last executing test programs: 2.091004662s ago: executing program 0 (id=11717): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)=ANY=[@ANYRES32], 0x48) r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) r2 = gettid() perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x0, 0x6, 0xc5, 0x0, 0x0, 0x10, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000100), 0x8}, 0x10000, 0x6, 0x101, 0x6, 0x8000, 0x3, 0xe211, 0x0, 0x3f, 0x0, 0x9}, r2, 0x1010, r1, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc48}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0x44) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x10020) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="6a0ac4ff0000000071107700000000009500000000001800ff090bc3b9b295db0628016a88cc74640267728ad4f632a9b7e90d4c191710d89124b51cd37ee3b3fdcb8872ef7532e2d66bab995bdd39e615ee69"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8924, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0), 0x4) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}, 0x10) 2.020823725s ago: executing program 0 (id=11720): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.685352953s ago: executing program 0 (id=11726): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xc00, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x1589, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext, 0x0, 0x5b, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102100, 0x4000, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102100, 0x4000, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x367b, 0x8000}, 0x10320, 0x0, 0x8, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r11 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x367b, 0x8000}, 0x10320, 0x0, 0x8, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r11, 0xc008240a, &(0x7f00000003c0)=ANY=[]) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r11, 0xc008240a, &(0x7f00000003c0)=ANY=[]) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7, 0x4, 0x1, 0x0, r0}, 0x50) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7, 0x4, 0x1, 0x0, r0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r12, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r13, &(0x7f0000000d40), 0x0}, 0x20) 1.626950455s ago: executing program 2 (id=11729): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000850000002300000095fdff0000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) syz_clone(0x62073d00, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)=@id={0x1e, 0x3, 0x0, {0x4e21, 0x3}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000700)="be25ef6b97e3e40a1c4234bfcff3c9c03cb7a48ddc3ae3a4a24111093a641f93fc76924d4d96be9b99fbee34f7ebb5600342abcc45999bb410e89799bf5a09587275469c2bc2c59247392029e93f6ea5c95a73d41f5120b039e482", 0x5b}], 0x1, 0x0, 0x0, 0x800}, 0x20004054) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x3, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_bp={&(0x7f0000000340), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000700000000000009209500000000000000f7315374ce569ec55869bfbcfa7c4e8f52e6288f2fbc43a3af3c6b881320c24423492f2fc14c9de730f42434dfa11c77edc1f06776d8"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100d2fcab614e4fee3bf18914a38a8b19dc18000000000000004800000048000000040000000008000000000009030000200000000000000001"], 0x0, 0x64}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11006, 0xc8, 0x20000000, 0x1, 0x9, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x2405, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg1\x00', 0x2}) ioctl$TUNSETVNETLE(r6, 0x400454dc, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071107300000000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f0000000380)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x4e}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000010000000000000000000000711807000000000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.430616926s ago: executing program 4 (id=11730): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x15, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x2}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000010040)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000001ce07e0fdb114ae7e1f95b0b07000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.429205016s ago: executing program 3 (id=11731): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r0, 0x400454cc, 0x0) (async) ioctl$TUNSETLINK(r0, 0x400454cc, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000001d71187d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1807000000ffff1f000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40200008500000018220000", @ANYRES32=r2, @ANYRESHEX=r2], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000800)={&(0x7f0000000140)="756061ba8d2f4299134ff098", &(0x7f0000000680)=""/166, &(0x7f0000000740)="f0259f36c1a37efef3c1b27795eb3780ed9a3bac613ebc549adbff2bba6a9c205669a1016e412888b9913fdf0eb99d16c394ab64b42715", &(0x7f0000000780)="9caed3231a8917a7b5b414abef3985a1d76a0a3694d5d8fbdc01041f8e9e88350415f88998d702aad2df103b27b3de8fd74c39f59d06ba7e875b15a9af6191eac4f4f0e44e47541562cf3b1e7dcef43694b24d30a9c1e7a734d6", 0x9, r2}, 0x38) ioctl$TUNSETOFFLOAD(r1, 0x400454ce, 0x9) (async) ioctl$TUNSETOFFLOAD(r1, 0x400454ce, 0x9) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x440, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x7101}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xc, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000023000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0xe, 0x0, &(0x7f0000000000)="17724b568c149730350c352f658c", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0xe, 0x0, &(0x7f0000000000)="17724b568c149730350c352f658c", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40200000000000063110800000000000500"/32], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x21) 1.35731673s ago: executing program 4 (id=11732): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x69, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r5, 0x4) socketpair(0x3, 0x6, 0xffffff83, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@fallback=r0, 0x1d, 0x0, 0xf8, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)={@fallback=r0, r1, 0x8, 0x20, 0x0, @void, @void, @void, @value=r3, r9}, 0x20) openat$cgroup(r2, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r5, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={r6, 0x20, &(0x7f00000008c0)={&(0x7f0000000780)=""/47, 0x2f, 0x0, &(0x7f00000007c0)=""/198, 0xc6}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000009c0)={{r8, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)=r8}, 0x20) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000a00)={r8}, 0x8) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x5, 0x0, r8, 0x4, '\x00', r4, r8, 0x0, 0x1, 0x2}, 0x50) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@bloom_filter={0x1e, 0x1fe5, 0x7, 0x0, 0x880, r1, 0x1, '\x00', r4, r1, 0x5, 0x3, 0x4, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x12, 0x9, &(0x7f0000000600)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000680)='syzkaller\x00', 0x1, 0x30, &(0x7f00000006c0)=""/48, 0x40f00, 0xc, '\x00', r4, @cgroup_sock_addr=0x35, r10, 0x8, &(0x7f0000000740)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, r11, r2, 0x4, &(0x7f0000000b40)=[r8, r12, r8, r13, r14, r15, 0xffffffffffffffff], &(0x7f0000000b80)=[{0x5, 0x4, 0x9, 0x1}, {0x2, 0x1, 0x7}, {0x3, 0x5, 0xf, 0x2}, {0x4, 0x1, 0x3, 0x6}], 0x10, 0x7fffffff}, 0x94) r16 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0xfff, 0x0, r15, 0x5, '\x00', 0x0, r2, 0x1, 0x1, 0x2}, 0x50) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e80)=r5, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f40)={0x6, 0x18, &(0x7f0000000d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@generic={0x9, 0x8, 0x8, 0x7, 0x5}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xc62eb8a18c07bec7}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x72, &(0x7f0000000e00)=""/114, 0x41100, 0x10, '\x00', 0x0, 0x25, r17, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ec0)={0x4, 0xc, 0x1, 0x26b8}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000f00)=[{0x2, 0x3, 0xc, 0x7}, {0x2, 0x4, 0x6, 0x2}, {0x4, 0x4, 0xd, 0xa}], 0x10, 0x42}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001000)={r13, r15}, 0xc) r18 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000022c0)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x8, [@fwd={0xf}, @enum64={0x8, 0x2, 0x0, 0x13, 0x1, 0x8, [{0x6, 0x0, 0x3}, {0xb, 0x0, 0x504}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x1}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x4}, @typedef={0x8, 0x0, 0x0, 0x8, 0x4}, @ptr={0xb, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x61, 0x30, 0x1c38a3176b71aeb, 0x61, 0x0]}}, &(0x7f00000012c0)=""/4096, 0x88, 0x1000, 0x1, 0x6}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0xc, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5ab4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000010c0)='GPL\x00', 0x0, 0xe1, &(0x7f0000001100)=""/225, 0x41000, 0x10, '\x00', r4, 0x0, r18, 0x8, &(0x7f0000002300)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002340)={0x5, 0xd, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002380)=[r16], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002580)={&(0x7f0000002480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0xe}]}, {0x0, [0x2e, 0x51, 0x5f, 0x2e]}}, &(0x7f00000024c0)=""/177, 0x2a, 0xb1, 0x0, 0xff, 0x10000, @value=r13}, 0x28) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000025c0)=r5, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002840)={0x18, 0x16, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x0, 0x0, 0x9, 0x6, 0xfffffffffffffff8, 0xffffffffffffffff}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @generic={0x7, 0x9, 0xd, 0x9, 0x3ff}, @map_fd={0x18, 0x4, 0x1, 0x0, r16}]}, &(0x7f00000026c0)='syzkaller\x00', 0x1, 0x3f, &(0x7f0000002700)=""/63, 0x40f00, 0x44, '\x00', r4, 0x0, r13, 0x8, &(0x7f0000002740)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000002780)={0x2, 0x6, 0x81, 0x7fff}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000027c0)=[0x1], &(0x7f0000002800)=[{0x0, 0x2, 0x6, 0x5}], 0x10, 0x3}, 0x94) perf_event_open(&(0x7f0000002940)={0x1, 0x80, 0x6f, 0x6, 0x4, 0x0, 0x0, 0x10, 0x8000, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000002900), 0x1}, 0x1101, 0x2, 0x3ff, 0x0, 0x7, 0x36f8, 0x9, 0x0, 0x2, 0x0, 0x401}, 0x0, 0x7, r8, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000029c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000002a80)={0x9, &(0x7f0000002a00)=[{0x2e25, 0x3, 0x1, 0x10000}, {0x2, 0x9, 0xd, 0x4}, {0x8, 0x46, 0xc0, 0x1}, {0x2, 0x2, 0x9, 0xb02d}, {0x6, 0x3, 0x2, 0x1}, {0x3, 0x4, 0x6, 0xeda293a}, {0x4, 0xfb, 0x4, 0x400}, {0xd, 0x8, 0x3, 0x7}, {0x9, 0x5, 0xe7, 0xbb}]}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000002ac0)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000002e40)={0x5, 0x19, &(0x7f0000002b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xab, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r15}}, {}, [@alu={0x7, 0x0, 0x8, 0x7, 0x5, 0x100, 0x4}, @jmp={0x5, 0x0, 0x8, 0x0, 0x1, 0x8, 0x8}, @ldst={0x0, 0x2, 0x3, 0x4, 0x4, 0x20, 0x8}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @generic={0x5, 0x1, 0x7, 0x80, 0xa}, @map_val={0x18, 0x6, 0x2, 0x0, r14}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002c00)='syzkaller\x00', 0x4, 0x46, &(0x7f0000002c40)=""/70, 0x41000, 0x1, '\x00', r4, @fallback=0x12, 0xffffffffffffffff, 0x8, &(0x7f0000002cc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002d00)={0x4, 0x1, 0x8000, 0x6}, 0x10, r11, 0xffffffffffffffff, 0x9, &(0x7f0000002d40)=[r13, r12, r16, r12], &(0x7f0000002d80)=[{0x4, 0x3, 0xe, 0xb}, {0x1, 0x5, 0x2, 0x7}, {0x5, 0x4, 0xb, 0x8}, {0x4, 0x3, 0x8, 0x7}, {0x4, 0x3, 0x2, 0xc}, {0x3, 0x2, 0xb, 0x3}, {0x5, 0x5, 0x8, 0x2}, {0x0, 0x1, 0xa, 0xb}, {0x2, 0x3, 0x10}]}, 0x94) 1.35634974s ago: executing program 4 (id=11733): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x8d}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x40198, 0x1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xffffffffffffffff}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.329477661s ago: executing program 4 (id=11734): bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="16000000000000000400000007000000000000002317a892f4e6162160e1274793d735bfc58ff51e7c0c941e6048dd968265a06b8e5076eb30d328f05ca1172533ce8f036ee9d0f5da0a1f1a7e07115aff75335f2334b6eb05e1f04253f7a8a363eb1d16e118a8f500"/119, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="16000000000000000400000007000000000000002317a892f4e6162160e1274793d735bfc58ff51e7c0c941e6048dd968265a06b8e5076eb30d328f05ca1172533ce8f036ee9d0f5da0a1f1a7e07115aff75335f2334b6eb05e1f04253f7a8a363eb1d16e118a8f500"/119, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(0x3) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r0}, &(0x7f00000000c0), &(0x7f0000000740)='%pB \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r0}, &(0x7f00000000c0), &(0x7f0000000740)='%pB \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000002f80)={&(0x7f0000000300), 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000000380)=""/55, 0x37}, {&(0x7f00000003c0)=""/29, 0x1d}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/222, 0xde}, {&(0x7f0000001c00)=""/106, 0x6a}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/220, 0xdc}, {&(0x7f0000002d80)=""/29, 0x1d}], 0x8, &(0x7f0000002e40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xfd71) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.319324392s ago: executing program 2 (id=11735): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711815000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0x20, &(0x7f00000016c0)={&(0x7f00000005c0)=""/201, 0xc9, 0x0, &(0x7f00000006c0)=""/4096, 0x1000}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001780)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000380)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @call={0x85, 0x0, 0x0, 0x6c}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000480)='GPL\x00', 0x429d, 0x7f, &(0x7f00000004c0)=""/127, 0x41100, 0x49, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, r4, 0x0, 0x3, 0x0, &(0x7f0000001740)=[{0x0, 0x4, 0x10, 0x3}, {0x0, 0x3, 0x10, 0x7}, {0x0, 0x4, 0x8, 0x1}]}, 0x94) 1.299784813s ago: executing program 2 (id=11736): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.232886896s ago: executing program 0 (id=11738): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f0"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x200, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000180)="76389e147583ddd0569ba56a655855", 0x0, 0x4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.231645746s ago: executing program 2 (id=11739): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1a1102, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000003800)=@base={0x6, 0x4, 0x4, 0x9, 0x8, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xf, 0x8, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x63, 0xa, 0xff00}, [@call={0x55}, @exit, @map_fd, @jmp={0x5, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x0, 0x42, '\x00', 0x0, @cgroup_device}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map, r3, 0x6}, 0x14) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000001000900000001"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000004c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r6}, 0xc) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x27, 0x0, 0x3f, 0x1}, @volatile={0x1, 0x0, 0x0, 0x9, 0x3}, @const={0x5}, @enum={0xa, 0x1, 0x0, 0x6, 0x4, [{0xa, 0xfff}]}]}, {0x0, [0x0, 0x61, 0x1d5a7cacbfac8d8a, 0x5f]}}, &(0x7f0000000740)=""/4096, 0x5a, 0x1000, 0x1, 0x0, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@base={0x19, 0xfffff801, 0x214, 0x7, 0x1242, r5, 0x4, '\x00', 0x0, r7, 0x2, 0x0, 0x5}, 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/cgroup\x00') 1.177187209s ago: executing program 0 (id=11741): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff7f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1d6492c004b006ca110000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x10, 0x2, 0x7}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0xfffffffffffffdfe, &(0x7f00000003c0)=[{&(0x7f0000000c00)=""/253, 0xfd}], 0x1}, 0x1f00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0x14, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a655, 0x0, 0x0, 0x0, 0x10}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1.17192887s ago: executing program 2 (id=11742): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xffff0f00}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @union={0x0, 0x0, 0x0, 0x6, 0x0, 0x2}]}}, 0x0, 0x4e}, 0x20) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x2300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x1000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x210000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x1, 0x9}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r1, r2}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB="0300"/15, @ANYBLOB="040000000300000000000000000001000000"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x5f, 0x0, 0x0, 0x4f, 0x2e, 0x61]}}, &(0x7f00000003c0)=""/153, 0x30, 0x90, 0x1}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000001080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdfffff7ffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x20, 0x1, 0x1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000340)}, 0x40) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x9, 0x5, 0x7, 0xc1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r6}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x11, 0x3, 0x0, &(0x7f0000000140)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000fc0)={r5}, 0x4) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000026c0)=r4, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000027c0)={0x6, 0x12, &(0x7f0000001340)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @alu={0x7, 0x1, 0x6, 0x2, 0x7, 0x4, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @alu={0x7, 0x0, 0x2, 0xb, 0x2, 0x18, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000001280)='syzkaller\x00', 0x5, 0xec, &(0x7f00000025c0)=""/236, 0x40f00, 0x10, '\x00', r3, @fallback=0x23, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, r1, 0x0, 0x0, &(0x7f0000002740), 0x10, 0x8c}, 0x94) recvmsg$unix(r7, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x11, 0x4, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.15680281s ago: executing program 1 (id=11743): bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901004459a7909500000000000000bf07080000000000b7020000000000008500000095000000b7000000000000009500400000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4107}, 0x4c) 1.085396874s ago: executing program 1 (id=11744): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x6c}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x3b, 0x10, 0x0, 0x1800}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) (async) socketpair(0xb, 0x800, 0x829, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r2, &(0x7f0000002b00)={&(0x7f0000002980)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002a00)="7ff387424ad0e6a7f3b30368ce81ecf11e2c9a1ee8384b86e9e37d", 0x1b}], 0x1, &(0x7f0000002a80)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xffffcded}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x48}, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x5, 0x41}, 0x50) (rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) (rerun: 64) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async, rerun: 32) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) (rerun: 32) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014001e00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async, rerun: 32) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f00000001c0)=r9) (async, rerun: 32) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000027c0)={r10, 0xe0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002500)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002580)=[0x0, 0x0], 0x0, 0x37, &(0x7f00000025c0)=[{}], 0x8, 0x10, &(0x7f0000002600), &(0x7f0000002640), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000002680)}}, 0x10) sendmsg$inet(r2, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f00000003c0)="f91c67b00de40cbd6124b8616ed162fbe815d694d8e4a25316d779472d1ba2f3177df2cfa8ea3e9b9fa11e94d80becade388ce1f058e1a881bf6e2f618618a0462a13640ef93a13cc421cc41", 0x4c}, {&(0x7f0000001140)="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", 0xfc0}, {&(0x7f0000002140)="6fc105d081b77f01fa7afaadfe0c8650703bfd2ead1c8bf21654c03289c4e0d9c57d766de85fe7e1996fb7065ac3f779cf9ee9d9322964c9f0a81cd559e6c42b9a9a6622935c07e306a0e545eceeb8f922ee834eb63294d8dc50cf2946bd46d388a891d1d420ceedb39e39d805a259b53a46e320233c4c1974caed63286e946d4b99e447cccb5635deb62c28953ef84dde9a2f06ded6e43895cec1abbde29055252ac6cd9ec53d58161fbf03b0b8c3bfce8c3e6d8fb0ae58de6783e67996c50073105d28022ce6b4785fba3390b6b9737ee68ca3c47dd625d4943edb0ebb4c0da284189e6da92cfd0639b762413e8e09", 0xf0}, {&(0x7f0000002240)="545e5dc0331942303c42629c780d421cd54102cc8c97a6b4182e5fd266335f7f6d4a8c665dde9b620260535daf36c6fa2a2af5917c8f88f214a015e736decf3b50808d354d5d2bc4fd8bba2ba99117ebe1d4d145821b2967e049f39a2fdb80225299d07eff1861d64685db480d1671d3f5a0afd319b6675da84aca96b3ce5521b1afbdaf9589ad193099868a0bdd6101b19328b9f977566440f31fcee0a476ca7e24c8a1527f4ec8a5b96f9df366b099ea48444be19ae2b087717e4104dfae9e0219d11f343a013c0d7ab0b92e", 0xcd}, {&(0x7f0000002340)="7e22952550db8baadb12936b9446b94a0e3396d13dd713100d2187104677968e2586c9d021278e0d2c75e1524dd91eecb6cc3e5756a0dd2496418eeb8d70bd01", 0x40}, {&(0x7f0000002380)="40cdffc7a1daaef32a02f7cfcf16c34802bba0b703d84873c803e72049296f8d900727f40e8f45e73b6faa0c789f99765672e120ea5b111472c45fda1f4dc3ccb50f639bd626ac1322ae32a5173240be05d4f5a6c79ea7c4e409f0e150a40a19d2797a120ed4530c2cb948139f80122ca2e96e779ae66d2aa45c3145c30910979e490441b473f490005aaac73b33daf7f1aaa1942bbe27b74b697a0a985dda2baba7f36594b5937268bfe2e9ff4f1cdd1c2832690cf644b851caac71807222e7bfd3d373da42b0d365f474b51863ba6eaf991ac8eed24aa700b72d", 0xdb}], 0x6, &(0x7f0000002800)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @local, @dev={0xac, 0x14, 0x14, 0x1b}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6f7d}}, @ip_retopts={{0x38, 0x0, 0x7, {[@generic={0x44, 0x4, "9f1d"}, @end, @lsrr={0x83, 0x13, 0xc0, [@remote, @remote, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0xf, 0x7b, [@multicast2, @local, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0xd0}, 0x4090) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0x20, &(0x7f0000001340)={&(0x7f0000000240)=""/255, 0xff, 0x0, &(0x7f0000000340)=""/4096, 0x1000}}, 0x10) (async) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000013c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x9}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000014c0)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xeb, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0x5c}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @jmp={0x5, 0x0, 0x3, 0x5, 0xb, 0xffffffffffffffff, 0x10}]}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', r11, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x1, 0x80, 0x7ff}, 0x10, r12, 0x0, 0x1, &(0x7f0000001440)=[r13], &(0x7f0000001480)=[{0x5, 0x5, 0x5, 0x7257561d45929c43}], 0x10, 0x6}, 0x94) (async) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000002100), 0x101000, 0x0) ioctl$TUNGETVNETLE(r14, 0x800454dd, &(0x7f0000002940)) 1.050864696s ago: executing program 1 (id=11745): syz_clone(0x10000, &(0x7f00000007c0)="1eac762c3ba76bcf869e3d2f4304fd82e6605f305e40c662326b7d38af36a8ca8642381e667fe2f7db673d2379129570f79c10a106a242e6345ae9158780ab747d532c", 0x43, &(0x7f0000000380), &(0x7f0000000280), &(0x7f00000002c0)="ecc032373519") r0 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000300)='@\'{-!:&.^\x00') (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r1) (async) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x1}, 0x2059, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) (async, rerun: 64) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) (rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000000025fb1bc1b7dcf464d05d03cd39f888a07f030173d4ca0054df54ba7aa1679756361bda776f7459f872a0d1ae4fddabf2821bc0bf662494c55e43342aa4ba614213baafefe2286f677892f8fda3f518b79b369456a97ad4e3d93458a2fb9074d0547d5066a1aaede514d45f15ed2777519cbe4730ab66a00ab21fe8b3d2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000002000110850000008600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) 994.107709ms ago: executing program 1 (id=11746): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x1, {{0x2, 0x4}, 0x1}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c81be3110a36a27aeffe0ad5a8a7385a1913a64fb2db630e8fc8017828cea60f327c3a510b441d94d32584e55f7c2320d89b2ba3d44d832b8e7c5f45442de9ef37d057e6d0c6664e8d74e23f18336d41a3e38c2cda49050cb32ca7040a388c75741ac07d3befc714df35dc92ff70ad041cf17b70a971c142bb89ecfe25290750e989c8666560a61b62fdc4fadef7f30b6269a669ef99be7e7ba7ddddf99949fedc0c331796988c6eedb5c66cbe2870a2affce0b550c3411a2aaf302481ee93398c0fbc0c815cfe1e78bf8fed7f19f2c2dae17a4533aa85f6b787f8072adda379118d76dbba3cebfc4c8aacbb1f79a28ec3a0ec99816e3c8721ddcde1ce73b0704063474", 0xe50}, {0x0}, {0x0}, {&(0x7f00000007c0)="0082105998bc9dfa5335377fffffff75c428eb8fa28fd15816"}, {0x0, 0x36}], 0x5}, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="b40000000020000061110b0000000000851000000200000085000000000000009500800000000000950000000000000067956e"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, r1, 0x8, 0x0, 0x2, 0x10, 0x0, 0xfffffffffffffe31}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b468867"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="18080004000600000000000000140000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000005a000000bca9000000000000350901000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000001840)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1b}}, {}, [@snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x5}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x8, 0xa, 0x4}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x0}, {0x7, 0x0, 0x0, 0x0}, {}, {0x18, 0x2}, {}, {0x62, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0xb, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r6, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r7, r4, 0x0, r5}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002e00)={r3, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ec0)={0x18, 0x20, &(0x7f0000000540)=@raw=[@ldst={0x0, 0x3, 0x0, 0xf, 0x3, 0x8, 0x1}, @ldst={0x3, 0x2, 0x4, 0x4, 0xb, 0x20, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x36}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f0000000640)='GPL\x00', 0xfffffffd, 0x1000, &(0x7f0000001d80)=""/4096, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x3, 0x1, 0x3163}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000002e40)=[r8, r3, r3, r3, r3, r3], &(0x7f0000002e80)=[{0x4, 0x4, 0xb, 0x9}, {0x3, 0x2, 0x2, 0xc}, {0x2, 0x4, 0x2, 0x3}], 0x10, 0x8}, 0x94) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r9, 0x0, 0x0}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r10, &(0x7f00000000c0), &(0x7f0000000380)=""/75}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x5b241400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xc5c2) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x3982, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) close(r11) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000002000000850000004f0000009500000000000000e10cb5d05a2bfe96d5284effffffff7e0657cae7cead95a4fec6"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 940.820251ms ago: executing program 3 (id=11747): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="760a0000000000006112980000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r3, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0xcb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) 923.228932ms ago: executing program 1 (id=11748): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x8, 0x8, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000040)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 836.136897ms ago: executing program 1 (id=11749): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@cgroup=r0, 0x30, 0x0, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="d09a46130000000000000000000000009ef1000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085000000070000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002b40)={&(0x7f0000002900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x1}]}, {0x0, [0x61, 0x2e, 0x2e]}}, &(0x7f0000002a40)=""/228, 0x29, 0xe4, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x2, 0x2, 0x1, &(0x7f0000002c40)) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x13bb711e) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x5) bpf$BPF_BTF_GET_NEXT_ID(0x7, &(0x7f0000000680)={0x20ffffff}, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000005000000fd0900008500000041000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) 740.929992ms ago: executing program 3 (id=11750): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="85000000310000009c0000000000000025000000fffffff19500000d000000004bea11fade2d6950bdaebf39f5d5e2c5dec1e666c3a573"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3}, 0x94) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000001c0)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180100002020782500000000002020207b1af8ff00000000bfa10000000000000701000000feffffb702000008002000b70300000000000085000000060000009500000000000000abf53132dac49b6815e9b09c76c57858cd5efd8ad83add775e7f7bb2ea7bbca7df8559986c29f3ffb0f712d351bdd7912d8c727138e97c0a8f45131dedaa783f641491b0806bb0a57471f8ee01817d926d03462084ffdb1ec106e7b6210a0f9c50670a7f85abc3c1226b78dfd8567d4fc95ef6e50890187a0a"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x23) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000680)=""/151, 0x97}, {&(0x7f00000003c0)=""/107, 0x6b}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000000)=""/162, 0xa2}], 0x4, 0xfffffffffffffffe, 0xfffffffffffffe15}, 0x0) close(r6) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x81, r3}, 0x38) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xa49a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}) 457.643896ms ago: executing program 4 (id=11751): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r0, r1, 0x0, r2}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x24, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x9d, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x800, 0x400, 0xfffffffc, 0x400, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0x1, 0xffffffffffffffff}, 0x4) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3c, 0x10}, 0xc) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x10}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x27, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x1, 0x6, 0xb, 0x6, 0x2}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @alu={0x7, 0x0, 0xd, 0x0, 0x9, 0xc, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x1, 0x0, 0x8, 0xfffffffffffffff0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @generic={0x58, 0xc, 0xf, 0x4, 0x10000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0x7, 0x18, &(0x7f0000000400)=""/24, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0xa, 0xffff, 0x4}, 0x10, r8, 0x0, 0x0, &(0x7f0000000900)=[r9, r10, r0, 0x1, r11, r12]}, 0x94) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a40)={r6}, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)=@generic={&(0x7f0000000a00)='./file0\x00', r13}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ac0)={r6}, 0x4) perf_event_open(&(0x7f0000000b00)={0x7, 0x80, 0x5e, 0x6, 0x2, 0xfe, 0x0, 0x0, 0xa67afe54f9527948, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0xca35, 0x3}, 0x2880, 0x0, 0x7, 0x9, 0x0, 0x1b676b7a, 0x80, 0x0, 0x10, 0x0, 0x3}, 0x0, 0x7, r5, 0xb) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80)=r8, 0x4) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x3, '\x00', r7, r14, 0x4, 0x1, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000dc0)={{r3, 0xffffffffffffffff}, &(0x7f0000000d40), &(0x7f0000000d80)=r5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x1, &(0x7f0000000c40)=@raw=[@call={0x85, 0x0, 0x0, 0xcd}], &(0x7f0000000c80)='GPL\x00', 0x24, 0x0, 0x0, 0x41000, 0x60, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000cc0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x1, 0xf, 0x400, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000e00)=[r3, r12, r16, r15, r3], &(0x7f0000000e40)=[{0x3, 0x2, 0x8, 0x2}, {0x1, 0x5, 0x0, 0x3}], 0x10, 0x4}, 0x94) r17 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000f40)={0x2, 0x4, 0x8, 0x1, 0x80, r16, 0x40, '\x00', r7, r14, 0x2, 0x5, 0x5}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@bloom_filter={0x1e, 0x2, 0x7, 0x6, 0x2, r17, 0x7, '\x00', 0x0, r5, 0x0, 0x5, 0x1, 0xf}, 0x50) bpf$ENABLE_STATS(0x20, &(0x7f0000001040), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r2}, &(0x7f0000001080), &(0x7f00000010c0)=r1}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001140)={@ifindex=r7, 0xffffffffffffffff, 0x26, 0x0, 0x0, @void, @value=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000014c0)={{r9, 0xffffffffffffffff}, &(0x7f0000001440), &(0x7f0000001480)=r5}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001540)={0x6, 0x23, &(0x7f0000001180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x4}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x7f}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000012c0)='GPL\x00', 0x401, 0xbf, &(0x7f0000001300)=""/191, 0x40f00, 0x60, '\x00', r7, 0x25, r5, 0x8, &(0x7f00000013c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001400)={0x5, 0x9, 0x3, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001500)=[r0, r18, r15, r16], 0x0, 0x10, 0x1}, 0x94) r19 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001600)={0x1b, 0x0, 0x0, 0x4, 0x0, r9, 0x7, '\x00', r7, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0xe, 0x5, &(0x7f00000016c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffe}, [@map_fd={0x18, 0x2}]}, &(0x7f0000001700)='GPL\x00', 0xffffffff, 0xb9, &(0x7f0000001740)=""/185, 0x41000, 0x20, '\x00', 0x0, @sk_skb=0x5, r5, 0x8, &(0x7f0000001800)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001840)={0x5, 0x100, 0xa, 0x6}, 0x10, r8, 0xffffffffffffffff, 0x2, &(0x7f00000018c0)=[r4, r4, r18, r10, r19, r10, r19, r12], &(0x7f0000001900)=[{0x2, 0x2, 0x7, 0xa}, {0x2, 0x2, 0xd, 0xb}], 0x10, 0x3}, 0x94) 276.193546ms ago: executing program 2 (id=11752): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000079108700000000001e000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x20000}, 0x50) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x62, 0xfe, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf40242309766deb4e793f90000000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c961e5f3762a51fe4c736edec6f", &(0x7f0000000440)=""/254, 0x2f00, 0x0, 0xff, 0x194, &(0x7f0000000980)="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", &(0x7f00000007c0)="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", 0x2, 0x0, 0x10000}, 0x24) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='\'^-#\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x9, 0x11, &(0x7f0000000080)=@ringbuf={{0x18, 0x6}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x51}}, {}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x7b}}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 275.107686ms ago: executing program 4 (id=11753): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xd, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0xa7}, @alu={0x7, 0x1, 0x7, 0x1, 0x1, 0x30, 0xffffffffffffffff}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @call={0x85, 0x0, 0x0, 0x75}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @ldst={0x0, 0x0, 0x4, 0x7, 0x2, 0x0, 0x8}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000e00)='syzkaller\x00', 0xffffff01, 0x0, 0x0, 0x100, 0x14, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x5, 0x10, 0x2, 0x6}, 0x10, 0xffffffffffffffff, r0, 0x9, &(0x7f0000000040)=[r0, r0, r0], &(0x7f0000000f00)=[{0x4, 0x1, 0x7, 0xa}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x5, 0x5, 0x2}, {0x2, 0x1, 0x6, 0x6}, {0x5, 0x4, 0x7, 0x8}, {0x4, 0x1, 0xf, 0x7}, {0x3, 0x4, 0x5}, {0x4, 0x1, 0x4}, {0x8000001, 0x3, 0x5, 0x1}], 0x10, 0x8b6}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffc67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000380)=r7) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={@cgroup, 0x10, 0x0, 0x8, &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001100)=[0x0], &(0x7f0000001140)=[0x0, 0x0], 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x9, 0x18, &(0x7f0000001640)=@raw=[@ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0xc, 0xb, 0x1, 0xfffffffffffffff0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0x5, 0x0, 0xa, 0xffffffffffffffe0, 0x8}, @call={0x85, 0x0, 0x0, 0x20}], &(0x7f0000001700)='syzkaller\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000001800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001840)={0x4, 0x1, 0xfffffffd, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f00000018c0)=[r0, r4, r4], &(0x7f0000001900)=[{0x5, 0x1, 0x3, 0x6}, {0x1, 0x2, 0x10, 0x9}, {0x2, 0x2, 0x6, 0xc}, {0x3, 0x3, 0x10, 0x3}], 0x10, 0x1}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000), 0xfdef) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_lsm={0x1d, 0x22, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3bad, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x68}, @map_fd={0x18, 0x8, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x7, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001340)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000013c0)={0x3, 0xc, 0xb, 0x6}, 0x10, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000001400)=[r0, r0, r0, r0, r0, r0, r0], &(0x7f0000001440)=[{0x3, 0x2, 0x8, 0xc}, {0x1, 0x4, 0xf, 0x1}, {0x2, 0x4, 0xa, 0xb}, {0x5, 0x5, 0x9, 0x4}, {0x4, 0x4, 0xe, 0xa}, {0x5, 0x2, 0xe, 0x6}, {0x2, 0x1, 0xc, 0x3}, {0x2, 0x2, 0x4, 0x4}, {0x5, 0x5, 0x7, 0xc}], 0x10, 0xa0}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001a00)=ANY=[@ANYRES32=r10, @ANYRES32=r1, @ANYBLOB='0\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r11, @ANYBLOB="426dbcfc2f3556d1af8c6c0a865da785a18b3b3dc5c540f75f4d7b853947ff1621b9f7139bf7e02fc0478964a88c1efcff8e80292448067391dc5bb8a01b70fb67ba2335b478d2166af392ac2c396261922fcfdc82a6beee2d5117ca895d93652c755f500148a27b859cff153f4d87dff3364af23b17318199380f9ea5882a0c2365f7b9be04bbd7e8dd0061d59bd188537fd32f63b78d91a1a2d6dfbb508eb0cc1f75bad46df38ad93d30a2f35eb01657f7a8c09ed05df457085a2eaaba34017fb3", @ANYRES64=r8], 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0xe40, 0x10000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x6}, 0x2c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) 251.996067ms ago: executing program 0 (id=11754): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000040000000c0000000b"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r3}, 0xc) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYBLOB='\x00'/13], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r5, 0x0, &(0x7f0000000340)=""/166}, 0x20) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@map=r5, 0x22, 0x1, 0x100, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="040000004001000000000000", @ANYRES32=r8, @ANYBLOB, @ANYRES64=r7], 0x20) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce81020329"], 0xfdef) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup=r9, r0, 0x31, 0x2002, r1, @value=r11, @void, @void, @void, r7}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2a24a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9877399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a8449f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d2943e6f5f828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000056c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137000059aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c072083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a00000000000000000000d550c9f15fbb2324a3f37dc4ba"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0xf0, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac141416070807034d2f87e5890c6aab845013f2325f1a39019403178da1880b251812a59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126f4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x155, &(0x7f0000000000), &(0x7f0000000880)="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", 0x6}, 0x50) 176.296951ms ago: executing program 3 (id=11755): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000eeb671342f5b590fdb907d890f59d424223ea35359fb97c881ea72aa9aa938656f758f49ca4753490349233d50275f8910bfeb582089cd0b598ff853b8fc325658c9d1a0216989101948811ac8fa3ed2aced0942b9517652f03535efe8cd6ad0efd1ad33ace8d072ad6405d2bcbd5e6714578b3e166cb97bbca360fe53f972ef54b20096b69ee35f6e"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040)=r1, 0x12) 47.852598ms ago: executing program 3 (id=11756): write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0x3a) r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1f, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/300], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc90}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRESOCT=r0], 0x0, 0x56, 0x0, 0x0, 0x5, 0x10000, @value=r0}, 0x28) 0s ago: executing program 3 (id=11757): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x1c, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x2, 0x1, 0x4, 0x0, 0xf, 0xfffffffffffffffe, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x5a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5709, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x3, 0x4, 0x3, 0x80, 0xfffffffffffffff0}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='syzkaller\x00', 0xa092, 0xe, &(0x7f0000000200)=""/14, 0x40f00, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x0, 0x397b, 0xb}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r3, 0x0, 0x42, 0x98, &(0x7f00000005c0)="5f6ffc34f9e0e7817e5bfe365cb2004bac4f6ab6d252fe0bd627702432f3856a12b4f4bd39405e08a2e9dc3edf713edccd961a762fbdd51424cece6410d144275f30", &(0x7f0000000640)=""/152, 0x2, 0x0, 0xc2, 0xc4, &(0x7f0000000700)="3b14d7bfbd1a08dbc30a048dfd8b02a54eac497b5f422801205cb778987aaefbd4cbd66eafdb8aa4b88e611c6c752728bf80ef2c09a55546c7e1582af8bec50e27f5a46ce7096f4cb9b730e55b5d3776beecb21d80aa3d18203c104ae52777882e3db03a3ca30bc5ab90b8a8ec27cca567e62d01b1c196152630149d379133be382d9c12ac86be28907fbd068944267b78dcadc0b916eed7e13ce3a36b28322264c5ef8eb3559b078de96a6c8925fb7c7d4859b01138d8932d6be118a2160a37500f", &(0x7f0000000800)="957a791776931d082c8d9d9cbafd82c2a36d73d90cb02718f95172a0ed867db7e79a201780e358c4bf1f8a22b68180a2b7a7710f9b33199d94e263cf60377c112d67de2e04c85d745f7c57938342f1d3224e7d61e99758b5d4cf54e62feb113fefa33493354b401ecb56cd3178da9e444c716dd83c2ea86d7573a443867f6a7b3f000da49259555e95bff86436e874cd1eb647397692c933cb47d20ab4161022e5eda9bd6c226ea95256afeb5e15ebd887de9a9dc2219b4cd7c4e725ad9d3c5decdb8fb4", 0x2, 0x0, 0x6}, 0x50) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xd, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xc01e4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x4, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) (async, rerun: 32) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x8, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x2, @perf_config_ext={0xe374, 0x1}, 0x120d, 0x800000000c8, 0x6, 0x8, 0x9, 0x10, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) kernel console output (not intermixed with test programs): state [ 321.413177][ T3175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.469710][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.480918][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.510030][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.518463][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.571352][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.580854][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.590674][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.616928][T18172] device veth0_vlan entered promiscuous mode [ 321.661726][T18172] device veth1_macvtap entered promiscuous mode [ 321.701884][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.711713][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.723755][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.736731][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.745151][ T3175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.860895][T18230] device syzkaller0 entered promiscuous mode [ 321.870480][T18230] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 322.726476][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 322.848937][ T9] device veth0_vlan left promiscuous mode [ 323.297499][T18308] device syzkaller0 entered promiscuous mode [ 323.572746][T18324] device wg2 entered promiscuous mode [ 324.075758][T18368] device syzkaller0 entered promiscuous mode [ 327.598100][T18494] device syzkaller0 entered promiscuous mode [ 327.787106][ T24] audit: type=1400 audit(1776501953.250:175): avc: denied { setattr } for pid=18496 comm="syz.2.5395" path="/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 328.115401][T18511] device syzkaller0 entered promiscuous mode [ 328.489932][T18538] device syzkaller0 entered promiscuous mode [ 328.756509][T18552] syzkaller0: create flow: hash 2449565861 index 1 [ 328.764322][T18543] device syzkaller0 entered promiscuous mode [ 328.810147][ T1094] syzkaller0: tun_net_xmit 48 [ 329.543709][T18613] device wg2 left promiscuous mode [ 329.708360][T18542] syzkaller0: delete flow: hash 2449565861 index 1 [ 330.431094][T18647] device syzkaller0 entered promiscuous mode [ 331.050097][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 332.000192][T18743] device veth1_macvtap left promiscuous mode [ 332.007667][T18743] device macsec0 left promiscuous mode [ 332.167075][T18756] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 333.350459][T18808] device syzkaller0 entered promiscuous mode [ 333.768585][T18849] tun1: tun_chr_ioctl cmd 1074025675 [ 333.774132][T18849] tun1: persist disabled [ 333.793454][T18849] tun1: tun_chr_ioctl cmd 1074025675 [ 333.806838][T18849] tun1: persist enabled [ 333.852112][T18865] device syzkaller0 entered promiscuous mode [ 334.864657][T18896] : port 1(vlan1) entered blocking state [ 334.871216][T18896] : port 1(vlan1) entered disabled state [ 334.883619][T18896] device vlan1 entered promiscuous mode [ 334.944187][T18905] device syzkaller0 entered promiscuous mode [ 334.982032][T18902] device syzkaller0 entered promiscuous mode [ 335.210041][T18924] : port 2(dummy0) entered blocking state [ 335.216046][T18924] : port 2(dummy0) entered disabled state [ 335.222661][T18924] device dummy0 entered promiscuous mode [ 335.368317][T18931] tap0: tun_chr_ioctl cmd 1074025675 [ 335.375139][T18931] tap0: persist enabled [ 335.393030][T18931] tap0: tun_chr_ioctl cmd 1074025675 [ 335.401388][T18931] tap0: persist disabled [ 335.594269][T18960] device syzkaller0 entered promiscuous mode [ 336.526062][T18997] device wg2 entered promiscuous mode [ 336.570412][T18999] device wg2 left promiscuous mode [ 336.820271][T19023] device syzkaller0 entered promiscuous mode [ 336.868735][T19022] device syzkaller0 entered promiscuous mode [ 336.898303][T19022] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 338.654908][T19118] device syzkaller0 entered promiscuous mode [ 338.825844][T19130] device syzkaller0 entered promiscuous mode [ 338.870795][T19132] syz.4.5590[19132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.870862][T19132] syz.4.5590[19132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.299934][T19167] device syzkaller0 entered promiscuous mode [ 339.577047][T19184] +: renamed from team_slave_1 [ 339.754763][T19185] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.766414][T19185] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.774083][T19185] device bridge_slave_0 entered promiscuous mode [ 339.784645][T19185] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.791897][T19185] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.801386][T19185] device bridge_slave_1 entered promiscuous mode [ 339.987564][T19206] device veth0_vlan left promiscuous mode [ 340.035056][T19206] device veth0_vlan entered promiscuous mode [ 340.129729][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.147653][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.166868][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.174162][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.196649][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.216491][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.223742][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.231672][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.249423][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.260648][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.280329][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 340.292092][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.340408][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 340.351359][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.408517][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 340.431362][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.443848][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.457947][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.471137][T19185] device veth0_vlan entered promiscuous mode [ 340.570516][T19185] device veth1_macvtap entered promiscuous mode [ 340.591125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 340.600082][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.608473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.639819][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.661631][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.732772][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.742403][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.742930][T19245] syz.1.5625[19245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.751738][T19242] : port 1(ip6gretap0) entered blocking state [ 340.771774][T19245] syz.1.5625[19245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.781654][T19242] : port 1(ip6gretap0) entered disabled state [ 340.807669][T19242] device ip6gretap0 entered promiscuous mode [ 340.855263][T19249] device syzkaller0 entered promiscuous mode [ 341.019628][T19242] device syzkaller0 entered promiscuous mode [ 341.272877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.292943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.334247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.349504][T19272] device syzkaller0 entered promiscuous mode [ 341.361015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 342.297586][T19291] syz.0.5638[19291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.297702][T19291] syz.0.5638[19291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.451597][T19305] device syzkaller0 entered promiscuous mode [ 342.640483][T19316] syz.4.5648[19316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.640543][T19316] syz.4.5648[19316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.089242][T19350] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 343.197225][T19362] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 343.205946][T19362] syzkaller0: persist disabled [ 343.292455][T19374] syz.0.5664[19374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.292545][T19374] syz.0.5664[19374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.052573][T19430] device syzkaller0 entered promiscuous mode [ 344.097853][T19434] device syzkaller0 entered promiscuous mode [ 344.108266][T19436] gre0: mtu less than device minimum [ 344.160672][T19441] syz.4.5688[19441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.160765][T19441] syz.4.5688[19441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.673501][T19486] device syzkaller0 entered promiscuous mode [ 345.325801][T19533] device syzkaller0 entered promiscuous mode [ 345.362552][T19535] device syzkaller0 entered promiscuous mode [ 345.436410][T19551] device lo entered promiscuous mode [ 345.453523][T19547] device sit0 entered promiscuous mode [ 346.300940][T19608] device syzkaller0 entered promiscuous mode [ 346.482182][T19633] device syzkaller0 entered promiscuous mode [ 346.852660][T19667] device syzkaller0 entered promiscuous mode [ 346.880923][T19670] device syzkaller0 entered promiscuous mode [ 346.895077][T19670] device syzkaller0 left promiscuous mode [ 346.907273][T19667] device veth1_macvtap left promiscuous mode [ 346.932006][T19673] device syzkaller0 entered promiscuous mode [ 347.040544][T19684] syz.3.5762[19684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.040607][T19684] syz.3.5762[19684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.063304][T19692] pimreg: tun_chr_ioctl cmd 1074025677 [ 347.096425][T19692] pimreg: linktype set to 823 [ 347.140703][T19695] device syzkaller0 entered promiscuous mode [ 347.386623][T19734] device syzkaller0 entered promiscuous mode [ 347.689415][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 347.863243][T19770] syz.1.5786[19770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.863300][T19770] syz.1.5786[19770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.892461][T19756] device syzkaller0 entered promiscuous mode [ 348.082138][T19786] device syzkaller0 entered promiscuous mode [ 348.423715][T19830] sock: sock_set_timeout: `syz.2.5804' (pid 19830) tries to set negative timeout [ 348.957732][T19860] syz.0.5814[19860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.957792][T19860] syz.0.5814[19860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.331998][T19898] syz.4.5827[19898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.363904][T19898] syz.4.5827[19898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.409915][T19892] device syzkaller0 entered promiscuous mode [ 350.741675][T19979] device syzkaller0 entered promiscuous mode [ 351.189487][T20007] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.197775][T20007] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.257172][T20014] device bridge_slave_1 left promiscuous mode [ 351.277103][T20014] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.307442][T20014] device bridge_slave_0 left promiscuous mode [ 351.314196][T20014] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.530263][T20025] device syzkaller0 entered promiscuous mode [ 351.609723][T20042] device syzkaller0 entered promiscuous mode [ 351.661223][T20051] device veth0_vlan left promiscuous mode [ 351.683425][T20051] device veth0_vlan entered promiscuous mode [ 351.733163][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.742261][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.756895][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.337959][T20130] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 354.515802][T20142] device syzkaller0 entered promiscuous mode [ 356.019527][T20216] device syzkaller0 entered promiscuous mode [ 356.201892][T20234] device syzkaller0 entered promiscuous mode [ 357.245505][T20280] device syzkaller0 entered promiscuous mode [ 358.590183][T20405] device syzkaller0 entered promiscuous mode [ 358.625636][T20408] cgroup: fork rejected by pids controller in /syz0 [ 358.820519][T20492] device syzkaller0 entered promiscuous mode [ 359.007833][T20508] device syzkaller0 entered promiscuous mode [ 359.046508][T20532] device sit0 entered promiscuous mode [ 360.095384][T20555] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.103030][T20555] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.110759][T20555] device bridge_slave_0 entered promiscuous mode [ 360.138582][ T49] device ip6gretap0 left promiscuous mode [ 360.144520][ T49] : port 1(ip6gretap0) entered disabled state [ 360.196530][T20555] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.236389][T20555] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.244145][T20555] device bridge_slave_1 entered promiscuous mode [ 360.357233][T20573] device syzkaller0 entered promiscuous mode [ 360.413371][T20555] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.420678][T20555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.428184][T20555] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.435455][T20555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.531072][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.545881][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.554516][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.608425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.620099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.637188][T20601] syz.3.6011[20601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.637251][T20601] syz.3.6011[20601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.637277][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.667874][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.682298][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.693841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.702578][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.710221][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.764167][T20603] device aaaaaaaaaaaaaaa entered promiscuous mode [ 360.779112][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 360.787524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.825923][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.837576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.866202][T20555] device veth0_vlan entered promiscuous mode [ 360.900032][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 360.908714][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 360.924956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 360.942717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.957052][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.980210][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.021058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.030106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.053274][T20555] device veth1_macvtap entered promiscuous mode [ 361.079242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.098169][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.110874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.152394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.163590][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 361.488188][ T49] device dummy0 left promiscuous mode [ 361.493838][ T49] : port 2(dummy0) entered disabled state [ 361.509299][ T49] device bridge_slave_1 left promiscuous mode [ 361.515585][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.542683][ T49] device bridge_slave_0 left promiscuous mode [ 361.556580][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.587341][ T49] device veth0_vlan left promiscuous mode [ 362.284513][T20673] syz.3.6031[20673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.284576][T20673] syz.3.6031[20673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.450720][T20680] device syzkaller0 entered promiscuous mode [ 363.202883][T20715] device syzkaller0 entered promiscuous mode [ 363.250406][T20722] device syzkaller0 left promiscuous mode [ 363.377817][T20729] device syzkaller0 entered promiscuous mode [ 364.108279][T20770] device syzkaller0 entered promiscuous mode [ 364.450067][T20780] device wg2 left promiscuous mode [ 364.546187][T20780] device wg2 entered promiscuous mode [ 365.381013][T20829] syz.2.6080[20829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.381115][T20829] syz.2.6080[20829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.393657][T20825] device syzkaller0 entered promiscuous mode [ 365.732985][T20839] device syzkaller0 entered promiscuous mode [ 366.853341][T20934] syz.2.6117[20934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.853429][T20934] syz.2.6117[20934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.962891][T20937] device dummy0 entered promiscuous mode [ 367.330996][T20976] syz.3.6132[20976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.331085][T20976] syz.3.6132[20976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.454083][T20982] tun2: tun_chr_ioctl cmd 1074025677 [ 367.504189][T20982] tun2: linktype set to 820 [ 367.538630][T21005] : renamed from team_slave_1 [ 368.396808][T21035] syz.3.6149[21035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.396907][T21035] syz.3.6149[21035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.547066][T21032] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.636713][T21032] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.674474][T21032] device bridge_slave_0 entered promiscuous mode [ 368.722957][T21032] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.759327][T21032] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.779929][T21032] device bridge_slave_1 entered promiscuous mode [ 368.855271][T21049] device syzkaller0 entered promiscuous mode [ 368.942602][T21032] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.949996][T21032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.957404][T21032] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.964537][T21032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.029551][T21065] device syzkaller0 entered promiscuous mode [ 369.040707][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.050067][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.058521][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.097125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.105817][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.112928][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.121565][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.130068][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.137238][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.209389][T21069] device wg2 entered promiscuous mode [ 369.244677][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.253741][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.266594][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.276703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.301383][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.310079][T21084] syz.0.6160[21084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.310171][T21084] syz.0.6160[21084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.322757][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.356157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.378237][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.390690][T21032] device veth0_vlan entered promiscuous mode [ 369.415051][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.427496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.484075][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.493540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.504383][T21032] device veth1_macvtap entered promiscuous mode [ 369.559230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.582064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.595794][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.623161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.632326][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.913893][ T49] device ip6gretap0 left promiscuous mode [ 369.935600][ T49] : port 1(ip6gretap0) entered disabled state [ 370.191613][T21142] syz.2.6174[21142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.191699][T21142] syz.2.6174[21142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.564531][ T49] device veth0_vlan left promiscuous mode [ 371.267583][T21178] : renamed from vlan1 [ 372.133734][T21223] device sit0 left promiscuous mode [ 372.239991][T21222] device syzkaller0 entered promiscuous mode [ 372.286842][T21217] device sit0 entered promiscuous mode [ 373.202457][T21258] device syzkaller0 entered promiscuous mode [ 373.605617][T21282] -: renamed from syzkaller0 [ 375.509701][T21396] device wg2 left promiscuous mode [ 375.550569][T21396] device wg2 entered promiscuous mode [ 376.458810][T21465] syz.1.6263[21465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.458876][T21465] syz.1.6263[21465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.734374][T21480] device syzkaller0 entered promiscuous mode [ 377.238656][T21505] device veth1_macvtap left promiscuous mode [ 377.686091][T21530] device syzkaller0 entered promiscuous mode [ 379.036929][T21670] tap0: tun_chr_ioctl cmd 1074025675 [ 379.042344][T21670] tap0: persist enabled [ 379.047567][T21670] tap0: tun_chr_ioctl cmd 1074025675 [ 379.056437][T21670] tap0: persist disabled [ 379.567819][T21705] device syzkaller0 entered promiscuous mode [ 380.126861][T21759] device syzkaller0 entered promiscuous mode [ 383.050522][T21875] device syzkaller0 entered promiscuous mode [ 385.372673][T21955] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 385.675924][T21979] device syzkaller0 entered promiscuous mode [ 386.035007][T22009] device syzkaller0 entered promiscuous mode [ 386.382634][T22029] device syzkaller0 entered promiscuous mode [ 387.045735][T22083] device syzkaller0 entered promiscuous mode [ 387.492380][T22110] nr0: port 1(macsec0) entered blocking state [ 387.498878][T22110] nr0: port 1(macsec0) entered disabled state [ 387.505667][T22110] device macsec0 entered promiscuous mode [ 387.514411][T22110] nr0: port 1(macsec0) entered blocking state [ 387.520734][T22110] nr0: port 1(macsec0) entered forwarding state [ 387.537919][T22110] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 387.545450][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 387.744839][T22122] device syzkaller0 entered promiscuous mode [ 387.858030][T22127] device syzkaller0 entered promiscuous mode [ 388.047368][T22134] device syzkaller0 entered promiscuous mode [ 388.705847][T22182] device syzkaller0 entered promiscuous mode [ 389.248450][T22208] device syzkaller0 entered promiscuous mode [ 389.330937][T22212] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.338698][T22212] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.346473][T22212] device bridge_slave_0 entered promiscuous mode [ 389.353575][T22212] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.396422][T22212] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.404239][T22212] device bridge_slave_1 entered promiscuous mode [ 389.571106][T22212] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.578492][T22212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.585762][T22212] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.592832][T22212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.617391][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.625647][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.669449][T22230] device syzkaller0 entered promiscuous mode [ 389.710110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 389.718073][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.739452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 389.748405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.757363][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.764422][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.803544][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 389.812612][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.826819][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.834035][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.868690][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 389.886724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.904982][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 389.930731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.960284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 389.976680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 389.997863][T22212] device veth0_vlan entered promiscuous mode [ 390.009042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 390.019609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.043803][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.083416][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.112742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 390.153856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.168172][T22212] device veth1_macvtap entered promiscuous mode [ 390.260475][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 390.272993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 390.289291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.298767][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 390.307760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.798158][ T49] device bridge_slave_1 left promiscuous mode [ 391.826510][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.862151][ T49] device bridge_slave_0 left promiscuous mode [ 391.869592][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.657938][T22401] device veth1_macvtap left promiscuous mode [ 392.697003][T22401] nr0: port 1(macsec0) entered disabled state [ 392.749609][T22401] device veth1_macvtap entered promiscuous mode [ 392.826955][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 392.834416][ T9] nr0: port 1(macsec0) entered blocking state [ 392.840802][ T9] nr0: port 1(macsec0) entered forwarding state [ 392.865748][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 393.142192][T22423] device syzkaller0 left promiscuous mode [ 393.251182][T22426] device syzkaller0 entered promiscuous mode [ 393.341459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 395.397555][T22540] device sit0 left promiscuous mode [ 395.711856][T22550] device syzkaller0 entered promiscuous mode [ 395.757707][T22556] tap0: tun_chr_ioctl cmd 35108 [ 395.828191][T22556] tap0: tun_chr_ioctl cmd 1074025672 [ 395.833543][T22556] tap0: ignored: set checksum disabled [ 396.109580][T22581] IPv6: : Disabled Multicast RS [ 397.628033][T22671] device syzkaller0 entered promiscuous mode [ 397.668773][T22669] device wg2 left promiscuous mode [ 398.498100][T22726] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 399.460802][T22774] device syzkaller0 entered promiscuous mode [ 400.908424][T22862] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.915669][T22862] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.923225][T22862] device bridge_slave_0 entered promiscuous mode [ 400.933445][T22862] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.942322][T22862] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.950854][T22862] device bridge_slave_1 entered promiscuous mode [ 401.008679][T22862] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.017063][T22862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.025055][T22862] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.032939][T22862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.046876][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.054689][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.101779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.127456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.150479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.176248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.207072][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.214192][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.238234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.258167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.276777][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.283956][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.311372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.320240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.349596][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 401.365800][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.422261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 401.440032][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 401.473168][T22862] device veth0_vlan entered promiscuous mode [ 401.489027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 401.504837][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.524132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.542827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.578295][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 401.587101][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 401.615208][T22862] device veth1_macvtap entered promiscuous mode [ 401.632446][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 401.653767][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 401.667095][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.697014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 401.711033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.475986][T22967] device veth0_vlan left promiscuous mode [ 402.487261][T22967] device veth0_vlan entered promiscuous mode [ 402.557054][ T49] device vlan1 left promiscuous mode [ 402.562619][ T49] : port 1(vlan1) entered disabled state [ 402.588222][ T49] device veth0_vlan left promiscuous mode [ 403.259438][T23025] device veth1_macvtap left promiscuous mode [ 403.275265][T23025] nr0: port 1(macsec0) entered disabled state [ 403.451409][T23034] device syzkaller0 entered promiscuous mode [ 403.628511][T23055] device syzkaller0 entered promiscuous mode [ 403.735319][T23077] : renamed from bond_slave_0 [ 405.061693][T23161] device syzkaller0 left promiscuous mode [ 405.760141][T23205] device syzkaller0 entered promiscuous mode [ 406.855497][T23274] +: renamed from team_slave_1 [ 406.895561][T23272] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 406.975484][T23272] device syzkaller0 entered promiscuous mode [ 407.914152][T23333] syz.1.6838[23333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.914214][T23333] syz.1.6838[23333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.246664][T23385] device syzkaller0 entered promiscuous mode [ 409.505393][T23396] syz.1.6858[23396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.505474][T23396] syz.1.6858[23396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.866787][T23430] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 410.193381][T23449] sit0: mtu greater than device maximum [ 410.350700][T23457] syz.3.6877[23457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.350762][T23457] syz.3.6877[23457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.793681][T23488] device syzkaller0 entered promiscuous mode [ 411.541004][T23539] device veth0_vlan left promiscuous mode [ 411.556255][T23539] device veth0_vlan entered promiscuous mode [ 411.593335][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.607018][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.626605][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.036901][T23565] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.045893][T23565] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.275560][T23572] device syzkaller0 entered promiscuous mode [ 412.670025][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 414.646698][T23749] device syzkaller0 entered promiscuous mode [ 415.704816][T23799] device syzkaller0 entered promiscuous mode [ 415.754590][T23813] device gre0 entered promiscuous mode [ 416.013268][T23852] device syzkaller0 entered promiscuous mode [ 416.048562][T23855] device gre0 entered promiscuous mode [ 416.242445][T23858] device syzkaller0 entered promiscuous mode [ 416.341523][T23869] syz.0.7004[23869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.341583][T23869] syz.0.7004[23869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.871727][T23953] syz.1.7028[23953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.894593][T23953] syz.1.7028[23953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.383072][T23997] device syzkaller0 entered promiscuous mode [ 418.401978][T24002] syz.1.7042[24002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.402045][T24002] syz.1.7042[24002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.870466][T24030] syz.2.7054[24030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.915541][T24030] syz.2.7054[24030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.066546][T24039] tun0: tun_chr_ioctl cmd 1074025676 [ 419.116349][T24039] tun0: owner set to 0 [ 419.445662][T24070] syz.4.7066[24070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.445708][T24070] syz.4.7066[24070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.287375][T24148] device syzkaller0 entered promiscuous mode [ 420.462847][T24155] device syzkaller0 entered promiscuous mode [ 421.015979][T24204] device sit0 entered promiscuous mode [ 421.069313][T24203] device syzkaller0 entered promiscuous mode [ 421.410190][T24221] bpf_get_probe_write_proto: 4 callbacks suppressed [ 421.410202][T24221] syz.4.7110[24221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.427938][T24221] syz.4.7110[24221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.722369][T24259] syz.1.7121[24259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.766446][T24259] syz.1.7121[24259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.634130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 422.670897][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.721875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.747195][T24368] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.769882][T24368] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.797623][T24367] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.820439][T24367] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 423.830213][T24367] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 424.477377][T24412] syz.4.7162[24412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.477854][T24412] syz.4.7162[24412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.621955][T24420] : renamed from bond_slave_0 [ 424.703449][T24423] device syzkaller0 entered promiscuous mode [ 424.738524][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 424.920500][T24437] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.219270][T24467] device syzkaller0 left promiscuous mode [ 425.489215][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.504040][T24503] device syzkaller0 entered promiscuous mode [ 425.558835][T24503] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.603476][T24502] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.620722][T24507] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.650376][T24501] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.672959][T24501] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.694860][T24501] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.242481][T24538] device syzkaller0 entered promiscuous mode [ 426.348744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.408648][T24550] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.434333][T24550] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.454121][T24548] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.493475][T24548] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.511120][T24548] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.873030][T24647] syz.1.7234[24647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.873092][T24647] syz.1.7234[24647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.364854][T24678] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.384271][T24678] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.391901][T24678] device bridge_slave_0 entered promiscuous mode [ 428.401747][T24678] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.408963][T24678] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.416802][T24678] device bridge_slave_1 entered promiscuous mode [ 428.543484][T24678] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.550893][T24678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.558327][T24678] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.565598][T24678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.593944][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 428.602126][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.609879][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.631369][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 428.650650][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.657763][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.669730][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 428.678399][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.685754][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.707661][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 428.716083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 428.736212][T24678] device veth0_vlan entered promiscuous mode [ 428.753146][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 428.762714][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.771191][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 428.779227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 428.795820][T24678] device veth1_macvtap entered promiscuous mode [ 428.803502][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 428.828130][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 428.849891][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 429.497051][ T9] device bridge_slave_1 left promiscuous mode [ 429.503611][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.521981][ T9] device bridge_slave_0 left promiscuous mode [ 429.530493][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.557385][ T9] device veth1_macvtap left promiscuous mode [ 429.563840][ T9] device veth0_vlan left promiscuous mode [ 429.797295][T24763] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.810566][T24851] device sit0 entered promiscuous mode [ 431.169886][T24887] 0: renamed from pim6reg1 [ 431.351958][T24909] syz.2.7315[24909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.351999][T24909] syz.2.7315[24909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.259796][T24961] : renamed from pim6reg1 [ 432.973905][T24979] device lo entered promiscuous mode [ 433.405940][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 433.481672][T25006] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 433.555724][T25006] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 433.563859][T25016] device sit0 left promiscuous mode [ 433.585791][T25016] device sit0 entered promiscuous mode [ 433.719287][T25005] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 433.746539][T25005] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 433.767903][T25005] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 433.841841][T25019] device syzkaller0 entered promiscuous mode [ 434.537209][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 434.588159][T25066] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 434.643988][T25074] device syzkaller0 entered promiscuous mode [ 434.687316][T25074] device syzkaller0 left promiscuous mode [ 434.722100][T25081] device sit0 left promiscuous mode [ 434.736245][T25081] device sit0 entered promiscuous mode [ 434.949675][T25092] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.910857][T25137] device syzkaller0 entered promiscuous mode [ 436.275214][T25172] device syzkaller0 entered promiscuous mode [ 436.415347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 436.479994][T25179] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 436.811785][T25205] device wg2 entered promiscuous mode [ 436.823002][T25205] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 437.095077][T25232] device veth1_macvtap left promiscuous mode [ 437.416806][T25260] syz.3.7424[25260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.416868][T25260] syz.3.7424[25260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.230013][T25393] syz.1.7435[25393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.257332][T25393] syz.1.7435[25393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.662515][T25402] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.759387][T25402] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.779564][T25402] device bridge_slave_0 entered promiscuous mode [ 438.840376][T25402] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.899020][T25402] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.937022][T25402] device bridge_slave_1 entered promiscuous mode [ 439.113161][T25423] syz.3.7443[25423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.113222][T25423] syz.3.7443[25423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.320747][T25402] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.339625][T25402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.346941][T25402] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.354114][T25402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.590683][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.598345][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.865194][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 439.873233][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.908367][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 439.917418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 439.925634][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.932723][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.940805][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 439.949894][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 439.958604][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.966232][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.974118][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 439.982876][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.991238][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 439.999692][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.017954][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 440.026628][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 440.035204][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 440.043769][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.053868][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.061557][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.074477][T25402] device veth0_vlan entered promiscuous mode [ 440.136749][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 440.150482][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 440.186015][T25402] device veth1_macvtap entered promiscuous mode [ 440.235962][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 440.244223][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 440.258773][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 440.294552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 440.304258][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 440.461562][T25482] syz.2.7461[25482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.461623][T25482] syz.2.7461[25482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.690298][ T9] device bridge_slave_1 left promiscuous mode [ 440.713879][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.723293][ T9] device bridge_slave_0 left promiscuous mode [ 440.735905][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.752332][ T9] device veth1_macvtap left promiscuous mode [ 440.764115][ T9] device veth0_vlan left promiscuous mode [ 440.943312][T25505] device syzkaller0 entered promiscuous mode [ 441.035103][T25519] syz.2.7472[25519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.035160][T25519] syz.2.7472[25519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.960746][T25610] +: renamed from team_slave_1 [ 443.399238][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 443.434965][T25628] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 443.983880][T25652] device syzkaller0 entered promiscuous mode [ 444.138845][T25667] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.146065][T25667] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.154221][T25667] device bridge_slave_0 entered promiscuous mode [ 444.161320][T25667] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.168760][T25667] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.176675][T25667] device bridge_slave_1 entered promiscuous mode [ 444.461636][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.475642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.501663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 444.511163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.522923][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.530028][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.538131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 444.568936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 444.584846][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.594676][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.601894][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.618735][T25672] device wg2 entered promiscuous mode [ 444.672810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.731300][T25667] device veth0_vlan entered promiscuous mode [ 444.743235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.755388][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.777050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.786016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.794152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.834487][T25700] bridge0: port 3(gretap0) entered blocking state [ 444.841728][T25700] bridge0: port 3(gretap0) entered disabled state [ 444.850141][T25700] device gretap0 entered promiscuous mode [ 444.856144][T25700] bridge0: port 3(gretap0) entered blocking state [ 444.862635][T25700] bridge0: port 3(gretap0) entered forwarding state [ 444.874654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.896506][T25667] device veth1_macvtap entered promiscuous mode [ 444.905754][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.931222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 445.291644][ T9] device bridge_slave_1 left promiscuous mode [ 445.299295][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.310483][ T9] device bridge_slave_0 left promiscuous mode [ 445.319056][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.334083][ T9] device veth0_vlan left promiscuous mode [ 445.684337][T25762] bpf_get_probe_write_proto: 2 callbacks suppressed [ 445.684346][T25762] syz.0.7543[25762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.692430][T25762] syz.0.7543[25762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.915876][T25771] device syzkaller0 entered promiscuous mode [ 446.171999][T25782] device wg2 entered promiscuous mode [ 446.348903][T25799] bridge0: port 3(veth1_macvtap) entered blocking state [ 446.376428][T25799] bridge0: port 3(veth1_macvtap) entered disabled state [ 447.842115][T25896] device syzkaller0 entered promiscuous mode [ 448.777163][T25947] syz.0.7600[25947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.777253][T25947] syz.0.7600[25947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.031615][T25978] tap0: tun_chr_ioctl cmd 2148553947 [ 449.117611][T25991] syz.0.7612[25991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.117705][T25991] syz.0.7612[25991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.177111][T25995] syz.3.7614[25995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.226535][T25995] syz.3.7614[25995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.563634][T26026] device syzkaller0 entered promiscuous mode [ 452.528360][T26054] syz.2.7630[26054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.528422][T26054] syz.2.7630[26054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.679969][T26061] bridge0: port 3(gretap0) entered disabled state [ 452.698442][T26061] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.705541][T26061] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.767304][T26063] batadv0: tun_chr_ioctl cmd 1074025677 [ 452.775447][T26067] syz.1.7635[26067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.775545][T26067] syz.1.7635[26067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.791830][T26063] batadv0: linktype set to 804 [ 452.820813][T26061] device gretap0 left promiscuous mode [ 452.846511][T26061] bridge0: port 3(gretap0) entered disabled state [ 452.866862][T26061] device bridge_slave_1 left promiscuous mode [ 452.873427][T26061] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.881417][T26061] device bridge_slave_0 left promiscuous mode [ 452.887786][T26061] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.294612][T26088] device sit0 entered promiscuous mode [ 453.317050][T26095] syz.2.7644[26095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.317112][T26095] syz.2.7644[26095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.551316][T26099] device syzkaller0 entered promiscuous mode [ 453.773015][T26117] syz.0.7650[26117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.773122][T26117] syz.0.7650[26117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.993289][T26124] tun0: tun_chr_ioctl cmd 2147767506 [ 454.597388][T26180] tap0: tun_chr_ioctl cmd 1074025677 [ 454.602830][T26180] tap0: linktype set to 778 [ 456.427469][T26274] -: renamed from syzkaller0 [ 456.673336][T26291] syz.4.7699[26291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.673442][T26291] syz.4.7699[26291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.119805][T26372] device syzkaller0 entered promiscuous mode [ 458.911984][T26418] syz.3.7736[26418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.912028][T26418] syz.3.7736[26418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.388852][T26429] tap0: tun_chr_ioctl cmd 1074812118 [ 459.550443][T26432] device syzkaller0 entered promiscuous mode [ 459.660528][T26444] device syzkaller0 entered promiscuous mode [ 459.692968][T26445] device syzkaller0 entered promiscuous mode [ 459.898254][T26455] syz.0.7747[26455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.898312][T26455] syz.0.7747[26455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.451423][T26472] device syzkaller0 entered promiscuous mode [ 460.640344][T26488] y: renamed from bond_slave_0 [ 460.778282][T26508] syz.4.7765[26508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.778577][T26508] syz.4.7765[26508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.803252][T26505] : port 1(ip6gretap0) entered blocking state [ 460.822755][T26505] : port 1(ip6gretap0) entered disabled state [ 460.845569][T26505] device ip6gretap0 entered promiscuous mode [ 461.141123][T26524] device syzkaller0 entered promiscuous mode [ 461.191161][T26530] device syzkaller0 entered promiscuous mode [ 461.676506][T26558] device syzkaller0 entered promiscuous mode [ 462.367916][T26599] device syzkaller0 entered promiscuous mode [ 462.925115][T26616] syz.3.7804[26616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.925177][T26616] syz.3.7804[26616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.331136][T26643] device syzkaller0 entered promiscuous mode [ 464.721853][T26733] @0: renamed from bond_slave_1 [ 465.965415][T26799] syz.2.7855[26799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.965476][T26799] syz.2.7855[26799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.348999][T26819] device syzkaller0 entered promiscuous mode [ 467.385178][T26864] device syzkaller0 entered promiscuous mode [ 467.953225][T26895] : renamed from bond_slave_0 [ 468.052918][T26898] device syzkaller0 entered promiscuous mode [ 468.193281][T26913] syz.2.7892[26913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.193344][T26913] syz.2.7892[26913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.205027][T26958] device sit0 entered promiscuous mode [ 469.903276][T26988] syz.2.7912[26988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.903336][T26988] syz.2.7912[26988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.089169][T27048] device syzkaller0 entered promiscuous mode [ 473.613965][T27149] syz.4.7961[27149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.614039][T27149] syz.4.7961[27149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.864053][T27157] device aaaaaaaaaaaaaaa entered promiscuous mode [ 473.911376][T27166] device syzkaller0 entered promiscuous mode [ 474.322639][T27211] device syzkaller0 entered promiscuous mode [ 474.677709][T27243] device wg2 left promiscuous mode [ 474.778091][T27243] device wg2 entered promiscuous mode [ 475.378636][T27271] syz.0.7998[27271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.378747][T27271] syz.0.7998[27271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.683874][T27292] device syzkaller0 entered promiscuous mode [ 476.043754][T27308] syz.2.8011[27308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.043814][T27308] syz.2.8011[27308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.939044][T27403] device sit0 entered promiscuous mode [ 478.124317][T27468] geneve1: tun_chr_ioctl cmd 1074025672 [ 478.137136][T27468] geneve1: ignored: set checksum enabled [ 478.176423][T27470] : renamed from bond_slave_0 [ 478.217212][T27477] device syzkaller0 entered promiscuous mode [ 478.584699][T27508] device syzkaller0 entered promiscuous mode [ 478.877633][T27542] device syzkaller0 entered promiscuous mode [ 479.337337][T27574] device wg2 left promiscuous mode [ 479.545459][T27592] device syzkaller0 entered promiscuous mode [ 480.910054][T27648] device syzkaller0 entered promiscuous mode [ 481.541823][T27699] device syzkaller0 entered promiscuous mode [ 481.583315][T27705] device syzkaller0 entered promiscuous mode [ 481.698457][T27717] device syzkaller0 entered promiscuous mode [ 482.580101][T27783] device syzkaller0 entered promiscuous mode [ 484.195645][T27896] device syzkaller0 entered promiscuous mode [ 484.463215][T27910] device syzkaller0 entered promiscuous mode [ 484.557615][T27912] device veth0_vlan left promiscuous mode [ 484.593063][T27912] device veth0_vlan entered promiscuous mode [ 484.815316][T27919] device syzkaller0 entered promiscuous mode [ 485.519641][T27960] device syzkaller0 entered promiscuous mode [ 485.681547][T27967] device syzkaller0 entered promiscuous mode [ 486.068775][T28009] device syzkaller0 entered promiscuous mode [ 487.262968][T28072] device syzkaller0 entered promiscuous mode [ 488.343675][T28121] device wg2 entered promiscuous mode [ 488.546546][T28130] device sit0 left promiscuous mode [ 488.676183][T28137] device sit0 entered promiscuous mode [ 489.894725][T28180] device sit0 entered promiscuous mode [ 490.370485][T28214] device wg2 left promiscuous mode [ 490.492014][T28208] device wg2 entered promiscuous mode [ 490.676974][T28242] device syzkaller0 entered promiscuous mode [ 491.950677][T28283] syz.2.8310[28283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 491.950729][T28283] syz.2.8310[28283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.876976][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 492.946739][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 493.506419][T28323] FAULT_INJECTION: forcing a failure. [ 493.506419][T28323] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 493.607969][T28323] CPU: 0 PID: 28323 Comm: syz.2.8322 Tainted: G W syzkaller #0 [ 493.616867][T28323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 493.627195][T28323] Call Trace: [ 493.630584][T28323] __dump_stack+0x21/0x24 [ 493.634964][T28323] dump_stack_lvl+0x1a7/0x208 [ 493.640170][T28323] ? show_regs_print_info+0x18/0x18 [ 493.645646][T28323] dump_stack+0x15/0x1c [ 493.649846][T28323] should_fail+0x3c1/0x510 [ 493.654281][T28323] should_fail_usercopy+0x1a/0x20 [ 493.659428][T28323] _copy_from_user+0x20/0xd0 [ 493.664032][T28323] sock_ioctl+0x678/0x760 [ 493.668463][T28323] ? sock_poll+0x350/0x350 [ 493.672890][T28323] ? __fget_files+0x2c4/0x320 [ 493.677621][T28323] ? security_file_ioctl+0x84/0xa0 [ 493.683188][T28323] ? sock_poll+0x350/0x350 [ 493.687721][T28323] __se_sys_ioctl+0x121/0x1a0 [ 493.692419][T28323] __x64_sys_ioctl+0x7b/0x90 [ 493.697255][T28323] do_syscall_64+0x31/0x40 [ 493.701795][T28323] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 493.707866][T28323] RIP: 0033:0x7f7a038a9819 [ 493.712290][T28323] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 493.732466][T28323] RSP: 002b:00007f7a02304028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 493.741178][T28323] RAX: ffffffffffffffda RBX: 00007f7a03b22fa0 RCX: 00007f7a038a9819 [ 493.749366][T28323] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 493.757471][T28323] RBP: 00007f7a02304090 R08: 0000000000000000 R09: 0000000000000000 [ 493.766024][T28323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 493.774026][T28323] R13: 00007f7a03b23038 R14: 00007f7a03b22fa0 R15: 00007ffde80cbd58 [ 494.518157][T28332] device syzkaller0 entered promiscuous mode [ 495.843596][T28379] device syzkaller0 entered promiscuous mode [ 497.697301][T28448] device syzkaller0 entered promiscuous mode [ 499.545434][T28525] device sit0 left promiscuous mode [ 499.663891][T28525] device sit0 entered promiscuous mode [ 500.937553][T28597] device veth1_macvtap left promiscuous mode [ 500.943598][T28597] device macsec0 entered promiscuous mode [ 501.220740][T28615] device syzkaller0 entered promiscuous mode [ 501.835747][T28671] syz.1.8421[28671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.835802][T28671] syz.1.8421[28671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 502.775349][ T24] audit: type=1400 audit(1776502128.230:176): avc: denied { create } for pid=28723 comm="syz.1.8436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 502.871565][T28726] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 506.808026][T28874] syz.2.8481[28874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.808088][T28874] syz.2.8481[28874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.284375][T28907] syz.4.8492[28907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.296613][T28907] syz.4.8492[28907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.480884][T28920] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 507.574490][T28920] syzkaller0: persist disabled [ 508.022327][T28950] syz.1.8504[28950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.022390][T28950] syz.1.8504[28950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.141791][T28956] device syzkaller0 entered promiscuous mode [ 508.325870][T28976] IPv6: : Disabled Multicast RS [ 508.553657][T28996] device syzkaller0 entered promiscuous mode [ 508.800426][T29016] bridge0: port 3(gretap0) entered blocking state [ 508.810935][T29016] bridge0: port 3(gretap0) entered disabled state [ 508.819380][T29016] device gretap0 entered promiscuous mode [ 508.825384][T29016] bridge0: port 3(gretap0) entered blocking state [ 508.832039][T29016] bridge0: port 3(gretap0) entered forwarding state [ 509.657663][T29058] device sit0 left promiscuous mode [ 510.302456][T29094] syz.1.8552[29094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.302517][T29094] syz.1.8552[29094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.488655][T29101] @: renamed from bond_slave_0 [ 510.994703][T29122] device syzkaller0 entered promiscuous mode [ 511.109978][T29134] syz.0.8564[29134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.110041][T29134] syz.0.8564[29134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.744782][T29161] device syz_tun entered promiscuous mode [ 512.044611][T29172] syz.1.8576[29172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.044672][T29172] syz.1.8576[29172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.141725][T29216] syz.0.8589[29216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.396416][T29216] syz.0.8589[29216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.005213][T29257] syz.2.8603[29257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.036527][T29257] syz.2.8603[29257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.301667][T29273] device veth1_macvtap entered promiscuous mode [ 515.493538][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 515.504146][ T9] nr0: port 1(macsec0) entered blocking state [ 515.510401][ T9] nr0: port 1(macsec0) entered forwarding state [ 515.527487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 516.273938][T29300] syz.0.8616[29300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.273994][T29300] syz.0.8616[29300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.793486][T29436] device sit0 entered promiscuous mode [ 520.068552][T29469] tun0: tun_chr_ioctl cmd 1074812118 [ 523.241918][T29575] device syzkaller0 entered promiscuous mode [ 524.786125][T29622] device syzkaller0 entered promiscuous mode [ 528.531545][T29828] device veth0_to_bridge entered promiscuous mode [ 528.677870][T29837] syz.2.8775[29837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.679093][T29837] syz.2.8775[29837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.695997][T29839] device syzkaller0 entered promiscuous mode [ 528.892507][T29845] tap0: tun_chr_ioctl cmd 1074812118 [ 530.230339][T29908] device syzkaller0 entered promiscuous mode [ 530.324052][T29911] device syzkaller0 entered promiscuous mode [ 530.688384][T29944] device sit0 left promiscuous mode [ 531.156967][T29981] device sit0 left promiscuous mode [ 531.309522][T29980] device sit0 entered promiscuous mode [ 531.558310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 531.943866][T30026] syz.2.8830[30026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.943925][T30026] syz.2.8830[30026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.486714][T30055] device dummy0 entered promiscuous mode [ 533.028167][T30059] device syzkaller0 entered promiscuous mode [ 533.239804][T30075] syz.3.8844[30075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.239867][T30075] syz.3.8844[30075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.316315][T30079] device sit0 left promiscuous mode [ 533.517376][T30092] device syzkaller0 entered promiscuous mode [ 533.925925][T30112] syz.4.8861[30112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.925991][T30112] syz.4.8861[30112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.632127][T30147] syz.2.8873[30147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.656382][T30147] syz.2.8873[30147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.511555][T30190] syz.2.8886[30190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.588139][T30190] syz.2.8886[30190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.349896][T30299] syz.0.8920[30299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.393343][T30299] syz.0.8920[30299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.284133][T30321] device syzkaller0 entered promiscuous mode [ 538.518536][T30332] syz.4.8930[30332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.518596][T30332] syz.4.8930[30332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.857497][T30352] device syzkaller0 entered promiscuous mode [ 538.879329][T30358] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.999865][T30369] syz.2.8942[30369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.999929][T30369] syz.2.8942[30369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.173099][T30366] device lo left promiscuous mode [ 539.218631][T30366] bY4`Ҙ: renamed from lo [ 539.694379][T30412] syz.3.8953[30412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.694445][T30412] syz.3.8953[30412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.497542][T30492] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.516929][T30492] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.525006][T30492] device bridge_slave_0 entered promiscuous mode [ 541.532858][T30492] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.541051][T30492] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.549514][T30492] device bridge_slave_1 entered promiscuous mode [ 541.696337][T30492] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.703458][T30492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.710796][T30492] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.718371][T30492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.879610][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 541.892320][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.906718][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.947170][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 541.966970][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.974604][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.000549][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 542.018730][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.026504][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.035614][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 542.052244][T30519] device veth1_macvtap left promiscuous mode [ 542.073824][T30525] syz.0.8987[30525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.073889][T30525] syz.0.8987[30525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.077097][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 542.111368][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 542.129698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 542.144277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 542.157117][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 542.166434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.182787][T30492] device veth0_vlan entered promiscuous mode [ 542.202154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 542.215632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 542.227877][T30492] device veth1_macvtap entered promiscuous mode [ 542.243252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 542.258620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 542.268137][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 542.278898][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 542.288487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 543.437841][ T407] nr0: port 1(macsec0) entered disabled state [ 543.451010][ T407] device veth1_macvtap left promiscuous mode [ 543.875365][T30635] device wg2 entered promiscuous mode [ 544.073104][T30647] device wg2 left promiscuous mode [ 544.103212][T30649] device veth0_vlan left promiscuous mode [ 544.126721][T30649] device veth0_vlan entered promiscuous mode [ 544.136207][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.151807][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.161850][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.176998][T30647] device wg2 entered promiscuous mode [ 544.456350][T30680] device syzkaller0 entered promiscuous mode [ 545.176309][T30735] syz.3.9056[30735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.176545][T30735] syz.3.9056[30735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.570263][T30779] syz.0.9068[30779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.624465][T30779] syz.0.9068[30779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 548.206083][T30859] IPv6: pim6reg1: Disabled Multicast RS [ 548.792502][T30908] device syzkaller0 entered promiscuous mode [ 549.218644][T30929] device syzkaller0 entered promiscuous mode [ 549.237409][T30919] device sit0 entered promiscuous mode [ 549.973245][T30988] device wg2 entered promiscuous mode [ 549.987973][T30988] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 550.397976][T31012] syz.1.9137[31012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.398038][T31012] syz.1.9137[31012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.566526][T31020] bridge0: port 3(gretap0) entered disabled state [ 550.585182][T31020] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.592886][T31020] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.696583][T31096] IPv6: : Disabled Multicast RS [ 551.870064][T31112] device syzkaller0 left promiscuous mode [ 551.896740][T31106] device wg2 left promiscuous mode [ 552.163136][ T24] audit: type=1400 audit(1776502177.620:177): avc: denied { create } for pid=31131 comm="syz.4.9175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 553.066382][T31171] device syzkaller0 entered promiscuous mode [ 553.199917][T31182] syz.1.9189[31182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 553.199993][T31182] syz.1.9189[31182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 553.672919][T31222] device syzkaller0 entered promiscuous mode [ 553.692995][T31228] device dummy0 entered promiscuous mode [ 554.031364][T31248] device syzkaller0 left promiscuous mode [ 554.749984][T31283] device sit0 left promiscuous mode [ 558.242104][T31400] device syzkaller0 entered promiscuous mode [ 559.054747][T31437] : renamed from vlan0 [ 560.820181][T31555] device syzkaller0 entered promiscuous mode [ 560.846312][T31558] device sit0 entered promiscuous mode [ 561.011935][T31562] device syzkaller0 entered promiscuous mode [ 562.893098][T31675] device wg2 entered promiscuous mode [ 562.899871][T31670] device wg2 left promiscuous mode [ 563.395309][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 563.821231][T31735] device wg2 entered promiscuous mode [ 563.847865][T31735] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 564.639434][T31765] device syzkaller0 entered promiscuous mode [ 564.746705][T31770] device syzkaller0 entered promiscuous mode [ 565.789116][T31811] device wg2 left promiscuous mode [ 565.875764][T31811] device wg2 entered promiscuous mode [ 565.989080][T31822] device syzkaller0 entered promiscuous mode [ 567.658376][T31921] device wg2 left promiscuous mode [ 567.715980][T31921] device wg2 entered promiscuous mode [ 567.730430][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 567.937440][T31944] device sit0 entered promiscuous mode [ 569.479284][T32016] device syzkaller0 entered promiscuous mode [ 569.616130][T32039] device sit0 left promiscuous mode [ 569.758839][T32039] device sit0 entered promiscuous mode [ 570.003955][T32055] @0: renamed from bond_slave_1 [ 570.152695][T32061] bridge0: port 3(gretap0) entered blocking state [ 570.169155][T32061] bridge0: port 3(gretap0) entered disabled state [ 570.198795][T32061] device gretap0 entered promiscuous mode [ 570.221491][T32061] bridge0: port 3(gretap0) entered blocking state [ 570.228435][T32061] bridge0: port 3(gretap0) entered forwarding state [ 573.177106][T32167] device lo entered promiscuous mode [ 573.204584][T32167] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 573.273995][T32170] device syzkaller0 left promiscuous mode [ 573.311499][T32173] device xfrm0 entered promiscuous mode [ 573.473564][T32199] device syzkaller0 entered promiscuous mode [ 573.791142][T32244] syz.1.9508[32244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.791204][T32244] syz.1.9508[32244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.112915][T32262] tap0: tun_chr_ioctl cmd 1074025680 [ 574.317869][T32288] syz.1.9520[32288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.317931][T32288] syz.1.9520[32288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.432658][T32291] device syzkaller0 entered promiscuous mode [ 574.562639][T32297] bridge0: port 3(gretap0) entered disabled state [ 574.569329][T32297] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.702754][T32307] device gretap0 left promiscuous mode [ 574.712744][T32307] bridge0: port 3(gretap0) entered disabled state [ 574.729456][T32307] device bridge_slave_1 left promiscuous mode [ 574.736483][T32307] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.744291][T32307] device bridge_slave_0 left promiscuous mode [ 574.776420][T32307] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.971245][T32312] device veth0_vlan left promiscuous mode [ 575.004534][T32312] device veth0_vlan entered promiscuous mode [ 575.075546][T32324] device syzkaller0 entered promiscuous mode [ 575.136693][T32329] device sit0 left promiscuous mode [ 575.805654][T32398] device syzkaller0 entered promiscuous mode [ 576.000353][T32403] syz.1.9555[32403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.000403][T32403] syz.1.9555[32403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.934934][T32453] syz.4.9573[32453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.948518][T32453] syz.4.9573[32453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.105664][T32509] device syzkaller0 entered promiscuous mode [ 578.431172][T32530] device syzkaller0 entered promiscuous mode [ 578.497927][T32529] device syzkaller0 entered promiscuous mode [ 578.949364][T32587] device syzkaller0 entered promiscuous mode [ 579.310729][T32616] device pimreg0 entered promiscuous mode [ 579.520782][T32619] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.546294][T32619] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.557258][T32619] device bridge_slave_0 entered promiscuous mode [ 579.576635][T32634] device gretap0 left promiscuous mode [ 579.582574][T32634] bridge0: port 3(gretap0) entered disabled state [ 579.605644][T32634] device bridge_slave_1 left promiscuous mode [ 579.614086][T32634] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.625953][T32634] device bridge_slave_0 left promiscuous mode [ 579.632575][T32634] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.692474][T32619] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.702037][T32619] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.712971][T32619] device bridge_slave_1 entered promiscuous mode [ 579.865626][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 579.874168][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.903055][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 579.912103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.920891][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.928342][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.935940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 579.945394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.954928][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.963072][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.980916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 579.989655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.999225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 580.018120][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 580.053933][T32619] device veth0_vlan entered promiscuous mode [ 580.061316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 580.069570][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 580.077553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 580.089978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 580.110803][T32652] syz.3.9635[32652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.110869][T32652] syz.3.9635[32652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.125573][T32619] device veth1_macvtap entered promiscuous mode [ 580.158151][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 580.167253][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 580.354403][T32673] batadv0: tun_chr_ioctl cmd 1074025677 [ 580.363544][T32673] batadv0: linktype set to 776 [ 580.603846][T32675] device syzkaller0 entered promiscuous mode [ 580.760802][T32696] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 580.771204][T32696] device syzkaller0 entered promiscuous mode [ 581.077941][T32706] device syzkaller0 entered promiscuous mode [ 581.472617][T32732] device syzkaller0 entered promiscuous mode [ 581.810383][ T305] syz.2.9673[305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.810447][ T305] syz.2.9673[305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.348046][ T338] device syzkaller0 entered promiscuous mode [ 583.387081][ T399] device syzkaller0 entered promiscuous mode [ 583.639511][ T427] device syzkaller0 entered promiscuous mode [ 584.400556][ T466] device syzkaller0 entered promiscuous mode [ 584.883995][ T496] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 586.106339][ T535] device syzkaller0 entered promiscuous mode [ 587.660654][ T583] device syzkaller0 entered promiscuous mode [ 587.919949][ T599] syz.4.9751[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.920012][ T599] syz.4.9751[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 588.339444][ T627] device syzkaller0 entered promiscuous mode [ 588.381414][ T632] tun0: tun_chr_ioctl cmd 1074025676 [ 588.388666][ T632] tun0: owner set to 0 [ 588.759125][ T658] device veth0_vlan left promiscuous mode [ 588.790463][ T658] device veth0_vlan entered promiscuous mode [ 589.429116][ T676] device syzkaller0 entered promiscuous mode [ 589.574615][ T694] device wg2 left promiscuous mode [ 589.640821][ T694] device wg2 entered promiscuous mode [ 589.650278][ T694] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 589.662718][ T701] syz.4.9786[701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.662781][ T701] syz.4.9786[701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.787576][ T721] device xfrm0 entered promiscuous mode [ 589.842571][ T727] syz.2.9797[727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.842631][ T727] syz.2.9797[727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.089304][ T735] device syzkaller0 entered promiscuous mode [ 590.420020][ T762] syz.3.9808[762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.420122][ T762] syz.3.9808[762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.609079][ T774] device syzkaller0 entered promiscuous mode [ 590.886190][ T790] device syzkaller0 entered promiscuous mode [ 591.010832][ T803] syz.4.9823[803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.010891][ T803] syz.4.9823[803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.490774][ T814] device syzkaller0 entered promiscuous mode [ 591.559033][ T821] device syzkaller0 entered promiscuous mode [ 591.593926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 592.444220][ T856] device syzkaller0 entered promiscuous mode [ 592.501134][ T24] audit: type=1400 audit(1776502217.960:178): avc: denied { create } for pid=863 comm="syz.3.9841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 592.568408][ T867] device syzkaller0 entered promiscuous mode [ 592.657200][ T876] device syzkaller0 entered promiscuous mode [ 592.669671][ T877] device veth0_vlan left promiscuous mode [ 592.698117][ T877] device veth0_vlan entered promiscuous mode [ 592.752632][ T874] device wg2 left promiscuous mode [ 592.962467][ T912] bpf_get_probe_write_proto: 2 callbacks suppressed [ 592.962477][ T912] syz.4.9856[912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.969520][ T912] syz.4.9856[912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.917525][ T942] sit0: mtu greater than device maximum [ 594.246822][ T962] device syzkaller0 entered promiscuous mode [ 594.485381][ T985] device syzkaller0 entered promiscuous mode [ 594.588179][ T988] device syzkaller0 entered promiscuous mode [ 594.728222][ T1004] device syzkaller0 entered promiscuous mode [ 595.416815][ T1025] device syzkaller0 entered promiscuous mode [ 595.551159][ T1038] tap0: tun_chr_ioctl cmd 1074025681 [ 595.611779][ T1040] device veth0_vlan left promiscuous mode [ 595.648490][ T1040] device veth0_vlan entered promiscuous mode [ 597.098956][ T1076] 0: renamed from pim6reg1 [ 599.007053][ T1213] device syzkaller0 entered promiscuous mode [ 600.115130][ T1285] device syzkaller0 entered promiscuous mode [ 600.321207][ T1290] device syzkaller0 entered promiscuous mode [ 600.442913][ T1296] device syzkaller0 entered promiscuous mode [ 600.465305][ T1296] syzkaller0: create flow: hash 3702106986 index 0 [ 600.530736][T29970] syzkaller0: tun_net_xmit 48 [ 600.577734][ T1295] syzkaller0 (unregistered): delete flow: hash 3702106986 index 0 [ 601.335443][ T24] audit: type=1400 audit(1776502226.790:179): avc: denied { create } for pid=1372 comm="syz.1.9999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 602.575042][ T1474] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.586564][ T1474] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.595564][ T1474] device bridge_slave_0 entered promiscuous mode [ 602.609985][ T1474] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.623306][ T1474] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.633474][ T1474] device bridge_slave_1 entered promiscuous mode [ 602.740092][ T407] device ip6gretap0 left promiscuous mode [ 602.749835][ T407] : port 1(ip6gretap0) entered disabled state [ 602.803365][ T1474] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.810979][ T1474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.818702][ T1474] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.826075][ T1474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.924927][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 602.938264][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.954093][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.987627][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 602.996735][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.004328][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.016021][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 603.027008][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.034468][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.050796][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 603.067722][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 603.089770][ T1474] device veth0_vlan entered promiscuous mode [ 603.097475][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 603.106560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 603.117180][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 603.131250][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 603.161020][ T1474] device veth1_macvtap entered promiscuous mode [ 603.192541][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 603.211308][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 603.220928][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 603.230275][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 603.239264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 604.510785][ T1575] : renamed from bond_slave_0 [ 604.883432][ T1587] device syzkaller0 entered promiscuous mode [ 606.096583][ T1606] device veth1_macvtap left promiscuous mode [ 606.637083][ T1650] syz.1.10075[1650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.637143][ T1650] syz.1.10075[1650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 607.069348][ T1671] device wg2 entered promiscuous mode [ 607.176745][ T1682] syz.4.10085[1682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 607.176808][ T1682] syz.4.10085[1682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 607.179471][ T1676] device syzkaller0 entered promiscuous mode [ 607.245146][ T1687] tap0: tun_chr_ioctl cmd 1074025677 [ 607.271722][ T1687] tap0: linktype set to 270 [ 607.298462][ T1678] device syzkaller0 entered promiscuous mode [ 607.443857][ T1705] device syzkaller0 entered promiscuous mode [ 608.920077][ T1796] device veth1_macvtap left promiscuous mode [ 609.090465][ T1815] syz.3.10127[1815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 609.090530][ T1815] syz.3.10127[1815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.278229][ T1883] tun0: tun_chr_ioctl cmd 1074025676 [ 610.329349][ T1883] tun0: owner set to 0 [ 610.650375][ T1915] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.670631][ T1915] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.678610][ T1915] device bridge_slave_0 entered promiscuous mode [ 610.691342][ T1915] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.712870][ T1915] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.752605][ T1915] device bridge_slave_1 entered promiscuous mode [ 610.989100][ T1915] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.996695][ T1915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.004676][ T1915] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.013048][ T1915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.417264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 611.425689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 611.440164][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 611.461493][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 611.497011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 611.509907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 611.528227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 611.555452][ T1915] device veth0_vlan entered promiscuous mode [ 611.567012][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 611.575282][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 611.584069][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 611.591817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 611.664763][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 611.676988][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 611.689321][ T1915] device veth1_macvtap entered promiscuous mode [ 611.726981][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 611.735620][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 611.744369][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 611.754380][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 611.765238][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 611.819868][ T1964] device syzkaller0 entered promiscuous mode [ 611.923221][ T1971] device syzkaller0 entered promiscuous mode [ 612.167284][ T2010] device syzkaller0 entered promiscuous mode [ 612.564269][ T2049] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 613.439887][ T407] device bridge_slave_1 left promiscuous mode [ 613.450904][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.469836][ T407] device bridge_slave_0 left promiscuous mode [ 613.488401][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.514047][ T407] device veth0_vlan left promiscuous mode [ 613.771308][ T2089] device veth0_vlan left promiscuous mode [ 613.777505][ T2089] device veth0_vlan entered promiscuous mode [ 613.788860][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 613.817364][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 613.829123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 613.949132][ T2109] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 615.091611][ T2165] device syzkaller0 entered promiscuous mode [ 615.212398][ T2174] device syzkaller0 entered promiscuous mode [ 616.844247][ T2277] syz.0.10269[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.844310][ T2277] syz.0.10269[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.945088][ T2284] device syzkaller0 entered promiscuous mode [ 617.158994][ T2299] sock: sock_set_timeout: `syz.2.10276' (pid 2299) tries to set negative timeout [ 617.460788][ T2319] syz.1.10282[2319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.460851][ T2319] syz.1.10282[2319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.818108][ T2352] device syzkaller0 entered promiscuous mode [ 617.871705][ T2362] syz.2.10295[2362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.871772][ T2362] syz.2.10295[2362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.267149][ T2400] syz.2.10307[2400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.289060][ T2400] syz.2.10307[2400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.759066][ T2420] device syzkaller0 entered promiscuous mode [ 618.886745][ T2426] device syzkaller0 entered promiscuous mode [ 619.796787][ T2471] device syzkaller0 entered promiscuous mode [ 620.084533][ T2487] device syzkaller0 entered promiscuous mode [ 620.574151][ T2522] device veth0_vlan left promiscuous mode [ 620.610946][ T2522] device veth0_vlan entered promiscuous mode [ 622.761492][ T2696] device veth0_vlan left promiscuous mode [ 622.771085][ T2696] device veth0_vlan entered promiscuous mode [ 622.811299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.822168][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 622.833548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 623.134638][ T2712] device veth0_vlan left promiscuous mode [ 623.158511][ T2712] device veth0_vlan entered promiscuous mode [ 623.205821][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 623.214372][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 623.223118][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 623.239406][ T2717] device wg2 left promiscuous mode [ 623.401819][ T2729] device macsec0 entered promiscuous mode [ 623.446420][ T2729] device veth1_macvtap left promiscuous mode [ 623.946689][ T2744] : renamed from syzkaller0 [ 624.152026][ T2747] device wg2 entered promiscuous mode [ 625.295921][ T2844] tap0: tun_chr_ioctl cmd 1074025680 [ 626.960834][ T2952] : port 1(ip6gretap0) entered blocking state [ 626.969401][ T2952] : port 1(ip6gretap0) entered disabled state [ 626.982909][ T2952] device ip6gretap0 entered promiscuous mode [ 627.141623][ T3067] device veth0_vlan left promiscuous mode [ 627.148181][ T3067] device veth0_vlan entered promiscuous mode [ 627.167511][ T3069] : port 1(vlan1) entered blocking state [ 627.184724][ T3069] : port 1(vlan1) entered disabled state [ 627.194804][ T3069] device vlan1 entered promiscuous mode [ 627.502514][ T3079] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.526271][ T3079] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.560105][ T3079] device bridge_slave_0 entered promiscuous mode [ 627.599612][ T3079] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.647080][ T3079] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.658150][ T3079] device bridge_slave_1 entered promiscuous mode [ 627.981768][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.993761][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 628.040618][ T3122] device syzkaller0 entered promiscuous mode [ 628.106396][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 628.117197][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 628.127741][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.134913][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 628.158947][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 628.189018][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 628.198130][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.205433][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.217131][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 628.225436][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 628.234877][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 628.243804][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 628.252632][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 628.272429][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 628.281617][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 628.294673][ T3079] device veth0_vlan entered promiscuous mode [ 628.302115][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 628.311089][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.320430][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.328403][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.343888][ T3079] device veth1_macvtap entered promiscuous mode [ 628.357234][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 628.381294][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 628.391071][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 628.400884][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 628.409723][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 629.123915][ T3163] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.143512][ T3163] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.176624][ T3163] device bridge_slave_0 entered promiscuous mode [ 629.190857][ T3163] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.198521][ T3163] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.206466][ T3163] device bridge_slave_1 entered promiscuous mode [ 629.261273][ T7] device bridge_slave_1 left promiscuous mode [ 629.276386][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.289801][ T7] device bridge_slave_0 left promiscuous mode [ 629.296408][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.304979][ T7] device veth0_vlan left promiscuous mode [ 629.583024][ T3163] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.590436][ T3163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.598584][ T3163] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.605986][ T3163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.699133][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.707419][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.725562][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.761667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.773854][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.781131][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.806385][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.814853][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.821927][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.846369][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.855422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.916837][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.925473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.936624][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.944191][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.956859][ T3163] device veth0_vlan entered promiscuous mode [ 630.008649][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 630.031472][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 630.060061][ T3163] device veth1_macvtap entered promiscuous mode [ 630.103049][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 630.116843][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 630.128270][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 630.151218][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 630.167127][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 631.819089][ T3338] syz.0.10551[3338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.819151][ T3338] syz.0.10551[3338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.911882][ T3342] device syzkaller0 entered promiscuous mode [ 633.003446][ T3358] device sit0 entered promiscuous mode [ 633.470607][ T3400] syz.0.10568[3400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.470665][ T3400] syz.0.10568[3400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.883243][ T3479] device syzkaller0 entered promiscuous mode [ 635.475113][ C1] Illegal XDP return value 16128, expect packet loss! [ 636.468894][ T3512] geneve0: tun_chr_ioctl cmd 1074025677 [ 636.474558][ T3512] geneve0: linktype set to 1 [ 636.767935][ T3537] tap0: tun_chr_ioctl cmd 1074025677 [ 636.776475][ T3537] tap0: linktype set to 778 [ 637.420472][ T3585] device syzkaller0 entered promiscuous mode [ 637.672308][ T3620] tap0: tun_chr_ioctl cmd 1074025677 [ 637.693598][ T3620] tap0: linktype set to 6 [ 638.525977][ T3689] device syzkaller0 entered promiscuous mode [ 639.320328][ T3748] device syzkaller0 entered promiscuous mode [ 639.386130][ T3755] device sit0 entered promiscuous mode [ 639.713451][ T3781] device syzkaller0 entered promiscuous mode [ 639.720352][ T3781] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 641.201405][ T3876] device syzkaller0 entered promiscuous mode [ 641.965821][ T3928] IPv6: pim6reg1: Disabled Multicast RS [ 641.985920][ T3938] device wg2 entered promiscuous mode [ 642.118892][ T3944] device syzkaller0 entered promiscuous mode [ 642.841505][ T3992] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 642.855013][ T3992] device syzkaller0 entered promiscuous mode [ 644.332100][ T4068] device syzkaller0 entered promiscuous mode [ 644.483978][ T4082] device syzkaller0 entered promiscuous mode [ 645.489586][ T4145] syz.2.10792[4145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.489654][ T4145] syz.2.10792[4145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.608616][ T4147] bond_slave_0: mtu less than device minimum [ 645.726792][ T4156] syz.4.10794[4156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.726857][ T4156] syz.4.10794[4156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 646.136973][ T4180] device syzkaller0 entered promiscuous mode [ 646.309697][ T4186] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 646.539450][ T4198] sit0: mtu less than device minimum [ 647.136660][ T4226] device sit0 left promiscuous mode [ 647.416024][ T4236] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 647.519980][ T4262] tap0: tun_chr_ioctl cmd 1074025677 [ 647.555522][ T4262] tap0: linktype set to 270 [ 649.004132][ T4362] tap0: tun_chr_ioctl cmd 1074025681 [ 649.461579][ T4382] syz.1.10860[4382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.461646][ T4382] syz.1.10860[4382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.734619][ T4395] device syzkaller0 entered promiscuous mode [ 650.357982][ T4427] syz.3.10874[4427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.358045][ T4427] syz.3.10874[4427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.357097][ T4505] device syzkaller0 entered promiscuous mode [ 656.819168][ T4646] device syzkaller0 entered promiscuous mode [ 656.948962][ T4655] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.956397][ T4655] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.044702][ T4659] gretap0: mtu less than device minimum [ 657.963031][ T4688] device syzkaller0 entered promiscuous mode [ 658.366876][ T4730] device syzkaller0 entered promiscuous mode [ 659.410270][ T4834] syz.3.10998[4834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.410326][ T4834] syz.3.10998[4834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.485867][ T4836] device syzkaller0 entered promiscuous mode [ 661.210894][ T4957] -1: renamed from syzkaller0 [ 663.138278][ T5044] device syzkaller0 entered promiscuous mode [ 663.356818][ T5050] device syzkaller0 entered promiscuous mode [ 663.406486][ T5058] syz.1.11059[5058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.406530][ T5058] syz.1.11059[5058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.095892][ T5100] syz.0.11071[5100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.217489][ T5100] syz.0.11071[5100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.699803][ T5128] sock: sock_set_timeout: `syz.1.11078' (pid 5128) tries to set negative timeout [ 664.894646][ T5116] device syzkaller0 entered promiscuous mode [ 665.020588][ T5143] syz.4.11083[5143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.020649][ T5143] syz.4.11083[5143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.582715][ T5179] syz.4.11094[5179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.639754][ T5179] syz.4.11094[5179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.191081][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 667.467263][ T5290] syz.0.11129[5290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.469280][ T5290] syz.0.11129[5290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.516076][ T5300] syz.4.11133[5300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.544948][ T5300] syz.4.11133[5300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.786037][ T5317] device syzkaller0 entered promiscuous mode [ 668.383562][ T5341] device wg2 entered promiscuous mode [ 668.528474][ T5345] device syzkaller0 entered promiscuous mode [ 670.020481][ T5427] device aaaaaaaaaaaaaaa entered promiscuous mode [ 670.601365][ T5461] device syzkaller0 entered promiscuous mode [ 670.870341][ T5479] syz.1.11190[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.870398][ T5479] syz.1.11190[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.357872][ T5565] device wg2 left promiscuous mode [ 672.486988][ T5575] syz.4.11219[5575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.487088][ T5575] syz.4.11219[5575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.319588][ T5620] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 673.443709][ T24] audit: type=1400 audit(1776502298.900:180): avc: denied { create } for pid=5619 comm="syz.1.11233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 674.042979][ T5660] device syzkaller0 left promiscuous mode [ 674.104007][ T5659] veth1_to_bridge: mtu less than device minimum [ 674.461658][ T5703] syz.4.11258[5703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 674.461720][ T5703] syz.4.11258[5703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 674.975476][ T5746] syz.0.11270[5746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.056545][ T5746] syz.0.11270[5746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.207059][ T5753] syz.4.11273[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.271653][ T5753] syz.4.11273[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.339491][ T5768] device syzkaller0 entered promiscuous mode [ 675.672368][ T5786] device syzkaller0 entered promiscuous mode [ 675.774258][ T5798] device syzkaller0 entered promiscuous mode [ 676.264939][ T5835] device syzkaller0 entered promiscuous mode [ 676.556777][ T5866] syz.3.11311[5866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.556844][ T5866] syz.3.11311[5866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.767043][ T5877] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.786642][ T5877] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.006428][ T5899] device bridge_slave_1 left promiscuous mode [ 677.012823][ T5899] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.039929][ T5899] device bridge_slave_0 left promiscuous mode [ 677.046526][ T5899] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.069008][ T5905] syz.2.11324[5905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.069071][ T5905] syz.2.11324[5905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.736795][ T5937] device syzkaller0 entered promiscuous mode [ 678.264438][ T5964] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.511788][ T5974] device wg2 left promiscuous mode [ 678.591609][ T5974] device wg2 entered promiscuous mode [ 681.248688][ T6148] device syzkaller0 entered promiscuous mode [ 681.716844][ T6158] gretap0: mtu less than device minimum [ 682.052632][ T6174] device syzkaller0 entered promiscuous mode [ 682.191543][ T6187] device lo entered promiscuous mode [ 682.246849][ T6190] syz.0.11412[6190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.246914][ T6190] syz.0.11412[6190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.369215][ T6200] tun0: tun_chr_ioctl cmd 1074025675 [ 682.406249][ T6200] tun0: persist enabled [ 682.413655][ T6200] tun0: tun_chr_ioctl cmd 1074025675 [ 682.419651][ T6200] tun0: persist enabled [ 682.693936][ T6231] device wg2 entered promiscuous mode [ 684.012232][ T6296] device veth1_macvtap entered promiscuous mode [ 684.019737][ T5517] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 686.156563][ T6362] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.163669][ T6362] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.186906][ T6362] device bridge_slave_0 entered promiscuous mode [ 686.195099][ T6362] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.216247][ T6362] bridge0: port 2(bridge_slave_1) entered disabled state [ 686.223937][ T6362] device bridge_slave_1 entered promiscuous mode [ 686.238232][ T407] device ip6gretap0 left promiscuous mode [ 686.244030][ T407] : port 1(ip6gretap0) entered disabled state [ 686.368052][ T6362] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.375944][ T6362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 686.383271][ T6362] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.390431][ T6362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 686.461062][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 686.471995][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.497800][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 686.518946][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 686.527751][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.535110][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 686.544618][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 686.553470][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.560925][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 686.587199][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 686.612948][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 686.622933][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 686.710409][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 686.718848][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 686.727010][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 686.774803][ T6362] device veth0_vlan entered promiscuous mode [ 686.849106][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 686.864358][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 686.896886][ T6362] device veth1_macvtap entered promiscuous mode [ 686.983170][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 686.997160][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 687.025982][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 687.060438][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 687.088206][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 687.172638][ T407] device veth1_macvtap left promiscuous mode [ 687.393312][ T6416] device sit0 left promiscuous mode [ 687.568897][ T6432] device sit0 entered promiscuous mode [ 688.859421][ T6526] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.866671][ T6526] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.950515][ T6530] device syzkaller0 entered promiscuous mode [ 689.354681][ T6567] device syzkaller0 entered promiscuous mode [ 689.580583][ T6592] device syz_tun entered promiscuous mode [ 689.590341][ T6584] device veth0_vlan left promiscuous mode [ 689.616858][ T6584] device veth0_vlan entered promiscuous mode [ 689.659729][ T5517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.669209][ T5517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.678898][ T5517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.784296][ T6630] device syzkaller0 entered promiscuous mode [ 690.038364][ T6659] device syzkaller0 entered promiscuous mode [ 691.737424][ T6754] device syzkaller0 entered promiscuous mode [ 692.708809][ T6780] device syzkaller0 entered promiscuous mode [ 695.284215][ T6892] device syzkaller0 entered promiscuous mode [ 695.326317][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 696.479969][ T6954] device syzkaller0 entered promiscuous mode [ 697.280425][ T6981] : renamed from bond_slave_0 [ 697.738478][ T7020] device syzkaller0 entered promiscuous mode [ 698.717358][ T7087] device syzkaller0 entered promiscuous mode [ 699.740966][ T7141] syz.2.11685[7141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.741057][ T7141] syz.2.11685[7141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.770692][ T7143] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 699.835268][ T7143] device syzkaller0 entered promiscuous mode [ 701.210097][ T7204] device syzkaller0 entered promiscuous mode [ 703.472779][ T7300] device syzkaller0 entered promiscuous mode [ 704.867931][ T7381] device syzkaller0 entered promiscuous mode [ 705.071070][ T7370] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 705.082916][ T7370] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 705.091527][ T7370] CPU: 1 PID: 7370 Comm: syz.1.11749 Tainted: G W syzkaller #0 [ 705.100405][ T7370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 705.110465][ T7370] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 705.116574][ T7370] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 705.136815][ T7370] RSP: 0018:ffffc90000e17400 EFLAGS: 00010202 [ 705.142994][ T7370] RAX: 0000000000000004 RBX: 1ffff11026a64d79 RCX: 0000000000080000 [ 705.150974][ T7370] RDX: ffffc90005021000 RSI: 000000000007f479 RDI: 000000000007f47a [ 705.158959][ T7370] RBP: ffffc90000e17500 R08: ffffffff86e79048 R09: ffffffff86e79058 [ 705.167052][ T7370] R10: ffffffff86e7905c R11: ffffffff86e79043 R12: 000000002284951f [ 705.175052][ T7370] R13: 0000000000000020 R14: 1ffff920001c2e88 R15: dffffc0000000000 [ 705.183603][ T7370] FS: 00007f2b816836c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 705.192533][ T7370] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 705.199248][ T7370] CR2: 000020000059517f CR3: 00000001115ad000 CR4: 00000000003506a0 [ 705.207398][ T7370] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 705.215367][ T7370] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 705.223418][ T7370] Call Trace: [ 705.226910][ T7370] ? debug_smp_processor_id+0x17/0x20 [ 705.232473][ T7370] ? perf_pending_event+0x560/0x560 [ 705.237770][ T7370] ? irq_exit_rcu+0x9/0x10 [ 705.242181][ T7370] ? __this_cpu_preempt_check+0x13/0x20 [ 705.247913][ T7370] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 705.254404][ T7370] __perf_event_overflow+0x1b3/0x340 [ 705.260032][ T7370] perf_swevent_event+0x2f7/0x530 [ 705.265247][ T7370] ___perf_sw_event+0x3aa/0x4d0 [ 705.270712][ T7370] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 705.277365][ T7370] ? __irq_exit_rcu+0x40/0x150 [ 705.282528][ T7370] ? __irq_exit_rcu+0x40/0x150 [ 705.287649][ T7370] ? irq_exit_rcu+0x9/0x10 [ 705.292265][ T7370] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 705.298078][ T7370] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 705.304549][ T7370] __perf_sw_event+0x134/0x270 [ 705.309363][ T7370] do_user_addr_fault+0xc76/0xc90 [ 705.314403][ T7370] ? kvm_sched_clock_read+0x18/0x40 [ 705.319678][ T7370] ? do_kern_addr_fault+0x80/0x80 [ 705.324717][ T7370] ? sched_clock_cpu+0x1b/0x3d0 [ 705.329600][ T7370] ? sched_clock+0x3a/0x40 [ 705.334019][ T7370] ? sched_clock_cpu+0x1b/0x3d0 [ 705.339213][ T7370] exc_page_fault+0x5a/0xc0 [ 705.343830][ T7370] asm_exc_page_fault+0x1e/0x30 [ 705.348770][ T7370] RIP: 0010:__get_user_nocheck_1+0x6/0x10 [ 705.354578][ T7370] Code: d0 73 64 48 19 d2 48 21 d0 0f 01 cb 48 8b 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb 0f ae e8 <0f> b6 10 31 c0 0f 01 ca c3 90 0f 01 cb 0f ae e8 0f b7 10 31 c0 0f [ 705.374851][ T7370] RSP: 0018:ffffc90000e17a40 EFLAGS: 00050287 [ 705.381117][ T7370] RAX: 000020000059517f RBX: 0000000000000000 RCX: ffff88810fcd4f00 [ 705.390205][ T7370] RDX: 0000000000000002 RSI: 00000000000000ff RDI: 0000000000001000 [ 705.398727][ T7370] RBP: ffffc90000e17a90 R08: ffff88810fcd4f00 R09: 0000000000000002 [ 705.407247][ T7370] R10: 0000000000000040 R11: 0000000000000002 R12: 000020000059517f [ 705.415234][ T7370] R13: 00000000000000ff R14: 0000200000595180 R15: 00000000ffffffff [ 705.423220][ T7370] ? iov_iter_fault_in_readable+0x19f/0x320 [ 705.429533][ T7370] generic_perform_write+0x1ab/0x540 [ 705.434851][ T7370] ? grab_cache_page_write_begin+0xb0/0xb0 [ 705.440664][ T7370] ? file_remove_privs+0x5b0/0x5b0 [ 705.446055][ T7370] __generic_file_write_iter+0x24b/0x480 [ 705.451964][ T7370] ? generic_write_checks+0x3b3/0x480 [ 705.457362][ T7370] generic_file_write_iter+0xa9/0x1d0 [ 705.462812][ T7370] vfs_write+0x758/0xdc0 [ 705.467051][ T7370] ? kernel_write+0x3c0/0x3c0 [ 705.471829][ T7370] ? __irq_exit_rcu+0x40/0x150 [ 705.476767][ T7370] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 705.483004][ T7370] ksys_write+0x149/0x250 [ 705.487629][ T7370] ? __ia32_sys_read+0x90/0x90 [ 705.492580][ T7370] ? __kasan_check_read+0x11/0x20 [ 705.497638][ T7370] __x64_sys_write+0x7b/0x90 [ 705.502251][ T7370] do_syscall_64+0x31/0x40 [ 705.506810][ T7370] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 705.512820][ T7370] RIP: 0033:0x7f2b82c28819 [ 705.517360][ T7370] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 705.537135][ T7370] RSP: 002b:00007f2b81683028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 705.546376][ T7370] RAX: ffffffffffffffda RBX: 00007f2b82ea1fa0 RCX: 00007f2b82c28819 [ 705.554656][ T7370] RDX: 0000000013bb711e RSI: 0000200000000180 RDI: 0000000000000009 [ 705.562736][ T7370] RBP: 00007f2b82cbec91 R08: 0000000000000000 R09: 0000000000000000 [ 705.571621][ T7370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 705.579785][ T7370] R13: 00007f2b82ea2038 R14: 00007f2b82ea1fa0 R15: 00007ffcdc1304e8 [ 705.588110][ T7370] Modules linked in: [ 705.592694][ T7370] ---[ end trace 0f514586a2af7554 ]--- [ 705.598649][ T7370] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 705.605017][ T7370] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 705.608023][ T24] audit: type=1400 audit(1776502331.060:181): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 705.625007][ T7370] RSP: 0018:ffffc90000e17400 EFLAGS: 00010202 [ 705.653745][ T7370] RAX: 0000000000000004 RBX: 1ffff11026a64d79 RCX: 0000000000080000 [ 705.661864][ T7370] RDX: ffffc90005021000 RSI: 000000000007f479 RDI: 000000000007f47a [ 705.670068][ T7370] RBP: ffffc90000e17500 R08: ffffffff86e79048 R09: ffffffff86e79058 [ 705.674638][ T24] audit: type=1400 audit(1776502331.060:182): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 705.678259][ T7370] R10: ffffffff86e7905c R11: ffffffff86e79043 R12: 000000002284951f [ 705.678269][ T7370] R13: 0000000000000020 R14: 1ffff920001c2e88 R15: dffffc0000000000 [ 705.678280][ T7370] FS: 00007f2b816836c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 705.678288][ T7370] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 705.678296][ T7370] CR2: 000020000059517f CR3: 00000001115ad000 CR4: 00000000003506a0 [ 705.678308][ T7370] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 705.678316][ T7370] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 705.678332][ T7370] Kernel panic - not syncing: Fatal exception [ 705.703319][ T24] audit: type=1400 audit(1776502331.060:183): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 705.708965][ T7370] Kernel Offset: disabled [ 705.791006][ T7370] Rebooting in 86400 seconds..