last executing test programs: 2.986342034s ago: executing program 3 (id=6831): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r4}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r8, &(0x7f0000000980), 0x20000992) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) close(r0) 2.0043655s ago: executing program 2 (id=6843): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000200), 0x3, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[], 0xfdef) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000001c0)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) 1.99887581s ago: executing program 1 (id=6845): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000903000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000380)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2b"], 0x66) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0x36) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0xe32, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}, {}, {}, {0x7, 0x0, 0xb, 0x7}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r8}, 0x10) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10000400, &(0x7f00000000c0)="d4c578188f5d598f68d98a6c2824596cb24f2afdd9edce0b5fe7de3511e332ae4d607dd968490113c956ac597ba72de4231e22db70efe822442494eeaa39db3e5281d6207371c5c452c431e5f71a6efecaa1c4cccf3c08d1e6208bc64af090fb55a01213470718b9642c5e85eaec9bde0e38dbcb3d92c1362cecde8b2f3852b33e679d223fe3f6434d4c633c1a23999bf71b73c1f6bfc0a3a857e78a02e81355c9b644cc6a", 0xa5, &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000440)="545c69cf2a0dd940b84e450d661bdab0ea882f068ec1364d48c3abb517760e7b84b85b3347f96cc277b55bb90cb469398109de0df9cf334b53402ddf4b819b0a7aed3e52e4ba8072a755c4c38f2ecd8107a150be74642876280b8cb9bbcf44ee3964d523ebc2714e7dd81c24dd2befa6") 1.94513366s ago: executing program 3 (id=6847): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b0000040000000000000004"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) 1.861974302s ago: executing program 0 (id=6848): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) 1.784232623s ago: executing program 1 (id=6849): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="180000000100000000000000000000009500000000000000461d02562c3163536e83a7f6ac12a8b52f0d70aa97a91fa46cdcefe7534fda04c1ce6524e7e718c0b1da96d9c9fa8e9523840100cbac3c07a0bf00ff9513b150a632c33ca9a009870000000000000000000000000000002cd50db1486b80ee61ff6ddaa43468bf0609a8ef7fd07f4c556489cf61cfad63e826fff67d3299ca9f9b85cdcd75b85bb1775f4ff03b75aa7b6aa1a7e9a2b91d173d541bce370d9e6810dec2fe8300dc5edf3f6aa43810579aed4ee19fbacb5bd5e5337b507559ca6acc6471ecad2746ab01526ace07000000c1ea01c13a2406007dae5bf308287352cc53f035347270d076c93f1b1a810eb2c7d72ee9ce76e6da15600893bc36f6502f75a8acc045e2315b"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x20000, 0x0, 0xa4, 0x0, &(0x7f0000000640)="00503d2f013245cebdacf8f1aefe4cc110f83d06a41331b667036150b19e0f530937c08535c9feec355bde4f235608939458b600c3404195027a09e2f348248bbfe219cf43aa67a150e15d0bd309eda3d517efd21e68d46f3f4a5904d8fb60d41672f81b8d9f1abed9ae2d0bc18e9baa732379c4d76c55b8b1d70b63e994574a1de1d6a1dde84d328859f53de4e9b2fda954f209953ad7346d7c45013834fd0c37598fe1", 0x0}, 0x50) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r3) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x15, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, {}, {}, [@exit, @alu={0x7, 0x1, 0xd, 0x6, 0x8, 0x8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x57, &(0x7f0000000280)=""/87, 0x41000, 0xf, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000380)=[{0x3, 0x4, 0xc, 0x6}, {0x1, 0x5, 0xe, 0x6}, {0x3, 0x4, 0x3, 0x5}, {0x2, 0x5, 0x9, 0x7}, {0x5, 0x2, 0x4, 0xb}, {0x1, 0x1, 0xe, 0x5}, {0x0, 0x5, 0x6, 0x4}, {0x5, 0x2, 0x10, 0x7}, {0x3, 0x2, 0x1, 0x9}], 0x10, 0xfffffc01, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='afs_sent_data\x00', r5, 0x0, 0x5000000000}, 0x18) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="374292e7f7ef"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 1.730956464s ago: executing program 0 (id=6851): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) 1.719730424s ago: executing program 2 (id=6852): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r0}, &(0x7f0000000700), &(0x7f0000000740)='%-010d \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9febf9ff1700000000000000400000004000000003000000040000000000000100000000160024020d00000000000008050000000800000000000008000000000e00000000000008030000000400000000001a0400000000000000"], &(0x7f0000000400)=""/33, 0x5b, 0x21, 0x0, 0x7, 0x10000, @value}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x13, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1d}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x3884c792, 0x21, &(0x7f0000000080)=""/33, 0x41100, 0x56, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000580)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x0, 0x7, 0xb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0, r0, r0, r0, r0, r0, r1, r8], 0x0, 0x10, 0x9, @void, @value}, 0x94) 1.689939835s ago: executing program 1 (id=6853): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0309007ba4000000040000000000000000cc7a23", @ANYRES32=r6, @ANYBLOB="ff00"/20, @ANYRES32=r6, @ANYBLOB="000000000400"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r7, 0x2, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', r7, 0xffffffffffffffff, 0x5, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='rxrpc_rtt_rx\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8c}, [@ldst={0x7}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r8}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.664948425s ago: executing program 4 (id=6854): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x7, 0x7f, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8a10ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x555) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x7) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200001f000000b7"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffff8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) 1.588558906s ago: executing program 0 (id=6855): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB="0b00000008000000020000000400000005000000", @ANYRES32, @ANYBLOB="0000000000000000ffff000048cb4f007b3d08b7824194390000000063199fd500", @ANYRES8, @ANYRES32=r0, @ANYRES8=r0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r4}, 0x10) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637288a8"], 0xe) 1.530085667s ago: executing program 4 (id=6856): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11c, 0x0, &(0x7f00000020c0)="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", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) sendmsg$tipc(r1, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e4e6f6cc20859bcb806f18d5e8f7b126c19431fdb56af", 0x7c}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) r2 = syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc00"], 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32], 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x7, 0x4, 0xeb, 0x4, 0x0, 0xfffffffffffffff9, 0x40000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_bp={0x0, 0x8}, 0x1404, 0xffffffffffffffff, 0x3, 0x9, 0x9, 0xffffff01, 0xa0b, 0x0, 0x0, 0x0, 0x9}, r2, 0x3, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x22a0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) 1.433023379s ago: executing program 4 (id=6857): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1f, 0xa, 0x81, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r1, r3, 0x4, r4}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x1d3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) (async) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair(0x1f, 0xa, 0x81, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r1, r3, 0x4, r4}, 0x10) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x1d3000, 0x0) (async) 1.260927921s ago: executing program 0 (id=6858): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000400000005000000", @ANYRES32, @ANYBLOB="0000000000e44e564a432a830000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 1.224957871s ago: executing program 4 (id=6859): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x5, 0x8, 0xf, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r3}, 0xc) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000200)={&(0x7f0000000340)="43ca6d41b4cacdc5c2a919a1b3a9a9583ce0dd1ace787329c2623ba536e7bd308b93925f08020ddb5469b45c049b4f8386227bd1dd3a6c6622150cd4fad768c2104da672", &(0x7f00000004c0)=""/114, &(0x7f0000000180)="fbad979dfb6f7e347d74f4b991a6d51fa7866f05dd54425ef290dd0444", &(0x7f0000000540)="8473e0c01e74010c2c94d04c2ae786305bcb3fe1d9836038d3699e1902e4f2041563e707442346b4b50f97c2f768434d3a1986a4b73496e8c4eecb9d9f37d27bb3cd84a43f8f84d2b84963749b88679a2d4bf2578cb28744c9eeafc4a3369a3159586ec3de2db4d64b", 0x3, r4, 0x4}, 0x38) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 1.207801752s ago: executing program 2 (id=6860): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006111ff000000000085000000020000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x9, 0xe, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f00000001c0)='GPL\x00', 0x3, 0xd7, &(0x7f0000000480)=""/215, 0x41100, 0x26, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x1, 0x9b4c, 0xc}, 0x10, 0x0, r1, 0x3, &(0x7f00000007c0)=[r0], &(0x7f0000000800)=[{0x1, 0x2, 0x5, 0x1}, {0x3, 0x1, 0xe, 0x5}, {0x1, 0x4, 0xa, 0x7}], 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f0000000180), &(0x7f0000000900)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff80850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r3}, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[], &(0x7f0000000ac0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) perf_event_open(&(0x7f0000000a40)={0x4, 0x80, 0x81, 0xd, 0x5b, 0x8, 0x0, 0x7, 0x2000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000980), 0x2}, 0x400, 0xfffffffffffffff2, 0x5, 0x8, 0x8, 0x9, 0x8, 0x0, 0x4b, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r6, 0x2) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r7, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8034000, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r8, &(0x7f0000000080), &(0x7f00000000c0)=""/102}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006111ff000000000085000000020000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x9, 0xe, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f00000001c0)='GPL\x00', 0x3, 0xd7, &(0x7f0000000480)=""/215, 0x41100, 0x26, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x1, 0x9b4c, 0xc}, 0x10, 0x0, r1, 0x3, &(0x7f00000007c0)=[r0], &(0x7f0000000800)=[{0x1, 0x2, 0x5, 0x1}, {0x3, 0x1, 0xe, 0x5}, {0x1, 0x4, 0xa, 0x7}], 0x10, 0x3, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f0000000180), &(0x7f0000000900)=r2}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff80850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r3}, 0xc) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[], &(0x7f0000000ac0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) (async) perf_event_open(&(0x7f0000000a40)={0x4, 0x80, 0x81, 0xd, 0x5b, 0x8, 0x0, 0x7, 0x2000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000980), 0x2}, 0x400, 0xfffffffffffffff2, 0x5, 0x8, 0x8, 0x9, 0x8, 0x0, 0x4b, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r6, 0x2) (async) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r7, 0x0, &(0x7f0000001780)=""/4096}, 0x20) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8034000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r8, &(0x7f0000000080), &(0x7f00000000c0)=""/102}, 0x20) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') (async) 1.155576223s ago: executing program 0 (id=6861): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000780)=""/152, 0x98, 0x0, &(0x7f00000004c0)=""/7, 0x7}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x10, 0x12, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000007000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000001000000b702000004000000b7030000000000008500000083000000bf0900000000000055090100000000000000000000851e00006301000000c978e0ffffffffff97dd20000000b7020000010000008500000000000000b7000000000000009500000100000000"], &(0x7f0000000240)='GPL\x00', 0x8, 0x9b, &(0x7f00000006c0)=""/155, 0x41000, 0x2, '\x00', 0x0, @fallback=0x2d, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000840)=[{0x3, 0x5, 0x5, 0x1}, {0x3, 0x1, 0x5, 0x2}, {0x4, 0x3, 0x9, 0x7}, {0x0, 0x4, 0x8, 0x7}, {0x5, 0x1, 0x10, 0xa}, {0x2, 0x1, 0x3, 0x4}, {0x4, 0x3, 0xd, 0xa}, {0x0, 0x4, 0x6, 0x3}, {0x5, 0x1, 0x0, 0x2}], 0x10, 0x5, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r5, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000bc0)=[0x0, 0x0], &(0x7f0000000c00)=[0x0], 0x0, 0xcc, &(0x7f0000000c40), 0x0, 0x10, &(0x7f0000000540), &(0x7f0000000cc0), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000011c0)={r5, 0xe0, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000f00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80), 0x0, 0x37, &(0x7f0000000fc0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001000), &(0x7f0000000f40), 0x8, 0xa7, 0x8, 0x8, &(0x7f0000001080)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@bloom_filter={0x1e, 0x6a, 0x4, 0x3, 0x800, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x3, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3ff, 0x40, 0xf1, 0x10000, r0, 0xfffffff7, '\x00', 0x0, r1, 0x3, 0x2, 0x5, 0x7, @void, @value, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x2, 0x25, &(0x7f00000023c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x100}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x2}, @exit, @alu={0x4, 0x1, 0xb, 0x9, 0x9, 0xffffffffffffffe0}, @tail_call, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff8}, @exit, @generic={0x7, 0xc, 0x9, 0x7, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ea}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x86, &(0x7f0000000ac0)=""/134, 0x41100, 0x4, '\x00', r6, @fallback=0x13, r1, 0x8, &(0x7f0000000e80)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0x8, 0x6, 0x2}, 0x10, r7, r3, 0x9, &(0x7f0000001280)=[0x1, r8, r4, r9, r4, r4, r4, 0xffffffffffffffff], &(0x7f00000012c0)=[{0x1, 0x1, 0x8, 0xda3b97eccfbf9625}, {0x0, 0x4, 0x10, 0x5}, {0x3, 0x3, 0x5, 0x1}, {0x4, 0x5, 0xb, 0x8}, {0x1, 0x3, 0x0, 0x5}, {0xb708, 0x3, 0xb}, {0x1, 0x4, 0x7, 0x5}, {0x1, 0x1, 0xd}, {0x5, 0x3, 0xe}], 0x10, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r10}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x1, 0x9, &(0x7f0000001440)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000004000000020000000400000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r11}, 0x10) r12 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000080)='(())') socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 1.049683414s ago: executing program 3 (id=6862): r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000f4e85a47ebfb7da7414efd35", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES32=r0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000004c0)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) r5 = openat$cgroup_procs(r4, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x7) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r10}, &(0x7f0000000540), &(0x7f0000000580)=r11}, 0x20) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r12}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16, @ANYRESDEC=r3, @ANYRES64=r7, @ANYRESOCT=r5, @ANYRES16=r9, @ANYRESDEC=r13, @ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa25f649b80186efd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xd3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r14}, 0x10) 1.049208064s ago: executing program 2 (id=6863): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000c8, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x40, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000030000000600000000000000", @ANYRES32, @ANYBLOB="000000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000000000068a000000000000bfa200000000000007020000f8ffffffb7030000ce0e2b2f972aa7b2b408000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad43010000000000950000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000000000000000000000000000c000000000000000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.025078645s ago: executing program 4 (id=6864): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(r0) 996.026956ms ago: executing program 3 (id=6865): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) 949.219366ms ago: executing program 3 (id=6866): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0xc8, 0x2, 0x7, 0x0, 0x10001, 0xa}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='fib6_table_lookup\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r1, @ANYRES16=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000008000000000000000000000000000000000000093b30eda92038ad386efb6fca5d11b8286c74ef2fa51fb7f5b4c4240ba5ab7401e230a6d88a08a10ecc80ea9f4de8129ac0aa1c4df14b009a089e0eb0894d408b76b53dc552a53f13a42cf2a021aa6769cd18ba5134ec6f3570c97b0c7a6ac8da0d5117ad12a606bce0de9dfff57293cf9539374324903a029"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000007000000010001000600000001000000106927ece92cc5f91772768a48fa4fa75ad6cfb84717630a72aa26ede391db85e6af08c3e60040dc49bdc559ccb8d072e8655899519052855cd31310d71987b65eb59c915df0ebf30d7fd69950d3611f4498e921413ccd053b10512a027da6f747115c3bc95446b2785bbd2de39983da7495705ac3d0ca505b3c64cc8360000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000000), &(0x7f0000000180)=""/111}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000180)=r11, 0x4) sendmsg$inet(r13, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 948.290176ms ago: executing program 0 (id=6867): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0xa00000, &(0x7f0000000280)="8951f7792aa6301921a48f630e9a6cf74d1f790b98c4066faf51f07f1f95f55c1cbc9973586899fe69ed4a40b6a3bfec0c7ac914ccb9197bfe20c149493441cd92d10a68", 0x44, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0, 0xb}, 0x100000, 0x0, 0x410, 0x0, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x2f, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xe7, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000000000000000000070000001863000004000000000000000b000000950000000000068534bef1b1628ab5011a463f7bd6c513f2e430e86ab449e5d52d4712f200fd6f90f815f8cbee6ae6959f6235bdf19d7407e95986be5fdeb733908306813412928937579053468b6d2c25002255cefc180b6bc2d202000000000000006ab29407643901885b887ab0ea1866f118b1714dd48965df4b4e78b6fb89b91b"], &(0x7f0000000600)='GPL\x00', 0xbb, 0x79, &(0x7f0000000640)=""/121, 0x41000, 0xc, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x18a12, 0xffffffffffffffff, 0x2, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000700)=[{0x4, 0x3, 0x3, 0x2}, {0x0, 0x1, 0x2, 0xc}], 0x10, 0x1, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3}, &(0x7f0000000080), &(0x7f0000000180)=r4}, 0x20) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x59, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b00000000000000000001000080000000000000", @ANYRES32=0x1, @ANYBLOB='I\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0xb6, 0x18}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000980)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a40)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="4099000003000004"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x22, &(0x7f0000000080)=""/34, 0x41000, 0x67, '\x00', r1, @fallback=0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x8, &(0x7f0000000a80)=[r3, r5, r6, r7, r8, r9, r10], &(0x7f0000000ac0)=[{0x3, 0x1, 0x6, 0x9}, {0x2, 0x2, 0x0, 0xc}, {0x0, 0x4, 0xa}, {0x4, 0x5, 0x2, 0xa}, {0x4, 0x3, 0x6, 0x8}, {0x1, 0x2, 0x2, 0x6}, {0x4, 0x3, 0x9, 0x15}, {0x4, 0x2, 0x10, 0x8}], 0x10, 0x15e00, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c00), 0x40, 0x0) ioctl$TUNGETFEATURES(r11, 0x800454cf, &(0x7f0000000c40)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40049480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 865.753067ms ago: executing program 2 (id=6868): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000000000000000000000000000850000005300000085000000230000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f59f18f845f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06f70c6792f2888d6fd95f202028070000003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f439547bcdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fbffffff850000002d000000850000000e000000950000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) 864.038867ms ago: executing program 3 (id=6869): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(r0) 817.030688ms ago: executing program 1 (id=6870): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000015000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='\xec\x00') (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) (async) close(r0) 763.310179ms ago: executing program 1 (id=6871): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000190ece30000000000000000000000000b3c55046001194f8b9700ef21662da66c6af1c4acf338ccb85a15e1a3565faf6c6b0d5232b65fc84b94e6048a5073f03c4d9b2f77e435cd6839549e3e467cadcca6b5b48bdca728266ccb7b29d326c0e01b58a5623dbd031df304c48b1399c57b3598a423ddf999b556757df89e5e1b2ae326f732b921902f493fd85df29a6144b8f6439ad890ff145757c96d5fbec37ec952d3a2fe1f75ad403449d116a6285bebfdcfa696abcadde236936eb341fe1d46e23bf2f8cf1f2cec5524e0f209a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x8810) (async) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) (async) sendmsg$tipc(r5, &(0x7f0000000540)={&(0x7f0000000180)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x3}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000001c0)="ba23d8a9ec6773f933adc88c80035e44cae222f5bd8281e42dadfed966a114e0088fd3084f140d2d2cd2420f61a44ecf0686d412a167c062006986b5cdd122bb37cab7e035f7638a87ef38f3c1e4471bf8589c6b79", 0x55}, {&(0x7f0000000240)="f0c8ef2a8ac329f149c7c80b53bcfb35428309de19eed03e41580cb01497090aeb93fb1722d595b24160da342756d41820b7d0562a504e57416fdf103d7acf166f83c108defe72883c655eb53b85e7316e19ae0a6bb48df2935b561818c2754f58efb4fc1103755beaad8894744133911c65b10a147e57760ee996e4ac45b01ee356bb947645d71fe8b78cb2f65166c68f8a80f4fc4331cc3cd115dacd7794a0a1cb164cfc01b79e35b19d3b2b8fb3ee669ccda35ae9289d46622c2d0951ff063d470b01ece00b2e41eeaf8df0a3a65daea9b40ba7929ae45ab8e137bef04397fc9d770d75d06f55bec73fe389658fd0e4fd5f98", 0xf4}, {&(0x7f00000004c0)="71200f84a67f1d2e2d9e3a2e19ec8b69aaa88fe4dc9850384df8ec4a340f4a5d6db0b1ff4b3a77da6dc1b5780ea8af3cd60170f3e12382666155159d89260292a7cb8596bf4e13aa7cd60ef3a60e07e2779473b63b69bd", 0x57}], 0x3, &(0x7f0000000600)="cec6194c96d1d349149ae354a35ea8cf1980a2ec51c0f6437e657cd43d1319336c8ea3fa47af17114d26c1bdda3466966addebd8a0877bc3c6c9cdfafadec3b5e0dd87e12e564f29e7e34ebac50533ca026e313df9959cb5ad90d9bfc7ab5d54feecf07cd4e73e16bbb3798856ca37820aaa73b854290354460b9cab88f4a85ebf5516ce86125de2", 0x88, 0x20000040}, 0x5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) (async) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) close(r2) (async) close(r9) 32.69917ms ago: executing program 1 (id=6872): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(r0) 30.80904ms ago: executing program 2 (id=6873): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="17dc9f00000075aeacf8aaaeb3"], 0x48) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0], 0x0, 0xce, &(0x7f0000000b80)=[{}, {}], 0x10, 0x10, &(0x7f0000000bc0), &(0x7f0000000c00), 0x8, 0x54, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000dc0), 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000e00)={0x0, r0}, 0x8) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@bloom_filter={0x1e, 0x7fffffff, 0x5, 0x5, 0x40d, r0, 0x8001, '\x00', r1, r2, 0x3, 0x3, 0x20002, 0x3, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfece09e9a433516b4a200009200000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000ebc7a30150d778b64d377125f0f6d27e41b8268c8498b1c5ce658b9f95d93811de08938cc2a8099bd013b9b9a092b8c08ef26d7bdd4db70a3694998cd574aaa7e805e944247bcbe776072e8a8e0f202f495d88d0c12be0cbe24f5005837c6984bbf8c9b2d2e25705d87da285e3814ef1cdb9cae6fbc66ed529889d56b8120b7529dd82940e8598e7e228fc3c3a2d1a2f53855fd97be7ca41de90d4ee9fe5ce2ab24d7434"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) write$cgroup_type(r6, &(0x7f0000000180), 0xfffffe51) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305829, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r3}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000630120000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r9, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={&(0x7f0000000380)="a4d7e9bd6613083d4ce739f614e763d5aa795b153acd19de41138f4c5e714daa01fa865ba74cc6dcc7995aea5e80ba5f99b36c231b854caad1badd3881a703764cd9e976017a63d6f2f6411479ea77daffcb15b95d90c578416ed7b0ea73a34fe359963cc497c49e738f45fc92b5e60f3af887457f7410ab0eabfe79606384fcd44cc9109aba46e276bffd2963dbe2e41232568efad6d61ed53ebcda5c089b08e4eece3f7524c839bb9182f40c718046cb4126b01383b60586df6482fcfb3792b0d52a9ec032c323619ce1458294009aeae1727c1427", &(0x7f00000002c0)=""/25, &(0x7f0000000600)="21090078c4098c56d64839b263841fb28160f315974d3f39680d634ad06a9b8d19beb7288034220fd03543fb9384db320fcd48dab3dc3f82987530ae9aaf97f86ac98c5a4e3a1013a42a8b28d3960492b6ff1f73e4207bd7eb4db298862b37134c1055b07c2b7202f3acc3643256513a23ff4d5d229b13e0c996b2e0f95029ddbed2cf5a765e83d3230485736a321fa146398458a368850feeb05f67a0c467bdb2dfed57352bee59c3c02d37379343af3f2fc80f9c6a25012178c3d96f396706c434ef9b9eb3c50f4f88c9439ab28c74e4929d3595b96378e65e29b17ddf0c4edc8279afd05a5146e05ce03fd5470a", &(0x7f0000000700)="4a8898345193237b2a8dd5347f384a5a11a320ce63c06de1e11a6214dbf2c54b929ece7d1c97ccff25bb47710ab79a6489ef52d17b5968bb93c2244c51654bea21efdf2a96d01dda2d13e77423767645e3fdcf81b103fda8bbd430dc8d28cc5869722978ec5d88d93f5a280080fb79504e278a981dab792414c30db52ee76157be5c0a09f9e36bd5268efc68219b3e18d6f2350c587af3d2d3fec732473dc521a779d3d173bea13de3c786fa7f7e1294e3855229c42d5bb48d2601faaec63e6c3f870aa14f0adf106bfff114ccc45642a515e885e0277b844fb6d0b04de1", 0x7, r0, 0x4}, 0x38) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000980)={r0, &(0x7f0000000840)="a14cd25de2132d3f24d5765d5e974300b6591fef37fb6154768d9cbc92bc9439e14dca6616291baa553178828edd1fc019a288ce4e61837dd1c409c85602e1fd8eb0c8b9a50a76dfcedf42fec52b4d24d4e9b4cbaf31cdd02d7bb5cfc2", &(0x7f00000008c0)=""/140}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r10, 0x0, &(0x7f0000002240)=""/4097}, 0x20) 0s ago: executing program 4 (id=6874): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000f8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000008e40c1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000004000000000002037000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff25) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) kernel console output (not intermixed with test programs): e_user helper that may corrupt user memory! [ 173.038760][ T5482] syz.2.1392[5482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.063578][ T5482] syz.2.1392[5482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.599351][ T5505] device sit0 entered promiscuous mode [ 173.942620][ T5563] syz.4.1414[5563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.942688][ T5563] syz.4.1414[5563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.383192][ T5581] ±ÿ: renamed from team_slave_1 [ 174.735501][ T5591] device syzkaller0 entered promiscuous mode [ 174.737084][ T5589] syz.3.1423[5589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.752705][ T5589] syz.3.1423[5589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.846393][ T5596] device syzkaller0 entered promiscuous mode [ 174.865307][ T1196] syzkaller0: tun_net_xmit 48 [ 174.911956][ T5596] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 174.954673][ T5596] syzkaller0: tun_net_xmit 1280 [ 174.978798][ T5596] syzkaller0: create flow: hash 773446480 index 2 [ 175.000851][ T5595] syzkaller0: delete flow: hash 773446480 index 2 [ 179.337862][ T5727] device macsec0 entered promiscuous mode [ 179.607366][ T5727] tun0: tun_chr_ioctl cmd 1074025692 [ 180.370753][ T5769] device wg2 left promiscuous mode [ 181.184471][ T5811] device pim6reg1 entered promiscuous mode [ 181.275557][ T5819] device sit0 left promiscuous mode [ 181.307188][ T5819] device sit0 entered promiscuous mode [ 181.524704][ T5828] device pim6reg1 entered promiscuous mode [ 181.791731][ T5850] cgroup: fork rejected by pids controller in /syz3 [ 181.885808][ T5856] device sit0 entered promiscuous mode [ 183.202274][ T24] audit: type=1400 audit(1750104449.050:158): avc: denied { read } for pid=5883 comm="syz.4.1509" name="cgroup.subtree_control" dev="cgroup2" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 183.408783][ T5876] device syzkaller0 entered promiscuous mode [ 183.461547][ T5888] Â: renamed from pim6reg1 [ 183.552664][ T5885] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.565441][ T5885] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.596538][ T5885] device bridge_slave_0 entered promiscuous mode [ 183.636401][ T5885] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.643465][ T5885] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.694393][ T5885] device bridge_slave_1 entered promiscuous mode [ 184.224940][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.257557][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.285245][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.402187][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.452439][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.459549][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.538923][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.631732][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.650761][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.694352][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.701461][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.834417][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.845818][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.876353][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.884586][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.893027][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.902060][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.987897][ T5933] device syzkaller0 entered promiscuous mode [ 185.010497][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.022812][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.048520][ T5885] device veth0_vlan entered promiscuous mode [ 185.122031][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.130835][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.220308][ T5885] device veth1_macvtap entered promiscuous mode [ 185.247208][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.270641][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.298938][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.330251][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.351764][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.409295][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.430706][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.960392][ T7] device veth1 left promiscuous mode [ 185.965904][ T7] kfree: port 1(veth1) entered disabled state [ 186.005940][ T7] device veth0_vlan left promiscuous mode [ 186.528468][ T5956] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.536096][ T5956] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.618961][ T5956] device bridge_slave_1 left promiscuous mode [ 186.634301][ T5956] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.748216][ T5956] device bridge_slave_0 left promiscuous mode [ 186.775679][ T5982] syz.4.1533[5982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.775737][ T5982] syz.4.1533[5982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.789935][ T5984] syz.4.1533[5984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.802648][ T5956] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.821791][ T5984] syz.4.1533[5984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.955965][ T24] audit: type=1400 audit(1750104455.800:159): avc: denied { create } for pid=6065 comm="syz.0.1555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 190.146118][ T24] audit: type=1400 audit(1750104455.840:160): avc: denied { read } for pid=6059 comm="syz.2.1553" dev="nsfs" ino=4026532458 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 190.173244][ T24] audit: type=1400 audit(1750104455.840:161): avc: denied { open } for pid=6059 comm="syz.2.1553" path="cgroup:[4026532458]" dev="nsfs" ino=4026532458 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 190.196830][ T6068] device sit0 left promiscuous mode [ 190.244747][ T6080] device wg2 left promiscuous mode [ 190.255704][ T6081] device sit0 entered promiscuous mode [ 190.358266][ T6084] device wg2 entered promiscuous mode [ 191.608962][ T6146] device syzkaller0 entered promiscuous mode [ 193.512975][ T6243] syz.4.1602[6243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.513060][ T6243] syz.4.1602[6243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.759406][ T6276] device wg2 entered promiscuous mode [ 195.952235][ T6308] device macsec0 entered promiscuous mode [ 196.195439][ T6311] device sit0 entered promiscuous mode [ 198.779458][ T24] audit: type=1400 audit(1750104464.630:162): avc: denied { ioctl } for pid=6472 comm="syz.2.1665" path="uts:[4026532459]" dev="nsfs" ino=4026532459 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 203.747127][ T6696] device wg2 left promiscuous mode [ 204.339581][ T6706] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.466079][ T6706] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.542034][ T6706] device bridge_slave_0 entered promiscuous mode [ 204.716366][ T6706] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.723432][ T6706] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.741308][ T6706] device bridge_slave_1 entered promiscuous mode [ 205.093511][ T6706] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.100616][ T6706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.108004][ T6706] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.115051][ T6706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.184961][ T6751] device pim6reg1 entered promiscuous mode [ 205.241517][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.248871][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.257690][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.267292][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.287809][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.336712][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.345162][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.352540][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.365937][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.374566][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.383175][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.390251][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.418067][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.439237][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.499076][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.531472][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.607452][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.616885][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.690472][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.706896][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.741299][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.756414][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.776739][ T6706] device veth0_vlan entered promiscuous mode [ 205.816854][ T6706] device veth1_macvtap entered promiscuous mode [ 205.894333][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.902922][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.912209][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.921243][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.929782][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.938585][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.947304][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.004702][ T6803] device pim6reg1 entered promiscuous mode [ 206.055471][ T7] device veth1_macvtap left promiscuous mode [ 206.077305][ T24] audit: type=1400 audit(1750104471.930:163): avc: denied { create } for pid=6804 comm="syz.3.1697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 206.172148][ T6805] bridge0: port 3(veth0) entered blocking state [ 206.183976][ T6805] bridge0: port 3(veth0) entered disabled state [ 206.233916][ T6805] device veth0 entered promiscuous mode [ 206.244753][ T6805] bridge0: port 3(veth0) entered blocking state [ 206.251341][ T6805] bridge0: port 3(veth0) entered forwarding state [ 206.344645][ T6825] device wg2 left promiscuous mode [ 206.727704][ T6846] device pim6reg1 entered promiscuous mode [ 206.972091][ T6854] device pim6reg1 entered promiscuous mode [ 207.249054][ T24] audit: type=1400 audit(1750104473.100:164): avc: denied { create } for pid=6858 comm="syz.0.1744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 207.912457][ T6917] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 207.956055][ T6917] syzkaller0: linktype set to 804 [ 208.567955][ T24] audit: type=1400 audit(1750104474.410:165): avc: denied { ioctl } for pid=6939 comm="syz.0.1769" path="" dev="cgroup2" ino=141 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 208.854244][ T6962] device pim6reg1 entered promiscuous mode [ 208.881187][ T6965] device pim6reg1 entered promiscuous mode [ 208.904561][ T6959] device sit0 left promiscuous mode [ 208.970906][ T6970] device wg2 left promiscuous mode [ 209.059685][ T6979] device syzkaller0 entered promiscuous mode [ 210.756686][ T7059] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.117991][ T7077] device sit0 entered promiscuous mode [ 211.736702][ T7105] device veth0_vlan left promiscuous mode [ 211.786538][ T7105] device veth0_vlan entered promiscuous mode [ 211.875443][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.896388][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.927444][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 213.377531][ T7143] device wg2 entered promiscuous mode [ 215.343535][ T7199] syz.3.1841[7199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.351787][ T7199] syz.3.1841[7199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.298932][ T7248] syz.2.1853[7248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.385736][ T7248] syz.2.1853[7248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.498755][ T7294] device sit0 left promiscuous mode [ 217.552778][ T7299] device sit0 entered promiscuous mode [ 219.158568][ T7373] device pim6reg1 entered promiscuous mode [ 220.577698][ T7431] device pim6reg1 entered promiscuous mode [ 221.134036][ T7463] device veth0_vlan left promiscuous mode [ 221.152946][ T7463] device veth0_vlan entered promiscuous mode [ 221.199468][ T7467] device pim6reg1 entered promiscuous mode [ 221.317742][ T7473] device wg2 left promiscuous mode [ 221.474886][ T7477] device veth0_vlan left promiscuous mode [ 221.541369][ T7477] device veth0_vlan entered promiscuous mode [ 221.660183][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.668593][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.687923][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.717656][ T7473] device wg2 entered promiscuous mode [ 221.767646][ T7495] Ÿë: port 1(veth0_to_team) entered blocking state [ 221.793802][ T7495] Ÿë: port 1(veth0_to_team) entered disabled state [ 221.801385][ T7495] device veth0_to_team entered promiscuous mode [ 222.080808][ T7516] device wg2 left promiscuous mode [ 222.190463][ T7516] device wg2 entered promiscuous mode [ 223.582565][ T7581] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 223.687258][ T7581] device syzkaller0 entered promiscuous mode [ 224.998206][ T7660] device syzkaller0 entered promiscuous mode [ 226.144052][ T7755] device wg2 left promiscuous mode [ 226.186180][ T7755] device wg2 entered promiscuous mode [ 226.270948][ T7759] device syzkaller0 entered promiscuous mode [ 226.322245][ T7759] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 228.807448][ T7866] syzkaller0: refused to change device tx_queue_len [ 235.889615][ T8049] device pim6reg1 entered promiscuous mode [ 237.048630][ T8088] device veth0_vlan left promiscuous mode [ 237.060056][ T8088] device veth0_vlan entered promiscuous mode [ 237.102479][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.120437][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.161105][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 238.902079][ T24] audit: type=1400 audit(1750104504.750:166): avc: denied { create } for pid=8128 comm="syz.1.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 238.931839][ T8139] device pim6reg1 entered promiscuous mode [ 239.756488][ T8182] syz.1.2115[8182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.756592][ T8182] syz.1.2115[8182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.202856][ T8200] syz.1.2118 (8200) used obsolete PPPIOCDETACH ioctl [ 240.703896][ T8231] device sit0 left promiscuous mode [ 241.872450][ T8263] device sit0 entered promiscuous mode [ 242.672553][ T8284] device veth0_vlan left promiscuous mode [ 242.681804][ T8284] device veth0_vlan entered promiscuous mode [ 242.689174][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.715480][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.737427][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.606419][ T8300] bridge0: port 3(veth0) entered disabled state [ 243.612883][ T8300] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.753999][ T8295] device veth0 left promiscuous mode [ 243.766736][ T8295] bridge0: port 3(veth0) entered disabled state [ 243.787301][ T8295] device bridge_slave_1 left promiscuous mode [ 243.794012][ T8295] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.805148][ T8295] device bridge_slave_0 left promiscuous mode [ 243.812449][ T8295] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.176052][ T8327] syz.1.2154[8327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.176149][ T8327] syz.1.2154[8327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.158789][ T8382] device wg2 entered promiscuous mode [ 245.217365][ T8387] device syzkaller0 entered promiscuous mode [ 246.377712][ T24] audit: type=1400 audit(1750104512.230:167): avc: denied { create } for pid=8437 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 253.209080][ T8576] device syzkaller0 entered promiscuous mode [ 254.422751][ T8612] device veth1_macvtap left promiscuous mode [ 254.449571][ T8612] device macsec0 entered promiscuous mode [ 254.495337][ T8621] device pim6reg1 entered promiscuous mode [ 256.702904][ T8685] device pim6reg1 entered promiscuous mode [ 259.269089][ T8825] device sit0 left promiscuous mode [ 261.026379][ T8932] ÿ: renamed from bond_slave_0 [ 262.019826][ T8983] device syzkaller0 entered promiscuous mode [ 262.697307][ T9010] device syzkaller0 entered promiscuous mode [ 263.330060][ T9036] device veth0_vlan left promiscuous mode [ 263.342572][ T9036] device veth0_vlan entered promiscuous mode [ 263.433541][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.442131][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.449825][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.147848][ T9050] device syzkaller0 entered promiscuous mode [ 265.597609][ T9058] device sit0 left promiscuous mode [ 266.159004][ T9087] device veth0_vlan left promiscuous mode [ 266.223469][ T9087] device veth0_vlan entered promiscuous mode [ 266.275048][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.337274][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.355030][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.126092][ T9140] Q±6ã×\b‹¡Y­4: renamed from lo [ 267.958789][ T9148] device pim6reg1 entered promiscuous mode [ 268.910021][ T9176] device syzkaller0 entered promiscuous mode [ 270.777259][ T9262] syz.4.2407[9262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.777354][ T9262] syz.4.2407[9262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.993457][ T9266] device wg2 left promiscuous mode [ 271.126997][ T9269] device wg2 entered promiscuous mode [ 275.189581][ T24] audit: type=1400 audit(1750104541.040:168): avc: denied { create } for pid=9405 comm="syz.4.2451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 277.410571][ T9488] device syzkaller0 entered promiscuous mode [ 278.573230][ T9532] device sit0 entered promiscuous mode [ 281.403357][ T9619] device erspan0 left promiscuous mode [ 281.413890][ T9619] GPL: port 1(erspan0) entered disabled state [ 281.558790][ T9630] device wg2 left promiscuous mode [ 282.152860][ T9653] device syzkaller0 entered promiscuous mode [ 282.191007][ T9657] device veth0_vlan left promiscuous mode [ 282.218928][ T9657] device veth0_vlan entered promiscuous mode [ 282.254021][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.271204][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.319808][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 282.573686][ T9680] device syzkaller0 left promiscuous mode [ 282.824175][ T9692] device macsec0 left promiscuous mode [ 282.995596][ T9701] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 283.029376][ T9700] device syzkaller0 entered promiscuous mode [ 283.092790][ T621] syzkaller0: tun_net_xmit 48 [ 283.131981][ T9701] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 283.154001][ T9700] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 283.636032][ T9737] device wg2 entered promiscuous mode [ 284.455086][ T9760] device pim6reg1 entered promiscuous mode [ 284.526811][ T9762] device wg2 left promiscuous mode [ 284.833056][ T9780] syz.1.2552[9780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.869390][ T9780] device sit0 left promiscuous mode [ 286.472177][ T9859] device pim6reg1 entered promiscuous mode [ 287.449585][ T9902] device veth0_vlan left promiscuous mode [ 287.456728][ T9902] device veth0_vlan entered promiscuous mode [ 287.488095][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.508904][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.564722][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 288.819434][ T9942] device syzkaller0 entered promiscuous mode [ 289.075263][ T9949] syz.1.2595[9949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.075349][ T9949] syz.1.2595[9949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.295180][ T9953] syz.1.2596[9953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.316671][ T9953] syz.1.2596[9953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.484032][T10024] device veth0_vlan left promiscuous mode [ 291.648470][T10024] device veth0_vlan entered promiscuous mode [ 291.824189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.847240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.885424][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.090450][T10045] device syzkaller0 entered promiscuous mode [ 292.594519][T10056] device sit0 entered promiscuous mode [ 294.738963][T10125] syz.3.2644[10125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.739025][T10125] syz.3.2644[10125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.751920][T10210] device syzkaller0 entered promiscuous mode [ 298.355580][T10225] device syzkaller0 entered promiscuous mode [ 299.237548][T10254] device pim6reg1 entered promiscuous mode [ 302.477337][T10440] device wg2 entered promiscuous mode [ 305.617634][T10529] device macsec0 left promiscuous mode [ 306.396542][T10536] device wg2 entered promiscuous mode [ 306.850681][T10548] device wg2 left promiscuous mode [ 306.919079][T10553] device wg2 entered promiscuous mode [ 308.578007][T10610] device pim6reg1 entered promiscuous mode [ 308.784650][T10619] device veth0_to_team entered promiscuous mode [ 309.047625][T10626] device syzkaller0 entered promiscuous mode [ 309.585114][T10644] device veth0_vlan left promiscuous mode [ 309.600653][T10644] device veth0_vlan entered promiscuous mode [ 309.686088][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.695669][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.703778][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 312.602285][T10732] device syzkaller0 entered promiscuous mode [ 312.700556][T10737] device sit0 entered promiscuous mode [ 313.029004][T10741] syz.0.2820[10741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.029066][T10741] syz.0.2820[10741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.280949][T10753] Â: renamed from pim6reg1 [ 314.951588][T10797] device syzkaller0 entered promiscuous mode [ 315.905469][T10816] syz.2.2839[10816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.905531][T10816] syz.2.2839[10816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.629333][T10939] device pim6reg1 entered promiscuous mode [ 321.231821][T10987] device pim6reg1 entered promiscuous mode [ 321.613698][T11009] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.636074][T11009] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.707667][T11009] device bridge_slave_0 entered promiscuous mode [ 321.746192][T11009] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.806122][T11009] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.868720][T11009] device bridge_slave_1 entered promiscuous mode [ 322.180464][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.205956][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.238487][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.279851][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.311552][ T973] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.318663][ T973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.326533][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.415559][T11032] device wg2 left promiscuous mode [ 322.423207][T11034] device wg2 entered promiscuous mode [ 322.444025][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.455197][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.471736][ T973] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.478843][ T973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.501232][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.515778][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.620348][T11009] device veth0_vlan entered promiscuous mode [ 322.627709][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.639038][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.652779][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.661189][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.697743][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.739735][T11009] device veth1_macvtap entered promiscuous mode [ 322.884895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.894435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.237502][ T48] GPL: port 1(erspan0) entered disabled state [ 323.260268][ T48] device erspan0 left promiscuous mode [ 323.265764][ T48] GPL: port 1(erspan0) entered disabled state [ 325.090270][T11216] device pim6reg1 entered promiscuous mode [ 326.227774][T11263] device sit0 left promiscuous mode [ 326.385894][T11271] device sit0 entered promiscuous mode [ 327.811622][T11326] device sit0 left promiscuous mode [ 328.308202][T11360] device syzkaller0 entered promiscuous mode [ 328.908758][T11370] device syzkaller0 entered promiscuous mode [ 330.018675][T11425] device pim6reg1 entered promiscuous mode [ 330.372966][T11445] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.402737][T11445] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.413262][T11445] device bridge_slave_0 entered promiscuous mode [ 330.482784][T11445] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.526017][T11445] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.533438][T11445] device bridge_slave_1 entered promiscuous mode [ 330.835133][T11465] device pim6reg1 entered promiscuous mode [ 331.114914][T11445] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.122018][T11445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.129350][T11445] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.136414][T11445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.259541][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.267578][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.274971][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.300152][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.311953][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.316748][T11480] syz.3.3032[11480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.319035][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.319054][T11480] syz.3.3032[11480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.340443][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.365720][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.372833][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.380667][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.427028][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.466756][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.701370][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 331.709854][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.789768][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 331.806537][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.842869][T11445] device veth0_vlan entered promiscuous mode [ 331.888547][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.938377][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.053771][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 332.086366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.176510][T11445] device veth1_macvtap entered promiscuous mode [ 332.203390][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.226914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.256239][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.265030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.274341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.379763][T11517] device syzkaller0 entered promiscuous mode [ 333.307128][ T48] device veth0_to_team left promiscuous mode [ 333.313235][ T48] Ÿë: port 1(veth0_to_team) entered disabled state [ 334.495530][T11590] device veth0_vlan left promiscuous mode [ 334.532081][T11590] device veth0_vlan entered promiscuous mode [ 334.652199][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.673890][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.700086][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 334.780876][T11597] device syzkaller0 entered promiscuous mode [ 336.302493][T11677] device pim6reg1 entered promiscuous mode [ 337.750743][T11753] ±ÿ: renamed from team_slave_1 [ 337.799654][T11759] device wg2 left promiscuous mode [ 337.956745][T11759] device wg2 entered promiscuous mode [ 339.986200][T11850] device wg2 entered promiscuous mode [ 340.070781][T11863] device lo entered promiscuous mode [ 340.078197][T11863] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 340.685415][T11895] device sit0 entered promiscuous mode [ 341.013630][T11921] device syzkaller0 entered promiscuous mode [ 341.043186][ T24] audit: type=1400 audit(1750104606.890:169): avc: denied { create } for pid=11922 comm="syz.1.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 341.726258][T11955] device syzkaller0 entered promiscuous mode [ 344.373090][T12005] device pim6reg1 entered promiscuous mode [ 345.152392][T12033] device pim6reg1 entered promiscuous mode [ 346.824777][T12091] syz.4.3210[12091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.301423][T12106] device wg2 left promiscuous mode [ 347.344776][T12110] device wg2 entered promiscuous mode [ 350.770437][T12165] Â: renamed from pim6reg1 [ 351.516380][T12180] device syzkaller0 entered promiscuous mode [ 352.377237][T12201] device veth0_vlan left promiscuous mode [ 352.581035][T12201] device veth0_vlan entered promiscuous mode [ 352.867437][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.167934][T12237] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.180282][T12237] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.296934][T12238] device bridge_slave_1 left promiscuous mode [ 353.303136][T12238] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.363986][T12238] device bridge_slave_0 left promiscuous mode [ 353.414337][T12238] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.056665][T12268] device sit0 entered promiscuous mode [ 355.294633][ T24] audit: type=1400 audit(1750104621.140:170): avc: denied { mounton } for pid=12275 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 355.892377][T12275] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.976221][T12275] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.109288][T12275] device bridge_slave_0 entered promiscuous mode [ 356.119860][T12275] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.127258][T12275] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.177660][T12275] device bridge_slave_1 entered promiscuous mode [ 356.793847][T12299] device syzkaller0 entered promiscuous mode [ 356.998014][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.012276][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.069034][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.077608][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.085862][ T973] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.092949][ T973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.102929][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.111425][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.119936][ T973] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.127017][ T973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.134791][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.229522][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.258540][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.379564][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 357.399331][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.470849][T12275] device veth0_vlan entered promiscuous mode [ 357.482735][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 357.491190][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.499825][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.507840][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.684575][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.705817][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.835206][T12275] device veth1_macvtap entered promiscuous mode [ 357.912295][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.929692][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.978501][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 358.093754][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 358.103135][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.209313][ T24] audit: type=1400 audit(1750104624.060:171): avc: denied { unmount } for pid=12275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 358.234012][ T7] device veth1 left promiscuous mode [ 358.253788][ T7] kfree: port 1(veth1) entered disabled state [ 360.258889][T12368] device sit0 entered promiscuous mode [ 361.352116][T12397] device syzkaller0 entered promiscuous mode [ 361.943005][T12411] device sit0 left promiscuous mode [ 362.143963][T12413] device sit0 entered promiscuous mode [ 365.647302][T12504] device veth0_vlan left promiscuous mode [ 365.681123][T12504] device veth0_vlan entered promiscuous mode [ 367.718204][T12554] device syzkaller0 entered promiscuous mode [ 369.123684][T12569] device syzkaller0 entered promiscuous mode [ 369.142724][T12569] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 371.718762][T12657] device syzkaller0 entered promiscuous mode [ 372.026482][T12679] device pim6reg1 entered promiscuous mode [ 372.271838][T12687] ÿÿÿÿÿÿ: renamed from vlan1 [ 372.998628][T12719] device wg2 entered promiscuous mode [ 373.571706][ T24] audit: type=1400 audit(1750104639.420:172): avc: denied { create } for pid=12735 comm="syz.2.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 373.805583][T12740] @ÿ: renamed from bond_slave_0 [ 373.987804][T12744] device wg2 left promiscuous mode [ 374.036938][T12753] device wg2 entered promiscuous mode [ 376.203069][T12790] device veth1_to_bond entered promiscuous mode [ 376.565567][ T24] audit: type=1400 audit(1750104642.410:173): avc: denied { create } for pid=12801 comm="syz.0.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 377.505291][T12850] device veth0_vlan left promiscuous mode [ 377.590173][T12850] device veth0_vlan entered promiscuous mode [ 377.626889][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.666768][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.699340][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.162076][T12889] device wg2 entered promiscuous mode [ 378.409321][T12898] device syzkaller0 entered promiscuous mode [ 378.486181][T12901] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 379.369316][T12932] device pim6reg1 entered promiscuous mode [ 379.536837][T12936] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.544036][T12936] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.119880][T13072] Â: renamed from pim6reg1 [ 382.777845][T13131] device pim6reg1 entered promiscuous mode [ 383.012209][T13114] device syzkaller0 entered promiscuous mode [ 384.741043][T13193] device pim6reg1 entered promiscuous mode [ 384.987196][T13190] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.999489][T13190] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.088451][T13190] device bridge_slave_0 entered promiscuous mode [ 385.156672][T13190] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.163741][T13190] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.194482][T13190] device bridge_slave_1 entered promiscuous mode [ 385.206292][T13209] device veth0_vlan left promiscuous mode [ 385.307499][T13209] device veth0_vlan entered promiscuous mode [ 385.442438][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.466811][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.476613][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 386.075343][ T7] GPL: port 1(erspan0) entered disabled state [ 386.083187][ T7] device erspan0 left promiscuous mode [ 386.089160][ T7] GPL: port 1(erspan0) entered disabled state [ 386.217671][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 386.235724][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 386.260805][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 386.269210][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 386.277427][T12322] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.284447][T12322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.292012][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 386.300792][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 386.309152][T12322] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.316196][T12322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.323563][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 386.452541][T13264] device macsec0 left promiscuous mode [ 386.478658][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 386.490808][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 386.557787][T13190] device veth0_vlan entered promiscuous mode [ 386.574097][T13190] device veth1_macvtap entered promiscuous mode [ 386.621959][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 386.651641][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 386.683797][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 386.720236][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 386.755452][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 386.800484][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 386.846355][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 386.942210][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.001780][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.010323][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 387.018718][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 387.027457][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 387.035876][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 387.248055][ T7] device veth1_macvtap left promiscuous mode [ 387.874168][T13309] device veth0_vlan left promiscuous mode [ 387.954124][T13309] device veth0_vlan entered promiscuous mode [ 388.037318][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.046796][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.060757][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.404861][T13421] device syzkaller0 entered promiscuous mode [ 391.566909][T13424] syz.1.3568[13424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.566992][T13424] syz.1.3568[13424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.695829][T13424] syz.1.3568[13424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.806416][T13429] syz.1.3568[13429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.827110][T13424] syz.1.3568[13424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.915028][T13429] syz.1.3568[13429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.884897][T13519] device pim6reg1 entered promiscuous mode [ 395.437180][T13653] device bridge_slave_1 left promiscuous mode [ 395.445156][T13653] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.536394][T13653] device bridge_slave_0 left promiscuous mode [ 395.565595][T13653] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.003947][T13673] device pim6reg1 entered promiscuous mode [ 396.278735][T13678] device syzkaller0 entered promiscuous mode [ 396.679727][T13691] device wg2 left promiscuous mode [ 397.083588][T13710] device veth1_macvtap left promiscuous mode [ 398.512388][T13773] device veth0_vlan left promiscuous mode [ 398.586527][T13773] device veth0_vlan entered promiscuous mode [ 398.753607][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.772291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.786427][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.944864][T13782] device syzkaller0 entered promiscuous mode [ 399.160020][T13798] syz.0.3671[13798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.160080][T13798] syz.0.3671[13798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.235451][T13796] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.255269][T13796] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.394517][T13808] device bridge_slave_1 left promiscuous mode [ 399.414651][T13808] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.596743][T13808] device bridge_slave_0 left promiscuous mode [ 399.603026][T13808] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.386815][T13834] syz.0.3680[13834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.386881][T13834] syz.0.3680[13834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.919527][T13929] device pim6reg1 entered promiscuous mode [ 404.603528][T13953] syz.4.3709[13953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.603614][T13953] syz.4.3709[13953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.668253][T13957] device sit0 left promiscuous mode [ 405.091423][T13974] device wg2 entered promiscuous mode [ 405.685643][T14011] device syzkaller0 entered promiscuous mode [ 406.321272][T14023] syz.2.3730[14023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.321334][T14023] syz.2.3730[14023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.506198][T14025] device pim6reg1 entered promiscuous mode [ 406.834996][T14043] device syzkaller0 entered promiscuous mode [ 406.888550][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 408.521638][T14112] device sit0 left promiscuous mode [ 408.938765][T14117] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.951546][T14117] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.158137][T14131] device bridge_slave_1 left promiscuous mode [ 409.187779][T14131] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.280148][T14131] device bridge_slave_0 left promiscuous mode [ 409.300242][T14131] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.036690][T14216] device veth0_vlan left promiscuous mode [ 412.044003][T14216] device veth0_vlan entered promiscuous mode [ 412.093106][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.101672][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.111454][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.751428][T14375] device syzkaller0 entered promiscuous mode [ 416.898438][T14412] device syzkaller0 entered promiscuous mode [ 416.957928][T14421] device pim6reg1 entered promiscuous mode [ 423.398320][T14482] device pim6reg1 entered promiscuous mode [ 423.460982][T14485] device sit0 left promiscuous mode [ 423.858270][T14509] device syzkaller0 entered promiscuous mode [ 424.820329][T14556] device veth1_macvtap left promiscuous mode [ 424.846130][T14556] device macsec0 entered promiscuous mode [ 429.147263][T14670] syzkaller0: mtu greater than device maximum [ 429.982539][T14690] device pim6reg1 entered promiscuous mode [ 429.994809][T14692] FAULT_INJECTION: forcing a failure. [ 429.994809][T14692] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 430.017803][T14692] CPU: 0 PID: 14692 Comm: syz.1.3922 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 430.029210][T14692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 430.039274][T14692] Call Trace: [ 430.042582][T14692] __dump_stack+0x21/0x24 [ 430.046926][T14692] dump_stack_lvl+0x169/0x1d8 [ 430.051615][T14692] ? show_regs_print_info+0x18/0x18 [ 430.056827][T14692] ? stack_trace_save+0x98/0xe0 [ 430.061696][T14692] dump_stack+0x15/0x1c [ 430.065846][T14692] should_fail+0x3c1/0x510 [ 430.070251][T14692] should_fail_alloc_page+0x4f/0x60 [ 430.075431][T14692] __alloc_pages_nodemask+0x109/0x5f0 [ 430.080787][T14692] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 430.086405][T14692] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 430.091937][T14692] ? __mod_node_page_state+0x9e/0xd0 [ 430.097313][T14692] ? lru_cache_add+0x164/0x380 [ 430.102075][T14692] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 430.109009][T14692] wp_page_copy+0x1d0/0x15d0 [ 430.113596][T14692] ? stack_trace_save+0xe0/0xe0 [ 430.118439][T14692] ? trace_spf_pte_lock+0x110/0x110 [ 430.123625][T14692] ? __set_page_owner+0x3b/0x2a0 [ 430.128551][T14692] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 430.135044][T14692] do_wp_page+0x9a6/0xc80 [ 430.139460][T14692] handle_pte_fault+0xac1/0x3750 [ 430.144394][T14692] handle_mm_fault+0xf3f/0x16a0 [ 430.149232][T14692] ? prep_new_page+0x10c/0x180 [ 430.154021][T14692] ? can_reuse_spf_vma+0xe0/0xe0 [ 430.159035][T14692] ? __kasan_check_write+0x14/0x20 [ 430.164397][T14692] ? down_read_trylock+0x100/0x150 [ 430.169493][T14692] ? __init_rwsem+0x1c0/0x1c0 [ 430.174163][T14692] ? find_vma+0x30/0x150 [ 430.178406][T14692] do_user_addr_fault+0x5a2/0xc80 [ 430.183428][T14692] ? do_kern_addr_fault+0x80/0x80 [ 430.188456][T14692] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 430.193906][T14692] ? _raw_spin_lock+0xe0/0xe0 [ 430.198594][T14692] exc_page_fault+0x5a/0xc0 [ 430.203115][T14692] asm_exc_page_fault+0x1e/0x30 [ 430.207978][T14692] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 430.214587][T14692] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 430.234329][T14692] RSP: 0018:ffffc90001947d40 EFLAGS: 00050206 [ 430.240411][T14692] RAX: ffffffff823a3c01 RBX: 000000000000b161 RCX: 00000000000068e1 [ 430.248396][T14692] RDX: 000000000000b161 RSI: ffff8881260e4880 RDI: 0000200000006000 [ 430.256377][T14692] RBP: ffffc90001947d70 R08: 0000000000000001 R09: 0000000000000000 [ 430.265223][T14692] R10: ffffed1024c1d62c R11: 0000000000001628 R12: 00007ffffffff000 [ 430.274347][T14692] R13: 000020000000c8e1 R14: ffff8881260e0000 R15: 0000200000001780 [ 430.282344][T14692] ? _copy_to_user+0x21/0x90 [ 430.286949][T14692] ? _copy_to_user+0x78/0x90 [ 430.291552][T14692] map_lookup_and_delete_elem+0x409/0x530 [ 430.297278][T14692] __se_sys_bpf+0x454/0x680 [ 430.301789][T14692] ? __x64_sys_bpf+0x90/0x90 [ 430.306409][T14692] ? fpu__clear_all+0x20/0x20 [ 430.311109][T14692] __x64_sys_bpf+0x7b/0x90 [ 430.315539][T14692] do_syscall_64+0x31/0x40 [ 430.319968][T14692] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 430.325869][T14692] RIP: 0033:0x7fc78fcb9929 [ 430.330296][T14692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 430.350661][T14692] RSP: 002b:00007fc78e322038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.359518][T14692] RAX: ffffffffffffffda RBX: 00007fc78fee0fa0 RCX: 00007fc78fcb9929 [ 430.367757][T14692] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 430.375732][T14692] RBP: 00007fc78e322090 R08: 0000000000000000 R09: 0000000000000000 [ 430.383706][T14692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.391685][T14692] R13: 0000000000000000 R14: 00007fc78fee0fa0 R15: 00007ffdfe3535b8 [ 430.430346][T14701] tap0: tun_chr_ioctl cmd 2147767517 [ 430.706505][T14710] device ip6gre0 entered promiscuous mode [ 430.712700][T14708] device sit0 entered promiscuous mode [ 430.786832][T14710] device sit0 entered promiscuous mode [ 431.262244][T14747] FAULT_INJECTION: forcing a failure. [ 431.262244][T14747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.366163][T14747] CPU: 1 PID: 14747 Comm: syz.3.3927 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 431.377671][T14747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 431.387756][T14747] Call Trace: [ 431.391066][T14747] __dump_stack+0x21/0x24 [ 431.395413][T14747] dump_stack_lvl+0x169/0x1d8 [ 431.400103][T14747] ? show_regs_print_info+0x18/0x18 [ 431.405319][T14747] ? stack_trace_save+0x98/0xe0 [ 431.410182][T14747] dump_stack+0x15/0x1c [ 431.414346][T14747] should_fail+0x3c1/0x510 [ 431.418768][T14747] should_fail_alloc_page+0x4f/0x60 [ 431.423995][T14747] __alloc_pages_nodemask+0x109/0x5f0 [ 431.429365][T14747] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 431.434998][T14747] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 431.440540][T14747] ? __mod_node_page_state+0x9e/0xd0 [ 431.445827][T14747] ? lru_cache_add+0x164/0x380 [ 431.450585][T14747] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 431.457512][T14747] wp_page_copy+0x1d0/0x15d0 [ 431.462094][T14747] ? stack_trace_save+0xe0/0xe0 [ 431.466943][T14747] ? trace_spf_pte_lock+0x110/0x110 [ 431.472139][T14747] ? __set_page_owner+0x3b/0x2a0 [ 431.477072][T14747] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 431.483135][T14747] do_wp_page+0x9a6/0xc80 [ 431.487459][T14747] handle_pte_fault+0xac1/0x3750 [ 431.492389][T14747] handle_mm_fault+0xf3f/0x16a0 [ 431.497232][T14747] ? prep_new_page+0x10c/0x180 [ 431.502000][T14747] ? can_reuse_spf_vma+0xe0/0xe0 [ 431.506933][T14747] ? __kasan_check_write+0x14/0x20 [ 431.512037][T14747] ? down_read_trylock+0x100/0x150 [ 431.517145][T14747] ? __init_rwsem+0x1c0/0x1c0 [ 431.521820][T14747] ? find_vma+0x30/0x150 [ 431.526059][T14747] do_user_addr_fault+0x5a2/0xc80 [ 431.531082][T14747] ? do_kern_addr_fault+0x80/0x80 [ 431.536098][T14747] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 431.542277][T14747] ? _raw_spin_lock+0xe0/0xe0 [ 431.548203][T14747] exc_page_fault+0x5a/0xc0 [ 431.552805][T14747] asm_exc_page_fault+0x1e/0x30 [ 431.558963][T14747] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 431.565992][T14747] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 431.585593][T14747] RSP: 0018:ffffc90000c27d40 EFLAGS: 00050206 [ 431.591655][T14747] RAX: ffffffff823a3c01 RBX: 000000000000b161 RCX: 00000000000058e1 [ 431.599624][T14747] RDX: 000000000000b161 RSI: ffff888121965880 RDI: 0000200000007000 [ 431.607602][T14747] RBP: ffffc90000c27d70 R08: 0000000000000001 R09: 0000000000000000 [ 431.615761][T14747] R10: ffffed102432d62c R11: 0000000000001628 R12: 00007ffffffff000 [ 431.623738][T14747] R13: 000020000000c8e1 R14: ffff888121960000 R15: 0000200000001780 [ 431.631714][T14747] ? _copy_to_user+0x21/0x90 [ 431.636303][T14747] ? _copy_to_user+0x78/0x90 [ 431.640906][T14747] map_lookup_and_delete_elem+0x409/0x530 [ 431.646630][T14747] __se_sys_bpf+0x454/0x680 [ 431.651143][T14747] ? __x64_sys_bpf+0x90/0x90 [ 431.655732][T14747] ? fpu__clear_all+0x20/0x20 [ 431.660433][T14747] __x64_sys_bpf+0x7b/0x90 [ 431.664843][T14747] do_syscall_64+0x31/0x40 [ 431.669345][T14747] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 431.675232][T14747] RIP: 0033:0x7f5160b76929 [ 431.679644][T14747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.699241][T14747] RSP: 002b:00007f515f1df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.707649][T14747] RAX: ffffffffffffffda RBX: 00007f5160d9dfa0 RCX: 00007f5160b76929 [ 431.715611][T14747] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 431.723668][T14747] RBP: 00007f515f1df090 R08: 0000000000000000 R09: 0000000000000000 [ 431.731634][T14747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.739601][T14747] R13: 0000000000000000 R14: 00007f5160d9dfa0 R15: 00007ffdf828b728 [ 432.446505][T14794] device pim6reg1 entered promiscuous mode [ 433.904539][T14845] device syzkaller0 entered promiscuous mode [ 434.548926][T14872] syz.2.3957[14872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.548990][T14872] syz.2.3957[14872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.419530][T14987] €Â0: renamed from pim6reg1 [ 438.599239][T15035] device sit0 left promiscuous mode [ 439.192214][T15068] device veth0_vlan left promiscuous mode [ 439.223981][T15068] device veth0_vlan entered promiscuous mode [ 440.952392][T15135] ref_ctr_offset mismatch. inode: 0x2af offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 441.349968][T15147] device veth0_vlan left promiscuous mode [ 441.382853][T15147] device veth0_vlan entered promiscuous mode [ 441.403822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.417701][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.446365][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.565651][T15170] device sit0 entered promiscuous mode [ 442.107607][T15212] device pim6reg1 entered promiscuous mode [ 442.184580][T15215] device wg2 left promiscuous mode [ 442.195864][T15216] device wg2 entered promiscuous mode [ 442.356813][T15225] device pim6reg1 entered promiscuous mode [ 442.694455][T15248] device sit0 entered promiscuous mode [ 443.406523][T15282] device pim6reg1 entered promiscuous mode [ 443.589933][T15290] tap0: tun_chr_ioctl cmd 1074025677 [ 443.602081][T15290] tap0: linktype set to 0 [ 445.035345][T15343] device sit0 left promiscuous mode [ 445.301849][T15370] tap0: tun_chr_ioctl cmd 1074025677 [ 445.319425][T15370] tap0: linktype set to 0 [ 446.267233][T15437] Â: renamed from pim6reg1 [ 446.488889][T15455] device pim6reg1 entered promiscuous mode [ 446.776476][T15478] device wg2 entered promiscuous mode [ 448.650573][T15568] device wg2 left promiscuous mode [ 448.686111][T15573] device wg2 entered promiscuous mode [ 448.700739][T15575] cgroup: fork rejected by pids controller in /syz1 [ 449.837855][T15607] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.855839][T15607] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.886365][T15607] device bridge_slave_0 entered promiscuous mode [ 449.950632][T15607] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.958398][T15607] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.965795][T15607] device bridge_slave_1 entered promiscuous mode [ 450.173198][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.198744][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.308613][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.317383][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.325856][ T973] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.332952][ T973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.341280][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.459075][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.480048][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.510481][ T973] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.517581][ T973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.559807][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.586042][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.653037][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 450.720087][T15607] device veth0_vlan entered promiscuous mode [ 450.758526][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 450.820037][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.861167][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.919072][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 450.984407][T15607] device veth1_macvtap entered promiscuous mode [ 451.058891][T15642] device syzkaller0 entered promiscuous mode [ 451.089535][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 451.117690][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 451.190228][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 451.269745][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 451.658911][T12322] device veth1_macvtap left promiscuous mode [ 451.664973][T12322] device veth0_vlan left promiscuous mode [ 455.133648][T15743] device veth0_vlan left promiscuous mode [ 455.161152][T15743] device veth0_vlan entered promiscuous mode [ 455.853901][T15770] device veth1_macvtap left promiscuous mode [ 456.202242][ T24] audit: type=1400 audit(1750104722.050:174): avc: denied { create } for pid=15778 comm="syz.1.4215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 456.421723][T15779] tap0: tun_chr_ioctl cmd 2147767507 [ 457.068568][T15820] device sit0 left promiscuous mode [ 457.113237][T15820] device sit0 entered promiscuous mode [ 457.389419][T15829] device pim6reg1 entered promiscuous mode [ 458.961438][T15873] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 459.129870][T15867] device veth1_macvtap left promiscuous mode [ 460.133820][T15926] kfree: port 1(veth1) entered blocking state [ 460.206605][T15926] kfree: port 1(veth1) entered disabled state [ 460.261786][T15926] device veth1 entered promiscuous mode [ 461.115433][T15944] device veth0_vlan left promiscuous mode [ 461.121471][T15944] device veth0_vlan entered promiscuous mode [ 461.151402][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.161278][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.168892][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.565209][T15960] €Â0: renamed from pim6reg1 [ 462.452184][T15986] device veth0_vlan left promiscuous mode [ 462.488236][T15986] device veth0_vlan entered promiscuous mode [ 462.584674][T15996] device syzkaller0 entered promiscuous mode [ 462.971176][T16010] device syzkaller0 entered promiscuous mode [ 463.434324][T16023] device veth0_vlan left promiscuous mode [ 463.442788][T16023] device veth0_vlan entered promiscuous mode [ 463.504264][T16034] device syzkaller0 entered promiscuous mode [ 463.786251][T16052] device veth0_vlan left promiscuous mode [ 463.795818][T16052] device veth0_vlan entered promiscuous mode [ 463.857066][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.874025][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.916081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 464.250458][T16074] syz.0.4297[16074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.250516][T16074] syz.0.4297[16074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.023715][T16092] device pim6reg1 entered promiscuous mode [ 465.251296][T16098] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.259913][T16098] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.309733][T16104] syz.3.4304[16104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.309795][T16104] syz.3.4304[16104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.344755][T16101] device bridge_slave_1 left promiscuous mode [ 465.425719][T16101] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.437818][T16101] device bridge_slave_0 left promiscuous mode [ 465.447694][T16101] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.845798][T16124] device pim6reg1 entered promiscuous mode [ 466.233561][T16139] kfree: port 1(veth1) entered blocking state [ 466.270891][T16139] kfree: port 1(veth1) entered disabled state [ 466.321908][T16139] device veth1 entered promiscuous mode [ 467.061170][T16160] device pim6reg1 entered promiscuous mode [ 467.865199][T16199] device wg2 left promiscuous mode [ 468.169368][T16226] device syzkaller0 entered promiscuous mode [ 468.721252][T16250] syz.2.4342[16250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.721311][T16250] syz.2.4342[16250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.787853][T16251] device veth0_vlan left promiscuous mode [ 468.841148][T16251] device veth0_vlan entered promiscuous mode [ 468.878891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 468.887411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 468.895583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 468.981880][T16263] device wg2 left promiscuous mode [ 469.026780][T16263] device wg2 entered promiscuous mode [ 469.747173][T16314] -1: renamed from syzkaller0 [ 471.551295][T16357] device wg2 entered promiscuous mode [ 472.151433][T16390] device pim6reg1 entered promiscuous mode [ 473.927186][T16452] device wg2 left promiscuous mode [ 474.844950][T16484] device sit0 entered promiscuous mode [ 476.771727][T16576] device syzkaller0 entered promiscuous mode [ 477.297973][T16589] device syzkaller0 entered promiscuous mode [ 477.917131][T16627] syz.4.4443[16627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.917220][T16627] syz.4.4443[16627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.192123][T16875] device syzkaller0 entered promiscuous mode [ 488.938588][T16909] tun0: tun_chr_ioctl cmd 1074025681 [ 489.737927][T16959] device syzkaller0 entered promiscuous mode [ 491.558130][T17031] syz.2.4561[17031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 491.558211][T17031] syz.2.4561[17031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 491.918446][T17038] device syzkaller0 entered promiscuous mode [ 492.411410][T17073] device bridge_slave_0 entered promiscuous mode [ 493.186120][T17107] device sit0 left promiscuous mode [ 493.376787][T17110] device sit0 entered promiscuous mode [ 493.470604][T17112] syz.2.4584[17112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.470713][T17112] syz.2.4584[17112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.938931][T17123] device pim6reg1 entered promiscuous mode [ 496.022194][T17155] device sit0 left promiscuous mode [ 497.685974][ T24] audit: type=1400 audit(1750104763.510:175): avc: denied { create } for pid=17205 comm="syz.0.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 497.992656][T17219] device veth0_vlan left promiscuous mode [ 498.011230][T17219] device veth0_vlan entered promiscuous mode [ 498.055271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 498.074181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 498.106403][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 498.571767][T17246] syz.4.4624[17246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.571864][T17246] syz.4.4624[17246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.169068][T17259] device sit0 entered promiscuous mode [ 500.925438][T17316] device pim6reg1 entered promiscuous mode [ 501.817019][T17341] device syzkaller0 entered promiscuous mode [ 503.479261][T17401] syz.4.4668[17401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.479357][T17401] syz.4.4668[17401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.528438][T17402] syz.1.4669[17402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.578621][T17403] device bridge_slave_0 entered promiscuous mode [ 503.619371][T17402] syz.1.4669[17402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.637191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 504.969570][T17465] ÿÿÿÿÿÿ: renamed from vlan1 [ 505.106860][T17477] device pim6reg1 entered promiscuous mode [ 505.659594][T17491] device macsec0 entered promiscuous mode [ 505.989340][T17505] device veth0_vlan left promiscuous mode [ 506.021711][T17505] device veth0_vlan entered promiscuous mode [ 506.079085][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 506.087739][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 506.095535][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 506.735691][T17546] tun0: tun_chr_ioctl cmd 1074025681 [ 506.752807][T17536] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.768975][T17536] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.776590][T17536] device bridge_slave_0 entered promiscuous mode [ 506.847110][T17536] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.895951][T17536] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.905304][T17536] device bridge_slave_1 entered promiscuous mode [ 507.225487][T17580] device syzkaller0 entered promiscuous mode [ 507.304612][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 507.326334][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 507.405874][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 507.458143][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 507.515397][T12322] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.522783][T12322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 507.636190][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 507.644788][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 507.653453][T12322] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.660559][T12322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 507.668473][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 507.741151][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 507.752813][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 507.797213][T17536] device veth0_vlan entered promiscuous mode [ 507.829308][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 507.842747][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 507.855172][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 507.864666][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 507.873990][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 507.882143][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.890691][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 507.898648][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 507.924717][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 507.934907][T17604] device veth0_vlan left promiscuous mode [ 507.950191][T17604] device veth0_vlan entered promiscuous mode [ 507.972026][T17536] device veth1_macvtap entered promiscuous mode [ 507.979317][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.987958][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 507.995682][T12322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 508.059939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 508.070519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 508.117406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 508.125794][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 508.286778][T17623] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.308849][T17625] device pim6reg1 entered promiscuous mode [ 509.983832][T17682] device sit0 left promiscuous mode [ 510.955618][T17719] device syzkaller0 entered promiscuous mode [ 511.565189][T17743] ªªªªªª: renamed from vlan0 [ 512.440104][T17797] device sit0 entered promiscuous mode [ 512.538785][T17800] device bridge_slave_0 left promiscuous mode [ 513.489004][T17878] device syzkaller0 entered promiscuous mode [ 514.571517][T17903] device pim6reg1 entered promiscuous mode [ 518.158738][T17983] device syzkaller0 entered promiscuous mode [ 518.447887][T17995] ÿÿÿÿÿÿ: renamed from vlan1 [ 519.712307][T18040] device syzkaller0 entered promiscuous mode [ 525.646876][T18246] device syzkaller0 entered promiscuous mode [ 526.375535][T18267] device veth0_vlan left promiscuous mode [ 526.396635][T18267] device veth0_vlan entered promiscuous mode [ 527.253271][T18301] device pim6reg1 entered promiscuous mode [ 527.948200][T18320] device syzkaller0 entered promiscuous mode [ 529.119379][T18368] syz.0.4928[18368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.119474][T18368] syz.0.4928[18368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.191991][T18370] device pim6reg1 entered promiscuous mode [ 529.329714][T18375] device macsec0 left promiscuous mode [ 529.486508][T18384] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 531.472374][T18473] device syzkaller0 entered promiscuous mode [ 532.603093][T18516] device syzkaller0 entered promiscuous mode [ 536.797638][T18679] device pim6reg1 entered promiscuous mode [ 538.057057][T18716] device bridge_slave_0 entered promiscuous mode [ 540.468356][T18816] device veth0_vlan left promiscuous mode [ 540.528944][T18816] device veth0_vlan entered promiscuous mode [ 540.587338][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 540.616151][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 540.640243][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 540.667023][T18822] device pim6reg1 entered promiscuous mode [ 541.029009][T18837] device syzkaller0 entered promiscuous mode [ 542.191846][T18870] device sit0 entered promiscuous mode [ 543.278182][T18899] device wg2 left promiscuous mode [ 543.366187][T18897] device wg2 entered promiscuous mode [ 545.138191][T18937] device veth0_vlan left promiscuous mode [ 545.186435][T18937] device veth0_vlan entered promiscuous mode [ 545.301094][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.315201][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.337478][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.263838][T18982] syz.4.5096[18982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.263932][T18982] syz.4.5096[18982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 548.610678][T19080] device syzkaller0 entered promiscuous mode [ 548.879853][T19091] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.913786][T19091] device bridge_slave_1 left promiscuous mode [ 548.921348][T19091] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.933218][T19091] device bridge_slave_0 left promiscuous mode [ 548.942920][T19091] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.362078][T19184] device sit0 entered promiscuous mode [ 553.698165][T19189] device sit0 left promiscuous mode [ 553.926712][T19193] device sit0 entered promiscuous mode [ 555.122603][T19247] device sit0 entered promiscuous mode [ 555.181258][T19254] syz.2.5171[19254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.181313][T19254] syz.2.5171[19254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.494896][T19255] device syzkaller0 entered promiscuous mode [ 555.920335][T19273] device pim6reg1 entered promiscuous mode [ 556.037785][T19278] device syzkaller0 entered promiscuous mode [ 556.111998][T19279] device sit0 left promiscuous mode [ 556.270539][T19286] device sit0 entered promiscuous mode [ 558.626128][T19355] device pim6reg1 entered promiscuous mode [ 561.236193][T19394] device wg2 entered promiscuous mode [ 561.521810][T19396] device sit0 left promiscuous mode [ 564.626224][T19532] €Â0: renamed from pim6reg1 [ 565.684329][T19600] €Â0: renamed from pim6reg1 [ 565.759784][T19613] syz.4.5276[19613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 565.759843][T19613] syz.4.5276[19613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 565.808370][T19617] device bridge_slave_0 left promiscuous mode [ 567.846407][T19741] device sit0 left promiscuous mode [ 569.130034][T19818] device pim6reg1 entered promiscuous mode [ 573.175336][T20031] device wg2 entered promiscuous mode [ 573.220362][T20057] device sit0 left promiscuous mode [ 573.292818][T20066] device pim6reg1 entered promiscuous mode [ 573.336582][T20053] device sit0 entered promiscuous mode [ 573.791026][T20089] device pim6reg1 entered promiscuous mode [ 573.855644][T20097] device sit0 entered promiscuous mode [ 574.068403][T20100] device pim6reg1 entered promiscuous mode [ 574.346422][T20115] device veth0_vlan left promiscuous mode [ 574.434953][T20115] device veth0_vlan entered promiscuous mode [ 574.484930][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.494700][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 574.502448][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 575.679548][T20201] syz.2.5429[20201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.679612][T20201] syz.2.5429[20201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.712466][T20185] device syzkaller0 entered promiscuous mode [ 576.076922][T20210] syz.1.5430[20210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.077018][T20210] syz.1.5430[20210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.247524][T20252] device sit0 left promiscuous mode [ 577.856085][T20286] device syzkaller0 entered promiscuous mode [ 577.910047][T20282] syz.2.5449[20282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.911183][T20282] syz.2.5449[20282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.930657][ T5] syzkaller0: tun_net_xmit 48 [ 578.038570][T20286] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 579.705640][T20296] device syzkaller0 entered promiscuous mode [ 580.029202][T20320] device pim6reg1 entered promiscuous mode [ 580.152034][T20327] device vxcan1 entered promiscuous mode [ 580.267683][T20341] syz.1.5466[20341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.267779][T20341] syz.1.5466[20341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.349332][T20341] syz.1.5466[20341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.410420][T20341] syz.1.5466[20341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.856924][T20458] device sit0 left promiscuous mode [ 583.064270][T20467] device sit0 entered promiscuous mode [ 583.385811][T20479] device sit0 left promiscuous mode [ 583.526444][T20481] device sit0 entered promiscuous mode [ 584.850267][T20538] device sit0 left promiscuous mode [ 585.559081][T20566] syz.3.5530[20566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.559176][T20566] syz.3.5530[20566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.712078][T20569] device syzkaller0 entered promiscuous mode [ 587.095071][T20615] syz.4.5545[20615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.095131][T20615] syz.4.5545[20615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.341648][T20620] device veth0_vlan left promiscuous mode [ 587.385019][T20620] device veth0_vlan entered promiscuous mode [ 588.385797][T20659] device pim6reg1 entered promiscuous mode [ 588.457358][T20657] device veth1 entered promiscuous mode [ 589.994526][T20704] device syzkaller0 entered promiscuous mode [ 590.249341][T20719] device veth1_macvtap entered promiscuous mode [ 591.646422][T20781] syz.1.5591[20781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.646484][T20781] syz.1.5591[20781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.904465][T20788] device veth0_vlan left promiscuous mode [ 591.948449][T20788] device veth0_vlan entered promiscuous mode [ 595.610950][T20911] device syzkaller0 entered promiscuous mode [ 596.873844][T20980] device wg2 left promiscuous mode [ 597.267244][T21001] device syzkaller0 entered promiscuous mode [ 597.985906][T21037] device syzkaller0 entered promiscuous mode [ 598.680613][T21081] device syzkaller0 entered promiscuous mode [ 600.639658][T21136] device pim6reg1 entered promiscuous mode [ 601.601248][T21171] device syzkaller0 entered promiscuous mode [ 602.822434][T21243] gretap0: refused to change device tx_queue_len [ 602.912658][T21247] device sit0 left promiscuous mode [ 602.986831][T21243] device veth1_macvtap entered promiscuous mode [ 603.066123][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 603.472103][T21263] device pim6reg1 entered promiscuous mode [ 603.934503][T21273] device syzkaller0 entered promiscuous mode [ 606.953989][T21318] device syzkaller0 entered promiscuous mode [ 606.983905][T21319] device wg2 entered promiscuous mode [ 607.968630][T21370] device syzkaller0 entered promiscuous mode [ 608.578537][T21387] ÿÿÿÿÿÿ: renamed from vlan1 [ 608.908840][T21393] device syzkaller0 entered promiscuous mode [ 610.113066][T21439] device syzkaller0 entered promiscuous mode [ 613.116999][T21575] device syzkaller0 entered promiscuous mode [ 613.533472][T21598] device syzkaller0 entered promiscuous mode [ 614.816622][T21629] device veth0_vlan left promiscuous mode [ 614.887057][T21629] device veth0_vlan entered promiscuous mode [ 614.927769][T21629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.956992][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.965715][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 614.973357][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.121485][T21672] device pim6reg1 entered promiscuous mode [ 616.266287][T21678] syz.1.5839[21678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.266416][T21678] syz.1.5839[21678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.292704][T21675] device sit0 entered promiscuous mode [ 616.617044][T21691] device pim6reg1 entered promiscuous mode [ 616.647547][T21699] €Â0: renamed from pim6reg1 [ 617.122057][T21737] device pim6reg1 entered promiscuous mode [ 618.027723][T21795] device sit0 left promiscuous mode [ 618.054567][T21795] device sit0 entered promiscuous mode [ 619.186589][T21825] device veth0_vlan left promiscuous mode [ 619.219654][T21825] device veth0_vlan entered promiscuous mode [ 619.280347][T21825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 619.339651][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 619.368098][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 619.375401][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 619.572798][T21840] device pim6reg1 entered promiscuous mode [ 619.674201][T21845] device pim6reg1 entered promiscuous mode [ 620.608314][T21892] device syzkaller0 entered promiscuous mode [ 621.561691][T21943] device syzkaller0 entered promiscuous mode [ 623.121198][T22004] device syzkaller0 entered promiscuous mode [ 623.357856][T22011] syz.0.5932[22011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.358021][T22011] syz.0.5932[22011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.304676][T22095] device syzkaller0 entered promiscuous mode [ 626.778607][T22113] device sit0 left promiscuous mode [ 627.053112][T22126] device sit0 entered promiscuous mode [ 627.401224][T22150] device syzkaller0 entered promiscuous mode [ 628.041259][T22158] device sit0 entered promiscuous mode [ 630.094759][T22213] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.116941][T22213] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.124478][T22213] device bridge_slave_0 entered promiscuous mode [ 630.135736][T22213] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.144770][T22213] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.152625][T22213] device bridge_slave_1 entered promiscuous mode [ 630.497886][T22213] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.505125][T22213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 630.512477][T22213] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.519562][T22213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 630.601825][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 630.637565][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 630.701065][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 630.714993][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 630.728660][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 630.753641][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 630.911765][T22213] device veth0_vlan entered promiscuous mode [ 630.925285][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 630.981978][T22213] device veth1_macvtap entered promiscuous mode [ 631.074629][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 631.086207][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 631.093868][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 631.105534][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 631.114116][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 631.298940][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 631.307917][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 631.349909][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 631.358755][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 633.276649][T22297] device veth0_vlan left promiscuous mode [ 633.303097][T22297] device veth0_vlan entered promiscuous mode [ 633.363150][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.375047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 633.418281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 633.862033][T22314] device syzkaller0 entered promiscuous mode [ 634.115019][T22321] device sit0 entered promiscuous mode [ 635.009737][T22360] device pim6reg1 entered promiscuous mode [ 635.306468][T22378] device veth0_vlan left promiscuous mode [ 635.345166][T22378] device veth0_vlan entered promiscuous mode [ 635.451647][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.488442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.518324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 637.123592][T22429] device veth0_vlan left promiscuous mode [ 637.388758][T22429] device veth0_vlan entered promiscuous mode [ 637.452516][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.484784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.502666][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.536706][T22438] syz.4.6043[22438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.536716][T22441] syz.4.6043[22441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.536797][T22438] syz.4.6043[22438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.665175][T22441] syz.4.6043[22441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.955814][T22445] device syzkaller0 entered promiscuous mode [ 639.360837][T22499] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.372601][T22499] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.380526][T22499] device bridge_slave_0 entered promiscuous mode [ 639.501994][T22499] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.543242][T22499] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.596212][T22499] device bridge_slave_1 entered promiscuous mode [ 639.612502][T22510] device wg2 entered promiscuous mode [ 639.745006][T22531] device pim6reg1 entered promiscuous mode [ 639.791006][T22513] device wg2 entered promiscuous mode [ 639.915665][T22547] FAULT_INJECTION: forcing a failure. [ 639.915665][T22547] name failslab, interval 1, probability 0, space 0, times 0 [ 639.928474][T22547] CPU: 0 PID: 22547 Comm: syz.4.6073 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 639.939975][T22547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 639.950041][T22547] Call Trace: [ 639.953337][T22547] __dump_stack+0x21/0x24 [ 639.957669][T22547] dump_stack_lvl+0x169/0x1d8 [ 639.962361][T22547] ? thaw_kernel_threads+0x220/0x220 [ 639.967656][T22547] ? show_regs_print_info+0x18/0x18 [ 639.972865][T22547] dump_stack+0x15/0x1c [ 639.977034][T22547] should_fail+0x3c1/0x510 [ 639.981456][T22547] ? alloc_uevent_skb+0x85/0x240 [ 639.986393][T22547] __should_failslab+0xa4/0xe0 [ 639.991163][T22547] should_failslab+0x9/0x20 [ 639.995666][T22547] __kmalloc_track_caller+0x5f/0x320 [ 640.000952][T22547] ? kmem_cache_alloc+0x165/0x2e0 [ 640.005980][T22547] ? __alloc_skb+0x9e/0x520 [ 640.010482][T22547] ? alloc_uevent_skb+0x85/0x240 [ 640.015414][T22547] __alloc_skb+0xdc/0x520 [ 640.019742][T22547] ? mutex_lock+0x8c/0xe0 [ 640.024066][T22547] alloc_uevent_skb+0x85/0x240 [ 640.028844][T22547] ? netdev_queue_release+0x90/0x90 [ 640.034040][T22547] kobject_uevent_net_broadcast+0x1a6/0x5a0 [ 640.039928][T22547] kobject_uevent_env+0x52e/0x700 [ 640.044947][T22547] kobject_uevent+0x1d/0x30 [ 640.049442][T22547] __kobject_del+0xd7/0x2f0 [ 640.053940][T22547] kobject_put+0x1db/0x270 [ 640.058352][T22547] netdev_queue_update_kobjects+0x326/0x390 [ 640.064239][T22547] netif_set_real_num_tx_queues+0x15d/0x7c0 [ 640.070133][T22547] __tun_detach+0xb31/0x1450 [ 640.074723][T22547] __tun_chr_ioctl+0xaad/0x1cd0 [ 640.079566][T22547] ? mutex_trylock+0xa0/0xa0 [ 640.084176][T22547] ? tun_flow_create+0x320/0x320 [ 640.089226][T22547] ? __fget_files+0x2c4/0x320 [ 640.093914][T22547] tun_chr_ioctl+0x2a/0x40 [ 640.098330][T22547] ? tun_chr_poll+0x6b0/0x6b0 [ 640.103097][T22547] __se_sys_ioctl+0x121/0x1a0 [ 640.107963][T22547] __x64_sys_ioctl+0x7b/0x90 [ 640.112566][T22547] do_syscall_64+0x31/0x40 [ 640.116992][T22547] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 640.122888][T22547] RIP: 0033:0x7fd960bc9929 [ 640.127377][T22547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 640.147673][T22547] RSP: 002b:00007fd95f232038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 640.156081][T22547] RAX: ffffffffffffffda RBX: 00007fd960df0fa0 RCX: 00007fd960bc9929 [ 640.164053][T22547] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000009 [ 640.172015][T22547] RBP: 00007fd95f232090 R08: 0000000000000000 R09: 0000000000000000 [ 640.179979][T22547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 640.188067][T22547] R13: 0000000000000000 R14: 00007fd960df0fa0 R15: 00007fffdbc0d708 [ 640.391227][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 640.418997][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 640.486206][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 640.575486][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 640.635218][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.642432][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.662809][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 640.677152][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 640.686507][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.693726][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.807454][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 640.866640][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 640.877140][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 640.958838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 640.989026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 641.027652][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 641.074758][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 641.184489][T22499] device veth0_vlan entered promiscuous mode [ 641.199168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 641.210259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 641.288968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 641.300300][ T48] device veth0_vlan left promiscuous mode [ 641.632904][T22601] FAULT_INJECTION: forcing a failure. [ 641.632904][T22601] name failslab, interval 1, probability 0, space 0, times 0 [ 641.736188][T22601] CPU: 0 PID: 22601 Comm: syz.3.6087 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 641.747917][T22601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 641.757997][T22601] Call Trace: [ 641.761316][T22601] __dump_stack+0x21/0x24 [ 641.765809][T22601] dump_stack_lvl+0x169/0x1d8 [ 641.770518][T22601] ? show_regs_print_info+0x18/0x18 [ 641.775771][T22601] ? __kasan_slab_free+0x11/0x20 [ 641.780815][T22601] ? slab_free_freelist_hook+0xc5/0x190 [ 641.786407][T22601] dump_stack+0x15/0x1c [ 641.790576][T22601] should_fail+0x3c1/0x510 [ 641.795002][T22601] ? kobject_uevent_env+0x272/0x700 [ 641.800212][T22601] __should_failslab+0xa4/0xe0 [ 641.804981][T22601] should_failslab+0x9/0x20 [ 641.809493][T22601] kmem_cache_alloc_trace+0x3a/0x2e0 [ 641.814793][T22601] ? kernfs_put+0x449/0x480 [ 641.819305][T22601] kobject_uevent_env+0x272/0x700 [ 641.824349][T22601] kobject_uevent+0x1d/0x30 [ 641.828856][T22601] __kobject_del+0xd7/0x2f0 [ 641.833369][T22601] kobject_put+0x1db/0x270 [ 641.838014][T22601] net_rx_queue_update_kobjects+0x3b5/0x420 [ 641.843936][T22601] ? netif_set_real_num_tx_queues+0x5e0/0x7c0 [ 641.850025][T22601] netif_set_real_num_rx_queues+0x107/0x1f0 [ 641.856110][T22601] __tun_detach+0xb67/0x1450 [ 641.860743][T22601] __tun_chr_ioctl+0xaad/0x1cd0 [ 641.865834][T22601] ? mutex_trylock+0xa0/0xa0 [ 641.870438][T22601] ? tun_flow_create+0x320/0x320 [ 641.875491][T22601] ? __fget_files+0x2c4/0x320 [ 641.880190][T22601] tun_chr_ioctl+0x2a/0x40 [ 641.884627][T22601] ? tun_chr_poll+0x6b0/0x6b0 [ 641.889329][T22601] __se_sys_ioctl+0x121/0x1a0 [ 641.894017][T22601] __x64_sys_ioctl+0x7b/0x90 [ 641.898615][T22601] do_syscall_64+0x31/0x40 [ 641.903055][T22601] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 641.908955][T22601] RIP: 0033:0x7feaff60d929 [ 641.913473][T22601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 641.933603][T22601] RSP: 002b:00007feafdc34038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 641.944255][T22601] RAX: ffffffffffffffda RBX: 00007feaff835160 RCX: 00007feaff60d929 [ 641.952847][T22601] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000009 [ 641.960931][T22601] RBP: 00007feafdc34090 R08: 0000000000000000 R09: 0000000000000000 [ 641.968908][T22601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 641.976912][T22601] R13: 0000000000000001 R14: 00007feaff835160 R15: 00007ffcf271c548 [ 642.065598][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 642.084903][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 642.117534][T22499] device veth1_macvtap entered promiscuous mode [ 642.136019][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 642.153308][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 642.162531][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 642.171384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 642.180450][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 642.260343][T22616] device syzkaller0 entered promiscuous mode [ 642.858152][T22658] device syzkaller0 entered promiscuous mode [ 642.943393][T22667] device syzkaller0 entered promiscuous mode [ 642.950595][T22668] device pim6reg1 entered promiscuous mode [ 643.528992][T22690] device veth0_vlan left promiscuous mode [ 643.582701][T22690] device veth0_vlan entered promiscuous mode [ 643.682269][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 643.691072][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 643.698876][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 643.988670][T22707] device syzkaller0 entered promiscuous mode [ 644.269744][T22710] device veth1_macvtap left promiscuous mode [ 644.320081][T22710] device macsec0 entered promiscuous mode [ 644.948125][T22735] device pim6reg1 entered promiscuous mode [ 645.618469][T22742] device macsec0 entered promiscuous mode [ 648.580551][T22855] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.589530][T22855] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.841489][T22860] device sit0 entered promiscuous mode [ 651.527650][T22907] device syzkaller0 entered promiscuous mode [ 652.484693][T22956] device syzkaller0 entered promiscuous mode [ 652.757775][T22959] device bridge_slave_1 left promiscuous mode [ 652.805622][T22959] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.918807][T22959] device bridge_slave_0 left promiscuous mode [ 652.927066][T22959] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.377585][T22975] device syzkaller0 entered promiscuous mode [ 656.800409][T23111] device syzkaller0 entered promiscuous mode [ 658.699493][T23144] device syzkaller0 entered promiscuous mode [ 659.621714][T23182] device sit0 left promiscuous mode [ 659.658041][T23175] device sit0 entered promiscuous mode [ 660.642664][T23220] device veth0_vlan left promiscuous mode [ 660.669147][T23220] device veth0_vlan entered promiscuous mode [ 660.690095][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 660.706204][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 660.735464][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 661.010482][T23227] device sit0 left promiscuous mode [ 661.977858][T23255] device pim6reg1 entered promiscuous mode [ 662.555991][T23294] device veth0_vlan left promiscuous mode [ 662.596062][T23294] device veth0_vlan entered promiscuous mode [ 664.032002][T23331] device bridge_slave_0 entered promiscuous mode [ 664.816368][T23339] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.823448][T23339] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.839669][T23339] device bridge_slave_0 entered promiscuous mode [ 664.846793][T23339] bridge0: port 2(bridge_slave_1) entered blocking state [ 664.855298][T23339] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.855419][T23348] syz.0.6295[23348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.864048][T23339] device bridge_slave_1 entered promiscuous mode [ 664.882727][T23348] syz.0.6295[23348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.308727][T23339] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.327234][T23339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.334604][T23339] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.341719][T23339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.387541][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.395157][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.405899][T23395] ÿÿÿÿÿÿ: renamed from vlan1 [ 665.486421][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.516187][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.584629][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.591737][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.620452][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.629422][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.636516][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.653818][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 665.685600][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 665.828028][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 665.848529][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 665.982342][T23430] syz.0.6312[23430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.982439][T23430] syz.0.6312[23430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.047076][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 666.070322][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.081786][T23339] device veth0_vlan entered promiscuous mode [ 666.115752][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 666.123907][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.152068][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 666.165434][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 666.179892][T23339] device veth1_macvtap entered promiscuous mode [ 666.192017][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 666.200188][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 666.228076][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 666.244373][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 666.253963][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 666.978237][T23478] device syzkaller0 entered promiscuous mode [ 667.637436][ T296] device veth0_vlan left promiscuous mode [ 667.971917][T23481] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.014430][T23481] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.042856][T23481] device bridge_slave_0 entered promiscuous mode [ 668.096224][T23481] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.103401][T23481] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.166353][T23481] device bridge_slave_1 entered promiscuous mode [ 668.553653][T23481] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.560766][T23481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.568093][T23481] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.575134][T23481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.018716][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.026306][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.099232][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 669.136230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 669.143813][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 669.238000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 669.329091][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.336219][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.436039][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 669.464882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 669.506389][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.513502][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.576026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 669.588631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 669.705933][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 669.716404][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 669.734712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 669.747606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 669.778616][T23481] device veth0_vlan entered promiscuous mode [ 669.804436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 669.815271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.842784][T23481] device veth1_macvtap entered promiscuous mode [ 669.883690][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.891712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 669.901711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 669.910247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 669.918838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 669.940148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 669.956306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 669.974993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 669.993742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 670.564735][T23563] device pim6reg1 entered promiscuous mode [ 670.660201][ T296] device veth1 left promiscuous mode [ 670.676001][ T296] kfree: port 1(veth1) entered disabled state [ 670.846927][T23563] device veth0_vlan left promiscuous mode [ 670.857925][T23563] device veth0_vlan entered promiscuous mode [ 671.016690][T23579] device veth1_macvtap left promiscuous mode [ 671.057935][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 671.071914][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 671.083666][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 672.096766][T23632] syz.3.6367[23632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.096831][T23632] syz.3.6367[23632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.834686][T23648] device syzkaller0 entered promiscuous mode [ 673.249334][T23681] device veth0_to_team entered promiscuous mode [ 673.370674][T23676] device pim6reg1 entered promiscuous mode [ 673.552952][T23683] device syzkaller0 entered promiscuous mode [ 674.027402][T23705] device wg2 left promiscuous mode [ 674.164375][T23707] device wg2 entered promiscuous mode [ 674.224870][T23710] device pim6reg1 entered promiscuous mode [ 675.834303][T23845] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.890494][T23845] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.920314][T23845] device bridge_slave_0 entered promiscuous mode [ 675.960987][T23845] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.976091][T23845] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.983725][T23845] device bridge_slave_1 entered promiscuous mode [ 676.359811][T23845] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.366910][T23845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 676.374216][T23845] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.381306][T23845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 676.686555][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.709859][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.813892][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 676.850148][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 676.916490][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.010425][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.096261][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.103493][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.218316][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 677.286277][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.305958][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.313028][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.321032][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 677.329618][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.346440][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.366051][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.504229][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 677.526411][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 677.565426][T23908] device pim6reg1 entered promiscuous mode [ 677.605686][T23909] device veth0_vlan left promiscuous mode [ 677.633599][T23909] device veth0_vlan entered promiscuous mode [ 677.675405][T23845] device veth0_vlan entered promiscuous mode [ 677.696453][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.705482][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.718746][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 677.727306][T23915] syz.1.6420[23915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.727368][T23915] syz.1.6420[23915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.732477][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 677.768662][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.777309][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.785092][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.047666][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 678.073089][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.155505][T23845] device veth1_macvtap entered promiscuous mode [ 678.272336][ T296] device bridge_slave_1 left promiscuous mode [ 678.287494][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.326462][ T296] device bridge_slave_0 left promiscuous mode [ 678.343047][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.384537][ T296] device veth0_vlan left promiscuous mode [ 678.524673][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 678.538682][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.549013][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 678.580925][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 678.593541][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 681.108462][T23989] device syzkaller0 entered promiscuous mode [ 681.693785][T24008] device pim6reg1 entered promiscuous mode [ 683.020686][T24042] device pim6reg1 entered promiscuous mode [ 683.545255][T24056] device pim6reg1 entered promiscuous mode [ 684.129648][T24081] syz.2.6466[24081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.129710][T24081] syz.2.6466[24081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.880535][T24111] bridge0: port 3(veth0) entered blocking state [ 684.900772][T24111] bridge0: port 3(veth0) entered disabled state [ 684.908473][T24111] device veth0 entered promiscuous mode [ 684.914996][T24111] bridge0: port 3(veth0) entered blocking state [ 684.921455][T24111] bridge0: port 3(veth0) entered forwarding state [ 685.719811][T24155] device veth0_vlan left promiscuous mode [ 685.823548][T24155] device veth0_vlan entered promiscuous mode [ 686.215881][T24167] device sit0 left promiscuous mode [ 686.461502][T24185] device syzkaller0 entered promiscuous mode [ 686.592350][T24195] device veth0_vlan left promiscuous mode [ 686.615773][T24195] device veth0_vlan entered promiscuous mode [ 688.868498][T24282] device pim6reg1 entered promiscuous mode [ 690.691568][T24327] device syzkaller0 left promiscuous mode [ 691.130307][T24351] syz.0.6538[24351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.130372][T24351] syz.0.6538[24351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.637272][T24361] device sit0 entered promiscuous mode [ 692.038756][T24372] device veth1_macvtap left promiscuous mode [ 692.822919][T24419] syz.0.6558[24419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 692.822978][T24419] syz.0.6558[24419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.230360][T24435] syz.3.6563[24435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.276091][T24435] syz.3.6563[24435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.585950][T24466] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.606826][T24466] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.686069][T24459] device bridge_slave_1 left promiscuous mode [ 693.779014][T24459] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.984338][T24459] device bridge_slave_0 left promiscuous mode [ 694.074440][T24459] bridge0: port 1(bridge_slave_0) entered disabled state [ 694.694872][T24492] syz.0.6579[24492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.694931][T24492] syz.0.6579[24492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 696.271074][T24531] device pim6reg1 entered promiscuous mode [ 699.101128][T24605] device syzkaller0 entered promiscuous mode [ 699.328329][T24608] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.338047][T24608] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.408101][T24614] syz.1.6611[24614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.408176][T24614] syz.1.6611[24614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.514019][T24601] device bridge_slave_1 left promiscuous mode [ 699.679257][T24601] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.738457][T24601] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.093788][T24648] device pim6reg1 entered promiscuous mode [ 701.673833][T24652] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.742021][T24652] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.749696][T24652] device bridge_slave_0 entered promiscuous mode [ 701.760134][T24652] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.767256][T24652] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.774882][T24652] device bridge_slave_1 entered promiscuous mode [ 701.849482][T24675] device veth0_vlan left promiscuous mode [ 701.855577][T24675] device veth0_vlan entered promiscuous mode [ 701.893340][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.925103][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.994497][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.472018][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 702.500359][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.568499][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 702.649509][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 702.720494][ T973] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.727604][ T973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.856764][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 702.946895][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 703.048036][ T973] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.055197][ T973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 703.180216][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 703.259314][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 703.365137][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 703.401441][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 703.473323][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 703.658763][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 703.689807][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 703.752282][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 703.795390][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 703.824256][T24652] device veth0_vlan entered promiscuous mode [ 703.860913][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 703.873939][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.942431][T23137] device veth0 left promiscuous mode [ 703.952405][T23137] bridge0: port 3(veth0) entered disabled state [ 703.972344][T23137] device bridge_slave_1 left promiscuous mode [ 704.006933][T23137] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.036640][T23137] device bridge_slave_0 left promiscuous mode [ 704.042824][T23137] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.301323][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 704.315570][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 704.326280][T24652] device veth1_macvtap entered promiscuous mode [ 704.384168][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 704.392954][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 704.401895][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 704.440204][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 704.448803][ T973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 705.018266][T24747] syz.3.6647[24747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.018329][T24747] syz.3.6647[24747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.395948][T24761] syz.3.6650[24761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.396214][T24762] syz.3.6650[24762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.480917][T24778] device veth0_vlan left promiscuous mode [ 706.532902][T24778] device veth0_vlan entered promiscuous mode [ 707.188038][T24785] device pim6reg1 entered promiscuous mode [ 709.024211][T24849] device syzkaller0 entered promiscuous mode [ 710.129865][T24896] syz.4.6688[24896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.129929][T24896] syz.4.6688[24896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.330461][T24906] syz.4.6691[24906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.349680][T24906] syz.4.6691[24906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.095158][T24925] device sit0 entered promiscuous mode [ 711.412749][T24944] syz.0.6702[24944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.412810][T24944] syz.0.6702[24944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.070020][T24978] syz.4.6712[24978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.138291][T24980] syz.1.6713[24980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.155939][T24978] syz.4.6712[24978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.186111][T24980] syz.1.6713[24980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.484239][T25055] bpf_get_probe_write_proto: 4 callbacks suppressed [ 715.484251][T25055] syz.2.6736[25055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.512294][T25055] syz.2.6736[25055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.874495][T25065] syz.1.6738[25065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.912434][T25072] syz.2.6740[25072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.913951][T25065] syz.1.6738[25065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.948663][T25072] syz.2.6740[25072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 716.362374][T25103] syz.3.6750[25103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 716.466155][T25103] syz.3.6750[25103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 716.588680][T25112] syz.3.6752[25112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 716.661887][T25112] syz.3.6752[25112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 716.838105][T25118] device syzkaller0 entered promiscuous mode [ 719.638746][T25202] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.646003][T25202] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.848471][T25255] bpf_get_probe_write_proto: 6 callbacks suppressed [ 720.848482][T25255] syz.1.6796[25255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 720.906079][T25255] syz.1.6796[25255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.220399][T25265] device veth0_vlan left promiscuous mode [ 721.249290][T25265] device veth0_vlan entered promiscuous mode [ 721.937313][T25309] syz.1.6810[25309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.937387][T25309] syz.1.6810[25309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.677326][T25346] syz.4.6823[25346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.760263][T25346] syz.4.6823[25346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.959775][T25355] syz.0.6825[25355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.072504][T25355] syz.0.6825[25355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.873549][T25389] device sit0 entered promiscuous mode [ 723.949416][T25400] syz.1.6836[25400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.949479][T25400] syz.1.6836[25400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 724.482057][T25428] device syzkaller0 left promiscuous mode [ 724.542199][T25428] device wg2 left promiscuous mode [ 724.596227][T25429] device syzkaller0 entered promiscuous mode [ 726.466251][T25486] general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN [ 726.478005][T25486] KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] [ 726.486526][T25486] CPU: 1 PID: 25486 Comm: syz.0.6867 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 726.497883][T25486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 726.507950][T25486] RIP: 0010:inherit_task_group+0x565/0x650 [ 726.513759][T25486] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 38 84 c0 0f 85 92 00 00 00 8b 1b 49 81 c4 8c 00 00 00 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 92 00 00 00 41 89 1c 24 45 31 e4 44 89 [ 726.533827][T25486] RSP: 0018:ffffc9000154fa20 EFLAGS: 00010207 [ 726.539896][T25486] RAX: 0000000000000011 RBX: 0000000000000000 RCX: 0000000000080000 [ 726.547863][T25486] RDX: ffffc90009ed2000 RSI: 0000000000000a73 RDI: 0000000000000a74 [ 726.555835][T25486] RBP: ffffc9000154fa98 R08: dffffc0000000000 R09: ffffed103ee2ae72 [ 726.563804][T25486] R10: ffffed103ee2ae72 R11: 1ffff1103ee2ae71 R12: 000000000000008c [ 726.571774][T25486] R13: ffffc9000154fafc R14: ffff8881017d8810 R15: dffffc0000000000 [ 726.579740][T25486] FS: 00007fb860c9e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 726.588664][T25486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 726.595244][T25486] CR2: 0000555561bdd4a8 CR3: 0000000118f44000 CR4: 00000000003506a0 [ 726.603214][T25486] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 726.611183][T25486] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 726.619148][T25486] Call Trace: [ 726.622445][T25486] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 726.628453][T25486] perf_event_init_task+0x250/0x4a0 [ 726.633997][T25486] copy_process+0x103b/0x32c0 [ 726.638766][T25486] ? __pidfd_prepare+0x150/0x150 [ 726.643699][T25486] kernel_clone+0x23f/0x940 [ 726.648196][T25486] ? create_io_thread+0x130/0x130 [ 726.653310][T25486] ? security_bpf+0x82/0xa0 [ 726.657826][T25486] __x64_sys_clone+0x176/0x1d0 [ 726.662582][T25486] ? __ia32_sys_vfork+0xf0/0xf0 [ 726.667437][T25486] do_syscall_64+0x31/0x40 [ 726.671848][T25486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 726.677732][T25486] RIP: 0033:0x7fb862635929 [ 726.682144][T25486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 726.701738][T25486] RSP: 002b:00007fb860c9dfe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 726.710145][T25486] RAX: ffffffffffffffda RBX: 00007fb86285cfa0 RCX: 00007fb862635929 [ 726.718113][T25486] RDX: 0000200000000a00 RSI: 0000000000000000 RDI: 0000000040049480 [ 726.726166][T25486] RBP: 00007fb8626b7b39 R08: 0000000000000000 R09: 0000000000000000 [ 726.734131][T25486] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 726.743226][T25486] R13: 0000000000000000 R14: 00007fb86285cfa0 R15: 00007ffc6a1dda98 [ 726.751216][T25486] Modules linked in: [ 726.758892][ T24] audit: type=1400 audit(1750104992.610:176): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 726.791196][ T24] audit: type=1400 audit(1750104992.610:177): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 726.813041][ T24] audit: type=1400 audit(1750104992.610:178): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 726.834520][ T24] audit: type=1400 audit(1750104992.610:179): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 726.865851][ T24] audit: type=1400 audit(1750104992.610:180): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 726.886637][ T24] audit: type=1400 audit(1750104992.610:181): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 726.909732][ T24] audit: type=1400 audit(1750104992.610:182): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 726.932560][T25486] ---[ end trace 125e13164fee24a0 ]--- [ 726.938693][T25486] RIP: 0010:inherit_task_group+0x565/0x650 [ 726.957935][T25486] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 38 84 c0 0f 85 92 00 00 00 8b 1b 49 81 c4 8c 00 00 00 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 92 00 00 00 41 89 1c 24 45 31 e4 44 89 [ 726.977871][T25486] RSP: 0018:ffffc9000154fa20 EFLAGS: 00010207 [ 726.984953][T25486] RAX: 0000000000000011 RBX: 0000000000000000 RCX: 0000000000080000 [ 727.004658][T25486] RDX: ffffc90009ed2000 RSI: 0000000000000a73 RDI: 0000000000000a74 [ 727.023053][T25486] RBP: ffffc9000154fa98 R08: dffffc0000000000 R09: ffffed103ee2ae72 [ 727.031497][T25486] R10: ffffed103ee2ae72 R11: 1ffff1103ee2ae71 R12: 000000000000008c [ 727.039839][T25486] R13: ffffc9000154fafc R14: ffff8881017d8810 R15: dffffc0000000000 [ 727.047888][T25486] FS: 00007fb860c9e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 727.057095][T25486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 727.063698][T25486] CR2: 0000000100000001 CR3: 0000000118f44000 CR4: 00000000003506b0 [ 727.071913][T25486] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 727.084290][T25486] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 727.093119][T25486] Kernel panic - not syncing: Fatal exception [ 727.099399][T25486] Kernel Offset: disabled [ 727.103736][T25486] Rebooting in 86400 seconds..