last executing test programs: 8.394199531s ago: executing program 0 (id=6307): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6af}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r3, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB="0059e862aa969a11e915d8917600000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500"/28], 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000004c0)=ANY=[]) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7.693676732s ago: executing program 4 (id=6311): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x9) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) sendmsg$inet(r6, &(0x7f0000000880)={&(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="d4bf5c4ea266d41ae822405a73b027c7597eb41c43c74e8a50174b57cdac0aa48dc09f396f27abefcbb8c1a4719d7b3c0d2d153a54860d78e9a452fbe131b7927f065bb8203c6b69333dec02c5cf84a4c485e195506773c377bf48e32e730c1c7f67e3767a4cabefba86592de2750ee87b9a6caa5c99ef3cfbd5290d7c5679af96069b8d1b1cdef0e46c3cd372c3a7dbace3ff01e5e8f7ba0b7a1aeedfd282e7c04be355333d2896d2f38914beb16a0b744e4e7953fea14417c9b6abfe0bb7", 0xbf}, {&(0x7f0000000c00)="91b8b32c51e1aeeea3877b21bd68ac859827a488737f1e5c1042908280181f68e91a0629fa3fb92ff745897235b7fb50c5c3c7e8d42509852009c890394047304795b7c84b1cea0c0a42c794cf1febeb6c2588d91ec196bf798a69d4d5afb6ea9d42", 0x62}], 0x2, &(0x7f0000000780)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xaaf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0xb8}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 7.692995882s ago: executing program 0 (id=6312): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e00000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a04a1be5e4614"], 0x5) r5 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 7.692265762s ago: executing program 3 (id=6313): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="020000000000d400"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdfff00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xa, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000240), &(0x7f0000000280), 0x600}, 0x20) mkdir(0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x23, &(0x7f0000000e80)=ANY=[@ANYBLOB="d50a00000100000063111400404c030018600000090000000000000095a200001800000004000000000000000800000018530000020000000000000000000000b708000084c7d113d2f65d4c4bc27e161902adbf000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000010400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000950000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000700000000000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x7, 0x0, &(0x7f00000001c0)="b884770fc6d886", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000740)={0x1, 0x80, 0x1, 0x2a, 0x10, 0x4, 0x0, 0x2, 0x2000, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x4000, 0x8, 0x3, 0x6, 0xb, 0x4, 0xfeff, 0x0, 0xfffeffff, 0x0, 0x6}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="d347fb6c34db2ba800000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 7.168244913s ago: executing program 4 (id=6314): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) r4 = openat$cgroup_type(r1, &(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) write$cgroup_type(r4, &(0x7f0000000080), 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xb1, 0x0, &(0x7f0000000680)="9f44948721919580684010a486fcd9b32763a24b3e271d60cb95d35408c1173c771355f26c5680e7a446469f208d10794877eb22fa715d17dc329151dba8108f8278ff01cc1bc1b44fb374e9fec42d83783b7f540c614e2f09059376b87bb68fc850e1fd02f3e99ea5308358616b6aaed56aa1302c203a7519d608a0ecb8fcf4a1bfd061e6c3cf1216cfba17c5fd8e7681db816e7146138e0f14c1e9f3e8678970c3bd524e4bdf1cda86fe5b3a3c5336d0", 0x0, 0x241, 0x0, 0xfd1b, 0x0, 0x0, &(0x7f0000000000), 0x3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) syz_clone(0x200000, &(0x7f0000000240)="fce2", 0x2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f00000014c0)='\x14\xbe\x19J\xea\xb9*\xf6g\xf2\x84\xbfZ\xb91P9Lv\x92\xaf\x97\"a\x01\x00\x00\x00\x00\x00\x00\x00\xf6\x06\xf2P\x9c^\t\x9fGwI\xb5\x98\xcf/\x13\xc6\x80:\f\xa9\"Rhb\v\xf5`8\xc8\xe8*\xf0\xd0B\x1c\xea\x80\xcb\"\x182\xdb\xfd%MBl\xbd\x840&Tq\xc6\x1f\xd0i\xbf\xef\xfdi\xb9\x1bv\xf4Ii\xca\x01\x00\x00\x80\a\x00\x00\x00\x00\x00\x00\x00\xa5c\xb8S\x9d\xa8\x8f\xc8\xcb\x9e\x89\x00\x00\x00\x00\xbe\xc1\x81\x0e\x81\x19%\xcd\xde\x7f\xce\x06\xa6\xdbD\xf3\xb9rB\xda\x90\xf2\tJn\x9a\x0e[h\xf2Z\xcc\x87\xbdg\\\xcfO\x9e\xd6\xb8\xa0') r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x37) 7.101230257s ago: executing program 3 (id=6315): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x4, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100006cc70000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000469e5b9d00002bf483ea312bddf186a09caf4ce7cbff4b3989295c0a09e9029eea9fef5f95cd457f493ad600b0a7fd9a4ae5ba804040eb71cb71c1ef7c1cacf89ea5222ad0780489a9a0650bf9e1576c9dd51725ca551fe25b383ed72d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="181300"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c23003f) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="80", @ANYRES64=r3], 0xa) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) 6.860231061s ago: executing program 0 (id=6317): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000007000000000000", @ANYRES16=r1, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f00000013c0)=""/154, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000008100000081000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_subtree(r7, &(0x7f0000000000), 0x15) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002180)={&(0x7f0000001000)="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", &(0x7f0000002000)=""/37, 0x0, 0x0, 0x4f, r0, 0x4}, 0x38) 5.815724621s ago: executing program 0 (id=6318): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) write$cgroup_subtree(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) r4 = openat$cgroup_type(r1, &(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) write$cgroup_type(r4, &(0x7f0000000080), 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xb1, 0x0, &(0x7f0000000680)="9f44948721919580684010a486fcd9b32763a24b3e271d60cb95d35408c1173c771355f26c5680e7a446469f208d10794877eb22fa715d17dc329151dba8108f8278ff01cc1bc1b44fb374e9fec42d83783b7f540c614e2f09059376b87bb68fc850e1fd02f3e99ea5308358616b6aaed56aa1302c203a7519d608a0ecb8fcf4a1bfd061e6c3cf1216cfba17c5fd8e7681db816e7146138e0f14c1e9f3e8678970c3bd524e4bdf1cda86fe5b3a3c5336d0", 0x0, 0x241, 0x0, 0xfd1b, 0x0, 0x0, &(0x7f0000000000), 0x3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) syz_clone(0x200000, &(0x7f0000000240)="fce2", 0x2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f00000014c0)='\x14\xbe\x19J\xea\xb9*\xf6g\xf2\x84\xbfZ\xb91P9Lv\x92\xaf\x97\"a\x01\x00\x00\x00\x00\x00\x00\x00\xf6\x06\xf2P\x9c^\t\x9fGwI\xb5\x98\xcf/\x13\xc6\x80:\f\xa9\"Rhb\v\xf5`8\xc8\xe8*\xf0\xd0B\x1c\xea\x80\xcb\"\x182\xdb\xfd%MBl\xbd\x840&Tq\xc6\x1f\xd0i\xbf\xef\xfdi\xb9\x1bv\xf4Ii\xca\x01\x00\x00\x80\a\x00\x00\x00\x00\x00\x00\x00\xa5c\xb8S\x9d\xa8\x8f\xc8\xcb\x9e\x89\x00\x00\x00\x00\xbe\xc1\x81\x0e\x81\x19%\xcd\xde\x7f\xce\x06\xa6\xdbD\xf3\xb9rB\xda\x90\xf2\tJn\x9a\x0e[h\xf2Z\xcc\x87\xbdg\\\xcfO\x9e\xd6\xb8\xa0') r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x37) 4.051985384s ago: executing program 4 (id=6320): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x41}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) bpf$BPF_GET_PROG_INFO(0x1c, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, 0x0, &(0x7f0000001000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@map=0xffffffffffffffff, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480), &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0]}, 0x40) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="c1188e19b95d02ff4284860151b0", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open$cgroup(&(0x7f0000000440)={0x5, 0x80, 0x81, 0x7f, 0x7, 0x4, 0x4000, 0x3, 0x84021, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9}, 0x8401, 0x1, 0x2, 0x2, 0x7, 0xfffffffe, 0x1ff, 0x0, 0x9, 0x0, 0x6fdb}, r1, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r3, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.868705843s ago: executing program 0 (id=6324): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000b00000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x79}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000e56520207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x1e3, 0x0, &(0x7f0000001a80)="b9ff03076844268cb89e14f086dd47e0ffff00122c00631177fbac141416e000030a44079f034d2f87e589ca6aab845013f2325f1a3911050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff400000000000000000003ef85db5433c3a1bdadc04cbf7b9d1149086447bea005a3abc3610bac86039835651bbf7bad105d7ea23a8150883e84a1d41408473158e27a534a4a551f8c3c1ece52a9f07c5e9d3554b7a6502a7a7cf2af4b14149feb8e0f96db322f9fb0472d5cefef83bcf3daf7a98ce81eacc44f8d15b8ca58aab45d1ead3273ee9c9e7a818d00fe4bd0a1150e5b3b21fe5ce11ad91a556cdf4c66021b5da0fd9c6b46d1dfab4d1dbe810d0d5fb050979ba912140777e846f818e3be5aa1bfff502ad826fb5fb26353b15fb53453b0d69c67fe77059452030c08496ec6928eb139591c5506aba89087", 0x0, 0x3c82, 0x60000000, 0x97, 0x0, &(0x7f0000000a00)="5f0b387a486c13da1b21f41ebb3749558927bc1248973c8205ad32be74955cee15d7132b05e3ba71b280315b0657a95e6e153de5fcd38b05deb3e277c72baee7a0b86baf86c3af38321c6f5a26e907218c934d891147153efa5a7cbf44a8c85d1146cae90ce8465a01bcb09a372a43c5fa18d4eaefd0d934e2dd740ad95228696594c300"/151, &(0x7f0000000000), 0x0, 0x0, 0xfffffffe}, 0x50) syz_clone(0x48220100, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x6, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.835513985s ago: executing program 2 (id=6325): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="020000000000d400"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdfff00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xa, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000240), &(0x7f0000000280), 0x600}, 0x20) mkdir(0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x23, &(0x7f0000000e80)=ANY=[@ANYBLOB="d50a00000100000063111400404c030018600000090000000000000095a200001800000004000000000000000800000018530000020000000000000000000000b708000084c7d113d2f65d4c4bc27e161902adbf000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000010400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000950000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000700000000000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x7, 0x0, &(0x7f00000001c0)="b884770fc6d886", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000740)={0x1, 0x80, 0x1, 0x2a, 0x10, 0x4, 0x0, 0x2, 0x2000, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x4000, 0x8, 0x3, 0x6, 0xb, 0x4, 0xfeff, 0x0, 0xfffeffff, 0x0, 0x6}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="d347fb6c34db2ba800000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.74028447s ago: executing program 4 (id=6326): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x1, 0x7, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000180), 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2f0000001c100000000000008074a9480cef3a"], 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x0, 0xcc0, 0xfffffffffffffde6, &(0x7f00000001c0)="348b0d151f8218e3c73697e4080049c416b90900000093291cfc5e8b99005e8b9900", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_type(r2, &(0x7f0000000b00), 0x9) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.525036783s ago: executing program 2 (id=6327): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x0, 0x0}, 0x30) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x2, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x8000000}, 0x42, 0x0, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) syz_open_procfs$namespace(r2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120500"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r6, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa5, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000004c0), 0x8, 0xaf, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x5, 0x3, 0x9, 0x200, r5, 0x6, '\x00', r7, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0xb}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1802000080ffffff0000000000000000850000003600000085000000080000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x739d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.456987367s ago: executing program 1 (id=6328): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000007000000000000", @ANYRES16=r1, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f00000013c0)=""/154, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000008100000081000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_subtree(r7, &(0x7f0000000000), 0x15) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002180)={&(0x7f0000001000)="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", &(0x7f0000002000)=""/37, 0x0, 0x0, 0x4f, r0, 0x4}, 0x38) 2.128308736s ago: executing program 3 (id=6329): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r4, 0xc0189436, 0x210020000005) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYRESHEX=r1, @ANYBLOB="03506a2d3bfd5c016cb955b3f401695923d7c5d85c88469b79bab146e2aa6a22082c1ec4248d9006fee50d6851864d948a9c5130a71f31a6e6358c39b8db04c899b31ba310596618d41fcfc0874cf8ff38c5a1bf2b4b81da2f485b16291cbb2f6ff21e39472de70f350af91dc9ebf5c79de38fecdee4fd67c94bff1b5a08bf14041a5d19e741d1e5e7b4894bb45f6b16639c42e56d8bd672ceae9483da200beebf0311ee2e4d5651fd50504d8bd02f34aa79c0", @ANYBLOB="f842c8aa958bee780065ab311abd88866a863998c00caf79354f60e8f1d8964bb20e181a66f9a4716fe7a815dcc130f69e00c59effb1412eaef2df96f7bfc901e53ec56eedba756d8a1b74", @ANYBLOB="3552ec5b06a2a6faf2985c96d5c3a541140a5f2b9a429d83242b50b2cccf54fe24d2bdaebae279e9638b93427c08dfe7e7095879382cb81400f6da4dfe0934734caf4af13d74cb55c5115119470b0d701f0bc2f59dbb6d40d9bb4cf610a70b2c939993601e1a1825802a3a4d123e004b0e6d3151d63a3cac351340742e61196844c7d69f45acad8468094b3a2af19eb4592bb6e16fc8", @ANYRES8=r3, @ANYRESHEX=0x0, @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0xa) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x10, 0x17, &(0x7f0000000e80)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @generic={0xaf, 0x7, 0x8, 0x2, 0xfffffffa}, @jmp={0x5, 0x1, 0xc, 0xb, 0x6, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f0000000a80)='GPL\x00', 0xfffffffc, 0xad, &(0x7f0000000b40)=""/173, 0x41100, 0x35, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000cc0)={0x5, 0xd, 0x5f7, 0x10001}, 0x10, 0x0, r5, 0x3, &(0x7f0000000d40)=[r4, 0xffffffffffffffff, r2, r2], &(0x7f0000000d80)=[{0x1, 0x3, 0x8, 0x7}, {0x3, 0x3, 0xc, 0x9}, {0x1, 0x5, 0xf, 0x3}], 0x10, 0xb55}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000980)={r3, &(0x7f0000000780)="6383ba72329749b124f6e060fae0dd559be36ec9c76e7f6bdc8e77471b7367cd9b6be845780b468d5685d03c72580cf22524ed71592066096487e75f0c6850d5dad6211f56b9aa10fc2f788d758a4b417ebe210351f6c19cde56ed6bc50d2efebafdaf8e81798f1b769954fc1ce6eb0e21cf9326e07eaf0c433a77f621a0fb5582c2fa9cff438c2452f292d91ca9400bd5b7b7794b3b269d01d9cd3379", &(0x7f00000008c0)=""/161}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r9 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000001000)='&)&!*)\x00') 2.127329466s ago: executing program 4 (id=6330): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) write$cgroup_subtree(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) r4 = openat$cgroup_type(r1, &(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) write$cgroup_type(r4, &(0x7f0000000080), 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xb1, 0x0, &(0x7f0000000680)="9f44948721919580684010a486fcd9b32763a24b3e271d60cb95d35408c1173c771355f26c5680e7a446469f208d10794877eb22fa715d17dc329151dba8108f8278ff01cc1bc1b44fb374e9fec42d83783b7f540c614e2f09059376b87bb68fc850e1fd02f3e99ea5308358616b6aaed56aa1302c203a7519d608a0ecb8fcf4a1bfd061e6c3cf1216cfba17c5fd8e7681db816e7146138e0f14c1e9f3e8678970c3bd524e4bdf1cda86fe5b3a3c5336d0", 0x0, 0x241, 0x0, 0xfd1b, 0x0, 0x0, &(0x7f0000000000), 0x3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) syz_clone(0x200000, &(0x7f0000000240)="fce2", 0x2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f00000014c0)='\x14\xbe\x19J\xea\xb9*\xf6g\xf2\x84\xbfZ\xb91P9Lv\x92\xaf\x97\"a\x01\x00\x00\x00\x00\x00\x00\x00\xf6\x06\xf2P\x9c^\t\x9fGwI\xb5\x98\xcf/\x13\xc6\x80:\f\xa9\"Rhb\v\xf5`8\xc8\xe8*\xf0\xd0B\x1c\xea\x80\xcb\"\x182\xdb\xfd%MBl\xbd\x840&Tq\xc6\x1f\xd0i\xbf\xef\xfdi\xb9\x1bv\xf4Ii\xca\x01\x00\x00\x80\a\x00\x00\x00\x00\x00\x00\x00\xa5c\xb8S\x9d\xa8\x8f\xc8\xcb\x9e\x89\x00\x00\x00\x00\xbe\xc1\x81\x0e\x81\x19%\xcd\xde\x7f\xce\x06\xa6\xdbD\xf3\xb9rB\xda\x90\xf2\tJn\x9a\x0e[h\xf2Z\xcc\x87\xbdg\\\xcfO\x9e\xd6\xb8\xa0') r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x37) 1.994158364s ago: executing program 1 (id=6331): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000180)=@base={0x8, 0x4, 0x4, 0xbf26, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0x4}, 0x50) 1.766644977s ago: executing program 3 (id=6332): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = getpid() perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000a3000000002e3fdaf44e209c152aea482f24369d0000000000000000000000050000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x80640, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a510110000b13a55f9c001000000000000801d1d39ee2bc336d1f4dc8bc91eab04cbab7043b959bac9f8e064cb8ebf6e19ca3c64781497e336fe2704d319935a1bbe8e06a5bf0301165ba62280b8eafa2fcab8118730d8aa1e97a51aa58ca608fb0c72832699263c3de5cb0741984627377c459ccb10b546a9dfcc198a88fdb55e7b8daaa5d0e19f2704abf5a0d382e6ac26b985a758963e922d884ae1761cad637d8c0c2e3c4797187cb2d688286e2300000000", @ANYRES32=r5], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000980), 0x4) close(r2) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.669511063s ago: executing program 2 (id=6333): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xa, 0x20, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r3, &(0x7f00000007c0)="1ab3070af18d261b883d25676b1cad1b2d3583e3fe27aa5c88f57a4fd80046d3d66f14d1e0b6524663305acf11621c05d673847d99e446762fe8e6c3b7d6d12b33dd447d91bbf3a033ac491cff55e6dabb78dceb29aa599c93eeefaa9ba4a92f55980f0b4799d256aeb89505694f4260798da15e99a6146c79b1fc0d99ebfd09e18f913336e57fce6a178e35dc6278277f22069c19411b895d80ca1468"}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x12, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004}, 0x94) bpf$LINK_DETACH(0x22, &(0x7f0000000040), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 1.344976791s ago: executing program 0 (id=6334): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) write$cgroup_subtree(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) r4 = openat$cgroup_type(r1, &(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) write$cgroup_type(r4, &(0x7f0000000080), 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xb1, 0x0, &(0x7f0000000680)="9f44948721919580684010a486fcd9b32763a24b3e271d60cb95d35408c1173c771355f26c5680e7a446469f208d10794877eb22fa715d17dc329151dba8108f8278ff01cc1bc1b44fb374e9fec42d83783b7f540c614e2f09059376b87bb68fc850e1fd02f3e99ea5308358616b6aaed56aa1302c203a7519d608a0ecb8fcf4a1bfd061e6c3cf1216cfba17c5fd8e7681db816e7146138e0f14c1e9f3e8678970c3bd524e4bdf1cda86fe5b3a3c5336d0", 0x0, 0x241, 0x0, 0xfd1b, 0x0, 0x0, &(0x7f0000000000), 0x3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) syz_clone(0x200000, &(0x7f0000000240)="fce2", 0x2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f00000014c0)='\x14\xbe\x19J\xea\xb9*\xf6g\xf2\x84\xbfZ\xb91P9Lv\x92\xaf\x97\"a\x01\x00\x00\x00\x00\x00\x00\x00\xf6\x06\xf2P\x9c^\t\x9fGwI\xb5\x98\xcf/\x13\xc6\x80:\f\xa9\"Rhb\v\xf5`8\xc8\xe8*\xf0\xd0B\x1c\xea\x80\xcb\"\x182\xdb\xfd%MBl\xbd\x840&Tq\xc6\x1f\xd0i\xbf\xef\xfdi\xb9\x1bv\xf4Ii\xca\x01\x00\x00\x80\a\x00\x00\x00\x00\x00\x00\x00\xa5c\xb8S\x9d\xa8\x8f\xc8\xcb\x9e\x89\x00\x00\x00\x00\xbe\xc1\x81\x0e\x81\x19%\xcd\xde\x7f\xce\x06\xa6\xdbD\xf3\xb9rB\xda\x90\xf2\tJn\x9a\x0e[h\xf2Z\xcc\x87\xbdg\\\xcfO\x9e\xd6\xb8\xa0') r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x37) 1.324259203s ago: executing program 1 (id=6335): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000060000000000000000000000850000009e00000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{}, &(0x7f0000000240), &(0x7f0000000300)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x264, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 1.250872137s ago: executing program 3 (id=6336): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6af}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r3, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB="0059e862aa969a11e915d8917600000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500"/28], 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000004c0)=ANY=[]) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.217134139s ago: executing program 2 (id=6337): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000342046fbf46087a27d000000009104ca7f1b0cf79d7c0baac0138c1c63d5074067fecb3c80009b9ae7eee915de5b6b223e7b6a345b41c134002fd9245a1f32d57f8823c6b3fb964093a1a71e1042c32446b08f93719358ce30b2d19c5b3f607868f05b0e0139ab4fd8d0c50654fdb7892d67bde00bb2fb2f5086eef629f3dd7f8721c7fdd9017f13badc6edc778ce334dea7a82b90037de52d45ba90ebda704e60b77bac8ee1cc0464e5d7fcac41a2f10214156be68b6b2351bb9156dd8251984403510d05ab87e2709d61f8e6d8f1aae2d687a1691b6efc56db4bedaebac2a5df2f6682ed4df843c293b690f1056b2b924f88c1fc1ff34a1117d476bef337ad2cc03dace76ef30e24a7cb1012271078a67285200618f3efd7feaf5e828cbdfd821057c0360e4e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100"/15, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) sendmsg$inet(r7, &(0x7f0000000880)={&(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="d4bf5c4ea266d41ae822405a73b027c7597eb41c43c74e8a50174b57cdac0aa48dc09f396f27abefcbb8c1a4719d7b3c0d2d153a54860d78e9a452fbe131b7927f065bb8203c6b69333dec02c5cf84a4c485e195506773c377bf48e32e730c1c7f67e3767a4cabefba86592de2750ee87b9a6caa5c99ef3cfbd5290d7c5679af96069b8d1b1cdef0e46c3cd372c3a7dbace3ff01e5e8f7ba0b7a1aeedfd282e7c04be355333d2896d2f38914beb16a0b744e4e7953fea14417c9b6abfe0bb7", 0xbf}, {&(0x7f0000000c00)="91b8b32c51e1aeeea3877b21bd68ac859827a488737f1e5c1042908280181f68e91a0629fa3fb92ff745897235b7fb50c5c3c7e8d42509852009c890394047304795b7c84b1cea0c0a42c794cf1febeb6c2588d91ec196bf798a69d4d5afb6ea9d42", 0x62}], 0x2, &(0x7f0000000780)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xaaf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0xb8}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.19796246s ago: executing program 1 (id=6338): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="020000000000d400"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdfff00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xa, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000240), &(0x7f0000000280), 0x600}, 0x20) mkdir(0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x23, &(0x7f0000000e80)=ANY=[@ANYBLOB="d50a00000100000063111400404c030018600000090000000000000095a200001800000004000000000000000800000018530000020000000000000000000000b708000084c7d113d2f65d4c4bc27e161902adbf000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000010400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000950000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000700000000000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x7, 0x0, &(0x7f00000001c0)="b884770fc6d886", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000740)={0x1, 0x80, 0x1, 0x2a, 0x10, 0x4, 0x0, 0x2, 0x2000, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x4000, 0x8, 0x3, 0x6, 0xb, 0x4, 0xfeff, 0x0, 0xfffeffff, 0x0, 0x6}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="d347fb6c34db2ba800000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 861.94294ms ago: executing program 1 (id=6339): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000b00000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB], 0x50) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, &(0x7f0000002900)=ANY=[@ANYBLOB], 0x18}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, &(0x7f00000000c0), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffed1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="1808000000000000000000001f0000151837000004000000000000000000000018100000", @ANYRES32=r1, @ANYBLOB="0000000000000000790000000000000085000000030000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000340), 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) 697.078669ms ago: executing program 4 (id=6340): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x4, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100006cc70000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000469e5b9d00002bf483ea312bddf186a09caf4ce7cbff4b3989295c0a09e9029eea9fef5f95cd457f493ad600b0a7fd9a4ae5ba804040eb71cb71c1ef7c1cacf89ea5222ad0780489a9a0650bf9e1576c9dd51725ca551fe25b383ed72d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="181300"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c23003f) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="80", @ANYRES64=r3], 0xa) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) 319.005251ms ago: executing program 2 (id=6341): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='1-0\n', @ANYRESOCT], 0x31) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0x14, 0x0, &(0x7f0000000000)="f8ad1dcc02cb29dcc80032008100", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 318.067001ms ago: executing program 2 (id=6342): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x4, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100006cc70000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000469e5b9d00002bf483ea312bddf186a09caf4ce7cbff4b3989295c0a09e9029eea9fef5f95cd457f493ad600b0a7fd9a4ae5ba804040eb71cb71c1ef7c1cacf89ea5222ad0780489a9a0650bf9e1576c9dd51725ca551fe25b383ed72d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="181300"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c23003f) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="80", @ANYRES64=r3], 0xa) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) 170.96261ms ago: executing program 3 (id=6343): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000f000000070000000010"], 0x13) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f5c4e59f8500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="189472239e1000c330dbd216ebf2100018120000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="895139725f", @ANYRES64=0x0], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x78}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 0s ago: executing program 1 (id=6344): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000b00000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x79}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000e56520207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x1e3, 0x0, &(0x7f0000001a80)="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", 0x0, 0x3c82, 0x60000000, 0x97, 0x0, &(0x7f0000000a00)="5f0b387a486c13da1b21f41ebb3749558927bc1248973c8205ad32be74955cee15d7132b05e3ba71b280315b0657a95e6e153de5fcd38b05deb3e277c72baee7a0b86baf86c3af38321c6f5a26e907218c934d891147153efa5a7cbf44a8c85d1146cae90ce8465a01bcb09a372a43c5fa18d4eaefd0d934e2dd740ad95228696594c300"/151, &(0x7f0000000000), 0x0, 0x0, 0xfffffffe}, 0x50) syz_clone(0x48220100, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x6, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 63.524881][ T30] audit: type=1400 audit(1769070875.715:117): avc: denied { associate } for pid=799 comm="syz.0.113" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 65.763107][ T831] device wg2 left promiscuous mode [ 65.927821][ T824] device wg2 entered promiscuous mode [ 66.915740][ T850] device sit0 left promiscuous mode [ 67.063697][ T849] device sit0 entered promiscuous mode [ 67.596396][ T859] device wg2 entered promiscuous mode [ 68.351463][ T876] device veth1_macvtap left promiscuous mode [ 70.243994][ T902] device wg2 left promiscuous mode [ 71.886098][ T921] device veth1_macvtap left promiscuous mode [ 72.251958][ T921] device wg2 entered promiscuous mode [ 73.642644][ T945] device wg2 left promiscuous mode [ 74.058383][ T946] ref_ctr_offset mismatch. inode: 0x91 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 74.082358][ T943] device wg2 entered promiscuous mode [ 74.463961][ T30] audit: type=1400 audit(1769070886.585:118): avc: denied { create } for pid=959 comm="syz.3.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 74.553373][ T962] syz.3.157[962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.945081][ T953] device sit0 left promiscuous mode [ 75.915713][ T954] device sit0 entered promiscuous mode [ 76.222187][ T965] device veth0_vlan left promiscuous mode [ 76.228310][ T965] device veth0_vlan entered promiscuous mode [ 76.244076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.284662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.292235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.349678][ T1001] syz.0.170[1001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.926042][ T1022] device veth0_vlan left promiscuous mode [ 78.959515][ T1022] device veth0_vlan entered promiscuous mode [ 79.428793][ T1045] device wg2 left promiscuous mode [ 80.935013][ T1064] ref_ctr_offset mismatch. inode: 0xcd offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 83.695256][ T1087] device veth0_vlan left promiscuous mode [ 83.701786][ T1087] device veth0_vlan entered promiscuous mode [ 83.916916][ T1097] device wg2 left promiscuous mode [ 83.976597][ T1096] device wg2 entered promiscuous mode [ 85.327315][ T1119] ref_ctr_offset mismatch. inode: 0x12a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 85.347412][ T1108] device veth0_vlan left promiscuous mode [ 85.613780][ T1108] device veth0_vlan entered promiscuous mode [ 86.192236][ T1130] device wg2 left promiscuous mode [ 86.320984][ T1130] device wg2 entered promiscuous mode [ 88.566481][ T1166] device veth0_vlan left promiscuous mode [ 88.734394][ T1166] device veth0_vlan entered promiscuous mode [ 88.963483][ T1170] ÿÿÿÿÿÿ: renamed from vlan1 [ 88.976372][ T1179] device wg2 left promiscuous mode [ 89.205963][ T30] audit: type=1400 audit(1769070901.405:119): avc: denied { create } for pid=1187 comm="syz.4.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 89.768924][ T1200] device wg2 entered promiscuous mode [ 90.529781][ T1217] device sit0 entered promiscuous mode [ 91.744846][ T1232] device wg2 left promiscuous mode [ 91.890083][ T1227] device wg2 left promiscuous mode [ 91.895781][ T1228] ÿÿÿÿÿÿ: renamed from vlan1 [ 92.014817][ T1229] device veth0_vlan left promiscuous mode [ 92.077560][ T1229] device veth0_vlan entered promiscuous mode [ 92.977492][ T1258] device wg2 entered promiscuous mode [ 95.988327][ T1328] device sit0 entered promiscuous mode [ 96.437937][ T1336] ÿÿÿÿÿÿ: renamed from vlan1 [ 97.529841][ T1362] device veth0_vlan left promiscuous mode [ 97.851350][ T1362] device veth0_vlan entered promiscuous mode [ 98.278240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.292892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.310789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 98.349927][ T1376] device sit0 left promiscuous mode [ 98.886095][ T1380] device sit0 entered promiscuous mode [ 99.560631][ T1383] ÿÿÿÿÿÿ: renamed from vlan1 [ 103.206540][ T1441] ÿÿÿÿÿÿ: renamed from vlan1 [ 107.036472][ T1530] ref_ctr_offset mismatch. inode: 0x1a1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 109.127792][ T1559] device wg2 left promiscuous mode [ 109.725472][ T1567] device wg2 left promiscuous mode [ 111.882735][ T1599] device syzkaller0 entered promiscuous mode [ 113.277418][ T1631] device veth0_vlan left promiscuous mode [ 113.319462][ T1631] device veth0_vlan entered promiscuous mode [ 113.746097][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.775521][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.829150][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 114.680355][ T1647] device wg2 entered promiscuous mode [ 115.564957][ T1665] syz.0.338[1665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.714932][ T1690] ref_ctr_offset mismatch. inode: 0x17c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 120.565444][ T1704] syz.0.349[1704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.292198][ T1713] device wg2 entered promiscuous mode [ 123.926994][ T1764] device veth0_vlan left promiscuous mode [ 124.018601][ T1763] ref_ctr_offset mismatch. inode: 0x175 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 124.047173][ T1764] device veth0_vlan entered promiscuous mode [ 124.166675][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.186092][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.194829][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 124.273688][ T1769] device sit0 entered promiscuous mode [ 124.938530][ T1778] device veth0_vlan left promiscuous mode [ 125.116382][ T1778] device veth0_vlan entered promiscuous mode [ 125.994559][ T1801] syz.2.375[1801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.293377][ T1811] ref_ctr_offset mismatch. inode: 0x186 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 126.705867][ T1827] device sit0 left promiscuous mode [ 126.909705][ T1824] device sit0 entered promiscuous mode [ 127.329314][ T1830] device veth0_vlan left promiscuous mode [ 127.359140][ T1830] device veth0_vlan entered promiscuous mode [ 127.466967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.549834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.654566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 129.040700][ T1890] device sit0 left promiscuous mode [ 129.862506][ T1891] device sit0 entered promiscuous mode [ 132.189039][ T1944] ref_ctr_offset mismatch. inode: 0x208 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 133.342295][ T1954] device wg2 entered promiscuous mode [ 135.708700][ T2002] device sit0 entered promiscuous mode [ 136.167043][ T2007] device wg2 left promiscuous mode [ 137.743822][ T2042] syz.2.438[2042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.896218][ T2046] ref_ctr_offset mismatch. inode: 0x22b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 138.162994][ T2055] device sit0 left promiscuous mode [ 138.538320][ T2052] device sit0 entered promiscuous mode [ 139.808065][ T2081] device syzkaller0 entered promiscuous mode [ 140.425687][ T2100] ref_ctr_offset mismatch. inode: 0x20b offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 141.274783][ T2119] device veth0_vlan left promiscuous mode [ 141.281475][ T2119] device veth0_vlan entered promiscuous mode [ 141.305156][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.323582][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.331501][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 141.344169][ T2120] device sit0 left promiscuous mode [ 141.388167][ T2122] device sit0 entered promiscuous mode [ 142.797371][ T2136] device syzkaller0 entered promiscuous mode [ 144.578362][ T2154] syz.1.468[2154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.359933][ T2178] device sit0 left promiscuous mode [ 149.619274][ T2180] device sit0 entered promiscuous mode [ 155.490472][ T2240] device wg2 left promiscuous mode [ 157.712229][ T2274] ref_ctr_offset mismatch. inode: 0x274 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 159.755747][ T2311] syz.4.508[2311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.013777][ T2322] ref_ctr_offset mismatch. inode: 0x286 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 162.147960][ T2364] syz.3.521[2364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.391246][ T2374] ref_ctr_offset mismatch. inode: 0x26f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 179.708945][ T2610] syz.0.592[2610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.061630][ T2649] device syzkaller0 entered promiscuous mode [ 182.179391][ T2669] ref_ctr_offset mismatch. inode: 0x2f0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 183.244505][ T2694] device syzkaller0 entered promiscuous mode [ 184.392561][ T2724] device wg2 entered promiscuous mode [ 184.788493][ T2732] device wg2 left promiscuous mode [ 184.809469][ T2739] syz.4.627[2739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.443437][ T2732] device veth0_vlan left promiscuous mode [ 185.494267][ T2732] device veth0_vlan entered promiscuous mode [ 186.177936][ T2752] device veth0_vlan left promiscuous mode [ 186.284562][ T2752] device veth0_vlan entered promiscuous mode [ 186.540506][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.550842][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.584651][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 188.689389][ T2798] device wg2 entered promiscuous mode [ 189.178890][ T2811] device veth0_vlan left promiscuous mode [ 189.225325][ T2811] device veth0_vlan entered promiscuous mode [ 189.404278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.413498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.422164][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 192.359933][ T2851] device wg2 entered promiscuous mode [ 195.393672][ T2894] device wg2 left promiscuous mode [ 195.625491][ T2893] device wg2 entered promiscuous mode [ 196.069534][ T2904] syz.3.673[2904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.235508][ T2925] device wg2 entered promiscuous mode [ 197.656294][ T2935] device wg2 left promiscuous mode [ 197.864281][ T2941] device wg2 entered promiscuous mode [ 199.597106][ T2976] device syzkaller0 entered promiscuous mode [ 199.664313][ T30] audit: type=1400 audit(1769071011.865:120): avc: denied { tracepoint } for pid=2990 comm="syz.3.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 202.584723][ T3029] device syzkaller0 entered promiscuous mode [ 203.217150][ T3045] device wg2 left promiscuous mode [ 203.397801][ T3045] device wg2 entered promiscuous mode [ 205.644730][ T3065] device veth1_macvtap entered promiscuous mode [ 205.651050][ T3065] device macsec0 entered promiscuous mode [ 205.861577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.423854][ T3075] device veth1_macvtap left promiscuous mode [ 206.436512][ T3075] device macsec0 left promiscuous mode [ 207.419991][ T3096] device syzkaller0 entered promiscuous mode [ 209.158443][ T3126] syz.0.736[3126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.277579][ T3130] device wg2 left promiscuous mode [ 209.654270][ T3130] device wg2 entered promiscuous mode [ 210.583276][ T3148] device sit0 left promiscuous mode [ 211.830571][ T3161] device syzkaller0 entered promiscuous mode [ 212.712852][ T3186] syz.0.754[3186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.390423][ T3198] device sit0 entered promiscuous mode [ 215.623237][ T3229] syz.3.765[3229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.178277][ T3248] device wg2 left promiscuous mode [ 218.837515][ T3291] Â: renamed from pim6reg1 [ 219.225030][ T3303] device wg2 left promiscuous mode [ 222.202968][ T3361] syz.3.801[3361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.247039][ T3361] syz.3.801[3361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.437904][ T30] audit: type=1400 audit(1769071034.635:121): avc: denied { ioctl } for pid=3370 comm="syz.0.804" path="pid:[4026532372]" dev="nsfs" ino=4026532372 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 225.974716][ T3427] syz.2.819[3427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.390121][ T3452] device wg2 entered promiscuous mode [ 231.425057][ T3471] syz.0.831[3471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.386290][ T30] audit: type=1400 audit(1769071046.585:122): avc: denied { create } for pid=3505 comm="syz.0.841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 243.106710][ T3606] device wg2 left promiscuous mode [ 244.310495][ T3619] device syzkaller0 entered promiscuous mode [ 246.144587][ T3650] device wg2 entered promiscuous mode [ 246.339247][ T3655] device veth0_vlan left promiscuous mode [ 246.500711][ T3655] device veth0_vlan entered promiscuous mode [ 246.748825][ T3662] ref_ctr_offset mismatch. inode: 0x3ca offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 246.857503][ T3654] device syzkaller0 entered promiscuous mode [ 248.340967][ T3707] device wg2 entered promiscuous mode [ 248.402492][ T3708] device wg2 left promiscuous mode [ 249.395765][ T3708] device veth0_vlan left promiscuous mode [ 249.401895][ T3708] device veth0_vlan entered promiscuous mode [ 249.438651][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.493394][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.517833][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 250.181969][ T3733] ref_ctr_offset mismatch. inode: 0x3dd offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 253.455264][ T3790] ref_ctr_offset mismatch. inode: 0x3fa offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 255.307791][ T3812] device wg2 left promiscuous mode [ 255.948218][ T3826] device wg2 entered promiscuous mode [ 257.264893][ T3859] device wg2 left promiscuous mode [ 257.443272][ T3856] device wg2 entered promiscuous mode [ 257.948609][ T3878] device wg2 left promiscuous mode [ 257.970381][ T3873] device wg2 entered promiscuous mode [ 258.793489][ T3901] device wg2 left promiscuous mode [ 259.065020][ T3904] device wg2 entered promiscuous mode [ 260.939879][ T3953] ref_ctr_offset mismatch. inode: 0x42e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 261.278673][ T3964] syz.0.960[3964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.278745][ T3964] syz.0.960[3964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.186511][ T4004] ref_ctr_offset mismatch. inode: 0x495 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 264.457565][ T4012] Â: renamed from pim6reg1 [ 264.909107][ T4016] device wg2 left promiscuous mode [ 269.062912][ T4053] Â: renamed from pim6reg1 [ 269.870560][ T4065] ref_ctr_offset mismatch. inode: 0x451 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 271.957136][ T30] audit: type=1400 audit(1769071084.155:123): avc: denied { create } for pid=4093 comm="syz.1.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 272.581645][ T4105] device veth0_vlan left promiscuous mode [ 272.591654][ T4105] device veth0_vlan entered promiscuous mode [ 272.631220][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.647873][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.663363][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 273.829213][ T4127] device syzkaller0 entered promiscuous mode [ 274.012768][ T4136] device macsec0 entered promiscuous mode [ 274.649930][ T4148] device syzkaller0 entered promiscuous mode [ 283.210703][ T4186] device syzkaller0 entered promiscuous mode [ 284.124720][ T4207] device wg2 left promiscuous mode [ 284.446975][ T4204] device wg2 entered promiscuous mode [ 287.159279][ T4233] device syzkaller0 entered promiscuous mode [ 288.861714][ T4276] device wg2 entered promiscuous mode [ 290.027091][ T4291] Â: renamed from pim6reg1 [ 291.898940][ T4317] device macsec0 left promiscuous mode [ 292.648307][ T4337] Â: renamed from pim6reg1 [ 296.613749][ T4378] device wg2 left promiscuous mode [ 300.277820][ T4414] device syzkaller0 entered promiscuous mode [ 300.935778][ T4422] device veth0_vlan left promiscuous mode [ 301.120548][ T4422] device veth0_vlan entered promiscuous mode [ 301.870538][ T4433] Â: renamed from pim6reg1 [ 301.984506][ T4438] ref_ctr_offset mismatch. inode: 0x511 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 306.005415][ T4478] ref_ctr_offset mismatch. inode: 0x519 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 308.548282][ T4498] ref_ctr_offset mismatch. inode: 0x4ed offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 309.315791][ T4523] device veth0_vlan left promiscuous mode [ 309.363278][ T4523] device veth0_vlan entered promiscuous mode [ 309.492512][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.503541][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.515082][ T4525] ref_ctr_offset mismatch. inode: 0x4c4 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 309.519606][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 310.337065][ T4533] device veth0_vlan left promiscuous mode [ 310.429392][ T4533] device veth0_vlan entered promiscuous mode [ 314.714992][ T4575] Â: renamed from pim6reg1 [ 315.264139][ T4580] ref_ctr_offset mismatch. inode: 0x54b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 319.548277][ T4613] device syzkaller0 entered promiscuous mode [ 319.946594][ T4623] ref_ctr_offset mismatch. inode: 0x4d5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 324.062161][ T4699] syz.3.1148[4699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.811206][ T4736] ref_ctr_offset mismatch. inode: 0x4fe offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 325.927379][ T4735] device veth0_vlan left promiscuous mode [ 325.933427][ T4735] device veth0_vlan entered promiscuous mode [ 325.956542][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.985266][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.066600][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 328.762406][ T4784] syz.4.1172[4784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.913092][ T4787] device veth0_vlan left promiscuous mode [ 329.176023][ T4787] device veth0_vlan entered promiscuous mode [ 329.239242][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.256142][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.293619][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 332.430064][ T4831] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.437266][ T4831] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.887799][ T4837] syz.0.1186[4837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.369383][ T4845] device veth0_vlan left promiscuous mode [ 333.514470][ T4845] device veth0_vlan entered promiscuous mode [ 340.676965][ T4915] ref_ctr_offset mismatch. inode: 0x5b9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 346.301607][ T4960] ref_ctr_offset mismatch. inode: 0x5c0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 347.024199][ T4969] syz.3.1222[4969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.641233][ T5014] syz.4.1234[5014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.880920][ T5019] device veth0_vlan left promiscuous mode [ 350.043483][ T5019] device veth0_vlan entered promiscuous mode [ 350.050505][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.093453][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.164980][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 352.224161][ T5054] syz.3.1247[5054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.633390][ T5109] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.652281][ T5109] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.394248][ T5153] device veth0_vlan left promiscuous mode [ 359.559281][ T5153] device veth0_vlan entered promiscuous mode [ 362.883826][ T5244] device veth0_vlan left promiscuous mode [ 362.928597][ T5244] device veth0_vlan entered promiscuous mode [ 362.965511][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.013716][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.052778][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 363.315465][ T5253] ref_ctr_offset mismatch. inode: 0x57b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 364.973454][ T5284] ref_ctr_offset mismatch. inode: 0x653 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 364.984915][ T5285] device veth0_vlan left promiscuous mode [ 364.997348][ T5285] device veth0_vlan entered promiscuous mode [ 366.380701][ T5304] ref_ctr_offset mismatch. inode: 0x667 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 366.693575][ T5309] device syzkaller0 entered promiscuous mode [ 367.824535][ T5321] syz.3.1321[5321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.365210][ T5331] ref_ctr_offset mismatch. inode: 0x687 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 372.328781][ T5358] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.335964][ T5358] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.034107][ T5369] ref_ctr_offset mismatch. inode: 0x627 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 380.083096][ T5440] ref_ctr_offset mismatch. inode: 0x6b0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 380.738887][ T5454] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.746229][ T5454] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.329525][ T5464] device veth0_vlan left promiscuous mode [ 381.443593][ T5464] device veth0_vlan entered promiscuous mode [ 383.363104][ T5500] ref_ctr_offset mismatch. inode: 0x6c2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 386.057560][ T5530] syz.2.1374[5530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.294297][ T5546] ref_ctr_offset mismatch. inode: 0x623 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 389.561175][ T5573] syz.3.1385[5573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.195210][ T5590] device veth0_vlan left promiscuous mode [ 390.356750][ T5590] device veth0_vlan entered promiscuous mode [ 390.711867][ T5607] device syzkaller0 entered promiscuous mode [ 390.876658][ T5594] ref_ctr_offset mismatch. inode: 0x634 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 402.424674][ T5729] device wg2 left promiscuous mode [ 403.372231][ T5741] ref_ctr_offset mismatch. inode: 0x68d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 404.224112][ T5762] syz.2.1431[5762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.204097][ T5776] ref_ctr_offset mismatch. inode: 0x622 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 406.028069][ T5792] ref_ctr_offset mismatch. inode: 0x629 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 407.023252][ T5806] ref_ctr_offset mismatch. inode: 0x664 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 408.873580][ T5834] device veth0_vlan left promiscuous mode [ 408.893171][ T5834] device veth0_vlan entered promiscuous mode [ 408.900138][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 408.963546][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 408.971257][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 409.445847][ T5840] ref_ctr_offset mismatch. inode: 0x63c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 410.659364][ T5870] ref_ctr_offset mismatch. inode: 0x680 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 414.552545][ T5919] ref_ctr_offset mismatch. inode: 0x746 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 415.696190][ T5930] syz.2.1474[5930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.503280][ T5973] ref_ctr_offset mismatch. inode: 0x6f8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 419.914115][ T5976] ref_ctr_offset mismatch. inode: 0x6b0 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 422.126249][ T6026] ref_ctr_offset mismatch. inode: 0x5df offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 422.163482][ T6018] ref_ctr_offset mismatch. inode: 0x704 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 424.163516][ T6058] device syzkaller0 entered promiscuous mode [ 425.613284][ T6080] ref_ctr_offset mismatch. inode: 0x716 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 425.838029][ T6086] syz.0.1514[6086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.010344][ T6134] syz.4.1526[6134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.243699][ T6125] device syzkaller0 entered promiscuous mode [ 428.449290][ T6141] device veth0_vlan left promiscuous mode [ 428.495926][ T6141] device veth0_vlan entered promiscuous mode [ 428.642917][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.662086][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 428.703283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 430.752853][ T6183] device veth0_vlan left promiscuous mode [ 430.833835][ T6183] device veth0_vlan entered promiscuous mode [ 432.176179][ T6197] device syzkaller0 entered promiscuous mode [ 438.861951][ T6302] device veth0_vlan left promiscuous mode [ 438.917002][ T6302] device veth0_vlan entered promiscuous mode [ 439.126709][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.136829][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.165218][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 440.878659][ T6324] device syzkaller0 entered promiscuous mode [ 444.655668][ T6350] device syzkaller0 entered promiscuous mode [ 451.053884][ T6419] device syzkaller0 entered promiscuous mode [ 453.007148][ T6434] device veth0_vlan left promiscuous mode [ 453.184229][ T6434] device veth0_vlan entered promiscuous mode [ 453.414771][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.433531][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.446884][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 454.684486][ T6456] device syzkaller0 entered promiscuous mode [ 457.603865][ T6501] device syzkaller0 entered promiscuous mode [ 458.981876][ T6513] device syzkaller0 entered promiscuous mode [ 474.908301][ T6682] ref_ctr_offset mismatch. inode: 0x722 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 475.335760][ T6693] device veth0_vlan left promiscuous mode [ 475.358530][ T6693] device veth0_vlan entered promiscuous mode [ 477.823807][ T6768] syz.2.1694[6768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.044579][ T6848] device veth0_vlan left promiscuous mode [ 483.101788][ T6848] device veth0_vlan entered promiscuous mode [ 483.242183][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 483.271359][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 483.378277][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 491.602774][ C1] sched: RT throttling activated [ 491.938696][ T6960] device syzkaller0 entered promiscuous mode [ 492.991027][ T6987] ref_ctr_offset mismatch. inode: 0x7e8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 493.972596][ T7018] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.979768][ T7018] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.082510][ T7026] device syzkaller0 entered promiscuous mode [ 495.592409][ T7054] ref_ctr_offset mismatch. inode: 0x897 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 498.606189][ T7076] syz.0.1778[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.606284][ T7076] syz.0.1778[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.189205][ T7076] syz.0.1778[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.328116][ T7082] device syzkaller0 entered promiscuous mode [ 500.685653][ T7106] ref_ctr_offset mismatch. inode: 0x819 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 504.962726][ T30] audit: type=1400 audit(1769071317.155:124): avc: denied { ioctl } for pid=7196 comm="syz.0.1809" path="socket:[40354]" dev="sockfs" ino=40354 ioctlcmd=0x54d3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 505.356226][ T7202] device syzkaller0 entered promiscuous mode [ 505.950454][ T7211] device syzkaller0 entered promiscuous mode [ 508.298280][ T7240] device syzkaller0 entered promiscuous mode [ 508.581555][ T7256] device syzkaller0 entered promiscuous mode [ 511.926640][ T7293] device syzkaller0 entered promiscuous mode [ 514.361185][ T7352] device syzkaller0 entered promiscuous mode [ 517.047692][ T7401] device syzkaller0 entered promiscuous mode [ 517.735026][ T7413] device veth0_vlan left promiscuous mode [ 517.740872][ T7413] device veth0_vlan entered promiscuous mode [ 517.971197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 518.017445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 518.031448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 519.220749][ T7444] device veth0_vlan left promiscuous mode [ 519.442823][ T7444] device veth0_vlan entered promiscuous mode [ 519.644897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 519.713823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 519.820795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 520.415168][ T7458] device syzkaller0 entered promiscuous mode [ 525.373917][ T7508] device macsec0 entered promiscuous mode [ 526.888178][ T7533] device syzkaller0 entered promiscuous mode [ 527.637276][ T7542] syz.2.1902[7542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 530.833958][ T7577] device syzkaller0 entered promiscuous mode [ 533.008633][ T7623] device syzkaller0 entered promiscuous mode [ 534.380279][ T7629] device syzkaller0 entered promiscuous mode [ 539.088530][ T30] audit: type=1400 audit(1769071351.285:125): avc: denied { create } for pid=7683 comm="syz.1.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 539.772888][ T7687] device syzkaller0 entered promiscuous mode [ 541.266102][ T7721] device syzkaller0 entered promiscuous mode [ 542.969769][ T7746] device syzkaller0 entered promiscuous mode [ 543.911619][ T7751] device wg2 left promiscuous mode [ 544.554225][ T7787] GPL: port 1(veth1_macvtap) entered blocking state [ 544.563366][ T7787] GPL: port 1(veth1_macvtap) entered disabled state [ 547.880640][ T7837] device veth0_vlan left promiscuous mode [ 548.000866][ T7837] device veth0_vlan entered promiscuous mode [ 548.045871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 548.054648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 548.062316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 553.720444][ T7906] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 553.734610][ T7906] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 553.902459][ T7906] device ÿÿÿÿÿÿ entered promiscuous mode [ 555.234145][ T7936] GPL: port 1(erspan0) entered blocking state [ 555.242100][ T7936] GPL: port 1(erspan0) entered disabled state [ 555.249844][ T7936] device erspan0 entered promiscuous mode [ 555.441397][ T7947] GPL: port 1(erspan0) entered blocking state [ 555.447660][ T7947] GPL: port 1(erspan0) entered forwarding state [ 555.906028][ T7958] device veth0_vlan left promiscuous mode [ 555.912136][ T7958] device veth0_vlan entered promiscuous mode [ 556.018904][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 556.083612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 556.224528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 564.529449][ T8031] device veth0_vlan left promiscuous mode [ 564.553617][ T8031] device veth0_vlan entered promiscuous mode [ 567.551397][ T8079] device syzkaller0 entered promiscuous mode [ 575.583246][ T8172] device macsec0 entered promiscuous mode [ 580.609843][ T8225] GPL: port 1(veth1_macvtap) entered blocking state [ 580.672911][ T8225] GPL: port 1(veth1_macvtap) entered disabled state [ 582.571304][ T8238] device syzkaller0 entered promiscuous mode [ 591.925667][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 591.940871][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 591.975412][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 595.540360][ T8371] device veth0_vlan left promiscuous mode [ 595.700937][ T8371] device veth0_vlan entered promiscuous mode [ 595.755876][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 595.769929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 595.803172][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 608.749599][ T8511] device syzkaller0 entered promiscuous mode [ 609.968623][ T8532] device veth0_vlan left promiscuous mode [ 610.001728][ T8532] device veth0_vlan entered promiscuous mode [ 610.121512][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.186632][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.256215][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 612.760895][ T8614] device syzkaller0 entered promiscuous mode [ 616.915921][ T8696] device sit0 left promiscuous mode [ 616.947282][ T8690] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 616.960173][ T8690] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 617.049202][ T8690] device ÿÿÿÿÿÿ entered promiscuous mode [ 623.317321][ T8821] ref_ctr_offset mismatch. inode: 0xa9f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 623.339521][ T8821] GPL: port 1(erspan0) entered blocking state [ 623.482768][ T8821] GPL: port 1(erspan0) entered disabled state [ 623.489301][ T8821] device erspan0 entered promiscuous mode [ 623.707120][ T8820] GPL: port 1(erspan0) entered blocking state [ 623.714370][ T8820] GPL: port 1(erspan0) entered forwarding state [ 623.799909][ T8818] device sit0 left promiscuous mode [ 624.763466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 625.413142][ T8844] device syzkaller0 entered promiscuous mode [ 625.795391][ T8880] device sit0 left promiscuous mode [ 625.852027][ T8880] device sit0 entered promiscuous mode [ 627.232353][ T8907] device syzkaller0 entered promiscuous mode [ 627.687254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.724979][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.781357][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 628.575911][ T30] audit: type=1400 audit(1769071440.775:126): avc: denied { create } for pid=8955 comm="syz.4.2281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 629.800238][ T8978] device syzkaller0 entered promiscuous mode [ 632.527866][ T9039] device sit0 left promiscuous mode [ 632.966771][ T9033] device syzkaller0 entered promiscuous mode [ 634.228307][ T9063] device wg2 entered promiscuous mode [ 634.244801][ T9067] device wg2 left promiscuous mode [ 636.141072][ T9085] device syzkaller0 entered promiscuous mode [ 637.852117][ T9107] ref_ctr_offset mismatch. inode: 0x99a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 637.963887][ T9109] GPL: port 1(erspan0) entered blocking state [ 638.145025][ T9109] GPL: port 1(erspan0) entered disabled state [ 638.151560][ T9109] device erspan0 entered promiscuous mode [ 638.279944][ T9107] GPL: port 1(erspan0) entered blocking state [ 638.287233][ T9107] GPL: port 1(erspan0) entered forwarding state [ 639.243972][ T9141] device veth0_vlan left promiscuous mode [ 639.305904][ T9141] device veth0_vlan entered promiscuous mode [ 639.440455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 639.451724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 639.594100][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 639.995592][ T9155] device syzkaller0 entered promiscuous mode [ 640.993604][ T9173] ref_ctr_offset mismatch. inode: 0xaed offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 641.001650][ T9178] device sit0 entered promiscuous mode [ 641.694554][ T9173] GPL: port 2(erspan0) entered blocking state [ 641.703520][ T9173] GPL: port 2(erspan0) entered disabled state [ 641.770545][ T9173] device erspan0 entered promiscuous mode [ 641.993587][ T9183] GPL: port 2(erspan0) entered blocking state [ 641.999726][ T9183] GPL: port 2(erspan0) entered forwarding state [ 642.057675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 642.073415][ T9196] device veth0_vlan left promiscuous mode [ 642.083065][ T9196] device veth0_vlan entered promiscuous mode [ 642.093442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 642.209168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 642.297999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 643.068699][ T9219] device syzkaller0 entered promiscuous mode [ 643.628276][ T9234] device veth0_vlan left promiscuous mode [ 643.652680][ T9234] device veth0_vlan entered promiscuous mode [ 643.973955][ T9240] ref_ctr_offset mismatch. inode: 0x919 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 645.562916][ T9297] ref_ctr_offset mismatch. inode: 0x9d9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 647.092193][ T9332] device veth0_vlan left promiscuous mode [ 647.475668][ T9332] device veth0_vlan entered promiscuous mode [ 647.601439][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 647.627452][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 647.645675][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 647.966208][ T9347] ref_ctr_offset mismatch. inode: 0xaf5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 648.116834][ T9348] GPL: port 2(erspan0) entered blocking state [ 648.132006][ T9348] GPL: port 2(erspan0) entered disabled state [ 648.155313][ T9348] device erspan0 entered promiscuous mode [ 650.099249][ T9420] device macsec0 entered promiscuous mode [ 652.597036][ T9482] device sit0 entered promiscuous mode [ 654.169270][ T9536] device sit0 left promiscuous mode [ 655.711519][ T9562] device syzkaller0 entered promiscuous mode [ 655.728736][ T9578] device macsec0 entered promiscuous mode [ 656.532387][ T9606] ref_ctr_offset mismatch. inode: 0x95c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 656.734345][ T9624] syz.2.2464[9624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.631409][ T9634] device syzkaller0 entered promiscuous mode [ 658.609242][ T9666] ref_ctr_offset mismatch. inode: 0xb77 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 659.714836][ T9683] syz.4.2482[9683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.672998][ T9690] device syzkaller0 entered promiscuous mode [ 674.054412][ T9823] device sit0 left promiscuous mode [ 674.277594][ T9820] device sit0 entered promiscuous mode [ 675.174377][ T9859] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 675.180396][ T9859] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 675.188215][ T9859] device ÿÿÿÿÿÿ entered promiscuous mode [ 675.248766][ T9859] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 675.255187][ T9859] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 676.116336][ T30] audit: type=1400 audit(1769071488.315:127): avc: denied { relabelfrom } for pid=9870 comm="syz.3.2534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 676.136638][ T30] audit: type=1400 audit(1769071488.315:128): avc: denied { relabelto } for pid=9870 comm="syz.3.2534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 676.347836][ T9876] device wg2 entered promiscuous mode [ 677.489250][ T9926] syz.4.2551[9926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.573454][ T9919] device sit0 left promiscuous mode [ 677.720170][ T9935] device syzkaller0 entered promiscuous mode [ 678.760807][ T9964] syz.0.2563[9964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.437673][ T9979] device sit0 left promiscuous mode [ 679.582176][ T9989] device syzkaller0 entered promiscuous mode [ 680.418978][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.471539][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 680.507340][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 682.734297][T10048] device syzkaller0 entered promiscuous mode [ 684.557336][T10066] ref_ctr_offset mismatch. inode: 0xbd2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 687.732789][T10093] syz.2.2599[10093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.757826][T10111] ref_ctr_offset mismatch. inode: 0xc31 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 690.304922][T10132] device sit0 entered promiscuous mode [ 690.758701][T10139] syz.2.2612[10139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 692.856273][T10177] syz.1.2623[10177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 696.209114][T10221] syz.2.2636[10221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.791036][T10273] syz.4.2650[10273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.034394][T10335] ref_ctr_offset mismatch. inode: 0xb15 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 702.737981][T10355] device sit0 left promiscuous mode [ 705.663704][T10395] ref_ctr_offset mismatch. inode: 0xcb1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 705.717702][T10395] GPL: port 2(erspan0) entered disabled state [ 706.916773][T10414] device sit0 left promiscuous mode [ 707.979254][T10431] syz.2.2692[10431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.979326][T10431] syz.2.2692[10431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.134618][T10429] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 709.135122][T10443] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 709.152724][T10443] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 709.159236][T10443] device ÿÿÿÿÿÿ entered promiscuous mode [ 712.847834][T10523] device sit0 entered promiscuous mode [ 715.450952][T10556] device sit0 left promiscuous mode [ 719.397796][T10595] device macsec0 entered promiscuous mode [ 720.197410][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.206273][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 720.214095][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 720.221669][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 720.227668][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 723.194692][T10653] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 724.749212][T10675] device sit0 entered promiscuous mode [ 726.097771][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 726.106362][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 726.114097][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 729.272339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.286941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.294760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 729.302986][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 729.308996][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 730.236060][T10761] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 731.716983][T10771] device sit0 entered promiscuous mode [ 732.568972][T10785] device sit0 entered promiscuous mode [ 735.131874][T10829] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 735.228938][T10829] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 735.312892][T10829] device ÿÿÿÿÿÿ entered promiscuous mode [ 739.350599][T10920] device sit0 left promiscuous mode [ 743.187852][T11012] device syzkaller0 entered promiscuous mode [ 744.496479][T11038] device sit0 entered promiscuous mode [ 757.972821][T11244] device sit0 entered promiscuous mode [ 761.157410][T11274] device sit0 left promiscuous mode [ 773.163809][T11364] device sit0 left promiscuous mode [ 774.106721][T11381] GPL: port 2(erspan0) entered blocking state [ 774.112866][T11381] GPL: port 2(erspan0) entered forwarding state [ 774.304740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 779.231789][T11469] device sit0 left promiscuous mode [ 782.047351][T11517] device sit0 entered promiscuous mode [ 784.142572][T11544] device wg2 entered promiscuous mode [ 786.743676][T11570] device sit0 left promiscuous mode [ 787.077599][T11574] device sit0 entered promiscuous mode [ 801.524698][T11707] device sit0 entered promiscuous mode [ 801.816664][T11706] device sit0 left promiscuous mode [ 808.073730][T11732] device sit0 entered promiscuous mode [ 812.162776][ T30] audit: type=1400 audit(1769071624.355:129): avc: denied { setattr } for pid=11764 comm="syz.0.3063" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 813.117690][T11779] device sit0 entered promiscuous mode [ 818.385609][T11833] device sit0 left promiscuous mode [ 818.405884][T11833] device sit0 entered promiscuous mode [ 821.501056][T11869] device sit0 left promiscuous mode [ 821.617412][T11869] device sit0 entered promiscuous mode [ 822.534335][T11886] device sit0 left promiscuous mode [ 824.122752][T11921] device sit0 entered promiscuous mode [ 825.717363][T11948] device wg2 left promiscuous mode [ 828.282805][T11969] device sit0 left promiscuous mode [ 828.483701][T11969] device sit0 entered promiscuous mode [ 830.864813][T12015] ref_ctr_offset mismatch. inode: 0xde2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 831.050470][T12023] device sit0 left promiscuous mode [ 832.926007][T12048] device wg2 left promiscuous mode [ 833.814651][T12069] device sit0 entered promiscuous mode [ 834.142379][T12080] device syzkaller0 entered promiscuous mode [ 834.218432][T12075] ref_ctr_offset mismatch. inode: 0xc6e offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 836.883261][T12115] device sit0 left promiscuous mode [ 837.535739][T12117] device sit0 entered promiscuous mode [ 837.664320][T12121] device sit0 left promiscuous mode [ 837.982956][T12125] ref_ctr_offset mismatch. inode: 0xc81 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 838.340957][T12128] device sit0 entered promiscuous mode [ 838.371271][T12136] device syzkaller0 entered promiscuous mode [ 839.019285][T12151] device sit0 left promiscuous mode [ 840.324918][T12178] device sit0 left promiscuous mode [ 841.539160][T12192] device syzkaller0 entered promiscuous mode [ 843.884251][T12214] ref_ctr_offset mismatch. inode: 0xdeb offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 844.324615][T12221] device wg2 entered promiscuous mode [ 844.351377][T12217] device wg2 left promiscuous mode [ 845.520536][T12266] ref_ctr_offset mismatch. inode: 0xe02 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 846.046988][T12265] device wg2 entered promiscuous mode [ 850.101265][T12323] device sit0 left promiscuous mode [ 850.115542][T12330] device sit0 entered promiscuous mode [ 850.849215][T12339] device sit0 left promiscuous mode [ 852.542065][T12384] device sit0 entered promiscuous mode [ 852.987545][T12402] device sit0 left promiscuous mode [ 853.149070][T12399] device sit0 entered promiscuous mode [ 855.663991][T12430] device wg2 entered promiscuous mode [ 855.706747][T12433] device sit0 left promiscuous mode [ 861.342799][T12482] device sit0 entered promiscuous mode [ 863.404299][T12514] device wg2 left promiscuous mode [ 863.419605][T12515] device wg2 entered promiscuous mode [ 864.029729][T12520] ref_ctr_offset mismatch. inode: 0xf40 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 864.191599][T12520] GPL: port 2(erspan0) entered blocking state [ 864.198511][T12520] GPL: port 2(erspan0) entered forwarding state [ 864.712786][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 864.965421][T12534] device sit0 entered promiscuous mode [ 866.475132][T12568] syz.1.3284[12568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.475208][T12568] syz.1.3284[12568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.207486][ T30] audit: type=1400 audit(1769071679.405:130): avc: denied { create } for pid=12574 comm="syz.4.3286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 867.987733][T12585] device syzkaller0 entered promiscuous mode [ 872.050039][ T30] audit: type=1400 audit(1769071684.225:131): avc: denied { create } for pid=12660 comm="syz.2.3309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 876.562941][T12703] device sit0 left promiscuous mode [ 881.033912][ T30] audit: type=1400 audit(1769071693.135:132): avc: denied { create } for pid=12738 comm="syz.2.3327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 882.253022][T12763] device syzkaller0 entered promiscuous mode [ 882.340087][T12761] device wg2 entered promiscuous mode [ 887.629285][T12820] device syzkaller0 entered promiscuous mode [ 887.882017][T12825] syz.2.3348[12825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 887.882092][T12825] syz.2.3348[12825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 895.970015][T12892] device syzkaller0 entered promiscuous mode [ 898.712260][T12918] device sit0 left promiscuous mode [ 899.847321][T12932] device wg2 left promiscuous mode [ 899.863251][T12933] device wg2 entered promiscuous mode [ 905.777791][T12978] device sit0 entered promiscuous mode [ 910.100421][T13053] device syzkaller0 entered promiscuous mode [ 919.019043][ T30] audit: type=1400 audit(1769071731.215:133): avc: denied { create } for pid=13112 comm="syz.2.3425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 922.935409][T13151] device wg2 entered promiscuous mode [ 923.234605][T13154] device sit0 entered promiscuous mode [ 923.473121][T13165] device wg2 left promiscuous mode [ 928.027910][T13209] device sit0 entered promiscuous mode [ 928.458210][T13223] device wg2 left promiscuous mode [ 929.301664][T13218] syz.1.3451[13218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 929.301740][T13218] syz.1.3451[13218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 932.303869][T13278] syz.3.3465[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 938.533027][T13341] syz.3.3484[13341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 940.804412][T13377] device syzkaller0 entered promiscuous mode [ 941.773787][T13390] syz.1.3498[13390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 943.597521][T13428] device syzkaller0 entered promiscuous mode [ 946.863503][T13468] device sit0 left promiscuous mode [ 947.079695][T13467] device sit0 entered promiscuous mode [ 947.958664][T13484] device syzkaller0 entered promiscuous mode [ 954.564801][T13602] syz.1.3554[13602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 954.603708][T13602] syz.1.3554[13602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 955.258778][T13621] device sit0 left promiscuous mode [ 957.349484][T13658] device sit0 left promiscuous mode [ 957.419859][T13660] syz.1.3569[13660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 957.446341][T13660] syz.1.3569[13660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 959.943556][T13699] device sit0 entered promiscuous mode [ 962.079209][T13715] device sit0 left promiscuous mode [ 962.548844][T13726] device wg2 left promiscuous mode [ 962.862895][T13738] device sit0 left promiscuous mode [ 963.561988][T13743] device sit0 entered promiscuous mode [ 963.621265][T13740] device wg2 entered promiscuous mode [ 972.593998][T13904] syz.4.3638[13904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 972.594072][T13904] syz.4.3638[13904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 973.104586][T13909] ref_ctr_offset mismatch. inode: 0xe2a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 975.916278][T13936] syz.3.3648[13936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 976.978295][T13952] ref_ctr_offset mismatch. inode: 0x1018 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 978.147086][T13970] device wg2 left promiscuous mode [ 980.540016][T13979] syz.1.3660[13979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 981.390192][T13992] ref_ctr_offset mismatch. inode: 0x112b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 982.681443][T14001] device sit0 left promiscuous mode [ 983.276587][T13999] device sit0 entered promiscuous mode [ 984.601426][T14037] device syzkaller0 entered promiscuous mode [ 984.742481][T14035] ref_ctr_offset mismatch. inode: 0x1146 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 989.239254][T14087] ref_ctr_offset mismatch. inode: 0xf8b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 989.264544][T14091] device syzkaller0 entered promiscuous mode [ 990.762773][T14108] device sit0 entered promiscuous mode [ 997.015593][T14171] syz.1.3714[14171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1000.027645][T14218] syz.1.3728[14218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.090479][T14254] device syzkaller0 entered promiscuous mode [ 1006.631609][T14298] device sit0 left promiscuous mode [ 1008.238487][T14326] device wg2 entered promiscuous mode [ 1008.793629][T14341] device sit0 left promiscuous mode [ 1011.677887][T14388] device sit0 entered promiscuous mode [ 1013.947054][T14432] syz.0.3789[14432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1013.947149][T14432] syz.0.3789[14432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1018.609858][T14464] syz.4.3796[14464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1018.887063][T14467] device sit0 left promiscuous mode [ 1019.084998][T14467] device sit0 entered promiscuous mode [ 1019.841336][T14486] device wg2 entered promiscuous mode [ 1020.763748][T14514] device sit0 entered promiscuous mode [ 1023.671145][T14545] device wg2 left promiscuous mode [ 1027.003174][T14569] device sit0 left promiscuous mode [ 1027.430697][T14567] device sit0 entered promiscuous mode [ 1028.394998][ T30] audit: type=1400 audit(1769071840.595:134): avc: denied { append } for pid=14577 comm="syz.3.3828" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1028.864791][T14588] device sit0 entered promiscuous mode [ 1029.053673][ T30] audit: type=1400 audit(1769071841.255:135): avc: denied { create } for pid=14587 comm="syz.2.3830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 1033.036947][T14669] device wg2 left promiscuous mode [ 1037.689382][T14699] syz.2.3860[14699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1037.689456][T14699] syz.2.3860[14699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1037.945385][T14705] device sit0 left promiscuous mode [ 1039.073898][T14713] device sit0 entered promiscuous mode [ 1042.074588][T14766] syz.0.3880[14766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1042.074659][T14766] syz.0.3880[14766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1043.604486][T14788] syz.1.3884[14788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1044.264007][T14804] device sit0 left promiscuous mode [ 1047.382429][T14840] ref_ctr_offset mismatch. inode: 0xf21 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1047.809069][T14856] device sit0 left promiscuous mode [ 1047.938229][T14859] device sit0 entered promiscuous mode [ 1049.523980][T14899] ref_ctr_offset mismatch. inode: 0xf37 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1051.162919][T14914] device sit0 entered promiscuous mode [ 1052.668034][T14935] device syzkaller0 entered promiscuous mode [ 1053.501459][T14941] device bridge_slave_1 left promiscuous mode [ 1053.507724][T14941] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.515563][T14941] device bridge_slave_0 left promiscuous mode [ 1053.521742][T14941] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.547500][T14965] device sit0 left promiscuous mode [ 1054.553212][T14960] syz.0.3930[14960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1054.652326][T14964] device sit0 entered promiscuous mode [ 1057.321452][T14995] device syzkaller0 entered promiscuous mode [ 1058.190674][T15007] syz.3.3943[15007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1061.692735][T15044] syz.0.3953[15044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1061.919120][T15044] syz.0.3953[15044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1062.713463][T15051] syz.1.3955[15051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1062.727308][T15049] device syzkaller0 entered promiscuous mode [ 1065.167958][T15092] syz.0.3967[15092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.168029][T15092] syz.0.3967[15092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1067.270677][T15102] device syzkaller0 entered promiscuous mode [ 1068.328973][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1068.337992][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1068.345942][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1068.353794][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1068.359793][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1069.019472][T15133] device sit0 left promiscuous mode [ 1069.019787][T15135] syz.0.3978[15135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1069.019852][T15135] syz.0.3978[15135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1070.348639][T15155] device syzkaller0 entered promiscuous mode [ 1072.065135][T15191] device sit0 entered promiscuous mode [ 1072.504802][T15204] syz.1.3993[15204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1072.922767][T15208] device sit0 left promiscuous mode [ 1073.631799][T15220] device syzkaller0 entered promiscuous mode [ 1076.736437][T15274] device syzkaller0 entered promiscuous mode [ 1080.840319][T15306] device sit0 entered promiscuous mode [ 1081.006486][T15310] device sit0 left promiscuous mode [ 1083.898213][T15350] device sit0 left promiscuous mode [ 1084.099554][T15349] syz.0.4035[15349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1084.099625][T15349] syz.0.4035[15349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1084.512320][T15356] device wg2 left promiscuous mode [ 1084.752981][T15365] device syzkaller0 entered promiscuous mode [ 1086.586348][T15398] syz.2.4050[15398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1086.586419][T15398] syz.2.4050[15398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1086.601779][T15404] device sit0 left promiscuous mode [ 1086.994636][T15404] device sit0 entered promiscuous mode [ 1087.200290][T15418] device syzkaller0 entered promiscuous mode [ 1087.763983][T15429] syz.1.4058[15429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1088.470965][T15431] device erspan0 left promiscuous mode [ 1088.488695][T15431] GPL: port 1(erspan0) entered disabled state [ 1088.506859][T15444] device sit0 left promiscuous mode [ 1089.016948][T15453] device sit0 left promiscuous mode [ 1089.121614][T15459] device sit0 entered promiscuous mode [ 1089.378269][T15464] device syzkaller0 entered promiscuous mode [ 1090.044490][T15472] syz.1.4071[15472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1092.200426][T15514] device syzkaller0 entered promiscuous mode [ 1092.244815][T15517] syz.1.4083[15517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1092.916765][T15523] device sit0 entered promiscuous mode [ 1093.867771][T15543] device sit0 left promiscuous mode [ 1094.400117][T15562] syz.0.4095[15562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1094.761131][T15567] device syzkaller0 entered promiscuous mode [ 1095.071780][T15572] ref_ctr_offset mismatch. inode: 0x1194 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1095.943015][T15597] device sit0 left promiscuous mode [ 1096.103522][T15599] syz.3.4107[15599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1096.494780][T15609] device wg2 entered promiscuous mode [ 1097.259642][T15621] ref_ctr_offset mismatch. inode: 0x11b0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1097.436491][T15628] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1098.531947][T15656] syz.0.4120[15656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1099.052412][T15674] device wg2 entered promiscuous mode [ 1099.186404][T15673] ref_ctr_offset mismatch. inode: 0x11c1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1099.439170][T15691] syz.2.4132[15691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1099.439238][T15691] syz.2.4132[15691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1099.475264][T15686] syz.2.4132[15686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1099.677298][T15686] syz.2.4132[15686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.429522][T15705] ref_ctr_offset mismatch. inode: 0x11d7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1100.785978][T15717] device syzkaller0 entered promiscuous mode [ 1101.714439][T15721] device sit0 entered promiscuous mode [ 1102.724632][T15755] ref_ctr_offset mismatch. inode: 0x126c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1103.244941][T15778] device syzkaller0 entered promiscuous mode [ 1103.378911][T15777] ref_ctr_offset mismatch. inode: 0x11f2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1105.304880][T15826] device sit0 entered promiscuous mode [ 1106.275052][T15842] device wg2 entered promiscuous mode [ 1108.110225][T15894] device wg2 left promiscuous mode [ 1108.149405][T15895] device wg2 entered promiscuous mode [ 1109.056478][T15915] device sit0 entered promiscuous mode [ 1111.951558][T15954] device syzkaller0 entered promiscuous mode [ 1112.672321][T15966] ref_ctr_offset mismatch. inode: 0x1217 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1113.211256][T15975] device wg2 entered promiscuous mode [ 1115.203295][T16013] device wg2 entered promiscuous mode [ 1115.976001][T16028] ref_ctr_offset mismatch. inode: 0x12db offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1116.420505][T16040] device erspan0 left promiscuous mode [ 1116.438273][T16040] GPL: port 1(erspan0) entered disabled state [ 1116.692236][T16051] device sit0 left promiscuous mode [ 1116.930222][T16049] ref_ctr_offset mismatch. inode: 0x1245 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1117.516881][T16057] GPL: port 1(erspan0) entered blocking state [ 1117.530778][T16057] GPL: port 1(erspan0) entered disabled state [ 1117.547826][T16057] device erspan0 entered promiscuous mode [ 1117.554004][T16057] GPL: port 1(erspan0) entered blocking state [ 1117.560115][T16057] GPL: port 1(erspan0) entered forwarding state [ 1117.950251][T16073] device sit0 left promiscuous mode [ 1118.319520][T16089] ref_ctr_offset mismatch. inode: 0x1166 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1118.368943][T16092] syz.2.4248[16092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1118.369016][T16092] syz.2.4248[16092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1118.914843][T16099] ref_ctr_offset mismatch. inode: 0x10d4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1118.961729][T16097] device wg2 left promiscuous mode [ 1119.125530][T16103] GPL: port 1(erspan0) entered blocking state [ 1119.131642][T16103] GPL: port 1(erspan0) entered disabled state [ 1119.145545][T16103] device erspan0 entered promiscuous mode [ 1119.162346][T16103] GPL: port 1(erspan0) entered blocking state [ 1119.168471][T16103] GPL: port 1(erspan0) entered forwarding state [ 1120.811398][T16159] ref_ctr_offset mismatch. inode: 0x126a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1120.839296][T16156] device wg2 left promiscuous mode [ 1122.095674][T16185] device erspan0 left promiscuous mode [ 1122.209569][T16185] GPL: port 1(erspan0) entered disabled state [ 1122.758847][T16202] ref_ctr_offset mismatch. inode: 0x138e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1123.131792][T16216] device wg2 left promiscuous mode [ 1123.184678][T16220] device sit0 left promiscuous mode [ 1123.467935][T16224] device wg2 entered promiscuous mode [ 1123.480435][T16223] device sit0 entered promiscuous mode [ 1124.283427][T16241] ref_ctr_offset mismatch. inode: 0x110a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1124.411745][T16241] GPL: port 1(erspan0) entered blocking state [ 1124.512379][T16241] GPL: port 1(erspan0) entered disabled state [ 1124.557473][T16241] device erspan0 entered promiscuous mode [ 1124.574604][T16241] GPL: port 1(erspan0) entered blocking state [ 1124.582447][T16241] GPL: port 1(erspan0) entered forwarding state [ 1124.644146][T16249] device wg2 left promiscuous mode [ 1124.734739][T16253] device wg2 entered promiscuous mode [ 1124.998764][ T30] audit: type=1400 audit(1769071937.195:136): avc: denied { create } for pid=16265 comm="syz.2.4303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1127.452709][T16297] ref_ctr_offset mismatch. inode: 0x132e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1128.223508][T16311] device sit0 entered promiscuous mode [ 1128.262807][T16310] device wg2 left promiscuous mode [ 1128.434162][T16310] device wg2 entered promiscuous mode [ 1128.921796][T16322] device wg2 left promiscuous mode [ 1130.287746][T16338] ref_ctr_offset mismatch. inode: 0x11a4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1130.760683][T16350] device sit0 entered promiscuous mode [ 1131.018999][T16359] device sit0 left promiscuous mode [ 1131.456578][T16368] device syzkaller0 entered promiscuous mode [ 1132.060723][T16379] syz.1.4333[16379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1132.060796][T16379] syz.1.4333[16379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1132.306359][T16385] ref_ctr_offset mismatch. inode: 0x11ba offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1133.376156][T16412] device sit0 left promiscuous mode [ 1133.783803][T16414] device sit0 entered promiscuous mode [ 1133.903609][T16421] device syzkaller0 entered promiscuous mode [ 1134.289713][T16431] syz.2.4347[16431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1134.289787][T16431] syz.2.4347[16431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1135.039308][T16442] device sit0 left promiscuous mode [ 1135.239040][T16442] device sit0 entered promiscuous mode [ 1136.351244][T16474] device syzkaller0 entered promiscuous mode [ 1137.048675][T16487] syz.1.4362[16487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1137.048745][T16487] syz.1.4362[16487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1138.234509][T16494] device erspan0 left promiscuous mode [ 1138.252077][T16494] GPL: port 1(erspan0) entered disabled state [ 1138.446432][T16499] device sit0 left promiscuous mode [ 1138.855168][T16509] device sit0 entered promiscuous mode [ 1139.898198][T16541] device sit0 left promiscuous mode [ 1140.261455][T16544] device sit0 entered promiscuous mode [ 1140.641888][T16552] syz.3.4385[16552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1140.647461][T16552] syz.3.4385[16552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1141.361729][T16557] device sit0 left promiscuous mode [ 1141.449224][T16566] device syzkaller0 entered promiscuous mode [ 1142.625275][T16595] syz.2.4397[16595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1142.625358][T16595] syz.2.4397[16595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1143.036410][T16607] device wg2 entered promiscuous mode [ 1144.913049][T16652] device wg2 entered promiscuous mode [ 1145.509447][T16658] device erspan0 left promiscuous mode [ 1145.515550][T16658] GPL: port 1(erspan0) entered disabled state [ 1145.999319][T16683] device sit0 left promiscuous mode [ 1146.261813][T16681] device sit0 entered promiscuous mode [ 1146.519270][T16689] device sit0 entered promiscuous mode [ 1147.806830][T16731] device syzkaller0 entered promiscuous mode [ 1148.525886][T16735] device sit0 left promiscuous mode [ 1148.536356][T16734] device sit0 entered promiscuous mode [ 1150.524697][T16766] syz.2.4448[16766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1150.524769][T16766] syz.2.4448[16766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1151.547205][T16773] device wg2 left promiscuous mode [ 1153.040528][T16795] device wg2 entered promiscuous mode [ 1153.477857][T16802] syz.1.4459[16802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1153.477925][T16802] syz.1.4459[16802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1153.540844][T16797] device wg2 left promiscuous mode [ 1153.716700][T16806] device wg2 entered promiscuous mode [ 1154.221818][T16820] device wg2 left promiscuous mode [ 1154.378759][T16827] device wg2 entered promiscuous mode [ 1155.259303][T16855] device wg2 left promiscuous mode [ 1155.439327][T16860] device wg2 entered promiscuous mode [ 1156.045076][T16877] device wg2 left promiscuous mode [ 1156.237435][T16865] syz.1.4474[16865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1156.237511][T16865] syz.1.4474[16865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1157.974740][T16907] device sit0 entered promiscuous mode [ 1158.101631][T16920] device wg2 left promiscuous mode [ 1159.482471][T16962] device sit0 left promiscuous mode [ 1159.513012][T16965] device sit0 entered promiscuous mode [ 1161.782845][T17032] device sit0 left promiscuous mode [ 1162.278597][T17048] device wg2 left promiscuous mode [ 1162.389784][T17050] device wg2 entered promiscuous mode [ 1162.993159][T17062] device erspan0 left promiscuous mode [ 1163.026789][T17062] GPL: port 1(erspan0) entered disabled state [ 1164.496311][T17099] device sit0 entered promiscuous mode [ 1165.372768][T17132] syz.1.4555[17132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1165.372837][T17132] syz.1.4555[17132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1165.770737][T17144] device wg2 left promiscuous mode [ 1165.993877][T17148] device wg2 entered promiscuous mode [ 1167.273586][T17187] GPL: port 1(erspan0) entered blocking state [ 1167.279894][T17187] GPL: port 1(erspan0) entered disabled state [ 1167.312989][T17187] device erspan0 entered promiscuous mode [ 1167.353719][T17178] ref_ctr_offset mismatch. inode: 0x12ca offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1167.430755][T17187] GPL: port 1(erspan0) entered blocking state [ 1167.436919][T17187] GPL: port 1(erspan0) entered forwarding state [ 1167.693954][T17195] device sit0 left promiscuous mode [ 1168.252022][T17204] device sit0 entered promiscuous mode [ 1168.456993][T17205] device erspan0 left promiscuous mode [ 1168.462787][T17205] GPL: port 2(erspan0) entered disabled state [ 1168.984905][T17225] ref_ctr_offset mismatch. inode: 0x1463 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1169.459069][T17244] device wg2 entered promiscuous mode [ 1170.786459][T17278] device wg2 left promiscuous mode [ 1170.926873][T17281] device wg2 entered promiscuous mode [ 1170.996917][T17284] device wg2 entered promiscuous mode [ 1172.394112][T17310] device erspan0 left promiscuous mode [ 1172.399690][T17310] GPL: port 2(erspan0) entered disabled state [ 1172.823560][T17311] device sit0 left promiscuous mode [ 1173.001657][T17316] syz.3.4614[17316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1173.001738][T17316] syz.3.4614[17316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1173.949130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1174.194181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1174.291973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1174.391983][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1174.398186][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1174.643735][T17337] device wg2 left promiscuous mode [ 1174.700357][T17329] device wg2 entered promiscuous mode [ 1175.588661][T17371] syz.4.4630[17371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1175.588730][T17371] syz.4.4630[17371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1175.646662][T17369] device syzkaller0 entered promiscuous mode [ 1176.656390][T17382] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1176.854437][T17380] device wg2 left promiscuous mode [ 1176.975978][T17385] device wg2 entered promiscuous mode [ 1177.376504][T17409] device sit0 left promiscuous mode [ 1178.452224][T17415] device sit0 entered promiscuous mode [ 1179.501869][T17427] syz.3.4647[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.501941][T17427] syz.3.4647[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.532087][T17429] device wg2 left promiscuous mode [ 1179.736472][T17435] device wg2 entered promiscuous mode [ 1180.022867][T17443] ref_ctr_offset mismatch. inode: 0x14c1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1180.245250][T17444] device sit0 left promiscuous mode [ 1180.588161][T17442] GPL: port 2(erspan0) entered blocking state [ 1180.596184][T17442] GPL: port 2(erspan0) entered disabled state [ 1180.604984][T17442] device erspan0 entered promiscuous mode [ 1180.611419][T17442] GPL: port 2(erspan0) entered blocking state [ 1180.617899][T17442] GPL: port 2(erspan0) entered forwarding state [ 1180.656052][T17445] device sit0 entered promiscuous mode [ 1182.445516][T17476] device syzkaller0 entered promiscuous mode [ 1182.573235][T17471] device sit0 left promiscuous mode [ 1183.118850][T17482] device wg2 left promiscuous mode [ 1183.303217][T17486] device wg2 entered promiscuous mode [ 1183.521086][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1183.569131][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1183.732983][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1183.740857][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1183.747069][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1183.757766][T17489] device sit0 entered promiscuous mode [ 1184.252187][T17517] device erspan0 left promiscuous mode [ 1184.303441][T17517] GPL: port 2(erspan0) entered disabled state [ 1184.637624][T17525] device sit0 left promiscuous mode [ 1185.037538][T17532] device sit0 entered promiscuous mode [ 1185.363934][T17544] ref_ctr_offset mismatch. inode: 0x1308 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1185.503612][T17538] device wg2 left promiscuous mode [ 1185.579085][T17548] device wg2 entered promiscuous mode [ 1185.616478][T17546] device sit0 left promiscuous mode [ 1186.246369][T17552] device sit0 entered promiscuous mode [ 1187.764608][T17596] syz.2.4692[17596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1187.764684][T17596] syz.2.4692[17596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1189.173068][T17610] device erspan0 left promiscuous mode [ 1189.324141][T17610] GPL: port 1(erspan0) entered disabled state [ 1193.557044][T17678] device sit0 left promiscuous mode [ 1193.960913][T17681] device sit0 entered promiscuous mode [ 1196.245893][T17733] device sit0 left promiscuous mode [ 1196.657489][T17736] device sit0 entered promiscuous mode [ 1199.107226][T17792] device sit0 entered promiscuous mode [ 1199.328012][T17796] device sit0 left promiscuous mode [ 1199.885957][T17799] device sit0 entered promiscuous mode [ 1200.657822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1200.673125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1200.717459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1200.803866][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1200.809910][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1202.224743][T17852] device wg2 left promiscuous mode [ 1202.286532][T17851] device wg2 entered promiscuous mode [ 1202.748684][T17866] device sit0 left promiscuous mode [ 1205.482120][T17917] device macsec0 left promiscuous mode [ 1206.041880][T17931] syz.4.4776[17931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1206.041950][T17931] syz.4.4776[17931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1206.983465][T17946] device wg2 left promiscuous mode [ 1207.146380][T17947] device wg2 entered promiscuous mode [ 1207.822591][ T30] audit: type=1400 audit(1769072019.985:137): avc: denied { create } for pid=17948 comm="syz.4.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1210.842947][T17998] syz.1.4800[17998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1210.843022][T17998] syz.1.4800[17998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1211.464975][T18013] device macsec0 left promiscuous mode [ 1211.714621][T18014] device wg2 entered promiscuous mode [ 1211.945543][T13439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1211.957605][T13439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1211.965787][T13439] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1212.112917][T13439] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1212.118956][T13439] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1218.272671][T18111] device macsec0 left promiscuous mode [ 1219.847645][T18142] device wg2 left promiscuous mode [ 1220.233779][T18143] device wg2 entered promiscuous mode [ 1220.337703][T18153] device wg2 left promiscuous mode [ 1220.730667][T18155] device wg2 entered promiscuous mode [ 1221.531361][T18182] syz.0.4856[18182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1221.531432][T18182] syz.0.4856[18182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1224.315320][T18241] device macsec0 left promiscuous mode [ 1228.344131][T18298] syz.0.4888[18298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1228.344205][T18298] syz.0.4888[18298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1231.033710][T18307] device sit0 entered promiscuous mode [ 1231.804818][T18323] device wg2 left promiscuous mode [ 1231.961353][T18328] device wg2 entered promiscuous mode [ 1233.368101][T18340] syz.0.4899[18340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1233.368173][T18340] syz.0.4899[18340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1234.837263][T18363] device sit0 left promiscuous mode [ 1235.799797][T18381] device sit0 left promiscuous mode [ 1235.843403][T18379] device sit0 entered promiscuous mode [ 1236.007485][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1236.016593][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1236.024377][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1236.031955][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1236.037970][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1236.915459][T18407] syz.0.4911[18407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1236.915533][T18407] syz.0.4911[18407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1237.197531][T18412] device sit0 entered promiscuous mode [ 1237.818756][T18419] device sit0 entered promiscuous mode [ 1238.432880][T18452] syz.2.4931[18452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1238.432953][T18452] syz.2.4931[18452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1239.115001][T18462] device sit0 left promiscuous mode [ 1239.731220][T18470] device sit0 left promiscuous mode [ 1239.773108][T18472] device sit0 entered promiscuous mode [ 1240.389303][T18495] device wg2 left promiscuous mode [ 1240.586324][T18498] device wg2 entered promiscuous mode [ 1240.902593][T18510] device sit0 left promiscuous mode [ 1240.998744][T18508] device sit0 left promiscuous mode [ 1241.597673][T18510] device sit0 entered promiscuous mode [ 1241.722553][T18513] device sit0 entered promiscuous mode [ 1242.196193][T18534] device sit0 entered promiscuous mode [ 1243.257508][T18547] device wg2 left promiscuous mode [ 1243.417684][T18548] device wg2 entered promiscuous mode [ 1249.574769][T18640] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1249.907297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1249.965106][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1250.049693][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1250.218287][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1250.224368][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1251.717316][T18692] device sit0 left promiscuous mode [ 1251.781312][T18691] device sit0 entered promiscuous mode [ 1252.300836][T18709] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1252.443862][T13439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1252.455120][T13439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1252.463941][T13439] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1252.471718][T13439] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1252.477761][T13439] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1256.667265][T18801] device wg2 left promiscuous mode [ 1256.876216][T18794] device wg2 entered promiscuous mode [ 1258.068208][T18824] device sit0 left promiscuous mode [ 1258.880748][T18832] device sit0 left promiscuous mode [ 1258.916406][T18831] device sit0 entered promiscuous mode [ 1258.979080][T18835] device macsec0 left promiscuous mode [ 1261.593163][T18882] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1261.646496][T18884] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1261.652931][T18884] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1262.008576][T18893] device sit0 left promiscuous mode [ 1264.015536][T18922] device sit0 left promiscuous mode [ 1264.560109][T18927] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1264.636400][T18928] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1264.642467][T18928] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1265.454403][T18944] device wg2 left promiscuous mode [ 1265.568025][T18947] device wg2 entered promiscuous mode [ 1266.374302][T18968] device sit0 entered promiscuous mode [ 1267.540259][T18988] device sit0 entered promiscuous mode [ 1268.782817][T19022] syz.2.5099[19022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1268.782889][T19022] syz.2.5099[19022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1268.937832][T19025] device sit0 entered promiscuous mode [ 1269.482198][T19035] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1269.659438][T19047] device sit0 left promiscuous mode [ 1270.373125][T19055] device veth1_macvtap entered promiscuous mode [ 1270.549398][T19055] device macsec0 entered promiscuous mode [ 1270.746682][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1271.760194][T19077] syz.3.5114[19077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1271.760270][T19077] syz.3.5114[19077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1273.021872][T19089] device sit0 left promiscuous mode [ 1273.081699][T19088] device sit0 entered promiscuous mode [ 1274.359202][T19108] device wg2 left promiscuous mode [ 1274.596265][T19114] device wg2 entered promiscuous mode [ 1274.610209][T19116] device wg2 left promiscuous mode [ 1274.802294][T19118] device wg2 entered promiscuous mode [ 1275.284497][T19137] device sit0 left promiscuous mode [ 1275.360056][T19131] device sit0 entered promiscuous mode [ 1275.654484][T19145] device sit0 left promiscuous mode [ 1276.574719][T19163] device wg2 left promiscuous mode [ 1276.748962][T19168] device wg2 entered promiscuous mode [ 1276.869685][T19174] device wg2 left promiscuous mode [ 1276.969789][T19171] device wg2 entered promiscuous mode [ 1277.315605][T19182] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1277.643731][T19176] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1277.650772][T19176] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1277.742890][T19189] device sit0 left promiscuous mode [ 1278.076273][T19198] device sit0 left promiscuous mode [ 1278.130502][T19193] device sit0 entered promiscuous mode [ 1280.505691][ T30] audit: type=1400 audit(1769072092.705:138): avc: denied { write } for pid=19233 comm="syz.1.5165" name="cgroup.subtree_control" dev="cgroup2" ino=320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1280.646639][ T30] audit: type=1400 audit(1769072092.705:139): avc: denied { open } for pid=19233 comm="syz.1.5165" path="" dev="cgroup2" ino=320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1280.703031][T19240] device sit0 entered promiscuous mode [ 1280.740179][ T30] audit: type=1400 audit(1769072092.775:140): avc: denied { ioctl } for pid=19233 comm="syz.1.5165" path="" dev="cgroup2" ino=320 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1281.071361][T19252] device wg2 left promiscuous mode [ 1281.150333][T19252] device wg2 entered promiscuous mode [ 1281.830396][T19262] device sit0 left promiscuous mode [ 1282.127004][T19267] device sit0 entered promiscuous mode [ 1283.290023][T19280] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1283.570365][T19285] device veth1_macvtap left promiscuous mode [ 1283.697805][T19285] device macsec0 left promiscuous mode [ 1288.017000][T19343] device sit0 entered promiscuous mode [ 1288.682446][T19349] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1288.933160][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1288.951565][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1289.022337][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1289.142760][T18764] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1289.148894][T18764] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1289.309347][T19374] device wg2 left promiscuous mode [ 1289.341674][T19369] device wg2 entered promiscuous mode [ 1289.566106][T19376] device sit0 left promiscuous mode [ 1290.917481][T19398] syz.2.5208[19398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1290.917553][T19398] syz.2.5208[19398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1292.763950][T19436] device sit0 entered promiscuous mode [ 1292.804826][T19451] syz.3.5222[19451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1292.804896][T19451] syz.3.5222[19451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1303.550767][ T30] audit: type=1400 audit(1769072115.745:141): avc: denied { create } for pid=19613 comm="syz.3.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1303.880368][T19622] syz.2.5274[19622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1303.880438][T19622] syz.2.5274[19622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1304.919919][T19640] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1305.975756][T19661] device wg2 left promiscuous mode [ 1306.139821][T19664] device wg2 entered promiscuous mode [ 1306.329861][T19680] syz.0.5289[19680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1306.329931][T19680] syz.0.5289[19680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1307.042792][T19692] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1307.514905][T19694] device wg2 left promiscuous mode [ 1307.552568][T19689] device wg2 entered promiscuous mode [ 1308.167134][T19703] device wg2 left promiscuous mode [ 1308.200878][T19704] device wg2 entered promiscuous mode [ 1308.243490][T19714] device wg2 left promiscuous mode [ 1308.320194][T19712] device wg2 entered promiscuous mode [ 1308.996226][T19730] device sit0 left promiscuous mode [ 1309.461227][T19739] device sit0 left promiscuous mode [ 1309.792996][T19738] device sit0 entered promiscuous mode [ 1309.993908][T19751] device sit0 entered promiscuous mode [ 1310.612132][T19752] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1310.845725][ T30] audit: type=1400 audit(1769072123.045:142): avc: denied { create } for pid=19764 comm="syz.2.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1311.235661][T19766] device wg2 left promiscuous mode [ 1311.324566][T19768] device wg2 entered promiscuous mode [ 1312.013475][T19796] device sit0 entered promiscuous mode [ 1312.126814][T19797] syz.2.5321[19797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1312.126888][T19797] syz.2.5321[19797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1312.587408][T19805] ref_ctr_offset mismatch. inode: 0x167d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1313.032599][T19813] device wg2 left promiscuous mode [ 1313.277608][T19829] ref_ctr_offset mismatch. inode: 0x1685 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1313.317256][T19831] device syzkaller0 entered promiscuous mode [ 1313.467522][T19825] GPL: port 1(erspan0) entered blocking state [ 1313.476752][T19825] GPL: port 1(erspan0) entered disabled state [ 1313.565237][T19825] device erspan0 entered promiscuous mode [ 1313.589613][T19825] GPL: port 1(erspan0) entered blocking state [ 1313.598235][T19825] GPL: port 1(erspan0) entered forwarding state [ 1315.318059][ T30] audit: type=1400 audit(1769072127.515:143): avc: denied { create } for pid=19863 comm="syz.1.5340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1320.591326][T19941] device wg2 entered promiscuous mode [ 1323.183969][T19975] device sit0 left promiscuous mode [ 1323.782725][T19976] device sit0 entered promiscuous mode [ 1325.369063][T19991] device sit0 left promiscuous mode [ 1326.428761][T20000] device wg2 left promiscuous mode [ 1326.592560][T20003] device wg2 entered promiscuous mode [ 1327.347270][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1327.368016][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1327.403722][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1327.466822][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1327.472903][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1327.510243][T20026] device sit0 left promiscuous mode [ 1327.529990][T20022] device sit0 entered promiscuous mode [ 1327.589441][T20025] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1327.692388][T20028] device wg2 left promiscuous mode [ 1328.026700][T20036] device wg2 entered promiscuous mode [ 1330.558479][T20100] device sit0 left promiscuous mode [ 1333.546162][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1333.559989][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1333.591812][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1333.627642][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1333.633711][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1333.683445][T20134] device sit0 entered promiscuous mode [ 1333.874247][T20142] syz.4.5413[20142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.874322][T20142] syz.4.5413[20142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1335.152354][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1335.178565][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1335.222808][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1335.232768][ T346] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1335.238881][ T346] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1335.391911][T20187] GPL: port 2(dummy0) entered blocking state [ 1335.423013][T20187] GPL: port 2(dummy0) entered disabled state [ 1335.566946][T20187] device dummy0 entered promiscuous mode [ 1335.628941][T20187] GPL: port 2(dummy0) entered blocking state [ 1335.636473][T20187] GPL: port 2(dummy0) entered forwarding state [ 1335.983072][T20184] device syzkaller0 entered promiscuous mode [ 1335.990527][T20186] device sit0 entered promiscuous mode [ 1336.459596][T20205] syz.4.5428[20205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.459668][T20205] syz.4.5428[20205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1337.913434][T20233] device sit0 left promiscuous mode [ 1338.101413][T20242] device sit0 left promiscuous mode [ 1338.231006][T20245] device sit0 entered promiscuous mode [ 1338.532172][T20239] device sit0 entered promiscuous mode [ 1339.608656][T20276] syz.1.5451[20276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.608725][T20276] syz.1.5451[20276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.115109][T20286] device wg2 left promiscuous mode [ 1340.142754][T20289] device wg2 entered promiscuous mode [ 1341.488160][T20318] GPL: port 1(erspan0) entered blocking state [ 1341.498825][T20318] GPL: port 1(erspan0) entered disabled state [ 1341.553692][T20318] device erspan0 entered promiscuous mode [ 1341.583798][T20315] ref_ctr_offset mismatch. inode: 0x15fa offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1341.627146][T20318] GPL: port 1(erspan0) entered blocking state [ 1341.633406][T20318] GPL: port 1(erspan0) entered forwarding state [ 1341.801094][T20321] device sit0 entered promiscuous mode [ 1342.323817][T20328] device wg2 left promiscuous mode [ 1342.559131][T20334] syz.4.5467[20334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1342.559203][T20334] syz.4.5467[20334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1342.712357][T20333] device wg2 entered promiscuous mode [ 1344.506292][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1344.549684][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1344.596203][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1344.646938][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1344.652992][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1344.743791][T20367] device sit0 left promiscuous mode [ 1344.782121][T20360] device sit0 left promiscuous mode [ 1344.793576][T20363] device sit0 entered promiscuous mode [ 1344.959152][T20362] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1345.098810][T20367] device sit0 entered promiscuous mode [ 1345.493166][T20378] syz.4.5479[20378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1345.493242][T20378] syz.4.5479[20378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1346.366784][T20373] device syzkaller0 entered promiscuous mode [ 1347.074448][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1347.138216][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1347.156268][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1347.164967][T18764] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1347.170988][T18764] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1347.377207][T20417] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1347.540177][T20420] device sit0 left promiscuous mode [ 1348.016179][T20425] device sit0 entered promiscuous mode [ 1348.260684][T20439] syz.2.5493[20439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1348.260753][T20439] syz.2.5493[20439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1348.272314][T20441] device sit0 left promiscuous mode [ 1349.093311][T20462] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1349.185932][T20460] device syzkaller0 entered promiscuous mode [ 1349.291177][T20473] device sit0 left promiscuous mode [ 1349.625162][T20476] device sit0 entered promiscuous mode [ 1349.990956][T20485] device sit0 left promiscuous mode [ 1350.347226][T20495] syz.3.5511[20495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1350.347301][T20495] syz.3.5511[20495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1350.553166][T20488] device sit0 entered promiscuous mode [ 1351.641804][T20509] device erspan0 left promiscuous mode [ 1351.691883][T20509] GPL: port 1(erspan0) entered disabled state [ 1352.936373][T20530] device syzkaller0 entered promiscuous mode [ 1353.157090][T20556] syz.0.5528[20556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1353.157167][T20556] syz.0.5528[20556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1353.200716][T20560] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1354.274871][T20577] device sit0 left promiscuous mode [ 1355.276541][T20579] device sit0 entered promiscuous mode [ 1355.483964][T20590] device sit0 left promiscuous mode [ 1356.677186][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1356.687737][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1356.751061][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1356.829416][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1356.835465][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1357.345477][T20633] device sit0 left promiscuous mode [ 1358.031999][T20640] device sit0 entered promiscuous mode [ 1358.075739][T20654] device sit0 entered promiscuous mode [ 1358.137562][T20645] device sit0 left promiscuous mode [ 1358.905250][T20664] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1358.928897][T20659] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1358.935470][T20659] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1359.646067][T20696] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1359.825859][T20698] device sit0 entered promiscuous mode [ 1360.539845][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1360.643880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1360.822080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1360.831721][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1360.837775][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1361.130359][T20718] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1361.924461][T20749] device sit0 entered promiscuous mode [ 1362.501100][T20752] device sit0 left promiscuous mode [ 1362.710090][T20755] device sit0 entered promiscuous mode [ 1365.586262][T20800] device wg2 left promiscuous mode [ 1365.780490][T20801] device wg2 entered promiscuous mode [ 1365.809848][T20815] device sit0 left promiscuous mode [ 1366.387430][T20818] device sit0 entered promiscuous mode [ 1368.658834][T20870] device wg2 left promiscuous mode [ 1368.759966][T20867] device wg2 entered promiscuous mode [ 1371.577817][T20915] syz.2.5629[20915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1371.577889][T20915] syz.2.5629[20915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1371.593614][T20914] device sit0 left promiscuous mode [ 1374.855694][T20980] syz.2.5647[20980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1374.855766][T20980] syz.2.5647[20980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1377.580947][T21030] device syzkaller0 entered promiscuous mode [ 1378.324205][T21049] syz.4.5664[21049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1378.324276][T21049] syz.4.5664[21049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1379.098483][T21076] device sit0 entered promiscuous mode [ 1379.473035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1379.483028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1379.493919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1379.501924][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1379.507974][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1379.711521][T21091] syz.0.5678 (21091) used greatest stack depth: 21680 bytes left [ 1379.796531][T21097] device wg2 left promiscuous mode [ 1379.900275][T21093] device wg2 entered promiscuous mode [ 1380.279558][T21108] syz.2.5683[21108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.279630][T21108] syz.2.5683[21108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.486304][T21112] device wg2 left promiscuous mode [ 1380.702321][T21116] device wg2 entered promiscuous mode [ 1380.732158][T21122] device sit0 left promiscuous mode [ 1381.265632][T21130] device sit0 left promiscuous mode [ 1381.290954][T21127] device sit0 entered promiscuous mode [ 1381.516842][T21125] device sit0 entered promiscuous mode [ 1382.474168][T21161] syz.4.5697[21161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1382.474239][T21161] syz.4.5697[21161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1382.645361][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1382.914923][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1383.126088][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1383.333404][T18764] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1383.339516][T18764] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1383.505116][T21169] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1383.803665][T21181] device sit0 left promiscuous mode [ 1384.091529][T21176] device syzkaller0 entered promiscuous mode [ 1384.106837][T21183] device sit0 left promiscuous mode [ 1384.153348][T21184] device sit0 entered promiscuous mode [ 1384.251009][T21185] device sit0 entered promiscuous mode [ 1385.547097][T21222] syz.4.5713[21222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1385.547170][T21222] syz.4.5713[21222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1387.653798][T21236] device syzkaller0 entered promiscuous mode [ 1387.707777][T21256] device erspan0 left promiscuous mode [ 1387.736552][T21256] GPL: port 1(erspan0) entered disabled state [ 1389.467176][T21298] GPL: port 2(dummy0) entered blocking state [ 1389.504753][T21298] GPL: port 2(dummy0) entered disabled state [ 1389.630445][T21298] device dummy0 entered promiscuous mode [ 1389.702457][T21298] GPL: port 2(dummy0) entered blocking state [ 1389.711978][T21298] GPL: port 2(dummy0) entered forwarding state [ 1389.874120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1389.887539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1389.895495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1389.903531][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1389.909561][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1392.184810][T21334] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1397.107704][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1397.164095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1397.220036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1397.295610][ T10] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1397.301675][ T10] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1400.242649][T21440] device wg2 left promiscuous mode [ 1400.436953][T21439] device wg2 entered promiscuous mode [ 1403.775987][T21477] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1406.130556][T21503] device wg2 left promiscuous mode [ 1406.334224][T21504] device wg2 entered promiscuous mode [ 1406.950470][T21511] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1407.235185][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1407.307201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1407.356010][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1407.363718][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1407.369718][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1407.386000][T21514] GPL: port 1(dummy0) entered blocking state [ 1407.393354][T21514] GPL: port 1(dummy0) entered disabled state [ 1407.443216][T21514] device dummy0 entered promiscuous mode [ 1407.467590][T21514] GPL: port 1(dummy0) entered blocking state [ 1407.475220][T21514] GPL: port 1(dummy0) entered forwarding state [ 1407.891083][T21527] device wg2 left promiscuous mode [ 1408.188710][T21533] device wg2 entered promiscuous mode [ 1408.443577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1408.474405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1408.543475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1408.685952][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1408.692158][ T8] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1408.946252][T21546] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1409.429176][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1409.437759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1409.445657][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1409.453579][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1409.459683][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1409.650767][T21561] device sit0 left promiscuous mode [ 1410.019191][T21567] device sit0 entered promiscuous mode [ 1410.329353][T21575] syz.4.5818[21575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1410.334604][T21575] syz.4.5818[21575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1410.953882][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1411.063130][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1411.190790][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1411.252359][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1411.258415][ T45] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1412.176032][T21619] device sit0 left promiscuous mode [ 1412.471629][T21626] syz.3.5832[21626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1412.471701][T21626] syz.3.5832[21626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1412.960527][T21628] device sit0 entered promiscuous mode [ 1415.721912][T21676] device sit0 left promiscuous mode [ 1416.477777][T21683] device wg2 left promiscuous mode [ 1417.594784][T21703] device sit0 left promiscuous mode [ 1417.796647][T21703] device sit0 entered promiscuous mode [ 1419.123595][T21718] device sit0 left promiscuous mode [ 1420.010442][T21726] device sit0 left promiscuous mode [ 1420.522521][T21745] device sit0 left promiscuous mode [ 1420.721373][T21748] device sit0 entered promiscuous mode [ 1422.037693][T21775] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1422.054020][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1422.063375][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1422.064365][T21768] syz.0.5873[21768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1422.070746][T21768] syz.0.5873[21768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1422.071110][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1422.223207][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1422.229294][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1422.462641][T21780] device sit0 left promiscuous mode [ 1423.373336][T21796] device sit0 left promiscuous mode [ 1425.532662][T21836] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1425.649185][T21824] syz.1.5891[21824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1425.677313][T21824] syz.1.5891[21824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1425.722826][T21839] device sit0 entered promiscuous mode [ 1426.209012][T21854] GPL: port 1(dummy0) entered blocking state [ 1426.227688][T21854] GPL: port 1(dummy0) entered disabled state [ 1426.294792][T21854] device dummy0 entered promiscuous mode [ 1426.335005][T21854] GPL: port 1(dummy0) entered blocking state [ 1426.342004][T21854] GPL: port 1(dummy0) entered forwarding state [ 1426.401981][T21866] device wg2 left promiscuous mode [ 1426.592043][T21866] device wg2 entered promiscuous mode [ 1428.043021][T21895] device sit0 entered promiscuous mode [ 1430.594928][T21940] device sit0 entered promiscuous mode [ 1431.626106][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1431.644796][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1431.703061][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1431.710853][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1431.717139][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1431.914694][T21968] device sit0 entered promiscuous mode [ 1432.579157][T21978] device sit0 left promiscuous mode [ 1433.665149][T21994] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1433.866810][T21990] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1433.872863][T21990] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1435.606535][T22020] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1436.019979][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1436.033192][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1436.042928][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1436.081692][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1436.087749][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1436.276889][T22029] device sit0 left promiscuous mode [ 1437.512029][T22049] device sit0 entered promiscuous mode [ 1437.959979][T22072] device sit0 left promiscuous mode [ 1438.178320][T22077] device wg2 left promiscuous mode [ 1438.759127][T22067] device sit0 entered promiscuous mode [ 1438.773383][T22080] device wg2 entered promiscuous mode [ 1440.025467][T22094] device syzkaller0 entered promiscuous mode [ 1440.121567][T22097] device sit0 left promiscuous mode [ 1440.242474][T22099] device sit0 entered promiscuous mode [ 1440.440443][T22108] device sit0 left promiscuous mode [ 1440.803833][T22120] device wg2 entered promiscuous mode [ 1440.816875][T22112] device wg2 left promiscuous mode [ 1441.005018][T22117] device wg2 entered promiscuous mode [ 1441.093107][T22123] device wg2 left promiscuous mode [ 1441.262826][T22126] device wg2 entered promiscuous mode [ 1442.147775][T22146] device sit0 entered promiscuous mode [ 1443.309521][T22169] device wg2 left promiscuous mode [ 1443.568543][T22173] device wg2 entered promiscuous mode [ 1443.662512][T22182] device sit0 left promiscuous mode [ 1443.922020][T22189] syz.2.5997[22189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1443.922092][T22189] syz.2.5997[22189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1444.011855][T22192] device sit0 entered promiscuous mode [ 1445.023094][T22216] device wg2 left promiscuous mode [ 1445.159305][T22216] device wg2 entered promiscuous mode [ 1445.853844][T22220] device wg2 left promiscuous mode [ 1446.010987][T22221] device wg2 entered promiscuous mode [ 1446.408645][T22227] device sit0 entered promiscuous mode [ 1446.727416][T22240] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1447.189605][T22251] syz.2.6016[22251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1447.189680][T22251] syz.2.6016[22251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1449.313419][T22274] device sit0 left promiscuous mode [ 1449.559750][T22272] device sit0 entered promiscuous mode [ 1450.335823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1450.393175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1450.594717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1450.732604][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1450.738652][ T8] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1450.964185][T22285] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1451.726668][T22293] syz.1.6029[22293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1451.745490][T22293] syz.1.6029[22293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1453.467659][T22316] device sit0 left promiscuous mode [ 1455.006064][T22342] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1455.250463][T22339] device wg2 left promiscuous mode [ 1455.327121][T22343] device wg2 entered promiscuous mode [ 1456.097299][T22362] device sit0 left promiscuous mode [ 1457.111679][T22379] syz.1.6053[22379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1457.111754][T22379] syz.1.6053[22379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1458.012120][T22408] device sit0 left promiscuous mode [ 1459.388169][T22419] device wg2 left promiscuous mode [ 1459.694614][T22423] device wg2 entered promiscuous mode [ 1461.889428][T22480] device wg2 left promiscuous mode [ 1461.962928][T22478] syz.0.6083[22478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.962999][T22478] syz.0.6083[22478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1462.222523][T22480] device wg2 entered promiscuous mode [ 1463.416062][T22501] device sit0 left promiscuous mode [ 1465.119534][T22536] device sit0 entered promiscuous mode [ 1466.831639][T22565] device sit0 entered promiscuous mode [ 1469.209508][T22600] device wg2 left promiscuous mode [ 1469.622086][T22607] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1469.722191][T22603] device wg2 entered promiscuous mode [ 1471.061488][T22628] device sit0 entered promiscuous mode [ 1471.692607][T22640] device sit0 left promiscuous mode [ 1472.701145][T22650] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1472.957231][T22652] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1472.963270][T22652] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1472.973371][T22659] device wg2 left promiscuous mode [ 1473.367627][T22674] device sit0 entered promiscuous mode [ 1474.736129][T22689] device sit0 entered promiscuous mode [ 1475.314415][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1475.373788][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1475.415129][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1475.554128][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1475.560198][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1476.033433][T22720] device sit0 left promiscuous mode [ 1476.196117][T22717] device sit0 entered promiscuous mode [ 1477.615867][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1477.691598][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1477.792852][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1477.848025][ T346] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1477.854084][ T346] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1478.220694][T22765] device sit0 left promiscuous mode [ 1478.837613][T22769] device sit0 entered promiscuous mode [ 1479.327546][T22776] device wg2 left promiscuous mode [ 1479.725899][T22778] device wg2 entered promiscuous mode [ 1479.787943][T22780] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1480.340865][T22800] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1480.638175][T22804] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1480.644364][T22804] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1480.708349][T22808] device sit0 entered promiscuous mode [ 1480.854044][T22818] device sit0 left promiscuous mode [ 1481.430087][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1481.449275][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1481.460569][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1481.543274][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1481.549314][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1481.939817][T22851] device sit0 left promiscuous mode [ 1482.383929][T22852] device sit0 entered promiscuous mode [ 1482.911079][T22873] device sit0 left promiscuous mode [ 1483.420680][T22876] device sit0 entered promiscuous mode [ 1483.960273][T22890] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1484.079535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1484.091704][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1484.103813][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1484.111350][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered blocking state [ 1484.117354][ T45] GPL: port 1(ÿÿÿÿÿÿ) entered forwarding state [ 1484.559451][T22904] device wg2 left promiscuous mode [ 1484.744190][T22904] device wg2 entered promiscuous mode [ 1486.074100][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1486.194075][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1486.347757][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1486.479772][T18764] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1486.486259][T18764] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1486.803577][T22945] device wg2 left promiscuous mode [ 1486.947136][T22944] device wg2 entered promiscuous mode [ 1487.793971][T22958] device syzkaller0 entered promiscuous mode [ 1489.490219][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1489.499660][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1489.557546][T18764] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1489.617512][T18764] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1489.623564][T18764] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1489.730167][T22997] device sit0 left promiscuous mode [ 1489.771924][T22986] device wg2 left promiscuous mode [ 1489.866421][T22998] device wg2 entered promiscuous mode [ 1489.877178][T22995] device sit0 entered promiscuous mode [ 1490.240966][T23005] device wg2 left promiscuous mode [ 1490.558466][T23012] device wg2 entered promiscuous mode [ 1492.638093][T23048] device sit0 left promiscuous mode [ 1493.229164][T23049] device sit0 entered promiscuous mode [ 1493.412377][T23052] device sit0 left promiscuous mode [ 1495.641730][T23100] device sit0 left promiscuous mode [ 1495.782581][T23098] device sit0 entered promiscuous mode [ 1497.123219][T23131] device wg2 left promiscuous mode [ 1497.291840][T23128] device wg2 entered promiscuous mode [ 1502.012199][T23165] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1502.162937][T23172] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1504.691064][T23199] device wg2 left promiscuous mode [ 1504.894954][T23202] device wg2 entered promiscuous mode [ 1505.455269][T23215] syz.3.6297[23215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.455338][T23215] syz.3.6297[23215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.635767][T23223] GPL: port 1(dummy0) entered blocking state [ 1505.672427][T23223] GPL: port 1(dummy0) entered disabled state [ 1505.678872][T23223] device dummy0 entered promiscuous mode [ 1505.806286][T23223] GPL: port 1(dummy0) entered blocking state [ 1505.812358][T23223] GPL: port 1(dummy0) entered forwarding state [ 1505.886684][T23224] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1505.921060][T23225] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1505.927104][T23225] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1507.620225][T23266] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 1508.193908][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1508.202950][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1508.219561][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1508.373134][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1508.379278][ T346] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1508.445989][T23272] device wg2 left promiscuous mode [ 1508.680979][T23290] device sit0 entered promiscuous mode [ 1510.879488][T23300] device syzkaller0 entered promiscuous mode [ 1512.280322][T23316] device sit0 entered promiscuous mode [ 1513.161750][T23335] device sit0 left promiscuous mode [ 1513.275772][T23334] device sit0 entered promiscuous mode [ 1513.352813][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1513.398851][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1513.473074][ T5480] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1513.518073][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered blocking state [ 1513.524149][ T5480] GPL: port 2(ÿÿÿÿÿÿ) entered forwarding state [ 1514.252295][T23365] GPL: port 1(ÿÿÿÿÿÿ) entered disabled state [ 1514.284785][T23360] device sit0 left promiscuous mode [ 1515.013138][T23370] device sit0 entered promiscuous mode [ 1515.085768][T23372] device sit0 left promiscuous mode [ 1515.981916][T23385] general protection fault, probably for non-canonical address 0xdffffc0000000018: 0000 [#1] PREEMPT SMP KASAN [ 1515.993670][T23385] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] [ 1516.002080][T23385] CPU: 1 PID: 23385 Comm: syz.3.6343 Not tainted syzkaller #0 [ 1516.009533][T23385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1516.019591][T23385] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 1516.026292][T23385] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 1d 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 fe 1a d1 fd 48 8b 7c 24 18 48 8d [ 1516.045895][T23385] RSP: 0018:ffffc900010577e0 EFLAGS: 00010206 [ 1516.052056][T23385] RAX: 0000000000000018 RBX: 1ffff9200020af00 RCX: 0000000000080000 [ 1516.060102][T23385] RDX: ffffc90003b74000 RSI: 00000000000087d6 RDI: 00000000000087d7 [ 1516.068059][T23385] RBP: ffffc900010578b0 R08: ffffc9000105783f R09: ffffc90001057820 [ 1516.076020][T23385] R10: dffffc0000000000 R11: fffff5200020af08 R12: 00000000000000c0 [ 1516.083979][T23385] R13: dffffc0000000000 R14: 1ffff1102811d784 R15: ffff8881408ebc20 [ 1516.091948][T23385] FS: 00007f390c4876c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1516.100876][T23385] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1516.107449][T23385] CR2: 0000000100000000 CR3: 000000010f5e3000 CR4: 00000000003506a0 [ 1516.115411][T23385] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1516.123371][T23385] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 1516.131515][T23385] Call Trace: [ 1516.134779][T23385] [ 1516.137697][T23385] ? sk_psock_start_verdict+0xc0/0xc0 [ 1516.143071][T23385] ? _raw_spin_lock+0x94/0xf0 [ 1516.147935][T23385] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1516.153729][T23385] ? skb_queue_tail+0xcb/0xf0 [ 1516.158423][T23385] unix_stream_sendmsg+0x7d1/0xc90 [ 1516.163579][T23385] ? unix_stream_sendmsg+0x721/0xc90 [ 1516.168849][T23385] ? unix_show_fdinfo+0xa0/0xa0 [ 1516.173943][T23385] ? security_socket_sendmsg+0x82/0xa0 [ 1516.179459][T23385] ? unix_show_fdinfo+0xa0/0xa0 [ 1516.184295][T23385] ____sys_sendmsg+0x5b7/0x8f0 [ 1516.189129][T23385] ? __sys_sendmsg_sock+0x40/0x40 [ 1516.194142][T23385] ? import_iovec+0x7c/0xb0 [ 1516.198697][T23385] ___sys_sendmsg+0x236/0x2e0 [ 1516.203376][T23385] ? __sys_sendmsg+0x280/0x280 [ 1516.208245][T23385] ? __fdget+0x1a1/0x230 [ 1516.212602][T23385] __x64_sys_sendmsg+0x206/0x2f0 [ 1516.217551][T23385] ? ___sys_sendmsg+0x2e0/0x2e0 [ 1516.222413][T23385] ? __kasan_check_write+0x14/0x20 [ 1516.227572][T23385] ? switch_fpu_return+0x15d/0x2c0 [ 1516.232725][T23385] x64_sys_call+0x4b/0x9a0 [ 1516.237156][T23385] do_syscall_64+0x4c/0xa0 [ 1516.241604][T23385] ? clear_bhb_loop+0x50/0xa0 [ 1516.246321][T23385] ? clear_bhb_loop+0x50/0xa0 [ 1516.250989][T23385] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1516.256869][T23385] RIP: 0033:0x7f390da2acb9 [ 1516.261271][T23385] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1516.280862][T23385] RSP: 002b:00007f390c487028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1516.289265][T23385] RAX: ffffffffffffffda RBX: 00007f390dca5fa0 RCX: 00007f390da2acb9 [ 1516.297225][T23385] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000005 [ 1516.305289][T23385] RBP: 00007f390da98bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1516.313270][T23385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1516.321228][T23385] R13: 00007f390dca6038 R14: 00007f390dca5fa0 R15: 00007ffd090ab948 [ 1516.329202][T23385] [ 1516.332224][T23385] Modules linked in: [ 1516.338521][ T30] audit: type=1400 audit(1769072328.535:144): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1516.389455][ T30] audit: type=1400 audit(1769072328.535:145): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1516.421542][T23385] ---[ end trace 1573720ff7dbc0a2 ]--- [ 1516.438440][T23385] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 1516.445564][T23385] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 1d 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 fe 1a d1 fd 48 8b 7c 24 18 48 8d [ 1516.467674][ T30] audit: type=1400 audit(1769072328.535:146): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1516.512463][T23385] RSP: 0018:ffffc900010577e0 EFLAGS: 00010206 [ 1516.518591][T23385] RAX: 0000000000000018 RBX: 1ffff9200020af00 RCX: 0000000000080000 [ 1516.533303][T23385] RDX: ffffc90003b74000 RSI: 00000000000087d6 RDI: 00000000000087d7 [ 1516.549347][ T30] audit: type=1400 audit(1769072328.535:147): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1516.570103][T23385] RBP: ffffc900010578b0 R08: ffffc9000105783f R09: ffffc90001057820 [ 1516.588555][T23385] R10: dffffc0000000000 R11: fffff5200020af08 R12: 00000000000000c0 [ 1516.603299][T23385] R13: dffffc0000000000 R14: 1ffff1102811d784 R15: ffff8881408ebc20 [ 1516.611382][ T30] audit: type=1400 audit(1769072328.535:148): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1516.642133][T23385] FS: 00007f390c4876c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1516.651374][T23385] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1516.662696][ T30] audit: type=1400 audit(1769072328.535:149): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1516.685888][T23385] CR2: 00007f5bcf021198 CR3: 000000010f5e3000 CR4: 00000000003506a0 [ 1516.702416][T23385] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1516.710492][T23385] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 1516.720601][ T30] audit: type=1400 audit(1769072328.535:150): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1516.752496][T23385] Kernel panic - not syncing: Fatal exception [ 1516.758910][T23385] Kernel Offset: disabled [ 1516.763234][T23385] Rebooting in 86400 seconds..