last executing test programs: 1m3.101000006s ago: executing program 2 (id=318): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x3, 0xff, 0x5, 0x0, 0x6151, 0x61000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x6}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x8, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, 0x0, 0xfdef) 1m3.042140247s ago: executing program 2 (id=322): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="eaff0000000000000000f5ffffffffffffff00000000100000010000"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x37a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x500}, 0x1075, 0x4, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c0000000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x80000000}, 0x100000, 0x0, 0x81, 0x0, 0x0, 0xffff0000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'pimreg\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000007000000000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1m2.154622504s ago: executing program 2 (id=343): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x20a2560ddbfd0220}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 1m1.932297528s ago: executing program 2 (id=353): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, 0x0, &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, [@printk={@llu}, @call={0x85, 0x0, 0x0, 0x5}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xbc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r5, 0x0, 0x20}, 0x38) 1m0.875628688s ago: executing program 2 (id=370): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='+^\'$\x00') sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040004) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = gettid() r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0xcb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000640)=ANY=[@ANYRESDEC=r2], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x2e, 0x0, 0xf, &(0x7f0000000000)=[0x0], 0x1, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@fallback=r4, r4, 0x14, 0x201c, 0x0, @value, @void, @void, @void, r5}, 0x20) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00', 0x0}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@fallback=r6, r3, 0xd51285124efda6c0, 0x28, 0x0, @void, @void, @void, @value=r7, r5}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1f, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) 1m0.530222475s ago: executing program 2 (id=378): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000d80)='mmap_lock_acquire_returned\x00', r3}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@cgroup=r4, 0x6, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x21) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, &(0x7f0000000300), &(0x7f0000000340)=r2}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) 45.444386615s ago: executing program 32 (id=378): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000d80)='mmap_lock_acquire_returned\x00', r3}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@cgroup=r4, 0x6, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x21) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, &(0x7f0000000300), &(0x7f0000000340)=r2}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) 8.224307031s ago: executing program 3 (id=923): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005345c0f63cdc2e82818254950ee03568b8809a1f04c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab66c1aae9314d7381fcfeb970bea672010000000000000043144648a07a975bd89dc398712376610faa54f12495b4659be8673086f6f3543205d4bc4ce05b8b961103673dff7f158052e62bfbdcddde6985f3f1ac5d9a94cc53207899762a07282a1914452d11858e795a3ca30a101af5574f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5ed44039aab46419496362e54cfad05b4004ac71a003d7b85d07191bed4e5a8908263722d4146f7ed569985439baa355cf3d8731f5e7a237bc06d035a8d601f21746d880819f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c5b9f87d988c9fbd2b9d9b4e2d71753b1549fa734f0b2e5fcf9549804cddad721971637f9c9730a9cc384eed30345979db9c93e1c52f42cad0a4d4f9436d3f39b0ed09c395dc6e970366087a8e4daeeb1b017006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f710c490ecd085d2811a7555c53030000007f00000000bfa6478eb96b079c277e2910b7ccdc3d672ed34aa65278c549e2abb549ad954884289130bc71cee2b7de62bf48129ae1af052a2d46a6165eb0954dac7265f1f425735acf6377793946b3229e861d8ea49806b3b533345d36ecef9df700000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c000000aaae37f044bcadeb0f6846582b7653665aa336db9f0384d3c7ddf79c2e0000000000000000000000000000000000000000000000e154aa0d3e41986a668ee1e5ef93a8ceac75f44aae95e26742f895f287111f8ee86f7e3ffb63cfb0e345cf7fc63dd2b0d30977899c6f03640040af4db71f7452bfc79a05118d8bb42b63b195771e42f9942ec626bd4b5461b74324012164e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x27, &(0x7f0000000100), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r7, @ANYRES32=r0, @ANYBLOB="0200000001000000", @ANYBLOB, @ANYRES64=0x0], 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000000), 0x12) ioctl$SIOCSIFHWADDR(r9, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) write$cgroup_type(r9, &(0x7f0000000080), 0x9) write$cgroup_netprio_ifpriomap(r9, &(0x7f0000000140)={'syzkaller1', 0x32, 0x36}, 0xd) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r8, r10, 0x2}, 0x10) 8.106195923s ago: executing program 3 (id=925): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x3, 0xff, 0x5, 0x0, 0x6151, 0x61000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x6}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x8, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, 0x0, 0xfdef) 8.002322786s ago: executing program 3 (id=929): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 5.552107473s ago: executing program 3 (id=929): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 3.250689557s ago: executing program 4 (id=967): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 2.811210126s ago: executing program 1 (id=973): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 2.779704826s ago: executing program 4 (id=974): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/159, 0x9f}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000540)=""/148, 0x94}], 0x3, &(0x7f0000000280)=""/61, 0x3d}, 0x10140) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 2.763511937s ago: executing program 3 (id=929): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 2.636198409s ago: executing program 5 (id=975): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000e093b4e71ad8099bcc25", @ANYRES32, @ANYBLOB="0000000000000000b3080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008e2ffffb60400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000608000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x33) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000400)={&(0x7f0000000180)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x24008001}, 0x800) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="0000000000000067194e63b50000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a'], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xc8, 0x0, 0x3}, 0x0, 0xb, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000000600)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/6, 0x6}, {&(0x7f0000000740)=""/133, 0x85}, {&(0x7f0000000f80)=""/4096, 0x1000}], 0x3, &(0x7f0000000800)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2020) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033a00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="18000000ff000000030000000800000042000100", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="000000000300000004000000000000000000000000000000052b0a12e5869fa676bababbbd58275ba01641545f99f7e1610ff6a37336294099159fca625653da91b83c796b894bfe725b9540be91a5321270f9f3054fd79a46d15eddf9bb0783e61f4471cf361888200f545e0c85780db7c340ebf9fca50042c967b968789e61545d29bec8b07034ddf8c77604edbc28d5d75f94f230369599d09b8ccfdff881d8a0d44486ff736f7c70de1ee25a80020c9c8c8b305ba1f32db1b53a41913558503316ab183a962719b5b92eb7b5601b0d54de8e88a626f8975bb370ac3ef6", @ANYRES32=r13, @ANYBLOB], 0x50) 2.247096177s ago: executing program 1 (id=976): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 2.213314877s ago: executing program 0 (id=977): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r0}, 0x38) 1.852079954s ago: executing program 0 (id=978): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x5b8, 0x0, &(0x7f0000000100)="b9ff030711a5268c019e14f088a847e0ffff00124000632177fbac141416e000030a94029f030301800000ca6aab840000008100", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xb, 0xd}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 1.851798604s ago: executing program 4 (id=979): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1e) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000600000000000000000000008500000041000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x2, 0x4, 0xc, 0x8, 0x0, 0x1}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x23, 0x4, 0x2, 0x40, r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f00000001c0), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x8, 0x0, &(0x7f0000000d40)="fae56ac553d73f32", 0x0, 0x8005, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000001000000000000000300000004000000030000000000000000000005000000000000002e"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000001bc0)='locks_get_lock_context\x00', r7}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x67, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r9, 0xfffffff7, '\x00', r10, r0, 0x4, 0x5, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.787791405s ago: executing program 5 (id=980): bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x4040001) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x10, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xffc0) 1.763908716s ago: executing program 5 (id=981): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 1.666642448s ago: executing program 4 (id=982): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x20a2560ddbfd0220}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x18) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 1.654944468s ago: executing program 5 (id=983): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r2}, 0x38) 1.612489569s ago: executing program 1 (id=984): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x702, 0xe, 0xff0f, &(0x7f0000000540)="e460334470b8d480eb20c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r3}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2d, 'cpu'}, {0x2b, 'cpuset'}, {0x2b, 'cpuacct'}, {0x2b, 'net_cls'}, {0x2d, 'net'}, {0x2b, 'hugetlb'}]}, 0x2d) r6 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000f6eb4a24cfec355830273237c8edc736dbbf80e2e4fead3dcbcaf9ded729bdcedcc1127429c40b0bdec57520f14b88c1acf4c419b356227fe416a21e26bccdb260dfb6c618b0c921f7d4e6"], 0x48) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x2060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1021, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRES32=r8], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x18, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @generic={0xa, 0xe, 0xb, 0x7, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='syzkaller\x00', 0x101, 0xd1, &(0x7f0000000a40)=""/209, 0x40f00, 0x25, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x0, 0xfff, 0x1}, 0x10, 0x594f, 0xffffffffffffffff, 0x1, &(0x7f00000006c0)=[r6, r7, 0xffffffffffffffff, r3, r6, r2, r2], &(0x7f0000000700)=[{0x5, 0x5, 0x6, 0x5}], 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00@\x00'/25], 0x50) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40202, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) write$cgroup_devices(r10, &(0x7f0000000100)=ANY=[@ANYBLOB="1b2308217f01"], 0xffdd) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 1.436145482s ago: executing program 0 (id=985): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 1.215205486s ago: executing program 4 (id=986): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) 1.04784519s ago: executing program 5 (id=987): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r2}, 0x38) 1.047271189s ago: executing program 0 (id=997): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r2}, 0x38) 730.988296ms ago: executing program 4 (id=988): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r0}, 0x38) 726.039466ms ago: executing program 1 (id=989): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) close(0x3) close(r2) 375.449323ms ago: executing program 0 (id=990): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4, 0x1}]}]}, {0x0, [0x0, 0x2e, 0x61, 0x61, 0x1e]}}, &(0x7f0000000640)=""/4118, 0x33, 0x1016, 0x1}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r2, &(0x7f0000000340)="caa0f323533cdb10706e5a9a653a9dca3bcbe2ce28b836b07007ebb40021bdaa5c57354eb27900f7f1a288d9568a2884219e35a9165166dfc506565eb25ebe5f637f277949ed69f3adccf167e83ffaf6055b000188d2057da3c84c8890b16a4b9bea406036ca607015246ecd1e7c860f1f7fc66c8e1df9d956ba47d4a82cf7ea3e2c3d8998b45bea540ef89a59b70ac6e39896bebb48b5a7da1285780774b837276f63208476dc99e617f8b6df9d2d38ad47a7bacc3810f0385a3b25e39e625f11f6363e3239f88ffaccd20c386ed9b50008ceb3", &(0x7f0000000440)=""/129, 0x4}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8, 0x4000}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000016c0)={0x0, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x3, 0x4, 0xa, 0x7fff}]}, &(0x7f00000005c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000600)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000001680)=[{0x3, 0x5, 0xc, 0xc}, {0x3, 0x3, 0x6, 0x4}, {0x4, 0x4, 0xc, 0x4}], 0x10, 0x1}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000018c0)={@fallback=r6, 0x38, 0x0, 0x4, &(0x7f00000017c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001800)=[0x0, 0x0, 0x0], &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001900)={@map=r2, r8, 0x27, 0x0, r1, @void, @value=r8, @void, @void, r10}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) write$cgroup_type(r7, &(0x7f0000000280), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001780)={&(0x7f0000000540)='fdb_delete\x00', r5, 0x0, 0x2}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 305.577044ms ago: executing program 1 (id=991): bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x4040001) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x10, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xffc0) 227.826465ms ago: executing program 1 (id=992): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='kmem_cache_free\x00'}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r3, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r7}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r6}, 0x20) unlink(&(0x7f00000006c0)='./file0\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x21, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x0, 0x5, 0xa, 0x5, 0x1, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @map_val={0x18, 0x7, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x292ed2fb}, @map_idx={0x18, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='syzkaller\x00', 0x10000, 0x1a, &(0x7f0000000140)=""/26, 0x40f00, 0x0, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb, 0x6, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000600)=[r7, r0, r3, r3], &(0x7f0000000640)=[{0x3, 0x3, 0xb, 0xb}, {0x3, 0x2, 0xb, 0x4}], 0x10, 0xfff}, 0x94) 145.427367ms ago: executing program 5 (id=993): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1e) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000600000000000000000000008500000041000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x2, 0x4, 0xc, 0x8, 0x0, 0x1}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x23, 0x4, 0x2, 0x40, r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f00000001c0), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x8, 0x0, &(0x7f0000000d40)="fae56ac553d73f32", 0x0, 0x8005, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000001000000000000000300000004000000030000000000000000000005000000000000002e"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000001bc0)='locks_get_lock_context\x00', r7}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x67, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r9, 0xfffffff7, '\x00', r10, r0, 0x4, 0x5, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 211.68µs ago: executing program 0 (id=994): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 0s ago: executing program 3 (id=929): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r1}, 0x38) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.236' (ED25519) to the list of known hosts. [ 20.310351][ T30] audit: type=1400 audit(1756976655.529:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.311405][ T273] cgroup: Unknown subsys name 'net' [ 20.333055][ T30] audit: type=1400 audit(1756976655.529:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.360671][ T30] audit: type=1400 audit(1756976655.569:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.361050][ T273] cgroup: Unknown subsys name 'devices' [ 20.507827][ T273] cgroup: Unknown subsys name 'hugetlb' [ 20.513473][ T273] cgroup: Unknown subsys name 'rlimit' [ 20.709261][ T30] audit: type=1400 audit(1756976655.929:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.732976][ T30] audit: type=1400 audit(1756976655.929:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.738886][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.758118][ T30] audit: type=1400 audit(1756976655.929:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.789519][ T30] audit: type=1400 audit(1756976655.989:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.815275][ T30] audit: type=1400 audit(1756976655.989:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.844736][ T30] audit: type=1400 audit(1756976656.069:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.845126][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.870269][ T30] audit: type=1400 audit(1756976656.069:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.396349][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.403441][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.410913][ T281] device bridge_slave_0 entered promiscuous mode [ 21.419115][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.426220][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.433503][ T281] device bridge_slave_1 entered promiscuous mode [ 21.536667][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.543815][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.551384][ T283] device bridge_slave_0 entered promiscuous mode [ 21.558371][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.565403][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.572893][ T283] device bridge_slave_1 entered promiscuous mode [ 21.579475][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.586734][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.594450][ T282] device bridge_slave_0 entered promiscuous mode [ 21.612295][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.619425][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.627273][ T282] device bridge_slave_1 entered promiscuous mode [ 21.664673][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.671954][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.679691][ T284] device bridge_slave_0 entered promiscuous mode [ 21.699167][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.706366][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.713675][ T284] device bridge_slave_1 entered promiscuous mode [ 21.729718][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.736845][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.744178][ T285] device bridge_slave_0 entered promiscuous mode [ 21.756912][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.763965][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.771555][ T285] device bridge_slave_1 entered promiscuous mode [ 21.830949][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.838025][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.845277][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.852696][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.953452][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.960529][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.967822][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.974848][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.985613][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.992757][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.000040][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.007074][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.033175][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.040251][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.047542][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.054566][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.063367][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.070443][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.078084][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.085133][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.102397][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.110138][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.117751][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.124957][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.132481][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.140047][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.147418][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.154726][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.162139][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.169377][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.177297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.185014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.202722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.216585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.224769][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.231840][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.239509][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.248378][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.255409][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.266126][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.274328][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.281522][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.293021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.328213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.337045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.345555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.353910][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.361199][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.368924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.377310][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.384328][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.391801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.399871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.408231][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.415250][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.422795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.430793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.439076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.458532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.467232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.475467][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.482788][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.491349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.500069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.508369][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.515402][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.522897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.531297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.539667][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.546707][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.554122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.562347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.570417][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.578897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.587423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.596012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.604276][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.611331][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.627439][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.635710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.651287][ T284] device veth0_vlan entered promiscuous mode [ 22.658885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.667154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.675060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.683609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.692054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.700072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.708195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.715727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.739766][ T283] device veth0_vlan entered promiscuous mode [ 22.746805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.754916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.763085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.771391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.779528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.787754][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.795617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.804067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.812667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.820671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.828723][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.836989][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.844971][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.852629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.860034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.867765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.876113][ T281] device veth0_vlan entered promiscuous mode [ 22.892692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.901176][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.909842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.918589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.927310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.938403][ T284] device veth1_macvtap entered promiscuous mode [ 22.947874][ T281] device veth1_macvtap entered promiscuous mode [ 22.957055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.964829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.973301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.985713][ T282] device veth0_vlan entered promiscuous mode [ 22.996115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.003964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.012238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.021226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.029616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.037380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.053548][ T285] device veth0_vlan entered promiscuous mode [ 23.061075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.069614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.078128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.086490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.094716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.103058][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.111437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.119439][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.127738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.135202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.157464][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 23.162082][ T283] device veth1_macvtap entered promiscuous mode [ 23.173166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.181515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.189874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.198544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.206927][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.215472][ T282] device veth1_macvtap entered promiscuous mode [ 23.246460][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.264389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.278763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.287462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.296334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.304873][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.314940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.324867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.334005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.357926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.367315][ T285] device veth1_macvtap entered promiscuous mode [ 23.409529][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.430350][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.447519][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.466216][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.607712][ C0] hrtimer: interrupt took 30869 ns [ 24.345425][ T367] device veth0_vlan left promiscuous mode [ 24.371551][ T367] device veth0_vlan entered promiscuous mode [ 27.576227][ T449] bond_slave_1: mtu less than device minimum [ 28.971897][ T474] bond_slave_1: mtu less than device minimum [ 30.823754][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 30.823770][ T30] audit: type=1400 audit(1756976666.039:109): avc: denied { read } for pid=504 comm="syz.1.70" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.979230][ T30] audit: type=1400 audit(1756976666.079:110): avc: denied { open } for pid=504 comm="syz.1.70" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.063961][ T30] audit: type=1400 audit(1756976666.079:111): avc: denied { ioctl } for pid=504 comm="syz.1.70" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.271082][ T30] audit: type=1400 audit(1756976666.489:112): avc: denied { write } for pid=520 comm="syz.2.76" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.326365][ T524] FAULT_INJECTION: forcing a failure. [ 31.326365][ T524] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 31.445924][ T524] CPU: 0 PID: 524 Comm: syz.3.77 Not tainted syzkaller #0 [ 31.453172][ T524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 31.463252][ T524] Call Trace: [ 31.466547][ T524] [ 31.469496][ T524] __dump_stack+0x21/0x30 [ 31.473906][ T524] dump_stack_lvl+0xee/0x150 [ 31.478593][ T524] ? show_regs_print_info+0x20/0x20 [ 31.483811][ T524] ? get_page_from_freelist+0x2cc5/0x2d50 [ 31.489542][ T524] dump_stack+0x15/0x20 [ 31.493725][ T524] should_fail+0x3c1/0x510 [ 31.498181][ T524] should_fail_alloc_page+0x55/0x80 [ 31.503415][ T524] prepare_alloc_pages+0x156/0x600 [ 31.508551][ T524] ? __alloc_pages_bulk+0xab0/0xab0 [ 31.513765][ T524] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 31.519412][ T524] __alloc_pages+0x10a/0x440 [ 31.524163][ T524] ? prep_new_page+0x110/0x110 [ 31.528940][ T524] ? __pcpu_chunk_move+0x275/0x310 [ 31.534689][ T524] pcpu_populate_chunk+0x184/0xcb0 [ 31.539908][ T524] ? _find_next_bit+0x1b5/0x200 [ 31.544774][ T524] pcpu_alloc+0xc4d/0x1660 [ 31.549206][ T524] __alloc_percpu_gfp+0x25/0x30 [ 31.554070][ T524] bpf_map_alloc_percpu+0xc5/0x150 [ 31.559429][ T524] htab_map_alloc+0xc1b/0x14f0 [ 31.564224][ T524] map_create+0x455/0x21b0 [ 31.568676][ T524] __sys_bpf+0x2cf/0x730 [ 31.572939][ T524] ? bpf_link_show_fdinfo+0x310/0x310 [ 31.578413][ T524] ? debug_smp_processor_id+0x17/0x20 [ 31.583986][ T524] __x64_sys_bpf+0x7c/0x90 [ 31.588599][ T524] x64_sys_call+0x4b9/0x9a0 [ 31.593135][ T524] do_syscall_64+0x4c/0xa0 [ 31.597585][ T524] ? clear_bhb_loop+0x50/0xa0 [ 31.602312][ T524] ? clear_bhb_loop+0x50/0xa0 [ 31.607123][ T524] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.613040][ T524] RIP: 0033:0x7f2ed6a8cbe9 [ 31.617738][ T524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.637649][ T524] RSP: 002b:00007f2ed54f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.646157][ T524] RAX: ffffffffffffffda RBX: 00007f2ed6cc3fa0 RCX: 00007f2ed6a8cbe9 [ 31.654211][ T524] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 31.662348][ T524] RBP: 00007f2ed54f5090 R08: 0000000000000000 R09: 0000000000000000 [ 31.670312][ T524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 31.678276][ T524] R13: 00007f2ed6cc4038 R14: 00007f2ed6cc3fa0 R15: 00007ffcecf3b928 [ 31.686242][ T524] [ 31.877948][ T30] audit: type=1400 audit(1756976667.099:113): avc: denied { write } for pid=520 comm="syz.2.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.110464][ T549] FAULT_INJECTION: forcing a failure. [ 32.110464][ T549] name failslab, interval 1, probability 0, space 0, times 1 [ 32.130158][ T549] CPU: 1 PID: 549 Comm: syz.1.87 Not tainted syzkaller #0 [ 32.137501][ T549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 32.147735][ T549] Call Trace: [ 32.151012][ T549] [ 32.153939][ T549] __dump_stack+0x21/0x30 [ 32.158276][ T549] dump_stack_lvl+0xee/0x150 [ 32.162865][ T549] ? show_regs_print_info+0x20/0x20 [ 32.168067][ T549] dump_stack+0x15/0x20 [ 32.172220][ T549] should_fail+0x3c1/0x510 [ 32.176641][ T549] __should_failslab+0xa4/0xe0 [ 32.181407][ T549] should_failslab+0x9/0x20 [ 32.186015][ T549] slab_pre_alloc_hook+0x3b/0xe0 [ 32.190956][ T549] __kmalloc+0x6d/0x2c0 [ 32.195289][ T549] ? kvmalloc_node+0x206/0x300 [ 32.200056][ T549] kvmalloc_node+0x206/0x300 [ 32.204641][ T549] ? vm_mmap+0xb0/0xb0 [ 32.208705][ T549] ? __kasan_check_write+0x14/0x20 [ 32.213816][ T549] pfifo_fast_init+0x3af/0x7a0 [ 32.218581][ T549] qdisc_create_dflt+0x142/0x3a0 [ 32.223571][ T549] dev_activate+0x2a0/0x1060 [ 32.228199][ T549] __dev_open+0x3aa/0x4c0 [ 32.232618][ T549] ? dev_open+0x230/0x230 [ 32.236952][ T549] ? _raw_spin_unlock_bh+0x51/0x60 [ 32.242064][ T549] ? dev_set_rx_mode+0x212/0x2c0 [ 32.246998][ T549] ? __kasan_check_read+0x11/0x20 [ 32.252017][ T549] __dev_change_flags+0x20a/0x6a0 [ 32.257041][ T549] ? dev_get_flags+0x1e0/0x1e0 [ 32.261895][ T549] dev_change_flags+0x88/0x1a0 [ 32.266660][ T549] dev_ifsioc+0x147/0xe70 [ 32.270991][ T549] ? dev_ioctl+0xd10/0xd10 [ 32.275583][ T549] ? __kasan_check_write+0x14/0x20 [ 32.280779][ T549] ? mutex_lock+0x95/0x1a0 [ 32.285281][ T549] ? wait_for_completion_killable_timeout+0x10/0x10 [ 32.291969][ T549] ? dev_get_by_name_rcu+0xc8/0xf0 [ 32.297081][ T549] dev_ioctl+0x560/0xd10 [ 32.301329][ T549] sock_do_ioctl+0x22e/0x300 [ 32.305921][ T549] ? sock_show_fdinfo+0xa0/0xa0 [ 32.310772][ T549] ? selinux_file_ioctl+0x377/0x480 [ 32.316060][ T549] sock_ioctl+0x4bc/0x6b0 [ 32.320488][ T549] ? sock_poll+0x3d0/0x3d0 [ 32.324924][ T549] ? __fget_files+0x2c4/0x320 [ 32.329603][ T549] ? security_file_ioctl+0x84/0xa0 [ 32.334712][ T549] ? sock_poll+0x3d0/0x3d0 [ 32.339124][ T549] __se_sys_ioctl+0x121/0x1a0 [ 32.343802][ T549] __x64_sys_ioctl+0x7b/0x90 [ 32.348394][ T549] x64_sys_call+0x2f/0x9a0 [ 32.352836][ T549] do_syscall_64+0x4c/0xa0 [ 32.357262][ T549] ? clear_bhb_loop+0x50/0xa0 [ 32.361936][ T549] ? clear_bhb_loop+0x50/0xa0 [ 32.366698][ T549] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 32.372594][ T549] RIP: 0033:0x7fad19b74be9 [ 32.377007][ T549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.396611][ T549] RSP: 002b:00007fad185dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 32.405024][ T549] RAX: ffffffffffffffda RBX: 00007fad19dabfa0 RCX: 00007fad19b74be9 [ 32.412995][ T549] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 32.420963][ T549] RBP: 00007fad185dd090 R08: 0000000000000000 R09: 0000000000000000 [ 32.428944][ T549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.436935][ T549] R13: 00007fad19dac038 R14: 00007fad19dabfa0 R15: 00007ffd63c535d8 [ 32.444924][ T549] [ 32.448879][ T549] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 32.467022][ T549] device pim6reg1 entered promiscuous mode [ 33.590816][ T597] syz.3.102[597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.590892][ T597] syz.3.102[597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.209147][ T30] audit: type=1400 audit(1756976669.429:114): avc: denied { create } for pid=623 comm="syz.3.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.493273][ T30] audit: type=1400 audit(1756976669.709:115): avc: denied { create } for pid=633 comm="syz.3.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 37.577167][ T694] device pim6reg1 entered promiscuous mode [ 37.705593][ T30] audit: type=1400 audit(1756976672.919:116): avc: denied { create } for pid=701 comm="syz.3.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 38.661335][ T30] audit: type=1400 audit(1756976673.879:117): avc: denied { cpu } for pid=725 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.739281][ T731] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 38.782108][ T729] device pim6reg1 entered promiscuous mode [ 39.466628][ T754] FAULT_INJECTION: forcing a failure. [ 39.466628][ T754] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 39.482117][ T754] CPU: 1 PID: 754 Comm: syz.4.166 Not tainted syzkaller #0 [ 39.489457][ T754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 39.499710][ T754] Call Trace: [ 39.503000][ T754] [ 39.505934][ T754] __dump_stack+0x21/0x30 [ 39.510274][ T754] dump_stack_lvl+0xee/0x150 [ 39.514869][ T754] ? show_regs_print_info+0x20/0x20 [ 39.520066][ T754] ? __kasan_check_write+0x14/0x20 [ 39.525172][ T754] ? proc_fail_nth_write+0x17a/0x1f0 [ 39.530454][ T754] ? proc_fail_nth_read+0x210/0x210 [ 39.535648][ T754] dump_stack+0x15/0x20 [ 39.539799][ T754] should_fail+0x3c1/0x510 [ 39.544213][ T754] should_fail_usercopy+0x1a/0x20 [ 39.549316][ T754] _copy_from_user+0x20/0xd0 [ 39.553923][ T754] perf_copy_attr+0x154/0x870 [ 39.558762][ T754] __se_sys_perf_event_open+0xcb/0x1b80 [ 39.564329][ T754] ? __kasan_check_write+0x14/0x20 [ 39.569453][ T754] ? mutex_unlock+0x89/0x220 [ 39.574055][ T754] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 39.579697][ T754] ? __ia32_sys_read+0x90/0x90 [ 39.584462][ T754] __x64_sys_perf_event_open+0xbf/0xd0 [ 39.589916][ T754] x64_sys_call+0x50d/0x9a0 [ 39.594411][ T754] do_syscall_64+0x4c/0xa0 [ 39.598827][ T754] ? clear_bhb_loop+0x50/0xa0 [ 39.603501][ T754] ? clear_bhb_loop+0x50/0xa0 [ 39.608173][ T754] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.614062][ T754] RIP: 0033:0x7f2f84d6dbe9 [ 39.618472][ T754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.638540][ T754] RSP: 002b:00007f2f837d6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 39.646952][ T754] RAX: ffffffffffffffda RBX: 00007f2f84fa4fa0 RCX: 00007f2f84d6dbe9 [ 39.654922][ T754] RDX: ffefffffffffffff RSI: 0000000000000000 RDI: 0000200000000700 [ 39.662930][ T754] RBP: 00007f2f837d6090 R08: 0000000000000000 R09: 0000000000000000 [ 39.670899][ T754] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 39.679170][ T754] R13: 00007f2f84fa5038 R14: 00007f2f84fa4fa0 R15: 00007ffc31eb8b68 [ 39.687159][ T754] [ 40.173021][ T790] FAULT_INJECTION: forcing a failure. [ 40.173021][ T790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 40.186263][ T790] CPU: 1 PID: 790 Comm: syz.0.179 Not tainted syzkaller #0 [ 40.193556][ T790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 40.203713][ T790] Call Trace: [ 40.206998][ T790] [ 40.209935][ T790] __dump_stack+0x21/0x30 [ 40.214277][ T790] dump_stack_lvl+0xee/0x150 [ 40.218878][ T790] ? show_regs_print_info+0x20/0x20 [ 40.224085][ T790] ? __kasan_check_write+0x14/0x20 [ 40.229206][ T790] ? _raw_spin_lock_irq+0x8f/0xe0 [ 40.234270][ T790] dump_stack+0x15/0x20 [ 40.238527][ T790] should_fail+0x3c1/0x510 [ 40.243059][ T790] should_fail_usercopy+0x1a/0x20 [ 40.248192][ T790] copy_page_from_iter_atomic+0x3fb/0x1350 [ 40.254023][ T790] ? pipe_zero+0x370/0x370 [ 40.258458][ T790] generic_perform_write+0x307/0x670 [ 40.263754][ T790] ? grab_cache_page_write_begin+0xb0/0xb0 [ 40.269833][ T790] ? file_remove_privs+0x590/0x590 [ 40.275046][ T790] ? rwsem_write_trylock+0x130/0x300 [ 40.280338][ T790] ? clear_nonspinnable+0x60/0x60 [ 40.285377][ T790] ? avc_policy_seqno+0x1b/0x70 [ 40.290290][ T790] __generic_file_write_iter+0x268/0x480 [ 40.295936][ T790] generic_file_write_iter+0xa9/0x1d0 [ 40.301321][ T790] vfs_write+0x802/0xf70 [ 40.305669][ T790] ? file_end_write+0x1b0/0x1b0 [ 40.310529][ T790] ? wait_for_completion_killable_timeout+0x10/0x10 [ 40.317158][ T790] ? __fget_files+0x2c4/0x320 [ 40.321849][ T790] ? __fdget_pos+0x2d2/0x380 [ 40.326550][ T790] ? ksys_write+0x71/0x240 [ 40.330970][ T790] ksys_write+0x140/0x240 [ 40.335310][ T790] ? __ia32_sys_read+0x90/0x90 [ 40.340170][ T790] ? debug_smp_processor_id+0x17/0x20 [ 40.345553][ T790] __x64_sys_write+0x7b/0x90 [ 40.350342][ T790] x64_sys_call+0x8ef/0x9a0 [ 40.354835][ T790] do_syscall_64+0x4c/0xa0 [ 40.359249][ T790] ? clear_bhb_loop+0x50/0xa0 [ 40.364026][ T790] ? clear_bhb_loop+0x50/0xa0 [ 40.368707][ T790] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.374595][ T790] RIP: 0033:0x7f84f59f0be9 [ 40.379005][ T790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.398695][ T790] RSP: 002b:00007f84f4459038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 40.407198][ T790] RAX: ffffffffffffffda RBX: 00007f84f5c27fa0 RCX: 00007f84f59f0be9 [ 40.415169][ T790] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000003 [ 40.423136][ T790] RBP: 00007f84f4459090 R08: 0000000000000000 R09: 0000000000000000 [ 40.431101][ T790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 40.439064][ T790] R13: 00007f84f5c28038 R14: 00007f84f5c27fa0 R15: 00007fffd7a44a38 [ 40.447043][ T790] [ 41.328810][ T30] audit: type=1400 audit(1756976676.549:118): avc: denied { create } for pid=820 comm="syz.4.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.387067][ T832] FAULT_INJECTION: forcing a failure. [ 41.387067][ T832] name failslab, interval 1, probability 0, space 0, times 0 [ 41.401260][ T832] CPU: 1 PID: 832 Comm: syz.4.195 Not tainted syzkaller #0 [ 41.408485][ T832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 41.418571][ T832] Call Trace: [ 41.421858][ T832] [ 41.424801][ T832] __dump_stack+0x21/0x30 [ 41.429149][ T832] dump_stack_lvl+0xee/0x150 [ 41.433746][ T832] ? show_regs_print_info+0x20/0x20 [ 41.438960][ T832] ? __alloc_pages+0x440/0x440 [ 41.443739][ T832] dump_stack+0x15/0x20 [ 41.448015][ T832] should_fail+0x3c1/0x510 [ 41.452453][ T832] __should_failslab+0xa4/0xe0 [ 41.457235][ T832] should_failslab+0x9/0x20 [ 41.461836][ T832] slab_pre_alloc_hook+0x3b/0xe0 [ 41.466773][ T832] ? __build_skb+0x2d/0x310 [ 41.471273][ T832] kmem_cache_alloc+0x44/0x260 [ 41.476043][ T832] __build_skb+0x2d/0x310 [ 41.480370][ T832] build_skb+0x24/0x200 [ 41.484519][ T832] ? tun_get_user+0x85d/0x33c0 [ 41.489281][ T832] tun_get_user+0x879/0x33c0 [ 41.493871][ T832] ? perf_event_read_local+0x510/0x710 [ 41.499328][ T832] ? tun_do_read+0x1c40/0x1c40 [ 41.504100][ T832] ? kstrtouint_from_user+0x1a0/0x200 [ 41.509468][ T832] ? kstrtol_from_user+0x260/0x260 [ 41.514575][ T832] ? putname+0x111/0x160 [ 41.518815][ T832] ? avc_policy_seqno+0x1b/0x70 [ 41.523675][ T832] ? selinux_file_permission+0x2aa/0x510 [ 41.529391][ T832] tun_chr_write_iter+0x1eb/0x2e0 [ 41.534411][ T832] vfs_write+0x802/0xf70 [ 41.538647][ T832] ? file_end_write+0x1b0/0x1b0 [ 41.543680][ T832] ? __fget_files+0x2c4/0x320 [ 41.548495][ T832] ? __fdget_pos+0x1f7/0x380 [ 41.553159][ T832] ? ksys_write+0x71/0x240 [ 41.557583][ T832] ksys_write+0x140/0x240 [ 41.561922][ T832] ? __ia32_sys_read+0x90/0x90 [ 41.566678][ T832] ? debug_smp_processor_id+0x17/0x20 [ 41.572135][ T832] __x64_sys_write+0x7b/0x90 [ 41.576721][ T832] x64_sys_call+0x8ef/0x9a0 [ 41.581229][ T832] do_syscall_64+0x4c/0xa0 [ 41.585638][ T832] ? clear_bhb_loop+0x50/0xa0 [ 41.590310][ T832] ? clear_bhb_loop+0x50/0xa0 [ 41.594982][ T832] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.600875][ T832] RIP: 0033:0x7f2f84d6dbe9 [ 41.605286][ T832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.625017][ T832] RSP: 002b:00007f2f837d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 41.633442][ T832] RAX: ffffffffffffffda RBX: 00007f2f84fa4fa0 RCX: 00007f2f84d6dbe9 [ 41.641412][ T832] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 41.649466][ T832] RBP: 00007f2f837d6090 R08: 0000000000000000 R09: 0000000000000000 [ 41.657433][ T832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.665489][ T832] R13: 00007f2f84fa5038 R14: 00007f2f84fa4fa0 R15: 00007ffc31eb8b68 [ 41.673459][ T832] [ 41.873398][ T868] device syzkaller0 entered promiscuous mode [ 41.967226][ T877] syz.1.210[877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.967299][ T877] syz.1.210[877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.028957][ T880] syz.1.210[880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.125114][ T880] syz.1.210[880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.190680][ T30] audit: type=1400 audit(1756976677.409:119): avc: denied { tracepoint } for pid=883 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 42.315966][ T30] audit: type=1400 audit(1756976677.479:120): avc: denied { create } for pid=883 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 42.497448][ T903] device sit0 entered promiscuous mode [ 42.624042][ T30] audit: type=1400 audit(1756976677.839:121): avc: denied { create } for pid=912 comm="syz.2.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.712741][ T903] device pim6reg1 entered promiscuous mode [ 43.253385][ T940] device pim6reg1 entered promiscuous mode [ 43.343095][ T30] audit: type=1400 audit(1756976678.559:122): avc: denied { relabelfrom } for pid=945 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 43.370078][ T30] audit: type=1400 audit(1756976678.579:123): avc: denied { relabelto } for pid=945 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 44.211612][ T993] FAULT_INJECTION: forcing a failure. [ 44.211612][ T993] name failslab, interval 1, probability 0, space 0, times 0 [ 44.285908][ T990] device syzkaller0 entered promiscuous mode [ 44.292298][ T993] CPU: 0 PID: 993 Comm: syz.2.265 Not tainted syzkaller #0 [ 44.299536][ T993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 44.309803][ T993] Call Trace: [ 44.313100][ T993] [ 44.316040][ T993] __dump_stack+0x21/0x30 [ 44.320385][ T993] dump_stack_lvl+0xee/0x150 [ 44.325007][ T993] ? show_regs_print_info+0x20/0x20 [ 44.330225][ T993] dump_stack+0x15/0x20 [ 44.334504][ T993] should_fail+0x3c1/0x510 [ 44.338950][ T993] __should_failslab+0xa4/0xe0 [ 44.343936][ T993] should_failslab+0x9/0x20 [ 44.348467][ T993] slab_pre_alloc_hook+0x3b/0xe0 [ 44.353479][ T993] ? __alloc_skb+0xe0/0x740 [ 44.358431][ T993] kmem_cache_alloc+0x44/0x260 [ 44.363222][ T993] __alloc_skb+0xe0/0x740 [ 44.367667][ T993] __pskb_copy_fclone+0xa7/0xf00 [ 44.372617][ T993] ? kfree+0xc4/0x270 [ 44.376613][ T993] ? tipc_dest_pop+0x1e4/0x280 [ 44.381390][ T993] ? tipc_dest_pop+0x1e4/0x280 [ 44.386170][ T993] tipc_sk_mcast_rcv+0x5ce/0xec0 [ 44.391142][ T993] ? tipc_msg_validate+0x2cc/0x590 [ 44.396264][ T993] ? tipc_sk_bind+0x310/0x310 [ 44.400962][ T993] tipc_mcast_xmit+0x10fd/0x1710 [ 44.405919][ T993] ? kasan_unpoison+0x67/0x90 [ 44.410608][ T993] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 44.415647][ T993] ? check_stack_object+0x81/0x140 [ 44.420773][ T993] ? __check_object_size+0x2f4/0x3c0 [ 44.426163][ T993] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 44.432694][ T993] __tipc_sendmsg+0x1d81/0x2680 [ 44.437650][ T993] ? local_bh_enable+0x30/0x30 [ 44.442426][ T993] ? perf_output_begin_forward+0x647/0x8d0 [ 44.448287][ T993] ? wait_woken+0x170/0x170 [ 44.452800][ T993] ? avc_has_perm+0x158/0x240 [ 44.457489][ T993] ? __kasan_check_write+0x14/0x20 [ 44.462614][ T993] ? _raw_spin_lock_bh+0x8e/0xe0 [ 44.467686][ T993] ? _raw_spin_lock_irq+0xe0/0xe0 [ 44.472736][ T993] ? __local_bh_enable_ip+0x58/0x80 [ 44.477946][ T993] ? irqentry_exit+0x37/0x40 [ 44.482549][ T993] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 44.488564][ T993] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 44.494756][ T993] tipc_sendmsg+0x55/0x70 [ 44.499156][ T993] ? tipc_recvmsg+0x13a0/0x13a0 [ 44.504367][ T993] ____sys_sendmsg+0x5a2/0x8c0 [ 44.509150][ T993] ? __sys_sendmsg_sock+0x40/0x40 [ 44.514280][ T993] ? import_iovec+0x7c/0xb0 [ 44.518797][ T993] ___sys_sendmsg+0x1f0/0x260 [ 44.523491][ T993] ? __sys_sendmsg+0x250/0x250 [ 44.528361][ T993] ? __fdget+0x1a1/0x230 [ 44.532618][ T993] __x64_sys_sendmsg+0x1e2/0x2a0 [ 44.537570][ T993] ? ___sys_sendmsg+0x260/0x260 [ 44.542430][ T993] ? debug_smp_processor_id+0x17/0x20 [ 44.547813][ T993] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 44.553889][ T993] x64_sys_call+0x4b/0x9a0 [ 44.558315][ T993] do_syscall_64+0x4c/0xa0 [ 44.562739][ T993] ? clear_bhb_loop+0x50/0xa0 [ 44.567426][ T993] ? clear_bhb_loop+0x50/0xa0 [ 44.572114][ T993] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.578017][ T993] RIP: 0033:0x7f6f502b3be9 [ 44.582442][ T993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.602074][ T993] RSP: 002b:00007f6f4ed1c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.610505][ T993] RAX: ffffffffffffffda RBX: 00007f6f504eafa0 RCX: 00007f6f502b3be9 [ 44.618492][ T993] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 000000000000000f [ 44.626472][ T993] RBP: 00007f6f4ed1c090 R08: 0000000000000000 R09: 0000000000000000 [ 44.634537][ T993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.642635][ T993] R13: 00007f6f504eb038 R14: 00007f6f504eafa0 R15: 00007ffde2abaf88 [ 44.650622][ T993] [ 44.658748][ T993] tipc: Failed to clone mcast rcv buffer [ 44.667532][ T1002] device veth0_vlan left promiscuous mode [ 44.705596][ T1002] device veth0_vlan entered promiscuous mode [ 45.214420][ T1021] device sit0 left promiscuous mode [ 47.032460][ T30] audit: type=1400 audit(1756976682.249:124): avc: denied { create } for pid=1061 comm="syz.4.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.250424][ T1070] FAULT_INJECTION: forcing a failure. [ 47.250424][ T1070] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 47.264148][ T1070] CPU: 0 PID: 1070 Comm: syz.2.296 Not tainted syzkaller #0 [ 47.271624][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 47.281894][ T1070] Call Trace: [ 47.285211][ T1070] [ 47.288145][ T1070] __dump_stack+0x21/0x30 [ 47.292486][ T1070] dump_stack_lvl+0xee/0x150 [ 47.297272][ T1070] ? show_regs_print_info+0x20/0x20 [ 47.302617][ T1070] ? 0xffffffffa001229c [ 47.306882][ T1070] dump_stack+0x15/0x20 [ 47.311193][ T1070] should_fail+0x3c1/0x510 [ 47.315692][ T1070] should_fail_alloc_page+0x55/0x80 [ 47.321059][ T1070] prepare_alloc_pages+0x156/0x600 [ 47.326165][ T1070] ? __alloc_pages_bulk+0xab0/0xab0 [ 47.331349][ T1070] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 47.336966][ T1070] __alloc_pages+0x10a/0x440 [ 47.341612][ T1070] ? prep_new_page+0x110/0x110 [ 47.346388][ T1070] pcpu_populate_chunk+0x184/0xcb0 [ 47.351512][ T1070] ? _find_next_bit+0x1b5/0x200 [ 47.356398][ T1070] pcpu_alloc+0xc4d/0x1660 [ 47.360814][ T1070] __alloc_percpu_gfp+0x25/0x30 [ 47.365689][ T1070] bpf_map_alloc_percpu+0xc5/0x150 [ 47.370902][ T1070] array_map_alloc+0x39a/0x6d0 [ 47.375652][ T1070] map_create+0x455/0x21b0 [ 47.380119][ T1070] __sys_bpf+0x2cf/0x730 [ 47.384519][ T1070] ? bpf_link_show_fdinfo+0x310/0x310 [ 47.390050][ T1070] ? debug_smp_processor_id+0x17/0x20 [ 47.395409][ T1070] __x64_sys_bpf+0x7c/0x90 [ 47.399812][ T1070] x64_sys_call+0x4b9/0x9a0 [ 47.404302][ T1070] do_syscall_64+0x4c/0xa0 [ 47.408711][ T1070] ? clear_bhb_loop+0x50/0xa0 [ 47.413375][ T1070] ? clear_bhb_loop+0x50/0xa0 [ 47.418136][ T1070] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.424134][ T1070] RIP: 0033:0x7f6f502b3be9 [ 47.428535][ T1070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.448395][ T1070] RSP: 002b:00007f6f4ed1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.456835][ T1070] RAX: ffffffffffffffda RBX: 00007f6f504eafa0 RCX: 00007f6f502b3be9 [ 47.464818][ T1070] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 47.472801][ T1070] RBP: 00007f6f4ed1c090 R08: 0000000000000000 R09: 0000000000000000 [ 47.480758][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 47.488824][ T1070] R13: 00007f6f504eb038 R14: 00007f6f504eafa0 R15: 00007ffde2abaf88 [ 47.496791][ T1070] [ 47.589169][ T1078] FAULT_INJECTION: forcing a failure. [ 47.589169][ T1078] name failslab, interval 1, probability 0, space 0, times 0 [ 47.615941][ T1078] CPU: 0 PID: 1078 Comm: syz.3.300 Not tainted syzkaller #0 [ 47.623275][ T1078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 47.633342][ T1078] Call Trace: [ 47.636631][ T1078] [ 47.639613][ T1078] __dump_stack+0x21/0x30 [ 47.644070][ T1078] dump_stack_lvl+0xee/0x150 [ 47.648667][ T1078] ? show_regs_print_info+0x20/0x20 [ 47.653865][ T1078] dump_stack+0x15/0x20 [ 47.658020][ T1078] should_fail+0x3c1/0x510 [ 47.662442][ T1078] __should_failslab+0xa4/0xe0 [ 47.667288][ T1078] should_failslab+0x9/0x20 [ 47.671875][ T1078] slab_pre_alloc_hook+0x3b/0xe0 [ 47.676825][ T1078] kmem_cache_alloc_trace+0x48/0x270 [ 47.682112][ T1078] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 47.687846][ T1078] selinux_sk_alloc_security+0x7e/0x1a0 [ 47.693385][ T1078] security_sk_alloc+0x72/0xa0 [ 47.698147][ T1078] sk_prot_alloc+0x108/0x320 [ 47.702730][ T1078] sk_alloc+0x38/0x430 [ 47.706793][ T1078] bpf_prog_test_run_skb+0x24b/0x1150 [ 47.712251][ T1078] ? __kasan_check_write+0x14/0x20 [ 47.717358][ T1078] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 47.723248][ T1078] bpf_prog_test_run+0x3d5/0x620 [ 47.728182][ T1078] ? bpf_prog_query+0x230/0x230 [ 47.733030][ T1078] ? selinux_bpf+0xce/0xf0 [ 47.737554][ T1078] ? security_bpf+0x82/0xa0 [ 47.742056][ T1078] __sys_bpf+0x52c/0x730 [ 47.746295][ T1078] ? bpf_link_show_fdinfo+0x310/0x310 [ 47.751670][ T1078] ? debug_smp_processor_id+0x17/0x20 [ 47.757124][ T1078] __x64_sys_bpf+0x7c/0x90 [ 47.761546][ T1078] x64_sys_call+0x4b9/0x9a0 [ 47.766145][ T1078] do_syscall_64+0x4c/0xa0 [ 47.770655][ T1078] ? clear_bhb_loop+0x50/0xa0 [ 47.775327][ T1078] ? clear_bhb_loop+0x50/0xa0 [ 47.780005][ T1078] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.785905][ T1078] RIP: 0033:0x7f2ed6a8cbe9 [ 47.790315][ T1078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.809919][ T1078] RSP: 002b:00007f2ed54f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.818346][ T1078] RAX: ffffffffffffffda RBX: 00007f2ed6cc3fa0 RCX: 00007f2ed6a8cbe9 [ 47.826312][ T1078] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 47.834276][ T1078] RBP: 00007f2ed54f5090 R08: 0000000000000000 R09: 0000000000000000 [ 47.842504][ T1078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.850644][ T1078] R13: 00007f2ed6cc4038 R14: 00007f2ed6cc3fa0 R15: 00007ffcecf3b928 [ 47.858791][ T1078] [ 48.707258][ T1149] -1: renamed from syzkaller0 [ 49.066315][ T1174] GPL: port 1(erspan0) entered blocking state [ 49.073428][ T1174] GPL: port 1(erspan0) entered disabled state [ 49.085972][ T1174] device erspan0 entered promiscuous mode [ 49.271904][ T1179] device pim6reg1 entered promiscuous mode [ 49.500301][ T1196] bond_slave_1: mtu less than device minimum [ 49.575188][ T30] audit: type=1400 audit(1756976684.789:125): avc: denied { create } for pid=1201 comm="syz.3.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 50.257503][ T1226] bond_slave_1: mtu less than device minimum [ 50.955358][ T1253] bond_slave_1: mtu less than device minimum [ 51.155377][ T1265] FAULT_INJECTION: forcing a failure. [ 51.155377][ T1265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.168952][ T1265] CPU: 1 PID: 1265 Comm: syz.0.381 Not tainted syzkaller #0 [ 51.176247][ T1265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 51.186307][ T1265] Call Trace: [ 51.189588][ T1265] [ 51.192591][ T1265] __dump_stack+0x21/0x30 [ 51.196937][ T1265] dump_stack_lvl+0xee/0x150 [ 51.201532][ T1265] ? show_regs_print_info+0x20/0x20 [ 51.206836][ T1265] ? __kasan_check_write+0x14/0x20 [ 51.211959][ T1265] ? _raw_spin_lock_irq+0x8f/0xe0 [ 51.216993][ T1265] dump_stack+0x15/0x20 [ 51.221156][ T1265] should_fail+0x3c1/0x510 [ 51.225579][ T1265] should_fail_usercopy+0x1a/0x20 [ 51.230606][ T1265] copy_page_from_iter_atomic+0x3fb/0x1350 [ 51.236421][ T1265] ? pipe_zero+0x370/0x370 [ 51.240848][ T1265] generic_perform_write+0x307/0x670 [ 51.246151][ T1265] ? grab_cache_page_write_begin+0xb0/0xb0 [ 51.252114][ T1265] ? file_remove_privs+0x590/0x590 [ 51.257259][ T1265] __generic_file_write_iter+0x268/0x480 [ 51.262897][ T1265] generic_file_write_iter+0xa9/0x1d0 [ 51.268273][ T1265] vfs_write+0x802/0xf70 [ 51.272524][ T1265] ? file_end_write+0x1b0/0x1b0 [ 51.277469][ T1265] ? wait_for_completion_killable_timeout+0x10/0x10 [ 51.284064][ T1265] ? __fget_files+0x2c4/0x320 [ 51.288742][ T1265] ? __fdget_pos+0x2d2/0x380 [ 51.293318][ T1265] ? ksys_write+0x71/0x240 [ 51.297717][ T1265] ksys_write+0x140/0x240 [ 51.302032][ T1265] ? __ia32_sys_read+0x90/0x90 [ 51.306782][ T1265] ? debug_smp_processor_id+0x17/0x20 [ 51.312181][ T1265] __x64_sys_write+0x7b/0x90 [ 51.316768][ T1265] x64_sys_call+0x8ef/0x9a0 [ 51.321284][ T1265] do_syscall_64+0x4c/0xa0 [ 51.325738][ T1265] ? clear_bhb_loop+0x50/0xa0 [ 51.330443][ T1265] ? clear_bhb_loop+0x50/0xa0 [ 51.335149][ T1265] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.341236][ T1265] RIP: 0033:0x7f84f59f0be9 [ 51.345644][ T1265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.365280][ T1265] RSP: 002b:00007f84f4459038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.373707][ T1265] RAX: ffffffffffffffda RBX: 00007f84f5c27fa0 RCX: 00007f84f59f0be9 [ 51.381780][ T1265] RDX: 0000000000040001 RSI: 0000200000000180 RDI: 0000000000000005 [ 51.389836][ T1265] RBP: 00007f84f4459090 R08: 0000000000000000 R09: 0000000000000000 [ 51.397889][ T1265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 51.405875][ T1265] R13: 00007f84f5c28038 R14: 00007f84f5c27fa0 R15: 00007fffd7a44a38 [ 51.413948][ T1265] [ 51.650268][ T1288] bond_slave_1: mtu less than device minimum [ 52.380797][ T1317] FAULT_INJECTION: forcing a failure. [ 52.380797][ T1317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 52.402349][ T1317] CPU: 0 PID: 1317 Comm: syz.1.401 Not tainted syzkaller #0 [ 52.409785][ T1317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 52.419856][ T1317] Call Trace: [ 52.423169][ T1317] [ 52.426095][ T1317] __dump_stack+0x21/0x30 [ 52.430419][ T1317] dump_stack_lvl+0xee/0x150 [ 52.435146][ T1317] ? show_regs_print_info+0x20/0x20 [ 52.440359][ T1317] ? get_page_from_freelist+0x2cc5/0x2d50 [ 52.446128][ T1317] dump_stack+0x15/0x20 [ 52.450290][ T1317] should_fail+0x3c1/0x510 [ 52.454703][ T1317] should_fail_alloc_page+0x55/0x80 [ 52.459959][ T1317] prepare_alloc_pages+0x156/0x600 [ 52.465108][ T1317] ? __alloc_pages_bulk+0xab0/0xab0 [ 52.470336][ T1317] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 52.476056][ T1317] __alloc_pages+0x10a/0x440 [ 52.480639][ T1317] ? prep_new_page+0x110/0x110 [ 52.485408][ T1317] pcpu_populate_chunk+0x184/0xcb0 [ 52.490536][ T1317] ? _find_next_bit+0x1b5/0x200 [ 52.495384][ T1317] pcpu_alloc+0xc4d/0x1660 [ 52.499816][ T1317] __alloc_percpu_gfp+0x25/0x30 [ 52.504676][ T1317] bpf_map_alloc_percpu+0xc5/0x150 [ 52.509789][ T1317] htab_map_alloc+0xc1b/0x14f0 [ 52.514554][ T1317] map_create+0x455/0x21b0 [ 52.518964][ T1317] __sys_bpf+0x2cf/0x730 [ 52.523237][ T1317] ? bpf_link_show_fdinfo+0x310/0x310 [ 52.528604][ T1317] ? debug_smp_processor_id+0x17/0x20 [ 52.533985][ T1317] __x64_sys_bpf+0x7c/0x90 [ 52.538401][ T1317] x64_sys_call+0x4b9/0x9a0 [ 52.542896][ T1317] do_syscall_64+0x4c/0xa0 [ 52.547487][ T1317] ? clear_bhb_loop+0x50/0xa0 [ 52.552155][ T1317] ? clear_bhb_loop+0x50/0xa0 [ 52.556835][ T1317] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.562833][ T1317] RIP: 0033:0x7fad19b74be9 [ 52.567243][ T1317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.586860][ T1317] RSP: 002b:00007fad185dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.595556][ T1317] RAX: ffffffffffffffda RBX: 00007fad19dabfa0 RCX: 00007fad19b74be9 [ 52.603521][ T1317] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 52.611680][ T1317] RBP: 00007fad185dd090 R08: 0000000000000000 R09: 0000000000000000 [ 52.619646][ T1317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 52.627604][ T1317] R13: 00007fad19dac038 R14: 00007fad19dabfa0 R15: 00007ffd63c535d8 [ 52.635746][ T1317] [ 52.702993][ T1324] bond_slave_1: mtu less than device minimum [ 53.224537][ T1346] device syzkaller0 entered promiscuous mode [ 53.857064][ T1359] bond_slave_1: mtu less than device minimum [ 54.407323][ T1384] syz.4.429[1384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.407467][ T1384] syz.4.429[1384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.608347][ T1382] device syzkaller0 entered promiscuous mode [ 54.709701][ T1390] bond_slave_1: mtu less than device minimum [ 54.943940][ T1399] FAULT_INJECTION: forcing a failure. [ 54.943940][ T1399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.975936][ T1399] CPU: 1 PID: 1399 Comm: syz.4.434 Not tainted syzkaller #0 [ 54.983362][ T1399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 54.993515][ T1399] Call Trace: [ 54.996796][ T1399] [ 54.999727][ T1399] __dump_stack+0x21/0x30 [ 55.004100][ T1399] dump_stack_lvl+0xee/0x150 [ 55.008688][ T1399] ? show_regs_print_info+0x20/0x20 [ 55.013970][ T1399] ? bpf_trace_run3+0xd1/0x1e0 [ 55.019254][ T1399] dump_stack+0x15/0x20 [ 55.023404][ T1399] should_fail+0x3c1/0x510 [ 55.027818][ T1399] should_fail_usercopy+0x1a/0x20 [ 55.032835][ T1399] copy_fpstate_to_sigframe+0x6d4/0x9a0 [ 55.038470][ T1399] ? fpregs_set+0x540/0x540 [ 55.043227][ T1399] ? get_signal+0x13da/0x1480 [ 55.047904][ T1399] ? fpu__alloc_mathframe+0x88/0x150 [ 55.053188][ T1399] arch_do_signal_or_restart+0x5e3/0x10f0 [ 55.058909][ T1399] ? __send_signal+0xc0e/0xc30 [ 55.063706][ T1399] ? send_signal+0x422/0x580 [ 55.068393][ T1399] ? get_sigframe_size+0x10/0x10 [ 55.073324][ T1399] ? force_sig_info_to_task+0x344/0x3f0 [ 55.078869][ T1399] ? force_sig+0xb7/0x100 [ 55.083202][ T1399] ? send_sig+0x70/0x70 [ 55.087359][ T1399] exit_to_user_mode_loop+0xa7/0xe0 [ 55.092554][ T1399] exit_to_user_mode_prepare+0x5a/0xa0 [ 55.098007][ T1399] irqentry_exit_to_user_mode+0x9/0x10 [ 55.103549][ T1399] irqentry_exit+0x12/0x40 [ 55.108059][ T1399] exc_general_protection+0x1e4/0x270 [ 55.113430][ T1399] ? debug_smp_processor_id+0x17/0x20 [ 55.118822][ T1399] ? do_syscall_64+0x58/0xa0 [ 55.123408][ T1399] asm_exc_general_protection+0x27/0x30 [ 55.128950][ T1399] RIP: 0033:0x7f2f84d46739 [ 55.133361][ T1399] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 55.153247][ T1399] RSP: 002b:00007f2f837d57c8 EFLAGS: 00010283 [ 55.159331][ T1399] RAX: 0000000000000999 RBX: 00007f2f837d5d30 RCX: 00007f2f84f67120 [ 55.167311][ T1399] RDX: 9999999999999999 RSI: 00007f2f84df0b31 RDI: 9999999999999999 [ 55.175486][ T1399] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 55.183681][ T1399] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 55.191668][ T1399] R13: 00007f2f837d5eb0 R14: 9999999999999999 R15: 0000000000000000 [ 55.199860][ T1399] [ 55.566299][ T1418] bond_slave_1: mtu less than device minimum [ 55.911293][ T1430] device syzkaller0 entered promiscuous mode [ 56.521022][ T1447] bond_slave_1: mtu less than device minimum [ 57.263232][ T1468] device syzkaller0 entered promiscuous mode [ 57.625063][ T1480] bond_slave_1: mtu less than device minimum [ 58.171697][ T1495] FAULT_INJECTION: forcing a failure. [ 58.171697][ T1495] name failslab, interval 1, probability 0, space 0, times 0 [ 58.255874][ T1495] CPU: 1 PID: 1495 Comm: syz.3.477 Not tainted syzkaller #0 [ 58.263340][ T1495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 58.273424][ T1495] Call Trace: [ 58.276716][ T1495] [ 58.279652][ T1495] __dump_stack+0x21/0x30 [ 58.283991][ T1495] dump_stack_lvl+0xee/0x150 [ 58.288586][ T1495] ? show_regs_print_info+0x20/0x20 [ 58.293799][ T1495] ? dev_queue_xmit+0x20/0x20 [ 58.298478][ T1495] dump_stack+0x15/0x20 [ 58.302634][ T1495] should_fail+0x3c1/0x510 [ 58.307058][ T1495] __should_failslab+0xa4/0xe0 [ 58.311836][ T1495] should_failslab+0x9/0x20 [ 58.316436][ T1495] slab_pre_alloc_hook+0x3b/0xe0 [ 58.321381][ T1495] ? skb_clone+0x1cf/0x360 [ 58.325806][ T1495] kmem_cache_alloc+0x44/0x260 [ 58.330686][ T1495] skb_clone+0x1cf/0x360 [ 58.334959][ T1495] bpf_clone_redirect+0xa7/0x380 [ 58.339982][ T1495] bpf_prog_b36a1f39e2fdd4f4+0x56/0x7ac [ 58.345529][ T1495] ? __kasan_slab_alloc+0xcf/0xf0 [ 58.350552][ T1495] ? __kasan_slab_alloc+0xbd/0xf0 [ 58.355764][ T1495] ? slab_post_alloc_hook+0x4f/0x2b0 [ 58.361062][ T1495] ? kmem_cache_alloc+0xf7/0x260 [ 58.366007][ T1495] ? __build_skb+0x2d/0x310 [ 58.370508][ T1495] ? build_skb+0x24/0x200 [ 58.374847][ T1495] ? bpf_prog_test_run_skb+0x279/0x1150 [ 58.380393][ T1495] ? bpf_prog_test_run+0x3d5/0x620 [ 58.385502][ T1495] ? __sys_bpf+0x52c/0x730 [ 58.389914][ T1495] ? __x64_sys_bpf+0x7c/0x90 [ 58.394498][ T1495] ? x64_sys_call+0x4b9/0x9a0 [ 58.399179][ T1495] ? do_syscall_64+0x4c/0xa0 [ 58.403773][ T1495] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.409847][ T1495] ? __kasan_check_read+0x11/0x20 [ 58.414937][ T1495] ? bpf_test_timer_continue+0x146/0x4a0 [ 58.420577][ T1495] bpf_test_run+0x33d/0x8d0 [ 58.425081][ T1495] ? convert___skb_to_skb+0x4f0/0x4f0 [ 58.430541][ T1495] ? eth_get_headlen+0x1f0/0x1f0 [ 58.435484][ T1495] ? convert___skb_to_skb+0x41/0x4f0 [ 58.440764][ T1495] bpf_prog_test_run_skb+0x9ec/0x1150 [ 58.446256][ T1495] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 58.452168][ T1495] bpf_prog_test_run+0x3d5/0x620 [ 58.457121][ T1495] ? bpf_prog_query+0x230/0x230 [ 58.461971][ T1495] ? selinux_bpf+0xce/0xf0 [ 58.466388][ T1495] ? security_bpf+0x82/0xa0 [ 58.470944][ T1495] __sys_bpf+0x52c/0x730 [ 58.475211][ T1495] ? bpf_link_show_fdinfo+0x310/0x310 [ 58.480601][ T1495] ? debug_smp_processor_id+0x17/0x20 [ 58.486045][ T1495] __x64_sys_bpf+0x7c/0x90 [ 58.490463][ T1495] x64_sys_call+0x4b9/0x9a0 [ 58.494962][ T1495] do_syscall_64+0x4c/0xa0 [ 58.499475][ T1495] ? clear_bhb_loop+0x50/0xa0 [ 58.504187][ T1495] ? clear_bhb_loop+0x50/0xa0 [ 58.508900][ T1495] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.514807][ T1495] RIP: 0033:0x7f2ed6a8cbe9 [ 58.519334][ T1495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.539118][ T1495] RSP: 002b:00007f2ed54f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 58.547624][ T1495] RAX: ffffffffffffffda RBX: 00007f2ed6cc3fa0 RCX: 00007f2ed6a8cbe9 [ 58.555629][ T1495] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 58.563695][ T1495] RBP: 00007f2ed54f5090 R08: 0000000000000000 R09: 0000000000000000 [ 58.571672][ T1495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 58.579737][ T1495] R13: 00007f2ed6cc4038 R14: 00007f2ed6cc3fa0 R15: 00007ffcecf3b928 [ 58.588076][ T1495] [ 58.704010][ T1497] device syzkaller0 entered promiscuous mode [ 58.768953][ T1509] bond_slave_1: mtu less than device minimum [ 59.520822][ T1541] bond_slave_1: mtu less than device minimum [ 59.582795][ T30] audit: type=1400 audit(1756976694.799:126): avc: denied { create } for pid=1543 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 59.895650][ T1577] bond_slave_1: mtu less than device minimum [ 60.050500][ T1581] FAULT_INJECTION: forcing a failure. [ 60.050500][ T1581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.068434][ T1581] CPU: 1 PID: 1581 Comm: syz.0.511 Not tainted syzkaller #0 [ 60.075844][ T1581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.085912][ T1581] Call Trace: [ 60.089200][ T1581] [ 60.092136][ T1581] __dump_stack+0x21/0x30 [ 60.096573][ T1581] dump_stack_lvl+0xee/0x150 [ 60.101288][ T1581] ? show_regs_print_info+0x20/0x20 [ 60.106497][ T1581] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 60.111965][ T1581] dump_stack+0x15/0x20 [ 60.116137][ T1581] should_fail+0x3c1/0x510 [ 60.120565][ T1581] should_fail_usercopy+0x1a/0x20 [ 60.125603][ T1581] _copy_to_user+0x20/0x90 [ 60.130054][ T1581] bpf_test_finish+0x20c/0x3b0 [ 60.134852][ T1581] ? convert_skb_to___skb+0x360/0x360 [ 60.140319][ T1581] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 60.145855][ T1581] bpf_prog_test_run_xdp+0x62d/0x910 [ 60.151125][ T1581] ? dev_put+0x80/0x80 [ 60.155281][ T1581] ? __fget_files+0x2c4/0x320 [ 60.159948][ T1581] ? fput_many+0x15a/0x1a0 [ 60.164352][ T1581] ? dev_put+0x80/0x80 [ 60.168424][ T1581] bpf_prog_test_run+0x3d5/0x620 [ 60.173351][ T1581] ? bpf_prog_query+0x230/0x230 [ 60.178286][ T1581] ? selinux_bpf+0xce/0xf0 [ 60.182702][ T1581] ? security_bpf+0x82/0xa0 [ 60.187290][ T1581] __sys_bpf+0x52c/0x730 [ 60.191632][ T1581] ? bpf_link_show_fdinfo+0x310/0x310 [ 60.197126][ T1581] ? debug_smp_processor_id+0x17/0x20 [ 60.202609][ T1581] __x64_sys_bpf+0x7c/0x90 [ 60.207038][ T1581] x64_sys_call+0x4b9/0x9a0 [ 60.211545][ T1581] do_syscall_64+0x4c/0xa0 [ 60.215971][ T1581] ? clear_bhb_loop+0x50/0xa0 [ 60.220759][ T1581] ? clear_bhb_loop+0x50/0xa0 [ 60.225474][ T1581] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.231376][ T1581] RIP: 0033:0x7f84f59f0be9 [ 60.235800][ T1581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.255501][ T1581] RSP: 002b:00007f84f4459038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 60.264092][ T1581] RAX: ffffffffffffffda RBX: 00007f84f5c27fa0 RCX: 00007f84f59f0be9 [ 60.272079][ T1581] RDX: 0000000000000050 RSI: 0000200000000500 RDI: 000000000000000a [ 60.280136][ T1581] RBP: 00007f84f4459090 R08: 0000000000000000 R09: 0000000000000000 [ 60.288102][ T1581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.296162][ T1581] R13: 00007f84f5c28038 R14: 00007f84f5c27fa0 R15: 00007fffd7a44a38 [ 60.304240][ T1581] [ 60.419184][ T1603] bond_slave_1: mtu less than device minimum [ 61.324512][ T1624] device syzkaller0 entered promiscuous mode [ 63.315820][ C0] sched: RT throttling activated [ 63.422338][ T1636] bond_slave_1: mtu less than device minimum [ 63.979391][ T1650] device syzkaller0 entered promiscuous mode [ 64.472607][ T1667] sock: sock_set_timeout: `syz.3.548' (pid 1667) tries to set negative timeout [ 64.602606][ T1674] bond_slave_1: mtu less than device minimum [ 65.583593][ T1698] FAULT_INJECTION: forcing a failure. [ 65.583593][ T1698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 65.665961][ T1698] CPU: 0 PID: 1698 Comm: syz.3.560 Not tainted syzkaller #0 [ 65.673307][ T1698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 65.683554][ T1698] Call Trace: [ 65.686854][ T1698] [ 65.689810][ T1698] __dump_stack+0x21/0x30 [ 65.694164][ T1698] dump_stack_lvl+0xee/0x150 [ 65.698772][ T1698] ? show_regs_print_info+0x20/0x20 [ 65.703991][ T1698] dump_stack+0x15/0x20 [ 65.708155][ T1698] should_fail+0x3c1/0x510 [ 65.712582][ T1698] should_fail_usercopy+0x1a/0x20 [ 65.717618][ T1698] _copy_from_iter+0x21a/0x1050 [ 65.722657][ T1698] ? __kasan_check_write+0x14/0x20 [ 65.727866][ T1698] ? skb_set_owner_w+0x24d/0x370 [ 65.732923][ T1698] ? copy_mc_pipe_to_iter+0x770/0x770 [ 65.738406][ T1698] ? __kernel_text_address+0xa0/0x100 [ 65.743897][ T1698] ? check_stack_object+0x81/0x140 [ 65.749125][ T1698] ? __kasan_check_read+0x11/0x20 [ 65.754168][ T1698] ? __check_object_size+0x2f4/0x3c0 [ 65.759650][ T1698] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 65.765395][ T1698] ? skb_put+0x10e/0x1f0 [ 65.769668][ T1698] tun_get_user+0xc3c/0x33c0 [ 65.774302][ T1698] ? __kasan_init_slab_obj+0x10/0x40 [ 65.779609][ T1698] ? kmem_cache_free+0x100/0x320 [ 65.784567][ T1698] ? __x64_sys_openat+0x136/0x160 [ 65.789611][ T1698] ? x64_sys_call+0x219/0x9a0 [ 65.794300][ T1698] ? tun_do_read+0x1c40/0x1c40 [ 65.799076][ T1698] ? kstrtouint_from_user+0x1a0/0x200 [ 65.804456][ T1698] ? kstrtol_from_user+0x260/0x260 [ 65.809584][ T1698] ? avc_policy_seqno+0x1b/0x70 [ 65.814525][ T1698] ? selinux_file_permission+0x2aa/0x510 [ 65.820307][ T1698] tun_chr_write_iter+0x1eb/0x2e0 [ 65.825455][ T1698] vfs_write+0x802/0xf70 [ 65.829715][ T1698] ? file_end_write+0x1b0/0x1b0 [ 65.834591][ T1698] ? __fget_files+0x2c4/0x320 [ 65.839416][ T1698] ? __fdget_pos+0x1f7/0x380 [ 65.844031][ T1698] ? ksys_write+0x71/0x240 [ 65.848551][ T1698] ksys_write+0x140/0x240 [ 65.853147][ T1698] ? __ia32_sys_read+0x90/0x90 [ 65.857917][ T1698] ? debug_smp_processor_id+0x17/0x20 [ 65.863387][ T1698] __x64_sys_write+0x7b/0x90 [ 65.867989][ T1698] x64_sys_call+0x8ef/0x9a0 [ 65.872523][ T1698] do_syscall_64+0x4c/0xa0 [ 65.873877][ T1700] device syzkaller0 entered promiscuous mode [ 65.876959][ T1698] ? clear_bhb_loop+0x50/0xa0 [ 65.876983][ T1698] ? clear_bhb_loop+0x50/0xa0 [ 65.877002][ T1698] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.877021][ T1698] RIP: 0033:0x7f2ed6a8cbe9 [ 65.877038][ T1698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.877053][ T1698] RSP: 002b:00007f2ed54f5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 65.877075][ T1698] RAX: ffffffffffffffda RBX: 00007f2ed6cc3fa0 RCX: 00007f2ed6a8cbe9 [ 65.877090][ T1698] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 65.877109][ T1698] RBP: 00007f2ed54f5090 R08: 0000000000000000 R09: 0000000000000000 [ 65.877120][ T1698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.877131][ T1698] R13: 00007f2ed6cc4038 R14: 00007f2ed6cc3fa0 R15: 00007ffcecf3b928 [ 65.877148][ T1698] [ 66.216740][ T1709] bond_slave_1: mtu less than device minimum [ 67.691628][ T284] syz-executor (284) used greatest stack depth: 21792 bytes left [ 68.075543][ T1715] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.082921][ T1715] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.090770][ T1715] device bridge_slave_0 entered promiscuous mode [ 68.098210][ T1715] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.105246][ T1715] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.113149][ T1715] device bridge_slave_1 entered promiscuous mode [ 68.245419][ T1743] bond_slave_1: mtu less than device minimum [ 68.468643][ T30] audit: type=1400 audit(1756976703.689:127): avc: denied { write } for pid=1715 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.561943][ T30] audit: type=1400 audit(1756976703.729:128): avc: denied { read } for pid=1715 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.609291][ T1715] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.616502][ T1715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.623794][ T1715] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.630859][ T1715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.799215][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.824437][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.079078][ T1758] device syzkaller0 entered promiscuous mode [ 70.364639][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.396351][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.478530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.487401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.495931][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.502998][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.512081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.552659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.756254][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.763347][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.787320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.795547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.805518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.814556][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.856331][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 70.875434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.915095][ T1715] device veth0_vlan entered promiscuous mode [ 70.936810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 70.976331][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.991437][ T1715] device veth1_macvtap entered promiscuous mode [ 71.067344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.096711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.104444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.116429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.124757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.206747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.216552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.225274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.233997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 71.371323][ T10] device bridge_slave_1 left promiscuous mode [ 71.382341][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.436047][ T10] device bridge_slave_0 left promiscuous mode [ 71.454547][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.488651][ T10] device veth1_macvtap left promiscuous mode [ 71.540598][ T10] device veth0_vlan left promiscuous mode [ 73.482670][ T1841] device syzkaller0 entered promiscuous mode [ 74.432550][ T1869] device veth0_vlan left promiscuous mode [ 74.529660][ T1869] device veth0_vlan entered promiscuous mode [ 74.688865][ T30] audit: type=1400 audit(1756976709.909:129): avc: denied { create } for pid=1870 comm="syz.0.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 75.757754][ T1904] device veth1_macvtap left promiscuous mode [ 75.778973][ T1904] device veth1_macvtap entered promiscuous mode [ 75.824012][ T1904] device macsec0 entered promiscuous mode [ 75.844715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 77.698639][ T1924] device syzkaller0 entered promiscuous mode [ 79.007416][ T1962] bond_slave_1: mtu less than device minimum [ 80.413196][ T2003] bond_slave_1: mtu less than device minimum [ 81.120605][ T2022] FAULT_INJECTION: forcing a failure. [ 81.120605][ T2022] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 81.148057][ T2022] CPU: 1 PID: 2022 Comm: syz.4.685 Not tainted syzkaller #0 [ 81.155483][ T2022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.165590][ T2022] Call Trace: [ 81.168884][ T2022] [ 81.171822][ T2022] __dump_stack+0x21/0x30 [ 81.176257][ T2022] dump_stack_lvl+0xee/0x150 [ 81.180970][ T2022] ? show_regs_print_info+0x20/0x20 [ 81.186181][ T2022] dump_stack+0x15/0x20 [ 81.190449][ T2022] should_fail+0x3c1/0x510 [ 81.194936][ T2022] should_fail_alloc_page+0x55/0x80 [ 81.200236][ T2022] prepare_alloc_pages+0x156/0x600 [ 81.205361][ T2022] ? __alloc_pages_bulk+0xab0/0xab0 [ 81.210699][ T2022] __alloc_pages+0x10a/0x440 [ 81.215307][ T2022] ? prep_new_page+0x110/0x110 [ 81.220341][ T2022] ? avc_has_perm_noaudit+0x2f4/0x460 [ 81.225915][ T2022] kmalloc_order+0x4c/0x160 [ 81.230427][ T2022] kmalloc_order_trace+0x18/0xb0 [ 81.235371][ T2022] __kmalloc+0x199/0x2c0 [ 81.239628][ T2022] kvmalloc_node+0x206/0x300 [ 81.244225][ T2022] ? vm_mmap+0xb0/0xb0 [ 81.248300][ T2022] ? cap_capable+0x1aa/0x230 [ 81.252999][ T2022] alloc_netdev_mqs+0x8d/0xc90 [ 81.257780][ T2022] ? tun_not_capable+0x1f0/0x1f0 [ 81.262822][ T2022] tun_set_iff+0x535/0xe00 [ 81.267265][ T2022] __tun_chr_ioctl+0x7e8/0x1eb0 [ 81.272128][ T2022] ? tun_flow_create+0x320/0x320 [ 81.277078][ T2022] ? mutex_unlock+0x89/0x220 [ 81.281701][ T2022] ? __fget_files+0x2c4/0x320 [ 81.286392][ T2022] tun_chr_ioctl+0x2a/0x40 [ 81.290824][ T2022] ? tun_chr_poll+0x720/0x720 [ 81.295604][ T2022] __se_sys_ioctl+0x121/0x1a0 [ 81.300304][ T2022] __x64_sys_ioctl+0x7b/0x90 [ 81.304900][ T2022] x64_sys_call+0x2f/0x9a0 [ 81.309312][ T2022] do_syscall_64+0x4c/0xa0 [ 81.313724][ T2022] ? clear_bhb_loop+0x50/0xa0 [ 81.318401][ T2022] ? clear_bhb_loop+0x50/0xa0 [ 81.323076][ T2022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.328964][ T2022] RIP: 0033:0x7f2f84d6dbe9 [ 81.333376][ T2022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.352981][ T2022] RSP: 002b:00007f2f837d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 81.361569][ T2022] RAX: ffffffffffffffda RBX: 00007f2f84fa4fa0 RCX: 00007f2f84d6dbe9 [ 81.369549][ T2022] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 81.377519][ T2022] RBP: 00007f2f837d6090 R08: 0000000000000000 R09: 0000000000000000 [ 81.385483][ T2022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.393619][ T2022] R13: 00007f2f84fa5038 R14: 00007f2f84fa4fa0 R15: 00007ffc31eb8b68 [ 81.401589][ T2022] [ 81.866900][ T2034] device sit0 entered promiscuous mode [ 82.085886][ T2040] bond_slave_1: mtu less than device minimum [ 83.212807][ T2074] bond_slave_1: mtu less than device minimum [ 83.789162][ T2092] syz.1.712[2092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.789229][ T2092] syz.1.712[2092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.866728][ T2096] FAULT_INJECTION: forcing a failure. [ 83.866728][ T2096] name failslab, interval 1, probability 0, space 0, times 0 [ 83.946066][ T2096] CPU: 1 PID: 2096 Comm: syz.0.713 Not tainted syzkaller #0 [ 83.953490][ T2096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 83.963562][ T2096] Call Trace: [ 83.967012][ T2096] [ 83.969964][ T2096] __dump_stack+0x21/0x30 [ 83.974310][ T2096] dump_stack_lvl+0xee/0x150 [ 83.978927][ T2096] ? show_regs_print_info+0x20/0x20 [ 83.984142][ T2096] dump_stack+0x15/0x20 [ 83.988309][ T2096] should_fail+0x3c1/0x510 [ 83.992752][ T2096] __should_failslab+0xa4/0xe0 [ 83.997636][ T2096] should_failslab+0x9/0x20 [ 84.002162][ T2096] slab_pre_alloc_hook+0x3b/0xe0 [ 84.007121][ T2096] __kmalloc+0x6d/0x2c0 [ 84.011311][ T2096] ? security_prepare_creds+0x4e/0x140 [ 84.016811][ T2096] security_prepare_creds+0x4e/0x140 [ 84.022112][ T2096] prepare_creds+0x456/0x640 [ 84.026718][ T2096] copy_creds+0xe4/0x640 [ 84.030980][ T2096] copy_process+0x799/0x3210 [ 84.035584][ T2096] ? kstrtol_from_user+0x260/0x260 [ 84.040721][ T2096] ? __kasan_check_write+0x14/0x20 [ 84.045872][ T2096] ? proc_fail_nth_write+0x17a/0x1f0 [ 84.051168][ T2096] ? proc_fail_nth_read+0x210/0x210 [ 84.056378][ T2096] ? __pidfd_prepare+0x150/0x150 [ 84.061329][ T2096] ? security_file_permission+0x83/0xa0 [ 84.066912][ T2096] kernel_clone+0x23f/0x940 [ 84.071433][ T2096] ? create_io_thread+0x130/0x130 [ 84.076486][ T2096] ? __kasan_check_write+0x14/0x20 [ 84.081619][ T2096] ? mutex_unlock+0x89/0x220 [ 84.086400][ T2096] __x64_sys_clone+0x176/0x1d0 [ 84.091191][ T2096] ? __kasan_check_write+0x14/0x20 [ 84.096311][ T2096] ? __ia32_sys_vfork+0xf0/0xf0 [ 84.101193][ T2096] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 84.107372][ T2096] x64_sys_call+0x41f/0x9a0 [ 84.111883][ T2096] do_syscall_64+0x4c/0xa0 [ 84.116306][ T2096] ? clear_bhb_loop+0x50/0xa0 [ 84.121002][ T2096] ? clear_bhb_loop+0x50/0xa0 [ 84.125795][ T2096] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 84.131797][ T2096] RIP: 0033:0x7f84f59f0be9 [ 84.136223][ T2096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.156196][ T2096] RSP: 002b:00007f84f4458fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 84.164715][ T2096] RAX: ffffffffffffffda RBX: 00007f84f5c27fa0 RCX: 00007f84f59f0be9 [ 84.172894][ T2096] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000044044000 [ 84.180875][ T2096] RBP: 00007f84f4459090 R08: 0000000000000000 R09: 0000000000000000 [ 84.188947][ T2096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 84.196927][ T2096] R13: 00007f84f5c28038 R14: 00007f84f5c27fa0 R15: 00007fffd7a44a38 [ 84.204911][ T2096] [ 84.301264][ T2103] bond_slave_1: mtu less than device minimum [ 84.604497][ T2110] bond_slave_1: mtu less than device minimum [ 85.472443][ T2138] bond_slave_1: mtu less than device minimum [ 86.645706][ T2165] bond_slave_1: mtu less than device minimum [ 87.025285][ T2172] device syzkaller0 entered promiscuous mode [ 88.141325][ T2196] bond_slave_1: mtu less than device minimum [ 89.123160][ T30] audit: type=1400 audit(1756976724.309:130): avc: denied { create } for pid=2216 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 89.405587][ T2226] bond_slave_1: mtu less than device minimum [ 89.472800][ T30] audit: type=1400 audit(1756976724.689:131): avc: denied { associate } for pid=2227 comm="syz.5.769" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 90.631820][ T2259] bond_slave_1: mtu less than device minimum [ 91.901212][ T2285] bond_slave_1: mtu less than device minimum [ 92.280017][ T2290] bond_slave_1: mtu less than device minimum [ 93.815231][ T30] audit: type=1400 audit(1756976729.029:132): avc: denied { create } for pid=2325 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 93.896880][ T2330] bond_slave_1: mtu less than device minimum [ 94.262381][ T2336] bond_slave_1: mtu less than device minimum [ 95.414237][ T2365] bond_slave_1: mtu less than device minimum [ 96.916565][ T2399] bond_slave_1: mtu less than device minimum [ 97.219172][ T30] audit: type=1400 audit(1756976732.439:133): avc: denied { create } for pid=2409 comm="syz.3.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.417480][ T2423] bond_slave_1: mtu less than device minimum [ 98.269882][ T2449] bond_slave_1: mtu less than device minimum [ 99.532495][ T2484] bond_slave_1: mtu less than device minimum [ 101.553438][ T2553] FAULT_INJECTION: forcing a failure. [ 101.553438][ T2553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.655891][ T2553] CPU: 0 PID: 2553 Comm: syz.1.904 Not tainted syzkaller #0 [ 101.663236][ T2553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 101.673479][ T2553] Call Trace: [ 101.676772][ T2553] [ 101.679715][ T2553] __dump_stack+0x21/0x30 [ 101.684062][ T2553] dump_stack_lvl+0xee/0x150 [ 101.688668][ T2553] ? show_regs_print_info+0x20/0x20 [ 101.693885][ T2553] dump_stack+0x15/0x20 [ 101.698047][ T2553] should_fail+0x3c1/0x510 [ 101.702562][ T2553] should_fail_usercopy+0x1a/0x20 [ 101.707590][ T2553] _copy_from_iter+0x21a/0x1050 [ 101.712447][ T2553] ? __kasan_check_write+0x14/0x20 [ 101.717653][ T2553] ? skb_set_owner_w+0x24d/0x370 [ 101.722600][ T2553] ? copy_mc_pipe_to_iter+0x770/0x770 [ 101.727987][ T2553] ? __kernel_text_address+0xa0/0x100 [ 101.733368][ T2553] ? check_stack_object+0x81/0x140 [ 101.738493][ T2553] ? __kasan_check_read+0x11/0x20 [ 101.743528][ T2553] ? __check_object_size+0x2f4/0x3c0 [ 101.748822][ T2553] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 101.754645][ T2553] ? skb_put+0x10e/0x1f0 [ 101.758896][ T2553] tun_get_user+0xc3c/0x33c0 [ 101.763494][ T2553] ? __kasan_init_slab_obj+0x10/0x40 [ 101.768787][ T2553] ? kmem_cache_free+0x100/0x320 [ 101.773742][ T2553] ? __x64_sys_openat+0x136/0x160 [ 101.778776][ T2553] ? x64_sys_call+0x219/0x9a0 [ 101.783465][ T2553] ? tun_do_read+0x1c40/0x1c40 [ 101.788297][ T2553] ? kstrtouint_from_user+0x1a0/0x200 [ 101.793682][ T2553] ? kstrtol_from_user+0x260/0x260 [ 101.798814][ T2553] ? avc_policy_seqno+0x1b/0x70 [ 101.803675][ T2553] ? selinux_file_permission+0x2aa/0x510 [ 101.809421][ T2553] tun_chr_write_iter+0x1eb/0x2e0 [ 101.814456][ T2553] vfs_write+0x802/0xf70 [ 101.818708][ T2553] ? file_end_write+0x1b0/0x1b0 [ 101.823654][ T2553] ? __fget_files+0x2c4/0x320 [ 101.828349][ T2553] ? __fdget_pos+0x1f7/0x380 [ 101.832957][ T2553] ? ksys_write+0x71/0x240 [ 101.837380][ T2553] ksys_write+0x140/0x240 [ 101.841721][ T2553] ? __ia32_sys_read+0x90/0x90 [ 101.846491][ T2553] ? debug_smp_processor_id+0x17/0x20 [ 101.851966][ T2553] __x64_sys_write+0x7b/0x90 [ 101.856574][ T2553] x64_sys_call+0x8ef/0x9a0 [ 101.861087][ T2553] do_syscall_64+0x4c/0xa0 [ 101.865516][ T2553] ? clear_bhb_loop+0x50/0xa0 [ 101.870210][ T2553] ? clear_bhb_loop+0x50/0xa0 [ 101.874905][ T2553] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.880826][ T2553] RIP: 0033:0x7fad19b74be9 [ 101.885249][ T2553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.905138][ T2553] RSP: 002b:00007fad185dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.913843][ T2553] RAX: ffffffffffffffda RBX: 00007fad19dabfa0 RCX: 00007fad19b74be9 [ 101.921830][ T2553] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 00000000000000c8 [ 101.929791][ T2553] RBP: 00007fad185dd090 R08: 0000000000000000 R09: 0000000000000000 [ 101.937752][ T2553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.945797][ T2553] R13: 00007fad19dac038 R14: 00007fad19dabfa0 R15: 00007ffd63c535d8 [ 101.953777][ T2553] [ 102.687897][ T2578] bond_slave_1: mtu less than device minimum [ 102.909484][ T2584] FAULT_INJECTION: forcing a failure. [ 102.909484][ T2584] name failslab, interval 1, probability 0, space 0, times 0 [ 102.956602][ T2586] device veth0_vlan left promiscuous mode [ 102.976091][ T2584] CPU: 0 PID: 2584 Comm: syz.1.918 Not tainted syzkaller #0 [ 102.983426][ T2584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.988873][ T2586] device veth0_vlan entered promiscuous mode [ 102.993489][ T2584] Call Trace: [ 102.993498][ T2584] [ 102.993506][ T2584] __dump_stack+0x21/0x30 [ 102.993531][ T2584] dump_stack_lvl+0xee/0x150 [ 102.993549][ T2584] ? show_regs_print_info+0x20/0x20 [ 102.993571][ T2584] dump_stack+0x15/0x20 [ 102.993589][ T2584] should_fail+0x3c1/0x510 [ 102.993607][ T2584] __should_failslab+0xa4/0xe0 [ 102.993629][ T2584] should_failslab+0x9/0x20 [ 103.037780][ T2584] slab_pre_alloc_hook+0x3b/0xe0 [ 103.042745][ T2584] __kmalloc+0x6d/0x2c0 [ 103.046948][ T2584] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 103.052787][ T2584] ? bpf_test_init+0x100/0x1c0 [ 103.057579][ T2584] bpf_test_init+0x100/0x1c0 [ 103.062188][ T2584] bpf_prog_test_run_skb+0x193/0x1150 [ 103.067583][ T2584] ? __kasan_check_write+0x14/0x20 [ 103.072705][ T2584] ? fput_many+0x15a/0x1a0 [ 103.077133][ T2584] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 103.083039][ T2584] bpf_prog_test_run+0x3d5/0x620 [ 103.088071][ T2584] ? bpf_prog_query+0x230/0x230 [ 103.092934][ T2584] ? selinux_bpf+0xce/0xf0 [ 103.097369][ T2584] ? security_bpf+0x82/0xa0 [ 103.101905][ T2584] __sys_bpf+0x52c/0x730 [ 103.106334][ T2584] ? bpf_link_show_fdinfo+0x310/0x310 [ 103.111729][ T2584] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 103.117922][ T2584] __x64_sys_bpf+0x7c/0x90 [ 103.122397][ T2584] x64_sys_call+0x4b9/0x9a0 [ 103.126921][ T2584] do_syscall_64+0x4c/0xa0 [ 103.131353][ T2584] ? clear_bhb_loop+0x50/0xa0 [ 103.136046][ T2584] ? clear_bhb_loop+0x50/0xa0 [ 103.140819][ T2584] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.141688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.146721][ T2584] RIP: 0033:0x7fad19b74be9 [ 103.146741][ T2584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.146758][ T2584] RSP: 002b:00007fad185dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.187319][ T2584] RAX: ffffffffffffffda RBX: 00007fad19dabfa0 RCX: 00007fad19b74be9 [ 103.195318][ T2584] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 103.203311][ T2584] RBP: 00007fad185dd090 R08: 0000000000000000 R09: 0000000000000000 [ 103.206449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.211288][ T2584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.226631][ T2584] R13: 00007fad19dac038 R14: 00007fad19dabfa0 R15: 00007ffd63c535d8 [ 103.234624][ T2584] [ 103.269215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.540766][ T2607] bond_slave_1: mtu less than device minimum [ 104.071785][ T2615] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.113507][ T2615] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.147706][ T2615] device bridge_slave_0 entered promiscuous mode [ 104.185106][ T2630] device veth0_vlan left promiscuous mode [ 104.240622][ T2630] device veth0_vlan entered promiscuous mode [ 104.259313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.271730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.299517][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.316787][ T2615] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.323916][ T2615] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.336398][ T2615] device bridge_slave_1 entered promiscuous mode [ 104.370757][ T30] audit: type=1400 audit(1756976739.589:134): avc: denied { create } for pid=2631 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 104.623792][ T381] device bridge_slave_1 left promiscuous mode [ 104.650346][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.666373][ T381] device bridge_slave_0 left promiscuous mode [ 104.672708][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.681247][ T381] device veth1_macvtap left promiscuous mode [ 104.687424][ T381] device veth0_vlan left promiscuous mode [ 104.908357][ T2647] bond_slave_1: mtu less than device minimum [ 105.004177][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.020541][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.066074][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.077405][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.085588][ T569] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.092742][ T569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.111041][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.119878][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.128537][ T569] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.135576][ T569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.183999][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.202310][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.227082][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.266045][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.292094][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.514413][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.523568][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.579710][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.589968][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.613752][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.644774][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.662705][ T2615] device veth0_vlan entered promiscuous mode [ 105.707877][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.724103][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.736149][ T2615] device veth1_macvtap entered promiscuous mode [ 105.751783][ T2671] GPL: port 1(erspan0) entered blocking state [ 105.758962][ T2671] GPL: port 1(erspan0) entered disabled state [ 105.773778][ T2671] device erspan0 entered promiscuous mode [ 105.794007][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.802306][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.810825][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.843094][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.868685][ T569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 106.515401][ T2686] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.524467][ T2686] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.538779][ T2686] device bridge_slave_0 entered promiscuous mode [ 106.551300][ T2686] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.567048][ T2686] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.589788][ T2686] device bridge_slave_1 entered promiscuous mode [ 107.317882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.350112][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.414089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.468680][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.536463][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.543561][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.565981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.581415][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.606149][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.613245][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.639977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.649263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.666516][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.933616][ T2686] device veth0_vlan entered promiscuous mode [ 107.972154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.991961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.052815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.094818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.146958][ T381] device bridge_slave_1 left promiscuous mode [ 108.153117][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.203248][ T381] device bridge_slave_0 left promiscuous mode [ 108.239898][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.284494][ T381] device veth1_macvtap left promiscuous mode [ 108.290768][ T381] device veth0_vlan left promiscuous mode [ 108.454632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 108.463146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.474540][ T2739] bond_slave_1: mtu less than device minimum [ 108.482409][ T2686] device veth1_macvtap entered promiscuous mode [ 108.506692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.516228][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.542722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.591005][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.657314][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.273620][ T2756] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.281736][ T2756] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.289391][ T2756] device bridge_slave_0 entered promiscuous mode [ 109.299959][ T2756] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.307500][ T2756] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.315433][ T2756] device bridge_slave_1 entered promiscuous mode [ 109.541439][ T381] device bridge_slave_1 left promiscuous mode [ 109.551117][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.585584][ T381] device bridge_slave_0 left promiscuous mode [ 109.614562][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.656872][ T381] device veth1_macvtap left promiscuous mode [ 109.692134][ T381] device veth0_vlan left promiscuous mode [ 109.852919][ T2773] bond_slave_1: mtu less than device minimum [ 109.955393][ T2756] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.962529][ T2756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.969932][ T2756] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.977075][ T2756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.256106][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.283761][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.399426][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.416095][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.447474][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.486303][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.494636][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.501811][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.596895][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.605531][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.656070][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.663135][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.691970][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.723247][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.756037][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.773751][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.832142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 110.851105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.968900][ T2756] device veth0_vlan entered promiscuous mode [ 110.976222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.007570][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.075880][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.120860][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.141591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.158082][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.190965][ T2756] device veth1_macvtap entered promiscuous mode [ 111.263673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.281147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.392749][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.408601][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.516327][ T2756] syz-executor (2756) used greatest stack depth: 21760 bytes left [ 111.528831][ T2812] bond_slave_1: mtu less than device minimum [ 112.144865][ T281] syz-executor (281) used greatest stack depth: 21192 bytes left [ 112.276744][ T381] device bridge_slave_1 left promiscuous mode [ 112.282891][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.290426][ T381] device bridge_slave_0 left promiscuous mode [ 112.296704][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.304441][ T381] device veth1_macvtap left promiscuous mode [ 112.310508][ T381] device veth0_vlan left promiscuous mode [ 113.459354][ T381] device erspan0 left promiscuous mode [ 113.464948][ T381] GPL: port 1(erspan0) entered disabled state [ 113.473766][ T381] device erspan0 left promiscuous mode [ 113.479300][ T381] GPL: port 1(erspan0) entered disabled state [ 113.917014][ T381] device bridge_slave_1 left promiscuous mode [ 113.923150][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.930834][ T381] device bridge_slave_0 left promiscuous mode [ 113.937290][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.945198][ T381] device bridge_slave_1 left promiscuous mode [ 113.951383][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.958770][ T381] device bridge_slave_0 left promiscuous mode [ 113.964865][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.972982][ T381] device bridge_slave_1 left promiscuous mode [ 113.979184][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.986667][ T381] device bridge_slave_0 left promiscuous mode [ 113.992769][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.000662][ T381] device bridge_slave_1 left promiscuous mode [ 114.007483][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.015039][ T381] device bridge_slave_0 left promiscuous mode [ 114.021372][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.029573][ T381] device veth1_macvtap left promiscuous mode [ 114.035568][ T381] device veth0_vlan left promiscuous mode [ 114.041590][ T381] device veth1_macvtap left promiscuous mode [ 114.047724][ T381] device veth1_macvtap left promiscuous mode [ 114.054141][ T381] device veth0_vlan left promiscuous mode [ 114.060095][ T381] device veth1_macvtap left promiscuous mode [ 114.066215][ T381] device veth0_vlan left promiscuous mode