last executing test programs: 9.38775981s ago: executing program 2 (id=941): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r4) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1201, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r6, 0x15, 0x1, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r7, r8, 0x2, 0x2, 0x0, @void, @value}, 0x10) 9.338678891s ago: executing program 2 (id=942): perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="611528000000000061138c0000000000bfa00000000000001503000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x54) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x22) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x6, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0xd, 0x4, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x71, &(0x7f0000000180)=""/113, 0x41000, 0x0, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000200)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x2, 0xad0, 0x7f}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000002c0)=[r2, r3, r1, r1], &(0x7f0000000300)=[{0x2, 0x3, 0xe, 0x6}, {0x1, 0x4, 0xa, 0x1}, {0x5, 0x4, 0x6, 0x2}, {0x3, 0x4, 0x10, 0x3}, {0x3, 0x4, 0x4, 0x2}, {0x2, 0x2, 0x2, 0x7}, {0x2, 0x5, 0xd, 0x9}, {0x3, 0x3, 0x0, 0xa}, {0x2, 0x1, 0x2, 0x3}], 0x10, 0x3, @void, @value}, 0x94) 9.247741452s ago: executing program 2 (id=943): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xd8, &(0x7f0000000300)=""/216, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 5.563886167s ago: executing program 2 (id=943): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xd8, &(0x7f0000000300)=""/216, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4.792454649s ago: executing program 3 (id=974): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x2, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.553362262s ago: executing program 3 (id=976): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYRES8=r0], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x6a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) 4.108486519s ago: executing program 3 (id=979): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20572, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20572, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='sys_exit\x00'}, 0x18) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB="00000000089d6db1d49796e9ee00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYRES16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYRES16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x18000000000002a0, 0xeff, 0x7, &(0x7f0000001240)="b9ff03076804268c989e14f088a8657986dd", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.842135743s ago: executing program 4 (id=983): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x40f00, 0x61, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r6, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000000000000110100000c000000100000000009000001000000020000009806c55f7a319001153dc0730a103cf62bd934a7628466e7181c6507bbed1fc9f933b42bf022d6e90f94267c4a6a176cbc323a9a50bbd3cb7e464ff591460b276078e43b913482c3537264b0519d27c70801cce62ed6c83c9e08ee2f827b78a64fb1299900cbd16bd74cfb309e6fe84bd21acea52a7595c9e5cc9f7dd42686fac16ae0fce099a1eb198fdd8147294816fbd655e5a08cb0c46c8de9fab9aafbed5bf586f8514f8e"], 0x20}, 0x20000001) r7 = gettid() write$cgroup_pid(r5, &(0x7f0000000080)=r7, 0xfffffdad) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) close(r9) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f0000000440)='./file0\x00', 0x0, 0x4}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) close(r3) r10 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r11 = syz_clone(0x83000, 0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)="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") perf_event_open(0x0, r11, 0xb, r10, 0x0) perf_event_open(0x0, r11, 0x0, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.985654375s ago: executing program 2 (id=943): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xd8, &(0x7f0000000300)=""/216, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.735864669s ago: executing program 4 (id=985): openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e33"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f0000000bc0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x35}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.166020068s ago: executing program 4 (id=987): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0xfdef) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa8c, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40002, 0x1, @perf_config_ext={0x7fff, 0xe2}, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='qdisc_enqueue\x00', r6}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) close(r8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0x10, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r10, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r9}, &(0x7f0000000900), &(0x7f0000000940)=r8}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x8000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], 0x0, 0x3d, &(0x7f0000000440)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000480), &(0x7f0000000640), 0x8, 0xf4, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 1.868867972s ago: executing program 0 (id=992): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x22, &(0x7f0000000440)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) sendmsg$inet(r6, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYRES32=r10, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r4, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.833948393s ago: executing program 1 (id=993): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, 0x0, &(0x7f00000005c0)=""/147}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000580)=r0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x25ceca02, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305829, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0xff64, 0x0, 0xffffffffffffffff, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x15, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x106}}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x0, 0x5, 0xa, 0x1, 0x30, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @jmp={0x5, 0x1, 0x2, 0x9, 0x0, 0x50, 0x10}]}, &(0x7f0000000200)='GPL\x00', 0x6, 0x83, &(0x7f00000004c0)=""/131, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x9, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000007c0)=[r4, r5, 0xffffffffffffffff, r6, r7, r8, r9], &(0x7f0000000800)=[{0x0, 0x3, 0xd, 0xa}, {0x3, 0x4, 0x8, 0x4}, {0x3, 0x3, 0x0, 0x2}, {0x5, 0x2, 0x3, 0xa}, {0x1, 0x2, 0x7, 0x9}], 0x10, 0x8000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.740160804s ago: executing program 1 (id=994): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYRES8=r0], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x6a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) 1.617767266s ago: executing program 3 (id=995): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000000)={{}, &(0x7f0000000200), 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x20}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x100}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0x8, 0xfff8, 0x50}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000040000000000001d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) 1.267171141s ago: executing program 4 (id=996): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x3, 0x0, 0x0, 0x21780, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) 1.234919232s ago: executing program 1 (id=997): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xf, 0x8, &(0x7f00000017c0)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4000000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="b03a4e12d1a2b605c408f51b28d0000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d61, 0x0, @perf_config_ext={0x0, 0x80}, 0x0, 0x2, 0x0, 0x0, 0xffff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES64=r1, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2e, &(0x7f0000000040), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='rss_stat\x00', r6}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.221528282s ago: executing program 4 (id=998): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x0, 0xaa9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000300)={&(0x7f0000000280)=@x25, 0x80, &(0x7f0000000180)=[{&(0x7f0000000540)=""/94, 0x5e}], 0x1}, 0x10121) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1e00000003000000810000000600000002240000", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0200fdff020000000b00000000000000008000"/28], 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 1.125723323s ago: executing program 3 (id=999): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000c00)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x45) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x20) (async) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 1.010633495s ago: executing program 1 (id=1000): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000028000000bca30000000000002403000007feffff720af0ff0000020071a4f0ff000000001f030000000000002e0a0200000000002604fdffffff000e61142c00000000001d430000000000007a0a00fe0000001f6114300000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081504507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fd79153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5e7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927e2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28e6ce4d9791c73c2d37999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fcf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb7ed9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e2848890522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b2676c07bb0fd14020a66718378825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b6"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32], 0x48) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000040)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 1.009287415s ago: executing program 0 (id=1001): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400001802000000000000000000000400000003000000000100001301000000000000000000000d020000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2, 0x0, 0x0, @void, @value}, 0x20) 922.047986ms ago: executing program 0 (id=1002): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x4003, 0xfffffffffffffdf6, 0x0, 0x0, 0xc, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x35c5cc9d, 0xffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x30026, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}, 0x10024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x80047456, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb010018000000000000005700000057000000000000000500000000000002050000001000000000000002020000001000000000000006040000000f0000000000000b00000000010000000100", @ANYRESOCT, @ANYRESDEC], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) 831.868488ms ago: executing program 1 (id=1003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYRESHEX=r2, @ANYRES64=r0], 0xfdef) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0xa, &(0x7f00000007c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32, @ANYBLOB="00000000000000000f0800000000000018000000000000000000000002000000950000000000000064950c25cf33dcb17caf3b6645"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, 0x0) ioctl$TUNSETTXFILTER(r5, 0x401054d5, &(0x7f0000000380)=ANY=[]) r6 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xed00}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000009500160000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 481.949363ms ago: executing program 0 (id=1004): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, 0x0, &(0x7f00000005c0)=""/147}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000580)=r0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x25ceca02, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0xff64, 0x0, 0xffffffffffffffff, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x15, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x106}}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x0, 0x5, 0xa, 0x1, 0x30, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @jmp={0x5, 0x1, 0x2, 0x9, 0x0, 0x50, 0x10}]}, &(0x7f0000000200)='GPL\x00', 0x6, 0x83, &(0x7f00000004c0)=""/131, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x9, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000007c0)=[r4, r5, r6, r7, r8, r9, r10], &(0x7f0000000800)=[{0x0, 0x3, 0xd, 0xa}, {0x3, 0x4, 0x8, 0x4}, {0x3, 0x3, 0x0, 0x2}, {0x5, 0x2, 0x3, 0xa}, {0x1, 0x2, 0x7, 0x9}], 0x10, 0x8000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 474.192263ms ago: executing program 2 (id=943): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xd8, &(0x7f0000000300)=""/216, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 27.51529ms ago: executing program 0 (id=1005): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b000000000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000", @ANYBLOB="0000000000000000b702000003000200850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0\x00', 0x80) (async) socketpair(0x1e, 0x1, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) (async) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r3) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00\x00\x00\x00'], 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r4}, 0x10) (async) gettid() (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000540)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r5) 25.97428ms ago: executing program 1 (id=1006): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYRES8=r0], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x6a) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) 25.39999ms ago: executing program 3 (id=1007): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001b40)={{r1}, &(0x7f0000001b00), 0xfffffffffffffffc}, 0x20) sendmsg$unix(r2, 0x0, 0x40051) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10852, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r6 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x6, 0x5, 0xee, 0x7f, 0x0, 0x3, 0x40000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xeb1, 0x0, @perf_config_ext={0x5, 0x9c7}, 0x2000, 0x3ff, 0x8, 0x1, 0x7fffffffffffffff, 0x6, 0x4, 0x0, 0x2b, 0x0, 0xaa}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000e2ca71000000000000000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x800}, 0x0, 0x1ff, 0x0, 0x7, 0x7fffffff, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r7, 0xf) 24.83632ms ago: executing program 4 (id=1008): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x10400, 0x5, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x19, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x82, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x10001, 0x0, 0x1, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x4, 0x45, 0x1488, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0x1, 0xd47f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_ext={0x1c, 0xf, &(0x7f00000000c0)=@raw=[@map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x959}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000140)='GPL\x00', 0x3d1, 0x5e, &(0x7f0000000180)=""/94, 0x41000, 0x5a, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000640)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0xa, 0xffff, 0x2}, 0x10, 0x181bf, r4, 0xa, &(0x7f0000000900)=[r5, r6, r7, r8, 0x1, r9, r10], &(0x7f0000000940)=[{0x3, 0x1, 0x2, 0x6}, {0x2, 0x3, 0x7, 0x1}, {0x5, 0x2, 0xc, 0x9}, {0x4, 0x4, 0x3, 0xa}, {0x4, 0x4, 0x7, 0x1}, {0x3, 0x2, 0x0, 0x4}, {0x3, 0x5, 0x1, 0xa}, {0x0, 0x5, 0x0, 0x2}, {0x4, 0x4, 0xb}, {0x1, 0x3, 0x10, 0x1}], 0x10, 0x2, @void, @value}, 0x94) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (async) socketpair(0x1a, 0x6, 0xf, &(0x7f00000008c0)) 0s ago: executing program 0 (id=1009): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000028000000", @ANYRES32, @ANYBLOB="000000912bcbdeed9a356c372656eb89b88c4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b700000000000000950000000000001c"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000280)='flush_foreign\x00', r1}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x2000002f, &(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r8}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000880), 0x12) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 14.148060][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 14.148075][ T28] audit: type=1400 audit(1747301205.471:59): avc: denied { transition } for pid=223 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.152723][ T28] audit: type=1400 audit(1747301205.471:60): avc: denied { noatsecure } for pid=223 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.156187][ T28] audit: type=1400 audit(1747301205.471:61): avc: denied { write } for pid=223 comm="sh" path="pipe:[13934]" dev="pipefs" ino=13934 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.160174][ T28] audit: type=1400 audit(1747301205.471:62): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.163166][ T28] audit: type=1400 audit(1747301205.471:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.172' (ED25519) to the list of known hosts. [ 21.543082][ T28] audit: type=1400 audit(1747301212.861:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.544489][ T274] cgroup: Unknown subsys name 'net' [ 21.565765][ T28] audit: type=1400 audit(1747301212.861:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.593838][ T274] cgroup: Unknown subsys name 'devices' [ 21.594144][ T28] audit: type=1400 audit(1747301212.891:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.737424][ T274] cgroup: Unknown subsys name 'hugetlb' [ 21.743045][ T274] cgroup: Unknown subsys name 'rlimit' [ 21.879524][ T28] audit: type=1400 audit(1747301213.201:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.903487][ T28] audit: type=1400 audit(1747301213.201:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.927437][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.928668][ T28] audit: type=1400 audit(1747301213.201:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.960088][ T28] audit: type=1400 audit(1747301213.261:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.977696][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.985772][ T28] audit: type=1400 audit(1747301213.261:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.020165][ T28] audit: type=1400 audit(1747301213.301:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.045681][ T28] audit: type=1400 audit(1747301213.301:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.440605][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.447794][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.455386][ T283] device bridge_slave_0 entered promiscuous mode [ 23.462352][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.469460][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.476995][ T283] device bridge_slave_1 entered promiscuous mode [ 23.526279][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.533331][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.540854][ T282] device bridge_slave_0 entered promiscuous mode [ 23.551229][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.558344][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.565806][ T284] device bridge_slave_0 entered promiscuous mode [ 23.578849][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.586092][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.593653][ T282] device bridge_slave_1 entered promiscuous mode [ 23.600405][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.607464][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.615059][ T286] device bridge_slave_0 entered promiscuous mode [ 23.621920][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.629030][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.636501][ T284] device bridge_slave_1 entered promiscuous mode [ 23.658398][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.665488][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.672969][ T286] device bridge_slave_1 entered promiscuous mode [ 23.686747][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.693806][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.701376][ T285] device bridge_slave_0 entered promiscuous mode [ 23.712026][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.719246][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.726735][ T285] device bridge_slave_1 entered promiscuous mode [ 23.954440][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.961521][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.968839][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.975879][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.990569][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.997659][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.004993][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.012042][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.023430][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.030558][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.066774][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.073853][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.081176][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.088246][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.106192][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.113262][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.120585][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.127629][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.136578][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.143797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.151787][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.159432][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.167120][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.174299][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.181736][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.189054][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.196318][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.203524][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.231246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.239201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.247544][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.254585][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.262367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.270823][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.277893][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.285407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.293603][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.300777][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.336762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.345306][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.352370][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.359926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.368238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.375749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.384048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.392302][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.399357][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.406949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.415235][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.422258][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.429840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.437847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.468338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.476923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.484459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.493203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.501925][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.509030][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.516895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.525384][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.533571][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.540647][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.558112][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.566396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.574377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.582695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.590991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.599449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.622661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.631077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.639236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.648055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.656737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.665230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.686966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.694620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.702256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.710599][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.719105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.727758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.736076][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.743108][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.750655][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.759041][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.767340][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.774362][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.781971][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.790128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.800712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.808297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.815840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.823914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.835832][ T284] device veth0_vlan entered promiscuous mode [ 24.850235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.858822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.867555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.876173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.884505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.893171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.901815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.909949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.918198][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.925838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.939790][ T286] device veth0_vlan entered promiscuous mode [ 24.946736][ T283] device veth0_vlan entered promiscuous mode [ 24.953017][ T282] device veth0_vlan entered promiscuous mode [ 24.959884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.968176][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.976197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.983627][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.991623][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.999787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.008014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.015609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.023652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.031985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.047437][ T284] device veth1_macvtap entered promiscuous mode [ 25.055294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.063615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.072029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.095202][ T286] device veth1_macvtap entered promiscuous mode [ 25.102713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.111488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.120414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.129165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.137829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.146336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.156368][ T283] device veth1_macvtap entered promiscuous mode [ 25.170202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.178926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.187361][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.208617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.217376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.217847][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 25.226423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.241056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.250342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.258814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.269899][ T282] device veth1_macvtap entered promiscuous mode [ 25.286252][ T285] device veth0_vlan entered promiscuous mode [ 25.309704][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.319764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.328285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.336249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.344589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.353239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.361747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.378060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.386553][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.395446][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.409759][ T285] device veth1_macvtap entered promiscuous mode [ 25.488869][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.504968][ C1] hrtimer: interrupt took 37354 ns [ 25.517620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.552113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.573505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.549581][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 26.549599][ T28] audit: type=1400 audit(1747301217.871:112): avc: denied { create } for pid=341 comm="syz.3.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 26.894308][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.901665][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.965165][ T28] audit: type=1400 audit(1747301218.281:113): avc: denied { create } for pid=354 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.127409][ T358] device bridge_slave_1 left promiscuous mode [ 27.154321][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.191617][ T358] device bridge_slave_0 left promiscuous mode [ 27.208782][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.529408][ T369] device wg2 entered promiscuous mode [ 28.290066][ T28] audit: type=1400 audit(1747301219.611:114): avc: denied { relabelfrom } for pid=376 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.441354][ T28] audit: type=1400 audit(1747301219.611:115): avc: denied { relabelto } for pid=376 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.586233][ T390] device wg2 left promiscuous mode [ 28.658132][ T392] device wg2 entered promiscuous mode [ 28.710796][ T394] device wg2 entered promiscuous mode [ 28.829404][ T396] device wg2 left promiscuous mode [ 28.895309][ T396] device wg2 entered promiscuous mode [ 29.005037][ T28] audit: type=1400 audit(1747301220.321:116): avc: denied { create } for pid=395 comm="syz.4.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.691518][ T28] audit: type=1400 audit(1747301221.011:117): avc: denied { cpu } for pid=417 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.795148][ T28] audit: type=1400 audit(1747301221.111:118): avc: denied { write } for pid=417 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.461531][ T28] audit: type=1400 audit(1747301221.781:119): avc: denied { create } for pid=440 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 30.717870][ T441] device veth1_macvtap left promiscuous mode [ 30.808718][ T444] device veth0_vlan left promiscuous mode [ 30.829382][ T444] device veth0_vlan entered promiscuous mode [ 30.872128][ T28] audit: type=1400 audit(1747301222.191:120): avc: denied { create } for pid=440 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 30.997740][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.033859][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.102671][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.835898][ T458] device wg2 left promiscuous mode [ 31.888538][ T460] device wg2 entered promiscuous mode [ 31.954664][ T461] device pim6reg1 entered promiscuous mode [ 32.008770][ T466] device wg2 left promiscuous mode [ 32.113862][ T467] device wg2 entered promiscuous mode [ 33.975835][ T506] device wg2 entered promiscuous mode [ 34.576244][ T527] device wg2 left promiscuous mode [ 34.610840][ T527] device wg2 entered promiscuous mode [ 35.030891][ T539] device wg2 entered promiscuous mode [ 35.436954][ T28] audit: type=1400 audit(1747301226.761:121): avc: denied { create } for pid=544 comm="syz.2.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 35.544297][ T28] audit: type=1400 audit(1747301226.791:122): avc: denied { create } for pid=544 comm="syz.2.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.896387][ T559] device wg2 left promiscuous mode [ 35.942104][ T559] device wg2 entered promiscuous mode [ 37.457860][ T600] bond_slave_1: mtu less than device minimum [ 38.417336][ T653] device wg2 left promiscuous mode [ 38.457356][ T653] device wg2 entered promiscuous mode [ 38.605272][ T655] device sit0 entered promiscuous mode [ 38.842909][ T665] device pim6reg1 entered promiscuous mode [ 38.905044][ T669] device sit0 left promiscuous mode [ 39.303027][ T28] audit: type=1400 audit(1747301230.621:123): avc: denied { create } for pid=664 comm="syz.2.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 40.737988][ T726] device syzkaller0 entered promiscuous mode [ 40.802301][ T24] syzkaller0: tun_net_xmit 48 [ 40.863412][ T735] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 41.057011][ T738] device syzkaller0 entered promiscuous mode [ 41.229337][ T28] audit: type=1400 audit(1747301232.551:124): avc: denied { create } for pid=752 comm="syz.3.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 42.267817][ T784] GPL: port 1(erspan0) entered blocking state [ 42.298067][ T784] GPL: port 1(erspan0) entered disabled state [ 42.348548][ T784] device erspan0 entered promiscuous mode [ 42.382374][ T788] GPL: port 1(erspan0) entered blocking state [ 42.388685][ T788] GPL: port 1(erspan0) entered forwarding state [ 43.096598][ T805] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.105170][ T805] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.519784][ T710] syz.2.118 (710) used greatest stack depth: 22208 bytes left [ 44.775801][ T859] device wg2 left promiscuous mode [ 44.902276][ T28] audit: type=1400 audit(1747301236.201:125): avc: denied { create } for pid=870 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 44.945387][ T28] audit: type=1400 audit(1747301236.271:126): avc: denied { create } for pid=870 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 45.156164][ T877] device wg2 entered promiscuous mode [ 45.522280][ T887] device veth0_vlan left promiscuous mode [ 45.570108][ T887] device veth0_vlan entered promiscuous mode [ 45.931292][ T898] device sit0 entered promiscuous mode [ 46.285063][ T28] audit: type=1400 audit(1747301237.601:127): avc: denied { create } for pid=907 comm="syz.0.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 46.430409][ T28] audit: type=1400 audit(1747301237.641:128): avc: denied { write } for pid=907 comm="syz.0.175" name="ppp" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 47.798536][ T925] device wg2 left promiscuous mode [ 47.911227][ T926] device wg2 entered promiscuous mode [ 48.184166][ T939] device wg2 entered promiscuous mode [ 48.271713][ T948] device wg2 left promiscuous mode [ 48.311709][ T954] device wg2 entered promiscuous mode [ 48.328641][ T953] device sit0 entered promiscuous mode [ 48.668553][ T959] device pim6reg1 entered promiscuous mode [ 49.171091][ T982] device wg2 left promiscuous mode [ 49.188924][ T982] FAULT_INJECTION: forcing a failure. [ 49.188924][ T982] name failslab, interval 1, probability 0, space 0, times 1 [ 49.221078][ T982] CPU: 0 PID: 982 Comm: syz.0.194 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 49.230858][ T982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 49.240947][ T982] Call Trace: [ 49.244248][ T982] [ 49.247197][ T982] __dump_stack+0x21/0x24 [ 49.251580][ T982] dump_stack_lvl+0xee/0x150 [ 49.256200][ T982] ? __cfi_dump_stack_lvl+0x8/0x8 [ 49.261255][ T982] dump_stack+0x15/0x24 [ 49.265456][ T982] should_fail_ex+0x3d4/0x520 [ 49.270161][ T982] ? security_inode_alloc+0x33/0x120 [ 49.275477][ T982] __should_failslab+0xac/0xf0 [ 49.280263][ T982] should_failslab+0x9/0x20 [ 49.284796][ T982] kmem_cache_alloc+0x3b/0x330 [ 49.289590][ T982] ? slab_pre_alloc_hook+0x30/0x1e0 [ 49.294807][ T982] security_inode_alloc+0x33/0x120 [ 49.299952][ T982] inode_init_always+0x6fc/0x960 [ 49.304963][ T982] new_inode_pseudo+0xa2/0x1f0 [ 49.309756][ T982] __sock_create+0x12c/0x7c0 [ 49.314381][ T982] sock_create_kern+0x3b/0x50 [ 49.319095][ T982] udp_sock_create4+0xbb/0x4b0 [ 49.323907][ T982] ? __cfi_udp_sock_create4+0x10/0x10 [ 49.329313][ T982] ? __kasan_check_write+0x14/0x20 [ 49.334455][ T982] wg_socket_init+0x2ce/0x7f0 [ 49.339161][ T982] ? __cfi_wg_socket_init+0x10/0x10 [ 49.344382][ T982] ? __kasan_check_write+0x14/0x20 [ 49.349518][ T982] ? __cfi_wg_receive+0x10/0x10 [ 49.354386][ T982] ? __kasan_check_write+0x14/0x20 [ 49.359531][ T982] ? vlan_device_event+0x49e/0x1ba0 [ 49.364764][ T982] ? __cfi_mutex_lock+0x10/0x10 [ 49.369642][ T982] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 49.375989][ T982] ? ndisc_netdev_event+0x8e/0x620 [ 49.381143][ T982] wg_open+0x18a/0x300 [ 49.385677][ T982] __dev_open+0x363/0x4f0 [ 49.390133][ T982] ? dev_open+0x230/0x230 [ 49.394498][ T982] ? _raw_spin_unlock_bh+0x50/0x60 [ 49.399637][ T982] ? dev_set_rx_mode+0x223/0x2c0 [ 49.404599][ T982] ? __kasan_check_read+0x11/0x20 [ 49.409655][ T982] __dev_change_flags+0x21b/0x6b0 [ 49.414800][ T982] ? __cfi___dev_change_flags+0x10/0x10 [ 49.420836][ T982] dev_change_flags+0x88/0x1a0 [ 49.425646][ T982] dev_ifsioc+0x159/0xed0 [ 49.430003][ T982] ? dev_ioctl+0xd10/0xd10 [ 49.434530][ T982] ? __kasan_check_write+0x14/0x20 [ 49.439676][ T982] ? mutex_lock+0x8d/0x1a0 [ 49.444148][ T982] ? __cfi_mutex_lock+0x10/0x10 [ 49.449103][ T982] ? dev_get_by_name_rcu+0xe5/0x130 [ 49.454333][ T982] dev_ioctl+0x556/0xd10 [ 49.458866][ T982] sock_do_ioctl+0x23f/0x310 [ 49.463755][ T982] ? sock_show_fdinfo+0xb0/0xb0 [ 49.468835][ T982] ? selinux_file_ioctl+0x377/0x480 [ 49.474783][ T982] sock_ioctl+0x4d8/0x6e0 [ 49.479297][ T982] ? __cfi_sock_ioctl+0x10/0x10 [ 49.484266][ T982] ? __fget_files+0x2d5/0x330 [ 49.489161][ T982] ? security_file_ioctl+0x95/0xc0 [ 49.494402][ T982] ? __cfi_sock_ioctl+0x10/0x10 [ 49.499341][ T982] __se_sys_ioctl+0x12f/0x1b0 [ 49.504056][ T982] __x64_sys_ioctl+0x7b/0x90 [ 49.508695][ T982] x64_sys_call+0x58b/0x9a0 [ 49.513245][ T982] do_syscall_64+0x4c/0xa0 [ 49.517703][ T982] ? clear_bhb_loop+0x15/0x70 [ 49.522405][ T982] ? clear_bhb_loop+0x15/0x70 [ 49.527119][ T982] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.533051][ T982] RIP: 0033:0x7f611bd8e969 [ 49.537510][ T982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.557129][ T982] RSP: 002b:00007f611cc9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 49.565567][ T982] RAX: ffffffffffffffda RBX: 00007f611bfb5fa0 RCX: 00007f611bd8e969 [ 49.573568][ T982] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 49.581578][ T982] RBP: 00007f611cc9b090 R08: 0000000000000000 R09: 0000000000000000 [ 49.589580][ T982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.597579][ T982] R13: 0000000000000000 R14: 00007f611bfb5fa0 R15: 00007ffce142a298 [ 49.605589][ T982] [ 49.625067][ T982] socket: no more sockets [ 49.645048][ T982] wireguard: wg2: Could not create IPv4 socket [ 49.661559][ T982] device wg2 entered promiscuous mode [ 49.679805][ T977] device veth0_vlan left promiscuous mode [ 49.707489][ T977] device veth0_vlan entered promiscuous mode [ 49.742577][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.753764][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.762595][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.787146][ T985] device pim6reg1 entered promiscuous mode [ 50.057543][ T28] audit: type=1400 audit(1747301241.381:129): avc: denied { create } for pid=987 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 50.218297][ T988] device syzkaller0 entered promiscuous mode [ 51.202318][ T1030] device wg2 left promiscuous mode [ 51.213767][ T1031] FAULT_INJECTION: forcing a failure. [ 51.213767][ T1031] name failslab, interval 1, probability 0, space 0, times 0 [ 51.269785][ T1031] CPU: 0 PID: 1031 Comm: syz.4.208 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 51.279565][ T1031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 51.289630][ T1031] Call Trace: [ 51.292931][ T1031] [ 51.295904][ T1031] __dump_stack+0x21/0x24 [ 51.300267][ T1031] dump_stack_lvl+0xee/0x150 [ 51.304883][ T1031] ? __cfi_dump_stack_lvl+0x8/0x8 [ 51.309955][ T1031] dump_stack+0x15/0x24 [ 51.314149][ T1031] should_fail_ex+0x3d4/0x520 [ 51.318859][ T1031] ? sk_prot_alloc+0x5f/0x320 [ 51.323593][ T1031] __should_failslab+0xac/0xf0 [ 51.328405][ T1031] should_failslab+0x9/0x20 [ 51.332954][ T1031] kmem_cache_alloc+0x3b/0x330 [ 51.337736][ T1031] ? security_inode_alloc+0x33/0x120 [ 51.343042][ T1031] sk_prot_alloc+0x5f/0x320 [ 51.347642][ T1031] sk_alloc+0x3b/0x460 [ 51.351712][ T1031] ? __cfi__raw_spin_lock+0x10/0x10 [ 51.356912][ T1031] ? security_inode_alloc+0xd1/0x120 [ 51.362212][ T1031] inet_create+0x5db/0xf30 [ 51.366631][ T1031] __sock_create+0x39e/0x7c0 [ 51.371222][ T1031] sock_create_kern+0x3b/0x50 [ 51.375928][ T1031] udp_sock_create4+0xbb/0x4b0 [ 51.380704][ T1031] ? __cfi_udp_sock_create4+0x10/0x10 [ 51.386083][ T1031] ? sched_clock_cpu+0x6e/0x250 [ 51.390939][ T1031] ? __cfi_sched_clock_cpu+0x10/0x10 [ 51.396218][ T1031] wg_socket_init+0x2ce/0x7f0 [ 51.400901][ T1031] ? __cfi_wg_socket_init+0x10/0x10 [ 51.406095][ T1031] ? __kasan_check_write+0x14/0x20 [ 51.411210][ T1031] ? __cfi_wg_receive+0x10/0x10 [ 51.416068][ T1031] ? __kasan_check_write+0x14/0x20 [ 51.421206][ T1031] ? vlan_device_event+0x49e/0x1ba0 [ 51.426444][ T1031] ? __cfi_mutex_lock+0x10/0x10 [ 51.431331][ T1031] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 51.437662][ T1031] ? ndisc_netdev_event+0x8e/0x620 [ 51.442773][ T1031] wg_open+0x18a/0x300 [ 51.446836][ T1031] __dev_open+0x363/0x4f0 [ 51.451161][ T1031] ? dev_open+0x230/0x230 [ 51.455488][ T1031] ? _raw_spin_unlock_bh+0x50/0x60 [ 51.460627][ T1031] ? dev_set_rx_mode+0x223/0x2c0 [ 51.465573][ T1031] ? __kasan_check_read+0x11/0x20 [ 51.470619][ T1031] __dev_change_flags+0x21b/0x6b0 [ 51.475648][ T1031] ? __cfi___dev_change_flags+0x10/0x10 [ 51.481201][ T1031] dev_change_flags+0x88/0x1a0 [ 51.485962][ T1031] dev_ifsioc+0x159/0xed0 [ 51.490288][ T1031] ? dev_ioctl+0xd10/0xd10 [ 51.494696][ T1031] ? __mutex_lock_slowpath+0xe/0x10 [ 51.499889][ T1031] ? mutex_lock+0xf8/0x1a0 [ 51.504324][ T1031] ? __cfi_mutex_lock+0x10/0x10 [ 51.509183][ T1031] ? dev_get_by_name_rcu+0xe5/0x130 [ 51.514384][ T1031] dev_ioctl+0x556/0xd10 [ 51.518793][ T1031] sock_do_ioctl+0x23f/0x310 [ 51.523374][ T1031] ? sock_show_fdinfo+0xb0/0xb0 [ 51.528222][ T1031] ? selinux_file_ioctl+0x377/0x480 [ 51.533444][ T1031] sock_ioctl+0x4d8/0x6e0 [ 51.537782][ T1031] ? __cfi_sock_ioctl+0x10/0x10 [ 51.542647][ T1031] ? __fget_files+0x2d5/0x330 [ 51.547326][ T1031] ? security_file_ioctl+0x95/0xc0 [ 51.552433][ T1031] ? __cfi_sock_ioctl+0x10/0x10 [ 51.557272][ T1031] __se_sys_ioctl+0x12f/0x1b0 [ 51.561947][ T1031] __x64_sys_ioctl+0x7b/0x90 [ 51.566554][ T1031] x64_sys_call+0x58b/0x9a0 [ 51.571090][ T1031] do_syscall_64+0x4c/0xa0 [ 51.575602][ T1031] ? clear_bhb_loop+0x15/0x70 [ 51.580277][ T1031] ? clear_bhb_loop+0x15/0x70 [ 51.584965][ T1031] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 51.590891][ T1031] RIP: 0033:0x7fdec2b8e969 [ 51.595298][ T1031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.614893][ T1031] RSP: 002b:00007fdec3a82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.623308][ T1031] RAX: ffffffffffffffda RBX: 00007fdec2db6080 RCX: 00007fdec2b8e969 [ 51.631279][ T1031] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 51.639245][ T1031] RBP: 00007fdec3a82090 R08: 0000000000000000 R09: 0000000000000000 [ 51.647210][ T1031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.655170][ T1031] R13: 0000000000000000 R14: 00007fdec2db6080 R15: 00007ffe612f54d8 [ 51.663140][ T1031] [ 51.666950][ T1031] wireguard: wg2: Could not create IPv4 socket [ 51.677155][ T1031] device wg2 entered promiscuous mode [ 52.018235][ T1040] device veth0_vlan left promiscuous mode [ 52.029274][ T1040] device veth0_vlan entered promiscuous mode [ 52.115867][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.124396][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.165021][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.771662][ T1062] device veth0_vlan left promiscuous mode [ 52.797543][ T1062] device veth0_vlan entered promiscuous mode [ 53.016957][ T1078] syz.4.220[1078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.017063][ T1078] syz.4.220[1078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.070988][ T1081] device veth0_vlan left promiscuous mode [ 53.172911][ T1081] device veth0_vlan entered promiscuous mode [ 53.239166][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.258125][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.310705][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.288975][ T1115] FAULT_INJECTION: forcing a failure. [ 54.288975][ T1115] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 54.341206][ T1115] CPU: 0 PID: 1115 Comm: syz.4.232 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 54.351076][ T1115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 54.361240][ T1115] Call Trace: [ 54.364545][ T1115] [ 54.367578][ T1115] __dump_stack+0x21/0x24 [ 54.372000][ T1115] dump_stack_lvl+0xee/0x150 [ 54.378092][ T1115] ? __cfi_dump_stack_lvl+0x8/0x8 [ 54.383158][ T1115] dump_stack+0x15/0x24 [ 54.387433][ T1115] should_fail_ex+0x3d4/0x520 [ 54.392352][ T1115] should_fail+0xb/0x10 [ 54.396839][ T1115] should_fail_usercopy+0x1a/0x20 [ 54.401931][ T1115] _copy_from_user+0x1e/0xc0 [ 54.406645][ T1115] __sys_bpf+0x277/0x780 [ 54.410921][ T1115] ? bpf_link_show_fdinfo+0x320/0x320 [ 54.416339][ T1115] ? __cfi_sched_clock_cpu+0x10/0x10 [ 54.421672][ T1115] __x64_sys_bpf+0x7c/0x90 [ 54.426282][ T1115] x64_sys_call+0x488/0x9a0 [ 54.430828][ T1115] do_syscall_64+0x4c/0xa0 [ 54.435299][ T1115] ? clear_bhb_loop+0x15/0x70 [ 54.440013][ T1115] ? clear_bhb_loop+0x15/0x70 [ 54.444730][ T1115] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 54.450666][ T1115] RIP: 0033:0x7fdec2b8e969 [ 54.455121][ T1115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.475011][ T1115] RSP: 002b:00007fdec3aa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.483454][ T1115] RAX: ffffffffffffffda RBX: 00007fdec2db5fa0 RCX: 00007fdec2b8e969 [ 54.491454][ T1115] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0000000000000000 [ 54.499559][ T1115] RBP: 00007fdec3aa3090 R08: 0000000000000000 R09: 0000000000000000 [ 54.507558][ T1115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.515560][ T1115] R13: 0000000000000000 R14: 00007fdec2db5fa0 R15: 00007ffe612f54d8 [ 54.523567][ T1115] [ 55.927172][ T1162] device veth0_vlan left promiscuous mode [ 55.976842][ T1162] device veth0_vlan entered promiscuous mode [ 56.372635][ T1171] ±ÿÿÿ: renamed from team_slave_1 [ 56.384513][ T1174] device wg2 left promiscuous mode [ 56.583468][ T28] audit: type=1400 audit(1747301247.901:130): avc: denied { tracepoint } for pid=1177 comm="syz.4.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 57.823961][ T28] audit: type=1400 audit(1747301249.141:131): avc: denied { create } for pid=1197 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 58.572047][ T1158] syz.1.240 (1158) used greatest stack depth: 22112 bytes left [ 58.864760][ T1224] FAULT_INJECTION: forcing a failure. [ 58.864760][ T1224] name failslab, interval 1, probability 0, space 0, times 0 [ 58.889331][ T1219] bond_slave_1: mtu less than device minimum [ 58.945187][ T1224] CPU: 0 PID: 1224 Comm: syz.4.266 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 58.954970][ T1224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 58.965062][ T1224] Call Trace: [ 58.968801][ T1224] [ 58.971750][ T1224] __dump_stack+0x21/0x24 [ 58.976135][ T1224] dump_stack_lvl+0xee/0x150 [ 58.980754][ T1224] ? __cfi_dump_stack_lvl+0x8/0x8 [ 58.985803][ T1224] dump_stack+0x15/0x24 [ 58.989993][ T1224] should_fail_ex+0x3d4/0x520 [ 58.994752][ T1224] __should_failslab+0xac/0xf0 [ 58.999537][ T1224] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 59.005283][ T1224] should_failslab+0x9/0x20 [ 59.009840][ T1224] __kmem_cache_alloc_node+0x3d/0x2c0 [ 59.015249][ T1224] ? __kasan_slab_alloc+0x72/0x80 [ 59.020295][ T1224] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 59.026037][ T1224] kmalloc_trace+0x29/0xb0 [ 59.030491][ T1224] selinux_sk_alloc_security+0x7e/0x1a0 [ 59.036065][ T1224] security_sk_alloc+0x83/0xb0 [ 59.040856][ T1224] sk_prot_alloc+0x108/0x320 [ 59.045487][ T1224] sk_alloc+0x3b/0x460 [ 59.049583][ T1224] ? __kasan_slab_alloc+0x72/0x80 [ 59.054717][ T1224] tipc_sk_create+0xe6/0x1e60 [ 59.059432][ T1224] ? security_inode_alloc+0x33/0x120 [ 59.064750][ T1224] ? __kasan_check_write+0x14/0x20 [ 59.069886][ T1224] ? _raw_spin_lock+0x8e/0xe0 [ 59.074715][ T1224] ? __cfi__raw_spin_lock+0x10/0x10 [ 59.079954][ T1224] ? security_inode_alloc+0xd1/0x120 [ 59.085287][ T1224] ? inode_init_always+0x714/0x960 [ 59.090433][ T1224] __sock_create+0x39e/0x7c0 [ 59.095051][ T1224] __sys_socketpair+0x1a1/0x5b0 [ 59.099923][ T1224] __x64_sys_socketpair+0x9b/0xb0 [ 59.105034][ T1224] x64_sys_call+0x6e/0x9a0 [ 59.109474][ T1224] do_syscall_64+0x4c/0xa0 [ 59.113913][ T1224] ? clear_bhb_loop+0x15/0x70 [ 59.118614][ T1224] ? clear_bhb_loop+0x15/0x70 [ 59.123335][ T1224] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 59.129266][ T1224] RIP: 0033:0x7fdec2b8e969 [ 59.133703][ T1224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.153328][ T1224] RSP: 002b:00007fdec3aa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 59.161766][ T1224] RAX: ffffffffffffffda RBX: 00007fdec2db5fa0 RCX: 00007fdec2b8e969 [ 59.169752][ T1224] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 59.177736][ T1224] RBP: 00007fdec3aa3090 R08: 0000000000000000 R09: 0000000000000000 [ 59.185721][ T1224] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 59.193710][ T1224] R13: 0000000000000000 R14: 00007fdec2db5fa0 R15: 00007ffe612f54d8 [ 59.201720][ T1224] [ 59.782081][ T28] audit: type=1400 audit(1747301251.101:132): avc: denied { create } for pid=1260 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 59.838688][ T1263] FAULT_INJECTION: forcing a failure. [ 59.838688][ T1263] name failslab, interval 1, probability 0, space 0, times 0 [ 59.876329][ T1263] CPU: 0 PID: 1263 Comm: syz.1.279 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 59.886204][ T1263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 59.896736][ T1263] Call Trace: [ 59.900049][ T1263] [ 59.903017][ T1263] __dump_stack+0x21/0x24 [ 59.907397][ T1263] dump_stack_lvl+0xee/0x150 [ 59.912029][ T1263] ? __cfi_dump_stack_lvl+0x8/0x8 [ 59.914693][ T28] audit: type=1400 audit(1747301251.101:133): avc: denied { create } for pid=1260 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 59.917106][ T1263] ? avc_has_perm+0x158/0x240 [ 59.917139][ T1263] dump_stack+0x15/0x24 [ 59.945339][ T1263] should_fail_ex+0x3d4/0x520 [ 59.950060][ T1263] __should_failslab+0xac/0xf0 [ 59.954869][ T1263] should_failslab+0x9/0x20 [ 59.959428][ T1263] slab_pre_alloc_hook+0x30/0x1e0 [ 59.964507][ T1263] kmem_cache_alloc_lru+0x49/0x280 [ 59.969666][ T1263] ? sock_alloc_inode+0x28/0xc0 [ 59.974569][ T1263] sock_alloc_inode+0x28/0xc0 [ 59.979278][ T1263] ? __cfi_sock_alloc_inode+0x10/0x10 [ 59.984703][ T1263] new_inode_pseudo+0x70/0x1f0 [ 59.989535][ T1263] __sock_create+0x12c/0x7c0 [ 59.994201][ T1263] __sys_socketpair+0x218/0x5b0 [ 59.999141][ T1263] __x64_sys_socketpair+0x9b/0xb0 [ 60.004329][ T1263] x64_sys_call+0x6e/0x9a0 [ 60.008975][ T1263] do_syscall_64+0x4c/0xa0 [ 60.013592][ T1263] ? clear_bhb_loop+0x15/0x70 [ 60.018726][ T1263] ? clear_bhb_loop+0x15/0x70 [ 60.023631][ T1263] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.029553][ T1263] RIP: 0033:0x7f936d98e969 [ 60.034147][ T1263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.053778][ T1263] RSP: 002b:00007f936d7ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 60.062207][ T1263] RAX: ffffffffffffffda RBX: 00007f936dbb5fa0 RCX: 00007f936d98e969 [ 60.070189][ T1263] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 60.078157][ T1263] RBP: 00007f936d7ff090 R08: 0000000000000000 R09: 0000000000000000 [ 60.086136][ T1263] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 60.094144][ T1263] R13: 0000000000000000 R14: 00007f936dbb5fa0 R15: 00007ffcf6f404d8 [ 60.102125][ T1263] [ 60.112593][ T1263] socket: no more sockets [ 60.734417][ T1308] FAULT_INJECTION: forcing a failure. [ 60.734417][ T1308] name failslab, interval 1, probability 0, space 0, times 0 [ 60.803059][ T1308] CPU: 1 PID: 1308 Comm: syz.1.295 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 60.812839][ T1308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 60.823011][ T1308] Call Trace: [ 60.826390][ T1308] [ 60.829346][ T1308] __dump_stack+0x21/0x24 [ 60.833890][ T1308] dump_stack_lvl+0xee/0x150 [ 60.838622][ T1308] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.844159][ T1308] dump_stack+0x15/0x24 [ 60.848873][ T1308] should_fail_ex+0x3d4/0x520 [ 60.853878][ T1308] ? security_inode_alloc+0x33/0x120 [ 60.859254][ T1308] __should_failslab+0xac/0xf0 [ 60.864314][ T1308] should_failslab+0x9/0x20 [ 60.869134][ T1308] kmem_cache_alloc+0x3b/0x330 [ 60.874173][ T1308] security_inode_alloc+0x33/0x120 [ 60.879496][ T1308] inode_init_always+0x6fc/0x960 [ 60.884465][ T1308] new_inode_pseudo+0xa2/0x1f0 [ 60.889233][ T1308] __sock_create+0x12c/0x7c0 [ 60.893838][ T1308] __sys_socketpair+0x218/0x5b0 [ 60.898712][ T1308] __x64_sys_socketpair+0x9b/0xb0 [ 60.903765][ T1308] x64_sys_call+0x6e/0x9a0 [ 60.908206][ T1308] do_syscall_64+0x4c/0xa0 [ 60.912643][ T1308] ? clear_bhb_loop+0x15/0x70 [ 60.917322][ T1308] ? clear_bhb_loop+0x15/0x70 [ 60.922003][ T1308] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.927953][ T1308] RIP: 0033:0x7f936d98e969 [ 60.932413][ T1308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.952155][ T1308] RSP: 002b:00007f936d7ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 60.960788][ T1308] RAX: ffffffffffffffda RBX: 00007f936dbb5fa0 RCX: 00007f936d98e969 [ 60.969036][ T1308] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 60.977104][ T1308] RBP: 00007f936d7ff090 R08: 0000000000000000 R09: 0000000000000000 [ 60.985112][ T1308] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 60.993184][ T1308] R13: 0000000000000000 R14: 00007f936dbb5fa0 R15: 00007ffcf6f404d8 [ 61.001386][ T1308] [ 61.044798][ T1308] socket: no more sockets [ 61.200787][ T1313] device veth1_macvtap left promiscuous mode [ 61.325204][ T1313] device veth1_macvtap entered promiscuous mode [ 61.331910][ T1313] device macsec0 entered promiscuous mode [ 61.359005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.434519][ T1331] FAULT_INJECTION: forcing a failure. [ 61.434519][ T1331] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 61.448845][ T1331] CPU: 1 PID: 1331 Comm: syz.2.302 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 61.458947][ T1331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 61.469505][ T1331] Call Trace: [ 61.473081][ T1331] [ 61.476077][ T1331] __dump_stack+0x21/0x24 [ 61.480452][ T1331] dump_stack_lvl+0xee/0x150 [ 61.485097][ T1331] ? __cfi_dump_stack_lvl+0x8/0x8 [ 61.490247][ T1331] dump_stack+0x15/0x24 [ 61.494437][ T1331] should_fail_ex+0x3d4/0x520 [ 61.499190][ T1331] should_fail_alloc_page+0x61/0x90 [ 61.504433][ T1331] prepare_alloc_pages+0x148/0x5f0 [ 61.509592][ T1331] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 61.514840][ T1331] __alloc_pages+0x115/0x3a0 [ 61.519463][ T1331] ? __cfi___alloc_pages+0x10/0x10 [ 61.524877][ T1331] ? __cfi__raw_spin_lock+0x10/0x10 [ 61.530157][ T1331] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 61.536376][ T1331] __get_free_pages+0xe/0x30 [ 61.541010][ T1331] kasan_populate_vmalloc_pte+0x29/0x120 [ 61.546688][ T1331] __apply_to_page_range+0x8cc/0xc10 [ 61.552020][ T1331] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 61.558307][ T1331] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 61.564591][ T1331] apply_to_page_range+0x3b/0x50 [ 61.569573][ T1331] kasan_populate_vmalloc+0x60/0x70 [ 61.574825][ T1331] alloc_vmap_area+0x173e/0x1870 [ 61.579914][ T1331] ? vm_map_ram+0x930/0x930 [ 61.584458][ T1331] ? __kasan_kmalloc+0x95/0xb0 [ 61.589263][ T1331] ? kmalloc_node_trace+0x3d/0xb0 [ 61.594340][ T1331] __get_vm_area_node+0x160/0x360 [ 61.599407][ T1331] __vmalloc_node_range+0x326/0x13d0 [ 61.604737][ T1331] ? xsk_map_alloc+0x16d/0x280 [ 61.609533][ T1331] ? avc_has_perm_noaudit+0x2f4/0x460 [ 61.614945][ T1331] ? __cfi_selinux_capable+0x10/0x10 [ 61.620279][ T1331] ? __cfi___vmalloc_node_range+0x10/0x10 [ 61.626049][ T1331] ? cap_capable+0x1aa/0x230 [ 61.630677][ T1331] ? irqentry_exit+0x37/0x40 [ 61.635311][ T1331] ? security_capable+0x99/0xc0 [ 61.640177][ T1331] bpf_map_area_alloc+0xd7/0xe0 [ 61.645031][ T1331] ? xsk_map_alloc+0x16d/0x280 [ 61.649788][ T1331] xsk_map_alloc+0x16d/0x280 [ 61.654373][ T1331] map_create+0x49c/0xd80 [ 61.658718][ T1331] __sys_bpf+0x30b/0x780 [ 61.662963][ T1331] ? bpf_link_show_fdinfo+0x320/0x320 [ 61.668359][ T1331] ? __cfi_sched_clock_cpu+0x10/0x10 [ 61.673646][ T1331] __x64_sys_bpf+0x7c/0x90 [ 61.678066][ T1331] x64_sys_call+0x488/0x9a0 [ 61.682582][ T1331] do_syscall_64+0x4c/0xa0 [ 61.687118][ T1331] ? clear_bhb_loop+0x15/0x70 [ 61.691829][ T1331] ? clear_bhb_loop+0x15/0x70 [ 61.696550][ T1331] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 61.702453][ T1331] RIP: 0033:0x7f3a3c38e969 [ 61.706876][ T1331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.726866][ T1331] RSP: 002b:00007f3a3c1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.735297][ T1331] RAX: ffffffffffffffda RBX: 00007f3a3c5b5fa0 RCX: 00007f3a3c38e969 [ 61.743376][ T1331] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0000000000000000 [ 61.751452][ T1331] RBP: 00007f3a3c1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 61.759431][ T1331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.767405][ T1331] R13: 0000000000000000 R14: 00007f3a3c5b5fa0 R15: 00007fff62c91b68 [ 61.775645][ T1331] [ 61.794582][ T1327] device pim6reg1 entered promiscuous mode [ 61.996258][ T1352] device wg2 left promiscuous mode [ 62.007337][ T28] audit: type=1400 audit(1747301253.331:134): avc: denied { create } for pid=1351 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 62.039087][ T1352] device wg2 entered promiscuous mode [ 62.227509][ T1374] FAULT_INJECTION: forcing a failure. [ 62.227509][ T1374] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 62.245872][ T1374] CPU: 1 PID: 1374 Comm: syz.0.314 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 62.255740][ T1374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 62.265913][ T1374] Call Trace: [ 62.269211][ T1374] [ 62.272253][ T1374] __dump_stack+0x21/0x24 [ 62.276631][ T1374] dump_stack_lvl+0xee/0x150 [ 62.281264][ T1374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 62.286343][ T1374] dump_stack+0x15/0x24 [ 62.290624][ T1374] should_fail_ex+0x3d4/0x520 [ 62.295433][ T1374] should_fail_alloc_page+0x61/0x90 [ 62.300678][ T1374] prepare_alloc_pages+0x148/0x5f0 [ 62.305866][ T1374] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 62.311282][ T1374] ? __sys_bpf+0x30b/0x780 [ 62.316274][ T1374] ? x64_sys_call+0x488/0x9a0 [ 62.321596][ T1374] ? do_syscall_64+0x4c/0xa0 [ 62.326597][ T1374] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 62.333148][ T1374] __alloc_pages+0x115/0x3a0 [ 62.337867][ T1374] ? __cfi___alloc_pages+0x10/0x10 [ 62.343275][ T1374] ? __cfi__raw_spin_lock+0x10/0x10 [ 62.348507][ T1374] __get_free_pages+0xe/0x30 [ 62.353211][ T1374] kasan_populate_vmalloc_pte+0x29/0x120 [ 62.359121][ T1374] __apply_to_page_range+0x8cc/0xc10 [ 62.364777][ T1374] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 62.371205][ T1374] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 62.377633][ T1374] apply_to_page_range+0x3b/0x50 [ 62.382579][ T1374] kasan_populate_vmalloc+0x60/0x70 [ 62.387790][ T1374] alloc_vmap_area+0x173e/0x1870 [ 62.392749][ T1374] ? vm_map_ram+0x930/0x930 [ 62.397357][ T1374] ? __kasan_kmalloc+0x95/0xb0 [ 62.402144][ T1374] ? kmalloc_node_trace+0x3d/0xb0 [ 62.407188][ T1374] __get_vm_area_node+0x160/0x360 [ 62.412227][ T1374] __vmalloc_node_range+0x326/0x13d0 [ 62.417521][ T1374] ? xsk_map_alloc+0x16d/0x280 [ 62.422411][ T1374] ? avc_has_perm_noaudit+0x2f4/0x460 [ 62.427810][ T1374] ? __cfi_selinux_capable+0x10/0x10 [ 62.433400][ T1374] ? __cfi___vmalloc_node_range+0x10/0x10 [ 62.440614][ T1374] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 62.447499][ T1374] bpf_map_area_alloc+0xd7/0xe0 [ 62.453526][ T1374] ? xsk_map_alloc+0x16d/0x280 [ 62.458444][ T1374] xsk_map_alloc+0x16d/0x280 [ 62.463700][ T1374] map_create+0x49c/0xd80 [ 62.468508][ T1374] __sys_bpf+0x30b/0x780 [ 62.473582][ T1374] ? bpf_link_show_fdinfo+0x320/0x320 [ 62.479171][ T1374] ? __cfi_ksys_write+0x10/0x10 [ 62.484227][ T1374] ? debug_smp_processor_id+0x17/0x20 [ 62.490068][ T1374] __x64_sys_bpf+0x7c/0x90 [ 62.494525][ T1374] x64_sys_call+0x488/0x9a0 [ 62.499038][ T1374] do_syscall_64+0x4c/0xa0 [ 62.503474][ T1374] ? clear_bhb_loop+0x15/0x70 [ 62.508169][ T1374] ? clear_bhb_loop+0x15/0x70 [ 62.512865][ T1374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 62.518786][ T1374] RIP: 0033:0x7f611bd8e969 [ 62.523207][ T1374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.542905][ T1374] RSP: 002b:00007f611cc9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 62.551332][ T1374] RAX: ffffffffffffffda RBX: 00007f611bfb5fa0 RCX: 00007f611bd8e969 [ 62.559311][ T1374] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0000000000000000 [ 62.567346][ T1374] RBP: 00007f611cc9b090 R08: 0000000000000000 R09: 0000000000000000 [ 62.575408][ T1374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.583390][ T1374] R13: 0000000000000000 R14: 00007f611bfb5fa0 R15: 00007ffce142a298 [ 62.591370][ T1374] [ 62.993321][ T1391] device syzkaller0 entered promiscuous mode [ 63.000686][ T1395] device wg2 left promiscuous mode [ 63.037062][ T1395] device wg2 entered promiscuous mode [ 63.754043][ T28] audit: type=1400 audit(1747301255.071:135): avc: denied { ioctl } for pid=1430 comm="syz.1.332" path="socket:[19553]" dev="sockfs" ino=19553 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 64.051596][ T1435] device wg2 left promiscuous mode [ 64.082967][ T1435] device wg2 entered promiscuous mode [ 64.228665][ T1437] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.237147][ T1437] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.809319][ T1462] device wg2 left promiscuous mode [ 64.816722][ T1463] device wg2 entered promiscuous mode [ 64.866520][ T1470] FAULT_INJECTION: forcing a failure. [ 64.866520][ T1470] name failslab, interval 1, probability 0, space 0, times 0 [ 64.881382][ T1470] CPU: 0 PID: 1470 Comm: syz.1.343 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 64.891266][ T1470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 64.901520][ T1470] Call Trace: [ 64.904825][ T1470] [ 64.907771][ T1470] __dump_stack+0x21/0x24 [ 64.912305][ T1470] dump_stack_lvl+0xee/0x150 [ 64.917272][ T1470] ? __cfi_dump_stack_lvl+0x8/0x8 [ 64.922322][ T1470] dump_stack+0x15/0x24 [ 64.926509][ T1470] should_fail_ex+0x3d4/0x520 [ 64.931213][ T1470] __should_failslab+0xac/0xf0 [ 64.936092][ T1470] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 64.942099][ T1470] should_failslab+0x9/0x20 [ 64.946650][ T1470] __kmem_cache_alloc_node+0x3d/0x2c0 [ 64.952061][ T1470] ? __kasan_slab_alloc+0x72/0x80 [ 64.957119][ T1470] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 64.962956][ T1470] kmalloc_trace+0x29/0xb0 [ 64.967425][ T1470] selinux_sk_alloc_security+0x7e/0x1a0 [ 64.973007][ T1470] security_sk_alloc+0x83/0xb0 [ 64.977813][ T1470] sk_prot_alloc+0x108/0x320 [ 64.982813][ T1470] sk_alloc+0x3b/0x460 [ 64.987039][ T1470] ? __kasan_slab_alloc+0x72/0x80 [ 64.992097][ T1470] tipc_sk_create+0xe6/0x1e60 [ 64.997069][ T1470] ? security_inode_alloc+0x33/0x120 [ 65.002502][ T1470] ? __kasan_check_write+0x14/0x20 [ 65.007828][ T1470] ? _raw_spin_lock+0x8e/0xe0 [ 65.012796][ T1470] ? __cfi__raw_spin_lock+0x10/0x10 [ 65.018050][ T1470] ? security_inode_alloc+0xd1/0x120 [ 65.023464][ T1470] ? inode_init_always+0x714/0x960 [ 65.029072][ T1470] __sock_create+0x39e/0x7c0 [ 65.033701][ T1470] __sys_socketpair+0x218/0x5b0 [ 65.038618][ T1470] __x64_sys_socketpair+0x9b/0xb0 [ 65.043683][ T1470] x64_sys_call+0x6e/0x9a0 [ 65.048155][ T1470] do_syscall_64+0x4c/0xa0 [ 65.052706][ T1470] ? clear_bhb_loop+0x15/0x70 [ 65.058022][ T1470] ? clear_bhb_loop+0x15/0x70 [ 65.062849][ T1470] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 65.068957][ T1470] RIP: 0033:0x7f936d98e969 [ 65.073416][ T1470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.094229][ T1470] RSP: 002b:00007f936d7ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 65.102764][ T1470] RAX: ffffffffffffffda RBX: 00007f936dbb5fa0 RCX: 00007f936d98e969 [ 65.111315][ T1470] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 65.119681][ T1470] RBP: 00007f936d7ff090 R08: 0000000000000000 R09: 0000000000000000 [ 65.127999][ T1470] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 65.136185][ T1470] R13: 0000000000000000 R14: 00007f936dbb5fa0 R15: 00007ffcf6f404d8 [ 65.144644][ T1470] [ 66.346000][ T1490] device sit0 entered promiscuous mode [ 66.763445][ T1508] FAULT_INJECTION: forcing a failure. [ 66.763445][ T1508] name failslab, interval 1, probability 0, space 0, times 0 [ 66.794984][ T1508] CPU: 1 PID: 1508 Comm: syz.4.355 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 66.804770][ T1508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 66.814858][ T1508] Call Trace: [ 66.818181][ T1508] [ 66.821132][ T1508] __dump_stack+0x21/0x24 [ 66.825517][ T1508] dump_stack_lvl+0xee/0x150 [ 66.830142][ T1508] ? __cfi_dump_stack_lvl+0x8/0x8 [ 66.835202][ T1508] ? bpf_trace_run3+0x118/0x270 [ 66.840093][ T1508] dump_stack+0x15/0x24 [ 66.844294][ T1508] should_fail_ex+0x3d4/0x520 [ 66.849006][ T1508] __should_failslab+0xac/0xf0 [ 66.853806][ T1508] should_failslab+0x9/0x20 [ 66.858344][ T1508] slab_pre_alloc_hook+0x30/0x1e0 [ 66.863397][ T1508] ? __traceiter_timer_start+0xbc/0xe0 [ 66.869163][ T1508] kmem_cache_alloc_lru+0x49/0x280 [ 66.874309][ T1508] ? __d_alloc+0x34/0x6c0 [ 66.878682][ T1508] __d_alloc+0x34/0x6c0 [ 66.883474][ T1508] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 66.888647][ T1508] d_alloc_pseudo+0x1d/0x70 [ 66.893465][ T1508] alloc_file_pseudo+0xc8/0x1f0 [ 66.898349][ T1508] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 66.903929][ T1508] ? tipc_sk_finish_conn+0x576/0x7e0 [ 66.909344][ T1508] sock_alloc_file+0xba/0x270 [ 66.914236][ T1508] __sys_socketpair+0x2d5/0x5b0 [ 66.919212][ T1508] __x64_sys_socketpair+0x9b/0xb0 [ 66.924374][ T1508] x64_sys_call+0x6e/0x9a0 [ 66.928873][ T1508] do_syscall_64+0x4c/0xa0 [ 66.933323][ T1508] ? clear_bhb_loop+0x15/0x70 [ 66.938023][ T1508] ? clear_bhb_loop+0x15/0x70 [ 66.942719][ T1508] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 66.948640][ T1508] RIP: 0033:0x7fdec2b8e969 [ 66.953068][ T1508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.972684][ T1508] RSP: 002b:00007fdec3aa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 66.981113][ T1508] RAX: ffffffffffffffda RBX: 00007fdec2db5fa0 RCX: 00007fdec2b8e969 [ 66.989094][ T1508] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 66.997069][ T1508] RBP: 00007fdec3aa3090 R08: 0000000000000000 R09: 0000000000000000 [ 67.005039][ T1508] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 67.013008][ T1508] R13: 0000000000000000 R14: 00007fdec2db5fa0 R15: 00007ffe612f54d8 [ 67.021011][ T1508] [ 67.287670][ T1528] device veth0_vlan left promiscuous mode [ 67.302080][ T1528] device veth0_vlan entered promiscuous mode [ 67.322160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.338022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.346067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.667544][ T28] audit: type=1400 audit(1747301258.991:136): avc: denied { create } for pid=1542 comm="syz.2.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 67.855900][ T1549] FAULT_INJECTION: forcing a failure. [ 67.855900][ T1549] name failslab, interval 1, probability 0, space 0, times 0 [ 67.868697][ T1549] CPU: 0 PID: 1549 Comm: syz.0.367 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 67.878445][ T1549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 67.888530][ T1549] Call Trace: [ 67.891825][ T1549] [ 67.894771][ T1549] __dump_stack+0x21/0x24 [ 67.899129][ T1549] dump_stack_lvl+0xee/0x150 [ 67.903746][ T1549] ? __cfi_dump_stack_lvl+0x8/0x8 [ 67.908806][ T1549] ? bpf_trace_run3+0x118/0x270 [ 67.913687][ T1549] dump_stack+0x15/0x24 [ 67.917874][ T1549] should_fail_ex+0x3d4/0x520 [ 67.922561][ T1549] __should_failslab+0xac/0xf0 [ 67.927330][ T1549] should_failslab+0x9/0x20 [ 67.931922][ T1549] slab_pre_alloc_hook+0x30/0x1e0 [ 67.936948][ T1549] ? __traceiter_timer_start+0xbc/0xe0 [ 67.942418][ T1549] kmem_cache_alloc_lru+0x49/0x280 [ 67.947527][ T1549] ? __d_alloc+0x34/0x6c0 [ 67.951872][ T1549] __d_alloc+0x34/0x6c0 [ 67.956050][ T1549] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 67.961198][ T1549] d_alloc_pseudo+0x1d/0x70 [ 67.965759][ T1549] alloc_file_pseudo+0xc8/0x1f0 [ 67.970618][ T1549] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 67.976076][ T1549] ? tipc_sk_finish_conn+0x576/0x7e0 [ 67.981456][ T1549] sock_alloc_file+0xba/0x270 [ 67.986141][ T1549] __sys_socketpair+0x2d5/0x5b0 [ 67.991013][ T1549] __x64_sys_socketpair+0x9b/0xb0 [ 67.996060][ T1549] x64_sys_call+0x6e/0x9a0 [ 68.000486][ T1549] do_syscall_64+0x4c/0xa0 [ 68.004910][ T1549] ? clear_bhb_loop+0x15/0x70 [ 68.009590][ T1549] ? clear_bhb_loop+0x15/0x70 [ 68.014268][ T1549] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 68.020175][ T1549] RIP: 0033:0x7f611bd8e969 [ 68.024591][ T1549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.044205][ T1549] RSP: 002b:00007f611cc9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 68.052629][ T1549] RAX: ffffffffffffffda RBX: 00007f611bfb5fa0 RCX: 00007f611bd8e969 [ 68.060605][ T1549] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 68.068572][ T1549] RBP: 00007f611cc9b090 R08: 0000000000000000 R09: 0000000000000000 [ 68.076544][ T1549] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 68.084515][ T1549] R13: 0000000000000000 R14: 00007f611bfb5fa0 R15: 00007ffce142a298 [ 68.092491][ T1549] [ 68.556036][ T1570] device macsec0 entered promiscuous mode [ 68.721801][ T1588] device sit0 left promiscuous mode [ 68.888303][ T1592] device sit0 entered promiscuous mode [ 69.002134][ T1603] FAULT_INJECTION: forcing a failure. [ 69.002134][ T1603] name failslab, interval 1, probability 0, space 0, times 0 [ 69.015312][ T1603] CPU: 0 PID: 1603 Comm: syz.2.379 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 69.025169][ T1603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 69.035251][ T1603] Call Trace: [ 69.038567][ T1603] [ 69.041511][ T1603] __dump_stack+0x21/0x24 [ 69.045873][ T1603] dump_stack_lvl+0xee/0x150 [ 69.050500][ T1603] ? __cfi_dump_stack_lvl+0x8/0x8 [ 69.055562][ T1603] dump_stack+0x15/0x24 [ 69.059759][ T1603] should_fail_ex+0x3d4/0x520 [ 69.064472][ T1603] ? __alloc_file+0x28/0x2a0 [ 69.069096][ T1603] __should_failslab+0xac/0xf0 [ 69.073891][ T1603] should_failslab+0x9/0x20 [ 69.078451][ T1603] kmem_cache_alloc+0x3b/0x330 [ 69.083324][ T1603] ? __cfi__raw_spin_lock+0x10/0x10 [ 69.088583][ T1603] __alloc_file+0x28/0x2a0 [ 69.093068][ T1603] alloc_empty_file+0x97/0x180 [ 69.097874][ T1603] alloc_file+0x59/0x640 [ 69.102365][ T1603] alloc_file_pseudo+0x17a/0x1f0 [ 69.107369][ T1603] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 69.112874][ T1603] sock_alloc_file+0xba/0x270 [ 69.117688][ T1603] __sys_socketpair+0x2d5/0x5b0 [ 69.122764][ T1603] __x64_sys_socketpair+0x9b/0xb0 [ 69.127858][ T1603] x64_sys_call+0x6e/0x9a0 [ 69.132411][ T1603] do_syscall_64+0x4c/0xa0 [ 69.136965][ T1603] ? clear_bhb_loop+0x15/0x70 [ 69.141672][ T1603] ? clear_bhb_loop+0x15/0x70 [ 69.146650][ T1603] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 69.152583][ T1603] RIP: 0033:0x7f3a3c38e969 [ 69.157029][ T1603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.177018][ T1603] RSP: 002b:00007f3a3c1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 69.185609][ T1603] RAX: ffffffffffffffda RBX: 00007f3a3c5b5fa0 RCX: 00007f3a3c38e969 [ 69.193699][ T1603] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 69.201776][ T1603] RBP: 00007f3a3c1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 69.209778][ T1603] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 69.217777][ T1603] R13: 0000000000000000 R14: 00007f3a3c5b5fa0 R15: 00007fff62c91b68 [ 69.225779][ T1603] [ 69.728464][ T1628] device wg2 left promiscuous mode [ 69.890049][ T1629] device wg2 entered promiscuous mode [ 69.907538][ T1629] FAULT_INJECTION: forcing a failure. [ 69.907538][ T1629] name failslab, interval 1, probability 0, space 0, times 0 [ 69.975177][ T1629] CPU: 0 PID: 1629 Comm: syz.2.386 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 69.985313][ T1629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 69.995397][ T1629] Call Trace: [ 69.998699][ T1629] [ 70.001641][ T1629] __dump_stack+0x21/0x24 [ 70.005995][ T1629] dump_stack_lvl+0xee/0x150 [ 70.010615][ T1629] ? __cfi_dump_stack_lvl+0x8/0x8 [ 70.015672][ T1629] dump_stack+0x15/0x24 [ 70.019850][ T1629] should_fail_ex+0x3d4/0x520 [ 70.024557][ T1629] __should_failslab+0xac/0xf0 [ 70.029354][ T1629] should_failslab+0x9/0x20 [ 70.033890][ T1629] kmem_cache_alloc_node+0x42/0x340 [ 70.039110][ T1629] ? __alloc_skb+0xdf/0x7e0 [ 70.043637][ T1629] __alloc_skb+0xdf/0x7e0 [ 70.048088][ T1629] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 70.053421][ T1629] rtmsg_ifinfo+0x7a/0x130 [ 70.057957][ T1629] __dev_notify_flags+0xdb/0x500 [ 70.062924][ T1629] ? __cfi___dev_notify_flags+0x10/0x10 [ 70.068500][ T1629] ? __dev_change_flags+0x521/0x6b0 [ 70.073738][ T1629] ? __cfi___dev_change_flags+0x10/0x10 [ 70.079499][ T1629] dev_change_flags+0xe8/0x1a0 [ 70.084320][ T1629] dev_ifsioc+0x159/0xed0 [ 70.088862][ T1629] ? dev_ioctl+0xd10/0xd10 [ 70.093331][ T1629] ? __mutex_lock_slowpath+0xe/0x10 [ 70.098579][ T1629] ? mutex_lock+0xf8/0x1a0 [ 70.103061][ T1629] ? __cfi_mutex_lock+0x10/0x10 [ 70.107956][ T1629] ? dev_get_by_name_rcu+0xe5/0x130 [ 70.113386][ T1629] dev_ioctl+0x556/0xd10 [ 70.117747][ T1629] sock_do_ioctl+0x23f/0x310 [ 70.122476][ T1629] ? sock_show_fdinfo+0xb0/0xb0 [ 70.127475][ T1629] ? selinux_file_ioctl+0x377/0x480 [ 70.132716][ T1629] sock_ioctl+0x4d8/0x6e0 [ 70.137596][ T1629] ? __cfi_sock_ioctl+0x10/0x10 [ 70.142482][ T1629] ? __fget_files+0x2d5/0x330 [ 70.147203][ T1629] ? security_file_ioctl+0x95/0xc0 [ 70.152347][ T1629] ? __cfi_sock_ioctl+0x10/0x10 [ 70.157222][ T1629] __se_sys_ioctl+0x12f/0x1b0 [ 70.161937][ T1629] __x64_sys_ioctl+0x7b/0x90 [ 70.166568][ T1629] x64_sys_call+0x58b/0x9a0 [ 70.171103][ T1629] do_syscall_64+0x4c/0xa0 [ 70.175545][ T1629] ? clear_bhb_loop+0x15/0x70 [ 70.180243][ T1629] ? clear_bhb_loop+0x15/0x70 [ 70.185007][ T1629] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.191284][ T1629] RIP: 0033:0x7f3a3c38e969 [ 70.195718][ T1629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.216505][ T1629] RSP: 002b:00007f3a3c1de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 70.225150][ T1629] RAX: ffffffffffffffda RBX: 00007f3a3c5b6080 RCX: 00007f3a3c38e969 [ 70.234042][ T1629] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 70.242426][ T1629] RBP: 00007f3a3c1de090 R08: 0000000000000000 R09: 0000000000000000 [ 70.251435][ T1629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 70.260245][ T1629] R13: 0000000000000000 R14: 00007f3a3c5b6080 R15: 00007fff62c91b68 [ 70.268692][ T1629] [ 70.724034][ T1650] FAULT_INJECTION: forcing a failure. [ 70.724034][ T1650] name failslab, interval 1, probability 0, space 0, times 0 [ 70.744670][ T1650] CPU: 0 PID: 1650 Comm: syz.0.392 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 70.754894][ T1650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 70.764981][ T1650] Call Trace: [ 70.769007][ T1650] [ 70.772508][ T1650] __dump_stack+0x21/0x24 [ 70.777511][ T1650] dump_stack_lvl+0xee/0x150 [ 70.782131][ T1650] ? __cfi_dump_stack_lvl+0x8/0x8 [ 70.787189][ T1650] dump_stack+0x15/0x24 [ 70.791436][ T1650] should_fail_ex+0x3d4/0x520 [ 70.796168][ T1650] __should_failslab+0xac/0xf0 [ 70.801209][ T1650] should_failslab+0x9/0x20 [ 70.805742][ T1650] slab_pre_alloc_hook+0x30/0x1e0 [ 70.810820][ T1650] kmem_cache_alloc_lru+0x49/0x280 [ 70.816036][ T1650] ? __d_alloc+0x34/0x6c0 [ 70.820384][ T1650] __d_alloc+0x34/0x6c0 [ 70.824556][ T1650] ? alloc_file+0x4c2/0x640 [ 70.829084][ T1650] d_alloc_pseudo+0x1d/0x70 [ 70.833603][ T1650] alloc_file_pseudo+0xc8/0x1f0 [ 70.838463][ T1650] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 70.843937][ T1650] sock_alloc_file+0xba/0x270 [ 70.848631][ T1650] __sys_socketpair+0x3a9/0x5b0 [ 70.853527][ T1650] __x64_sys_socketpair+0x9b/0xb0 [ 70.858586][ T1650] x64_sys_call+0x6e/0x9a0 [ 70.863030][ T1650] do_syscall_64+0x4c/0xa0 [ 70.867577][ T1650] ? clear_bhb_loop+0x15/0x70 [ 70.872276][ T1650] ? clear_bhb_loop+0x15/0x70 [ 70.876969][ T1650] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.882885][ T1650] RIP: 0033:0x7f611bd8e969 [ 70.887312][ T1650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.906958][ T1650] RSP: 002b:00007f611cc9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 70.915428][ T1650] RAX: ffffffffffffffda RBX: 00007f611bfb5fa0 RCX: 00007f611bd8e969 [ 70.923419][ T1650] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 70.931401][ T1650] RBP: 00007f611cc9b090 R08: 0000000000000000 R09: 0000000000000000 [ 70.939386][ T1650] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 70.947368][ T1650] R13: 0000000000000000 R14: 00007f611bfb5fa0 R15: 00007ffce142a298 [ 70.955649][ T1650] [ 71.935911][ T1676] device wg2 entered promiscuous mode [ 72.784084][ T1692] device pim6reg1 entered promiscuous mode [ 72.994760][ T1709] device wg2 left promiscuous mode [ 73.070381][ T1711] device wg2 entered promiscuous mode [ 73.414374][ T28] audit: type=1400 audit(1747301264.731:137): avc: denied { create } for pid=1721 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 73.729643][ T1729] device sit0 left promiscuous mode [ 74.056187][ T1742] device wg2 left promiscuous mode [ 74.130573][ T1743] device wg2 entered promiscuous mode [ 74.140931][ T1743] FAULT_INJECTION: forcing a failure. [ 74.140931][ T1743] name failslab, interval 1, probability 0, space 0, times 0 [ 74.154300][ T1743] CPU: 1 PID: 1743 Comm: syz.4.424 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 74.164059][ T1743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 74.174137][ T1743] Call Trace: [ 74.177435][ T1743] [ 74.180391][ T1743] __dump_stack+0x21/0x24 [ 74.184955][ T1743] dump_stack_lvl+0xee/0x150 [ 74.189592][ T1743] ? __cfi_dump_stack_lvl+0x8/0x8 [ 74.194666][ T1743] ? __kasan_check_write+0x14/0x20 [ 74.199825][ T1743] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 74.205325][ T1743] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 74.211259][ T1743] dump_stack+0x15/0x24 [ 74.215461][ T1743] should_fail_ex+0x3d4/0x520 [ 74.220180][ T1743] __should_failslab+0xac/0xf0 [ 74.225065][ T1743] ? ____ip_mc_inc_group+0x1ab/0x860 [ 74.230461][ T1743] should_failslab+0x9/0x20 [ 74.235011][ T1743] __kmem_cache_alloc_node+0x3d/0x2c0 [ 74.240427][ T1743] ? ____ip_mc_inc_group+0x1ab/0x860 [ 74.245740][ T1743] kmalloc_trace+0x29/0xb0 [ 74.250199][ T1743] ____ip_mc_inc_group+0x1ab/0x860 [ 74.255345][ T1743] ip_mc_up+0x112/0x1f0 [ 74.259528][ T1743] inetdev_event+0xc7e/0x10e0 [ 74.264236][ T1743] ? __cfi_inetdev_event+0x10/0x10 [ 74.269470][ T1743] ? arp_netdev_event+0xd4/0x2b0 [ 74.274436][ T1743] raw_notifier_call_chain+0xa1/0x110 [ 74.279844][ T1743] __dev_notify_flags+0x28f/0x500 [ 74.285080][ T1743] ? __cfi___dev_notify_flags+0x10/0x10 [ 74.290659][ T1743] ? __dev_change_flags+0x521/0x6b0 [ 74.295897][ T1743] ? __cfi___dev_change_flags+0x10/0x10 [ 74.301486][ T1743] dev_change_flags+0xe8/0x1a0 [ 74.306279][ T1743] dev_ifsioc+0x159/0xed0 [ 74.310621][ T1743] ? dev_ioctl+0xd10/0xd10 [ 74.315033][ T1743] ? __mutex_lock_slowpath+0xe/0x10 [ 74.320241][ T1743] ? mutex_lock+0xf8/0x1a0 [ 74.324658][ T1743] ? __cfi_mutex_lock+0x10/0x10 [ 74.329515][ T1743] ? dev_get_by_name_rcu+0xe5/0x130 [ 74.334717][ T1743] dev_ioctl+0x556/0xd10 [ 74.338964][ T1743] sock_do_ioctl+0x23f/0x310 [ 74.343564][ T1743] ? sock_show_fdinfo+0xb0/0xb0 [ 74.348439][ T1743] ? selinux_file_ioctl+0x377/0x480 [ 74.353650][ T1743] sock_ioctl+0x4d8/0x6e0 [ 74.357983][ T1743] ? __cfi_sock_ioctl+0x10/0x10 [ 74.362851][ T1743] ? __fget_files+0x2d5/0x330 [ 74.367538][ T1743] ? security_file_ioctl+0x95/0xc0 [ 74.372645][ T1743] ? __cfi_sock_ioctl+0x10/0x10 [ 74.377490][ T1743] __se_sys_ioctl+0x12f/0x1b0 [ 74.382170][ T1743] __x64_sys_ioctl+0x7b/0x90 [ 74.386764][ T1743] x64_sys_call+0x58b/0x9a0 [ 74.391265][ T1743] do_syscall_64+0x4c/0xa0 [ 74.395689][ T1743] ? clear_bhb_loop+0x15/0x70 [ 74.400374][ T1743] ? clear_bhb_loop+0x15/0x70 [ 74.405061][ T1743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 74.410974][ T1743] RIP: 0033:0x7fdec2b8e969 [ 74.415387][ T1743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.434998][ T1743] RSP: 002b:00007fdec3a82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 74.443421][ T1743] RAX: ffffffffffffffda RBX: 00007fdec2db6080 RCX: 00007fdec2b8e969 [ 74.451394][ T1743] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 74.459373][ T1743] RBP: 00007fdec3a82090 R08: 0000000000000000 R09: 0000000000000000 [ 74.467358][ T1743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.475327][ T1743] R13: 0000000000000000 R14: 00007fdec2db6080 R15: 00007ffe612f54d8 [ 74.483302][ T1743] [ 74.749777][ T1753] pim6reg: tun_chr_ioctl cmd 2148553947 [ 74.906980][ T1757] @0Ù: renamed from bond_slave_1 [ 75.116745][ T1765] gretap0: refused to change device tx_queue_len [ 75.253219][ T1780] device sit0 left promiscuous mode [ 75.405927][ T1784] device sit0 entered promiscuous mode [ 75.640865][ T1792] device wg2 left promiscuous mode [ 75.660554][ T1792] device wg2 entered promiscuous mode [ 75.848670][ T1805] device sit0 entered promiscuous mode [ 77.613999][ T1878] device syzkaller0 entered promiscuous mode [ 77.848781][ T1889] device sit0 entered promiscuous mode [ 78.102096][ T1893] device wg2 left promiscuous mode [ 78.116915][ T1898] device wg2 entered promiscuous mode [ 78.148167][ T1898] FAULT_INJECTION: forcing a failure. [ 78.148167][ T1898] name failslab, interval 1, probability 0, space 0, times 0 [ 78.192855][ T1898] CPU: 0 PID: 1898 Comm: syz.0.469 Not tainted 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 78.202642][ T1898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 78.212724][ T1898] Call Trace: [ 78.216024][ T1898] [ 78.218974][ T1898] __dump_stack+0x21/0x24 [ 78.223343][ T1898] dump_stack_lvl+0xee/0x150 [ 78.227975][ T1898] ? __cfi_dump_stack_lvl+0x8/0x8 [ 78.233035][ T1898] dump_stack+0x15/0x24 [ 78.237229][ T1898] should_fail_ex+0x3d4/0x520 [ 78.241941][ T1898] __should_failslab+0xac/0xf0 [ 78.246730][ T1898] ? fib_create_info+0x902/0x2030 [ 78.251785][ T1898] should_failslab+0x9/0x20 [ 78.256424][ T1898] __kmem_cache_alloc_node+0x3d/0x2c0 [ 78.261823][ T1898] ? fib_create_info+0x902/0x2030 [ 78.266879][ T1898] __kmalloc+0xa1/0x1e0 [ 78.271071][ T1898] fib_create_info+0x902/0x2030 [ 78.275956][ T1898] ? __local_bh_enable_ip+0x58/0x80 [ 78.281182][ T1898] fib_table_insert+0x130/0x1ee0 [ 78.286182][ T1898] ? fib_new_table+0x10d/0x2b0 [ 78.290979][ T1898] fib_add_ifaddr+0x7f8/0xd20 [ 78.295687][ T1898] ? ____ip_mc_inc_group+0x1ab/0x860 [ 78.301004][ T1898] ? ip_mc_up+0x112/0x1f0 [ 78.305368][ T1898] ? inetdev_event+0xc7e/0x10e0 [ 78.310261][ T1898] ? __cfi_fib_add_ifaddr+0x10/0x10 [ 78.315493][ T1898] ? arp_mc_map+0x505/0x920 [ 78.320027][ T1898] ? __kasan_check_write+0x14/0x20 [ 78.325174][ T1898] ? igmp_group_added+0x213/0x830 [ 78.330230][ T1898] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 78.335733][ T1898] ? igmpv3_del_delrec+0x700/0x700 [ 78.340888][ T1898] ? __local_bh_enable_ip+0x58/0x80 [ 78.346205][ T1898] ? _raw_spin_unlock_bh+0x50/0x60 [ 78.351380][ T1898] ? inetdev_event+0xe17/0x10e0 [ 78.356271][ T1898] ? __cfi_inetdev_event+0x10/0x10 [ 78.361424][ T1898] fib_netdev_event+0x231/0x5b0 [ 78.366306][ T1898] raw_notifier_call_chain+0xa1/0x110 [ 78.371721][ T1898] __dev_notify_flags+0x28f/0x500 [ 78.376783][ T1898] ? __cfi___dev_notify_flags+0x10/0x10 [ 78.382366][ T1898] ? __dev_change_flags+0x521/0x6b0 [ 78.387598][ T1898] ? __cfi___dev_change_flags+0x10/0x10 [ 78.393184][ T1898] dev_change_flags+0xe8/0x1a0 [ 78.397990][ T1898] dev_ifsioc+0x159/0xed0 [ 78.402356][ T1898] ? dev_ioctl+0xd10/0xd10 [ 78.406792][ T1898] ? __mutex_lock_slowpath+0xe/0x10 [ 78.412022][ T1898] ? mutex_lock+0xf8/0x1a0 [ 78.416470][ T1898] ? __cfi_mutex_lock+0x10/0x10 [ 78.421360][ T1898] ? dev_get_by_name_rcu+0xe5/0x130 [ 78.426586][ T1898] dev_ioctl+0x556/0xd10 [ 78.430855][ T1898] sock_do_ioctl+0x23f/0x310 [ 78.435475][ T1898] ? sock_show_fdinfo+0xb0/0xb0 [ 78.440366][ T1898] ? selinux_file_ioctl+0x377/0x480 [ 78.445599][ T1898] sock_ioctl+0x4d8/0x6e0 [ 78.450041][ T1898] ? __cfi_sock_ioctl+0x10/0x10 [ 78.454921][ T1898] ? __fget_files+0x2d5/0x330 [ 78.459787][ T1898] ? security_file_ioctl+0x95/0xc0 [ 78.464927][ T1898] ? __cfi_sock_ioctl+0x10/0x10 [ 78.469812][ T1898] __se_sys_ioctl+0x12f/0x1b0 [ 78.474532][ T1898] __x64_sys_ioctl+0x7b/0x90 [ 78.479156][ T1898] x64_sys_call+0x58b/0x9a0 [ 78.483681][ T1898] do_syscall_64+0x4c/0xa0 [ 78.488133][ T1898] ? clear_bhb_loop+0x15/0x70 [ 78.492922][ T1898] ? clear_bhb_loop+0x15/0x70 [ 78.497623][ T1898] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.503543][ T1898] RIP: 0033:0x7f611bd8e969 [ 78.507977][ T1898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.527611][ T1898] RSP: 002b:00007f611cc7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 78.536053][ T1898] RAX: ffffffffffffffda RBX: 00007f611bfb6080 RCX: 00007f611bd8e969 [ 78.544048][ T1898] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 78.552043][ T1898] RBP: 00007f611cc7a090 R08: 0000000000000000 R09: 0000000000000000 [ 78.560066][ T1898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.568058][ T1898] R13: 0000000000000000 R14: 00007f611bfb6080 R15: 00007ffce142a298 [ 78.576064][ T1898] [ 78.709305][ T1911] device veth0_vlan left promiscuous mode [ 78.918091][ T1911] device veth0_vlan entered promiscuous mode [ 79.292189][ T28] audit: type=1400 audit(1747301270.611:138): avc: denied { create } for pid=1933 comm="syz.0.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 79.733678][ T1952] device sit0 entered promiscuous mode [ 79.910300][ T1965] device vlan1 entered promiscuous mode [ 80.647616][ T1979] device wg2 left promiscuous mode [ 80.676133][ T1977] device wg2 entered promiscuous mode [ 80.828927][ T1983] device wg2 left promiscuous mode [ 80.904845][ T1983] device wg2 entered promiscuous mode [ 81.955616][ T2008] device wg2 left promiscuous mode [ 81.999459][ T2008] device wg2 entered promiscuous mode [ 83.212479][ T2050] bond_slave_1: mtu greater than device maximum [ 83.278195][ T2056] device wg2 left promiscuous mode [ 84.386445][ T2121] device wg2 left promiscuous mode [ 84.545867][ T2128] device veth0_vlan left promiscuous mode [ 84.582867][ T2128] device veth0_vlan entered promiscuous mode [ 84.668244][ T1582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.683183][ T1582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.708455][ T1582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.109606][ T2140] syz.3.548 (2140) used obsolete PPPIOCDETACH ioctl [ 85.278541][ T2166] device wg2 left promiscuous mode [ 85.341771][ T2168] device wg2 entered promiscuous mode [ 85.771553][ T2183] device veth1_macvtap left promiscuous mode [ 85.778234][ T2183] device macsec0 left promiscuous mode [ 86.016499][ T2185] device veth1_macvtap entered promiscuous mode [ 86.039640][ T2185] device macsec0 entered promiscuous mode [ 86.561331][ T2193] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 86.564939][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 87.796637][ T2233] device wg2 left promiscuous mode [ 87.848383][ T2233] device wg2 entered promiscuous mode [ 88.827943][ T2277] syz.2.587 uses obsolete (PF_INET,SOCK_PACKET) [ 88.885458][ T2287] device wg2 left promiscuous mode [ 88.975663][ T2287] device wg2 entered promiscuous mode [ 89.012875][ T2291] device wg2 entered promiscuous mode [ 89.366988][ T2307] syz_tun: mtu less than device minimum [ 91.034645][ T2361] device wg2 left promiscuous mode [ 91.714239][ T2361] device wg2 entered promiscuous mode [ 91.749818][ T2376] device pim6reg1 entered promiscuous mode [ 92.630386][ T2388] device syzkaller0 entered promiscuous mode [ 92.922697][ T2397] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.288886][ T2414] device veth1_macvtap left promiscuous mode [ 93.561888][ T2410] device veth1_macvtap entered promiscuous mode [ 93.576919][ T2410] device macsec0 entered promiscuous mode [ 94.308397][ T2446] device wg2 left promiscuous mode [ 94.653306][ T2454] device syzkaller0 entered promiscuous mode [ 94.690294][ T2446] device wg2 entered promiscuous mode [ 95.330703][ T28] audit: type=1400 audit(1747301286.651:139): avc: denied { create } for pid=2469 comm="syz.3.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.782155][ T28] audit: type=1400 audit(1747301288.101:140): avc: denied { create } for pid=2514 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 97.215762][ T2534] device veth0_vlan left promiscuous mode [ 97.331340][ T2534] device veth0_vlan entered promiscuous mode [ 97.494775][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.503288][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.514211][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.190964][ T28] audit: type=1400 audit(1747301289.511:141): avc: denied { write } for pid=2550 comm="syz.3.662" name="cgroup.subtree_control" dev="cgroup2" ino=346 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 98.316737][ T2559] tap0: tun_chr_ioctl cmd 2147767517 [ 98.435186][ T28] audit: type=1400 audit(1747301289.511:142): avc: denied { open } for pid=2550 comm="syz.3.662" path="" dev="cgroup2" ino=346 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 99.246398][ T2588] device veth0_vlan left promiscuous mode [ 99.285358][ T2588] device veth0_vlan entered promiscuous mode [ 101.139565][ T28] audit: type=1400 audit(1747301292.461:143): avc: denied { read } for pid=2615 comm="syz.3.678" dev="nsfs" ino=4026532454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 101.244389][ T2630] device sit0 left promiscuous mode [ 101.254760][ T28] audit: type=1400 audit(1747301292.461:144): avc: denied { open } for pid=2615 comm="syz.3.678" path="pid:[4026532454]" dev="nsfs" ino=4026532454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 101.326455][ T2638] device sit0 entered promiscuous mode [ 101.476620][ T2635] Driver unsupported XDP return value 0 on prog (id 995) dev N/A, expect packet loss! [ 101.677275][ T2648] device sit0 left promiscuous mode [ 101.903512][ T2651] device sit0 entered promiscuous mode [ 103.103856][ T2685] device pim6reg1 entered promiscuous mode [ 103.297917][ T2695] device syzkaller0 entered promiscuous mode [ 106.044907][ C0] sched: RT throttling activated [ 109.103267][ T2813] device pim6reg1 entered promiscuous mode [ 109.199132][ T2816] device bridge0 entered promiscuous mode [ 109.652007][ T2828] device sit0 left promiscuous mode [ 109.964076][ T2829] device sit0 entered promiscuous mode [ 110.625103][ T2846] device sit0 left promiscuous mode [ 110.720635][ T2847] device sit0 entered promiscuous mode [ 111.327561][ T2852] device syzkaller0 entered promiscuous mode [ 111.585567][ T2858] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.746493][ T2867] device veth0_vlan left promiscuous mode [ 111.753413][ T2867] device veth0_vlan entered promiscuous mode [ 111.769151][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.777888][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.785884][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.861186][ T28] audit: type=1400 audit(1747301304.181:145): avc: denied { ioctl } for pid=2899 comm="syz.4.756" path="uts:[4026532292]" dev="nsfs" ino=4026532292 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 112.991226][ T28] audit: type=1400 audit(1747301304.281:146): avc: denied { create } for pid=2904 comm="syz.3.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 113.215625][ T2918] device sit0 left promiscuous mode [ 113.293531][ T2921] device bridge_slave_1 left promiscuous mode [ 113.308458][ T2921] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.391496][ T2921] device bridge_slave_0 left promiscuous mode [ 113.399046][ T2921] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.929695][ T2936] device sit0 entered promiscuous mode [ 114.793334][ T28] audit: type=1400 audit(1747301306.111:147): avc: denied { create } for pid=2994 comm="syz.2.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.909917][ T3028] device sit0 left promiscuous mode [ 115.965255][ T3029] device sit0 entered promiscuous mode [ 116.539322][ T3043] device wg2 entered promiscuous mode [ 116.808154][ T3058] device veth1_macvtap left promiscuous mode [ 116.948535][ T3061] device pim6reg1 entered promiscuous mode [ 117.139171][ T3066] device veth0_vlan left promiscuous mode [ 117.153731][ T3066] device veth0_vlan entered promiscuous mode [ 117.168466][ T1582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.180069][ T1582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.192968][ T1582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.460476][ T3079] syz.3.809[3079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.460578][ T3079] syz.3.809[3079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.470319][ T28] audit: type=1400 audit(1747301308.781:148): avc: denied { create } for pid=3078 comm="syz.3.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 117.528985][ T3079] syz.3.809[3079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.532312][ T3079] syz.3.809[3079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.096975][ T3097] device veth1_macvtap entered promiscuous mode [ 118.117296][ T3097] device macsec0 entered promiscuous mode [ 118.207042][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.605911][ T3144] device sit0 left promiscuous mode [ 119.768128][ T3152] device sit0 left promiscuous mode [ 119.855130][ T3157] device sit0 entered promiscuous mode [ 119.872298][ T28] audit: type=1400 audit(1747301311.191:149): avc: denied { create } for pid=3153 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 120.208667][ T3173] device wg2 left promiscuous mode [ 120.274984][ T3176] device wg2 entered promiscuous mode [ 124.687396][ T3315] device wg2 left promiscuous mode [ 124.740111][ T3315] device wg2 entered promiscuous mode [ 125.919721][ T3348] device pim6reg1 entered promiscuous mode [ 127.392201][ T28] audit: type=1400 audit(1747301318.701:150): avc: denied { create } for pid=3400 comm="syz.1.902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 128.957033][ T3432] device sit0 left promiscuous mode [ 132.337052][ T284] syz-executor (284) used greatest stack depth: 21760 bytes left [ 132.740389][ T3546] GPL: port 1(erspan0) entered blocking state [ 132.752314][ T3546] GPL: port 1(erspan0) entered disabled state [ 132.806674][ T3546] device erspan0 entered promiscuous mode [ 132.857156][ T3547] GPL: port 1(erspan0) entered blocking state [ 132.863312][ T3547] GPL: port 1(erspan0) entered forwarding state [ 132.908016][ T309] GPL: port 1(erspan0) entered disabled state [ 132.914817][ T309] device erspan0 left promiscuous mode [ 132.920567][ T309] GPL: port 1(erspan0) entered disabled state [ 133.010595][ T3550] syz.0.945[3550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.010679][ T3550] syz.0.945[3550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.203758][ T309] device veth1_macvtap left promiscuous mode [ 133.502267][ T3562] device veth1_macvtap entered promiscuous mode [ 133.510379][ T3562] device macsec0 entered promiscuous mode [ 133.551887][ T3570] device sit0 left promiscuous mode [ 133.748396][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.756405][ T3565] device sit0 entered promiscuous mode [ 133.854296][ T3548] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.861580][ T3548] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.869398][ T3548] device bridge_slave_0 entered promiscuous mode [ 133.941389][ T3548] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.948531][ T3548] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.956057][ T3548] device bridge_slave_1 entered promiscuous mode [ 134.069440][ T3593] device wg2 left promiscuous mode [ 134.112013][ T3593] device wg2 entered promiscuous mode [ 134.222678][ T28] audit: type=1400 audit(1747301325.541:151): avc: denied { create } for pid=3548 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 134.302756][ T28] audit: type=1400 audit(1747301325.591:152): avc: denied { write } for pid=3548 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 134.340227][ T28] audit: type=1400 audit(1747301325.591:153): avc: denied { read } for pid=3548 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 134.592806][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.611310][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.646404][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.665225][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.675227][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.682293][ T1583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.731179][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.749696][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.779435][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.795584][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.802660][ T1583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.871359][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.901455][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.972030][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.012848][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.034814][ T3614] device sit0 left promiscuous mode [ 135.080084][ T3615] device sit0 entered promiscuous mode [ 135.261628][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.285812][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.349688][ T3548] device veth0_vlan entered promiscuous mode [ 135.357380][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.368433][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.394631][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.422049][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.522344][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.532069][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.565480][ T3548] device veth1_macvtap entered promiscuous mode [ 135.589323][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.610531][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.626065][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.654398][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.826778][ T1585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.786234][ T3661] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.797296][ T3661] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.826290][ T3661] device bridge_slave_0 entered promiscuous mode [ 136.835214][ T3661] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.842350][ T3661] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.849959][ T3661] device bridge_slave_1 entered promiscuous mode [ 137.381573][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.389748][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.422799][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.441524][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.495667][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.502745][ T1583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.510235][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.524444][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.533042][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.540129][ T1583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.613437][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.638107][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.658281][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.666793][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.675760][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.751456][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 137.785736][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.837106][ T3661] device veth0_vlan entered promiscuous mode [ 137.909145][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 137.940106][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.965770][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.995536][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.071010][ T3661] device veth1_macvtap entered promiscuous mode [ 138.121516][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.144338][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.184760][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.315166][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.323635][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.357249][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.396980][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.805813][ T309] device bridge_slave_1 left promiscuous mode [ 138.815013][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.845488][ T309] device bridge_slave_0 left promiscuous mode [ 138.855162][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.892684][ T309] device veth1_macvtap left promiscuous mode [ 138.919099][ T309] device veth0_vlan left promiscuous mode [ 139.368328][ T3709] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.378783][ T3709] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.389450][ T3709] device bridge_slave_0 entered promiscuous mode [ 139.404661][ T3709] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.412181][ T3709] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.419938][ T3709] device bridge_slave_1 entered promiscuous mode [ 140.109815][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.129028][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.205046][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.264235][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.304558][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.311655][ T1583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.434819][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.444072][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.452557][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.459630][ T1583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.530919][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.540431][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.549504][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.575053][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.583825][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.620042][ T3709] device veth0_vlan entered promiscuous mode [ 140.633132][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.641712][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.668179][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.741593][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.791382][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.805788][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.821222][ T3709] device veth1_macvtap entered promiscuous mode [ 140.864345][ T309] device bridge_slave_1 left promiscuous mode [ 140.870535][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.878087][ T309] device bridge_slave_0 left promiscuous mode [ 140.884308][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.892732][ T309] device veth1_macvtap left promiscuous mode [ 140.899007][ T309] device veth0_vlan left promiscuous mode [ 140.993785][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.001579][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.009935][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.055761][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 141.064450][ T1583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready