last executing test programs: 8.816153493s ago: executing program 0 (id=10693): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004020000080000d0f49153b946376100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000200000000000000"], 0x0, 0x56}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r3, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000800), &(0x7f0000000840)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r8}, 0x10) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r9, 0xb701, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000640)="b9ff0300100d690b98caa58cd290", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 8.706371655s ago: executing program 1 (id=10695): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x50, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x810, 0x0, 0x5, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 8.527690098s ago: executing program 1 (id=10706): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc1", 0x1b, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 8.302324142s ago: executing program 0 (id=10699): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 7.818814862s ago: executing program 0 (id=10702): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc1", 0x1b, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 5.409750608s ago: executing program 1 (id=10714): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc1", 0x1b, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 5.339828549s ago: executing program 0 (id=10716): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x50, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x810, 0x0, 0x5, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 5.089468604s ago: executing program 3 (id=10718): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc1", 0x1b, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 4.982853985s ago: executing program 0 (id=10719): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x3ba, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x5, 0x4, 0x8, 0x5, 0x3a410, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc, 0x0, @value=r2, @void, @value=r2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x2000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r6, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000cfb0c225d007de9023803a9bf33467fa286a8bc593235fd7e006032e5aba617f525e51c6f03bf61a15794b5aaa"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.691352691s ago: executing program 4 (id=10721): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) 4.593528003s ago: executing program 2 (id=10722): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x24, 0x4, 0x9, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f0000000240), &(0x7f0000000540)=""/32}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="9e7dd9be696976ce", &(0x7f0000000280)=""/29}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x7, 0x80, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa0a40, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) r8 = syz_clone(0x12000000, &(0x7f0000000780)="0022fd6dc00d824a35cbace6f95ffea8486630a81c44a9d2e95a3c039a916ce5c32c6edf26f2bde411044f3051e45b5d6f4766543b4335fa5606df3617513d7bdd7acf1d942057c0cce6d61cd172c53c6a67aae2481a31493d3d92f00b5e6010bf235e9560ab8bcaa00adfa89777fe747b441c482daa5c97e52a0405ce6b9249cabc86e94d1f84b821ea3bb46075fc3b0f9a1d5e5f3c14120c01e9ea940c4604db9dde6393eec7437fd16a732053875caffcd1884503dabbff151e28", 0xbc, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000a00)="85a3400a79b9b118870cc7f7e08ffb70c80eefd96bd9c54ca2f57a9cd2bca51abf53b29e793aafbed772a71c7d268c298dced7b2093550a30d4ec85503fed2ea98779587cfee0288c9eb1c56c51b63fbfb609e31b394e9cc36909f85fbf5ac3120fbd95d0f6a460618c7a82b6038fc481576dd6124630a0c692c108fd335012d312976abb7870b7843e7d11498d146bd2e90e487b58b5b7dbbe9e8473e6043ea93fa45b2ae165bf647b6f0fd804128d13ad37c734415657cf854015ec755e5db69eb6214895660f2005c29a8b92fa583915727df65d0d16ac11be54af9a36d83c9") r9 = perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x4, 0x5, 0x4c, 0x6, 0x0, 0x4, 0x10, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x97, 0x2, @perf_bp={&(0x7f0000000680), 0x1}, 0x60c, 0x1f, 0x4, 0x5, 0xe385, 0x6, 0x2, 0x0, 0x9, 0x0, 0x7}, r5, 0x7, r6, 0xa) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x3, 0x8, 0xfb, 0x0, 0xffffffffffffffff, 0x10258, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8c2, 0x0, @perf_bp={&(0x7f0000000380), 0x4}, 0x2000, 0x1, 0x3, 0x3, 0x1, 0x100, 0x3, 0x0, 0x7, 0x0, 0x6}, r8, 0x8, r9, 0x3) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) 4.199297641s ago: executing program 2 (id=10723): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f0000000240)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0x10, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd01}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000740)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x3, 0x0, &(0x7f00000007c0)=[{0x0, 0x5, 0xb, 0x6}, {0x4, 0x1, 0xe, 0x1}, {0x4, 0x3, 0xc, 0x2}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1b, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0x7, 0x1, 0x0, r2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xf}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8bc0}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x8, 0x3, 0x8, 0xb, 0x9}]}, &(0x7f0000000040)='syzkaller\x00', 0xd2ed, 0x51, &(0x7f0000000380)=""/81, 0x41100, 0x0, '\x00', r3, @fallback=0x1d, r4, 0x8, &(0x7f0000000600)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0xc, 0x7fff}, 0x10, r5, r6, 0x4, 0x0, &(0x7f0000000900)=[{0x0, 0x1, 0xe, 0x3}, {0x5, 0x3, 0xa, 0x4}, {0x4, 0x2, 0xf, 0x3}, {0x0, 0x5, 0x6, 0xb}], 0x10, 0xb}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000"], 0x48) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r7) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317"], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 4.141677552s ago: executing program 3 (id=10724): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x6d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) socketpair(0x29, 0x0, 0x0, &(0x7f0000000140)) 4.044908183s ago: executing program 2 (id=10725): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc1", 0x1b, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 4.021748054s ago: executing program 0 (id=10726): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc1", 0x1b, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 3.812547538s ago: executing program 4 (id=10727): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x15) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x1}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 3.718643699s ago: executing program 3 (id=10728): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b700000000000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r3], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.66865271s ago: executing program 4 (id=10729): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x50, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x810, 0x0, 0x5, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 2.575812501s ago: executing program 3 (id=10730): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x40047451, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.395300955s ago: executing program 4 (id=10731): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000640)={&(0x7f00000003c0)=@file={0x1, './cgroup\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f00000004c0)="7b0fb5dfcd657bd265b5aaec1f8ab55d971148836233ffca89ddc3dc23c3966e0437a912526744d5d194a205dc8ffc3fdc47fd39b237a07d660ddce03341062feaaeb327a81aa4b058a1e42dc68788f3f2169013611a3262f7e4ae6daecfdb9f8e9db0d4068b6c78e097595fb89626b468b4c4", 0x73}, {&(0x7f0000000540)="3d0aba3abd0d7622dd05c8577c17eb79694a059f6034f2b6c6e711c08617a939f24666f3e3dc8e538792ea15ab82de9008ee5e4faff3809a891e70cc1fed23771fc43ec5b2b1f9574cc9de1d8b8c0857f3405a6ea0891f75f6e8189c41858b5e26e998c71a814370201373a88a9c92b1c15941ee9e0397231e1c699b", 0x7c}, {&(0x7f0000000740)="21952de532b76df902c7ae65c7ef6bdc81aaeac067726f149bcbf5d6c89eaae8a1925aa07c0812492b2464f7278d353453e27b180f47afca8cce40bcf92c273d513bde27deaf1fdd4e84015b256b441493889382bca4b67cc1641f19572ed3cac63930907989fe8947e1b50e67fb508b9f93f5c9c53b0802113184a32129a3f285188a445913950c0d2a9cd17988ad34b20bb8cf582a7940876b467f8f46f1c5b503208b29b674adb8bab8d6956b289ff287e656d68d64fa5baa470491b6e6a09212f09e9a2dae0e3cccf0adc8188dfd1f0f5372006708788be63299d197082c3f404a01c4b295faab6919aa785cea61d7855ff285ef15e5576d9ca584", 0xfd}, {&(0x7f0000000300)="16", 0x1}, {&(0x7f0000000a40)="422bff2663cf30dff1bbddd43fd900c9082277376e6780dd2154c75b63e44c52cd030c68839b43dbd72f9dfc574bc727d690b89f00cec5a5fdcd13d13660e93a899ebdfe0fb05d612b32d1e31930dc453c7b2c689b779e151d51486b245d971a9ac6647e5234e02fce36fb3846999fe53a65a8883ea579c757ea5e838a691dd38da15ecb987f36bb4c337b0b365ae91ee65ef024084d07e3ceb23ae5d53071c5ac385ebb47b655f532b7ee0c69655bc270577cfb35abaccf66a8cd42d1547fca05443b33d5fa38e5b466bc710c0bf288f8f9e54535f134a47114df0a3a29ca8d300ede2a5591ae8a16e8", 0xea}], 0x5, 0x0, 0x0, 0x4000004}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f008", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x30) 1.924109394s ago: executing program 3 (id=10732): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb22773321812", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x144a8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005005500050000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000280)=ANY=[@ANYRES8=r0, @ANYBLOB="76d72470b27981b83d256218cbc7afa02760232613b2a3a22de958e77eb8ebf06b48110841757fe4a6e13801045d3fcfd3f235943508e41b8c84fc35ce75e48d74b7edf45aff0bd71a5b9d7148aee8f346b42502567367c8b4e6e7ee23f103e2b926b2a91cb882d8afef9ccb244433c8d4057c18cd2c02180f2964576ff781cce3bab8e4b9afce6baa80b5dc3da68b3a57881a6c299aa40fe8d57a0dc062f6cc3a162f78bf50b031cda436c916809707c80cc7", @ANYBLOB="1380d84b1edcf3128bbfa57781f9ccabf00e2d9da4467a8bae7955d75e9fddb0a96f5c1cc4feeb9345efa1042a796e73d3402f760f69fa9cc17d9b74d97d33c39fea03f1639fc206ec4b5c9542ebabd93dd33a62a494a3"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c01250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.641225199s ago: executing program 2 (id=10733): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x6d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) socketpair(0x29, 0x0, 0x0, &(0x7f0000000140)) 1.636161109s ago: executing program 4 (id=10734): socketpair(0x25, 0x805, 0x84, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x23a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/13], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.460818563s ago: executing program 1 (id=10735): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae350000000000000000000000000001", @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, 0x0, 0x0) close(r5) sendmsg$inet(r6, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 1.07404425s ago: executing program 3 (id=10736): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)=ANY=[], &(0x7f00000006c0)=""/9, 0xc7, 0x9, 0x0, 0x57, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2b, &(0x7f0000001a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3b}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x9}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40}}]}, &(0x7f00000002c0)='syzkaller\x00', 0xb, 0xb2, &(0x7f0000000380)=""/178, 0x41000, 0x4, '\x00', r2, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x10, 0xf, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x28000}, 0x94) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000006c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 841.761804ms ago: executing program 2 (id=10737): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) 797.962415ms ago: executing program 4 (id=10738): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2f"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b700000000000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r3], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 772.988746ms ago: executing program 1 (id=10739): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x24, 0x4, 0x9, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f0000000240), &(0x7f0000000540)=""/32}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="9e7dd9be696976ce", &(0x7f0000000280)=""/29}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x7, 0x80, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa0a40, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) 524.51775ms ago: executing program 1 (id=10740): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b700000000000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r3], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 0s ago: executing program 2 (id=10741): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.109' (ED25519) to the list of known hosts. [ 25.072568][ T24] audit: type=1400 audit(1758277494.780:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.073884][ T267] cgroup: Unknown subsys name 'net' [ 25.095249][ T24] audit: type=1400 audit(1758277494.780:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.122542][ T24] audit: type=1400 audit(1758277494.810:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.122740][ T267] cgroup: Unknown subsys name 'devices' [ 25.322246][ T267] cgroup: Unknown subsys name 'hugetlb' [ 25.327865][ T267] cgroup: Unknown subsys name 'rlimit' [ 25.499028][ T24] audit: type=1400 audit(1758277495.200:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.522469][ T24] audit: type=1400 audit(1758277495.200:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.529199][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.547568][ T24] audit: type=1400 audit(1758277495.200:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.578977][ T24] audit: type=1400 audit(1758277495.260:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.604637][ T24] audit: type=1400 audit(1758277495.260:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.651936][ T24] audit: type=1400 audit(1758277495.360:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.677685][ T24] audit: type=1400 audit(1758277495.360:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.703765][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.141181][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.148352][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.156041][ T275] device bridge_slave_0 entered promiscuous mode [ 26.163044][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.170074][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.177617][ T275] device bridge_slave_1 entered promiscuous mode [ 26.229158][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.236271][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.243678][ T276] device bridge_slave_0 entered promiscuous mode [ 26.251494][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.258528][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.266080][ T276] device bridge_slave_1 entered promiscuous mode [ 26.281629][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.288872][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.296394][ T279] device bridge_slave_0 entered promiscuous mode [ 26.306335][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.313427][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.320861][ T279] device bridge_slave_1 entered promiscuous mode [ 26.371518][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.378668][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.386110][ T277] device bridge_slave_0 entered promiscuous mode [ 26.395197][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.402569][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.410009][ T278] device bridge_slave_0 entered promiscuous mode [ 26.419038][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.426125][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.433617][ T278] device bridge_slave_1 entered promiscuous mode [ 26.444685][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.451772][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.459211][ T277] device bridge_slave_1 entered promiscuous mode [ 26.559276][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.566354][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.573647][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.580688][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.613889][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.621240][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.628501][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.635538][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.657226][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.664291][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.671574][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.678593][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.688455][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.695513][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.702808][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.709867][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.734782][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.741872][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.749157][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.756207][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.769467][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.776745][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.784533][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.791966][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.799100][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.806530][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.813707][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.820927][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.828038][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.835237][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.843097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.850555][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.873243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.881032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.888801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.897554][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.904595][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.912280][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.920573][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.927599][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.935062][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.960627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.968682][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.976913][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.983945][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.992184][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.000315][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.007360][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.015079][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.023311][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.030353][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.037635][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.045700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.053881][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.060912][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.068251][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.076443][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.083477][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.109342][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.118223][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.126411][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.133444][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.142027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.149936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.158006][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.166088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.179905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.187404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.196663][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.205358][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.220025][ T275] device veth0_vlan entered promiscuous mode [ 27.229162][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.237608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.246034][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.253196][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.260929][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.269216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.277645][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.286132][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.294499][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.301567][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.308865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.316882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.325040][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.332494][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.342394][ T276] device veth0_vlan entered promiscuous mode [ 27.352930][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.360938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.368910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.377421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.385888][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.394192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.402173][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.410027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.418304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.426110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.433892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.441502][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.455231][ T276] device veth1_macvtap entered promiscuous mode [ 27.466199][ T277] device veth0_vlan entered promiscuous mode [ 27.472562][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.480943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.489295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.497058][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.505328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.513784][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.522087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.538181][ T279] device veth0_vlan entered promiscuous mode [ 27.546527][ T275] device veth1_macvtap entered promiscuous mode [ 27.554660][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.563082][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.571545][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.579351][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.588058][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.596213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.604450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.612178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.619638][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.629484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.638000][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.649700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.658189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.670015][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.678354][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.686936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.696075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.711597][ T277] device veth1_macvtap entered promiscuous mode [ 27.723029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.730863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.739129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.748573][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.758237][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.766973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.774937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.783121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.790624][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.799339][ T278] device veth0_vlan entered promiscuous mode [ 27.811105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.819330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.832625][ T279] device veth1_macvtap entered promiscuous mode [ 27.843037][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 27.856045][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.866499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.874899][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.883636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.892387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.900806][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.908986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.921728][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 27.937582][ T278] device veth1_macvtap entered promiscuous mode [ 27.951500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.963610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.972167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.980541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.027256][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.039622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.048685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.057446][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.177526][ T316] device wg2 entered promiscuous mode [ 28.256069][ C0] hrtimer: interrupt took 96208 ns [ 28.340779][ T330] cgroup: syz.2.6 (330) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.368617][ T330] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.408027][ T334] ------------[ cut here ]------------ [ 28.414103][ T334] trace type BPF program uses run-time allocation [ 28.421002][ T334] WARNING: CPU: 1 PID: 334 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 28.432217][ T334] Modules linked in: [ 28.436208][ T334] CPU: 1 PID: 334 Comm: syz.0.12 Not tainted syzkaller #0 [ 28.455608][ T334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 28.466435][ T334] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 28.473563][ T334] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 28.501874][ T334] RSP: 0018:ffffc90000d67468 EFLAGS: 00010246 [ 28.508078][ T334] RAX: 0ccf7033bfe84500 RBX: 0000000000000001 RCX: 0000000000080000 [ 28.516172][ T334] RDX: ffffc9000152b000 RSI: 0000000000001fbe RDI: 0000000000001fbf [ 28.527133][ T334] RBP: ffffc90000d674b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 28.607000][ T334] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff88810e960000 [ 28.762049][ T334] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810e986800 [ 28.809777][ T334] FS: 00007f05954296c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 28.879374][ T334] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.941245][ T334] CR2: 0000200000746000 CR3: 000000011da01000 CR4: 00000000003506a0 [ 28.991960][ T334] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.029983][ T334] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.062695][ T334] Call Trace: [ 29.082769][ T334] ? __fdget+0x1a1/0x230 [ 29.139334][ T334] resolve_pseudo_ldimm64+0x526/0x1020 [ 29.180441][ T334] ? bpf_check+0xd680/0xd680 [ 29.197752][ T334] ? kvmalloc_node+0x88/0x130 [ 29.264423][ T334] bpf_check+0x8d4b/0xd680 [ 29.281762][ T334] ? bpf_get_btf_vmlinux+0x60/0x60 [ 29.307249][ T334] ? 0xffffffffa002c730 [ 29.337624][ T334] ? is_bpf_text_address+0x177/0x190 [ 29.367991][ T334] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.388287][ T334] ? __kernel_text_address+0xa0/0x100 [ 29.410452][ T334] ? unwind_get_return_address+0x4d/0x90 [ 29.489737][ T334] ? stack_trace_save+0xe0/0xe0 [ 29.540390][ T334] ? arch_stack_walk+0xee/0x140 [ 29.545316][ T334] ? stack_trace_save+0x98/0xe0 [ 29.550182][ T334] ? stack_trace_snprint+0xf0/0xf0 [ 29.604647][ T334] ? __kasan_slab_alloc+0x69/0xf0 [ 29.609733][ T334] ? pcpu_block_update+0x379/0x900 [ 29.640510][ T334] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.646120][ T334] ? __kasan_kmalloc+0xec/0x110 [ 29.655480][ T334] ? __kasan_kmalloc+0xda/0x110 [ 29.675781][ T334] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 29.710408][ T334] ? selinux_bpf_prog_alloc+0x51/0x140 [ 29.715925][ T334] ? security_bpf_prog_alloc+0x62/0x90 [ 29.794592][ T334] ? bpf_prog_load+0x949/0x1420 [ 29.820664][ T334] ? __se_sys_bpf+0x442/0x680 [ 29.825390][ T334] ? __x64_sys_bpf+0x7b/0x90 [ 29.830006][ T334] ? do_syscall_64+0x31/0x40 [ 29.850613][ T334] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.869757][ T356] device syzkaller0 entered promiscuous mode [ 29.870436][ T334] ? memset+0x35/0x40 [ 29.886382][ T334] ? bpf_obj_name_cpy+0x193/0x1e0 [ 29.893603][ T334] bpf_prog_load+0xf5a/0x1420 [ 29.898535][ T334] ? map_freeze+0x320/0x320 [ 29.913213][ T357] device wg2 entered promiscuous mode [ 29.928527][ T334] ? selinux_bpf+0xc7/0xf0 [ 29.940707][ T334] ? security_bpf+0x82/0xa0 [ 29.965254][ T334] __se_sys_bpf+0x442/0x680 [ 29.977171][ T334] ? __x64_sys_bpf+0x90/0x90 [ 30.020004][ T334] ? ____fput+0x15/0x20 [ 30.048155][ T334] ? __kasan_check_read+0x11/0x20 [ 30.114068][ T334] __x64_sys_bpf+0x7b/0x90 [ 30.118541][ T334] do_syscall_64+0x31/0x40 [ 30.162400][ T362] device wg2 entered promiscuous mode [ 30.181684][ T334] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.203231][ T334] RIP: 0033:0x7f05969c0c29 [ 30.207797][ T334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.263146][ T24] kauditd_printk_skb: 36 callbacks suppressed [ 30.263159][ T24] audit: type=1400 audit(1758277499.970:110): avc: denied { read } for pid=365 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.288448][ T334] RSP: 002b:00007f0595429038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.308164][ T334] RAX: ffffffffffffffda RBX: 00007f0596c07fa0 RCX: 00007f05969c0c29 [ 30.380429][ T334] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 30.412327][ T24] audit: type=1400 audit(1758277500.020:111): avc: denied { write } for pid=365 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.446723][ T334] RBP: 00007f0596a43e41 R08: 0000000000000000 R09: 0000000000000000 [ 30.470410][ T334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 30.487757][ T334] R13: 00007f0596c08038 R14: 00007f0596c07fa0 R15: 00007fff29b3f578 [ 30.509722][ T334] ---[ end trace 28fd51fdccbf18cd ]--- [ 30.532204][ T24] audit: type=1400 audit(1758277500.050:112): avc: denied { write } for pid=364 comm="syz.2.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.645892][ T24] audit: type=1400 audit(1758277500.350:113): avc: denied { create } for pid=384 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 30.832981][ T24] audit: type=1400 audit(1758277500.530:114): avc: denied { create } for pid=391 comm="syz.3.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 31.862840][ T410] device pim6reg1 entered promiscuous mode [ 32.071005][ T24] audit: type=1400 audit(1758277501.780:115): avc: denied { cpu } for pid=413 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.236021][ T417] device syzkaller0 entered promiscuous mode [ 32.886152][ T450] @ÿ: renamed from bond_slave_0 [ 33.038564][ T24] audit: type=1400 audit(1758277502.740:116): avc: denied { relabelfrom } for pid=453 comm="syz.4.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.200115][ T24] audit: type=1400 audit(1758277502.740:117): avc: denied { relabelto } for pid=453 comm="syz.4.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.520621][ T461] device veth0_vlan left promiscuous mode [ 33.640173][ T461] device veth0_vlan entered promiscuous mode [ 34.649149][ T502] device syzkaller0 entered promiscuous mode [ 36.418554][ T541] device wg2 left promiscuous mode [ 36.444425][ T541] device wg2 entered promiscuous mode [ 36.700001][ T24] audit: type=1400 audit(1758277506.400:118): avc: denied { create } for pid=555 comm="syz.4.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 36.843004][ T557] device syzkaller0 entered promiscuous mode [ 37.607544][ T569] device syzkaller0 entered promiscuous mode [ 38.001487][ T24] audit: type=1400 audit(1758277507.710:119): avc: denied { create } for pid=584 comm="syz.4.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.020104][ T608] device syzkaller0 entered promiscuous mode [ 39.931203][ T625] device wg2 left promiscuous mode [ 39.994132][ T625] device wg2 entered promiscuous mode [ 40.449705][ T638] device pim6reg1 entered promiscuous mode [ 43.687055][ T717] device wg2 entered promiscuous mode [ 43.713957][ T719] device syzkaller0 entered promiscuous mode [ 49.103014][ T839] device syzkaller0 entered promiscuous mode [ 53.837193][ T917] device syzkaller0 entered promiscuous mode [ 55.202846][ T944] device pim6reg1 entered promiscuous mode [ 56.187654][ T966] device veth1_macvtap left promiscuous mode [ 56.280574][ T968] device veth1_macvtap entered promiscuous mode [ 56.338923][ T968] device macsec0 entered promiscuous mode [ 56.471695][ T970] device pim6reg1 entered promiscuous mode [ 56.493758][ T24] audit: type=1400 audit(1758277526.200:120): avc: denied { create } for pid=972 comm="syz.2.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 56.548258][ T973] device sit0 entered promiscuous mode [ 57.083494][ T24] audit: type=1400 audit(1758277526.790:121): avc: denied { create } for pid=979 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 57.087389][ T980] device syzkaller0 entered promiscuous mode [ 58.236771][ T1008] device syzkaller0 entered promiscuous mode [ 60.900647][ T1069] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.907934][ T1069] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.013134][ T1073] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.020230][ T1073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.027601][ T1073] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.034996][ T1073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.131137][ T1073] device bridge0 entered promiscuous mode [ 61.948799][ T1080] device pim6reg1 entered promiscuous mode [ 62.090486][ T1087] device pim6reg1 entered promiscuous mode [ 63.024656][ T1118] device veth1_macvtap left promiscuous mode [ 63.147216][ T1119] device veth1_macvtap entered promiscuous mode [ 63.211977][ T1119] device macsec0 entered promiscuous mode [ 64.814320][ T1153] device veth1_macvtap left promiscuous mode [ 64.918860][ T1157] device veth1_macvtap entered promiscuous mode [ 65.013903][ T1157] device macsec0 entered promiscuous mode [ 65.031524][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.411791][ T1203] syz.4.352[1203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.411846][ T1203] syz.4.352[1203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.263830][ T1231] device pim6reg1 entered promiscuous mode [ 70.040218][ T1262] device pim6reg1 entered promiscuous mode [ 70.442675][ T1273] device syzkaller0 entered promiscuous mode [ 72.362866][ T1314] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.359726][ T1349] syz.4.407 (1349) used obsolete PPPIOCDETACH ioctl [ 73.437666][ T1350] device sit0 entered promiscuous mode [ 75.418911][ T1396] device syzkaller0 entered promiscuous mode [ 75.742638][ T1411] syz.3.432[1411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.742720][ T1411] syz.3.432[1411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.418603][ T1448] device syzkaller0 entered promiscuous mode [ 77.933118][ T24] audit: type=1400 audit(1758277547.640:122): avc: denied { create } for pid=1462 comm="syz.4.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 78.856771][ T1489] device pim6reg1 entered promiscuous mode [ 81.190150][ T1539] device syzkaller0 entered promiscuous mode [ 81.357325][ T642] syzkaller0: tun_net_xmit 48 [ 81.856480][ T1562] device syzkaller0 entered promiscuous mode [ 82.179892][ T1576] device sit0 entered promiscuous mode [ 82.953956][ T1615] device sit0 entered promiscuous mode [ 84.069979][ T24] audit: type=1400 audit(1758277553.770:123): avc: denied { create } for pid=1639 comm="syz.3.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.533033][ T1647] device sit0 entered promiscuous mode [ 86.716569][ T24] audit: type=1400 audit(1758277556.420:124): avc: denied { tracepoint } for pid=1697 comm="syz.4.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 88.161407][ T1743] device sit0 left promiscuous mode [ 88.218759][ T1743] device sit0 entered promiscuous mode [ 90.645302][ T1822] device syzkaller0 entered promiscuous mode [ 91.257236][ T1830] syz.4.598[1830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.261846][ T1830] syz.4.598[1830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.321841][ T1833] syz.4.598[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.431820][ T1833] syz.4.598[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.935082][ T1908] device syzkaller0 entered promiscuous mode [ 95.538500][ T1924] device pim6reg1 entered promiscuous mode [ 96.998540][ T24] audit: type=1400 audit(1758277566.700:125): avc: denied { create } for pid=1954 comm="syz.1.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 97.857481][ T1981] ÿÿÿÿÿÿ: renamed from vlan1 [ 99.574265][ T2045] device syzkaller0 entered promiscuous mode [ 100.771942][ T2093] device wg2 entered promiscuous mode [ 104.916659][ T2195] device syzkaller0 entered promiscuous mode [ 105.291291][ T2209] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.423223][ T2209] device bridge_slave_1 left promiscuous mode [ 105.445916][ T2209] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.462474][ T2209] device bridge_slave_0 left promiscuous mode [ 105.470772][ T2209] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.364187][ T24] audit: type=1400 audit(1758277576.070:126): avc: denied { append } for pid=2229 comm="syz.4.763" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 106.514544][ T2241] device sit0 left promiscuous mode [ 106.582678][ T2245] device sit0 entered promiscuous mode [ 109.171668][ T2308] device syzkaller0 entered promiscuous mode [ 110.836568][ T2359] device syzkaller0 entered promiscuous mode [ 111.831475][ T2397] device sit0 left promiscuous mode [ 111.865706][ T2398] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.872940][ T2398] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.953829][ T2397] device sit0 entered promiscuous mode [ 112.141676][ T2401] device bridge_slave_1 left promiscuous mode [ 112.182174][ T2401] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.219197][ T2401] device bridge_slave_0 left promiscuous mode [ 112.251665][ T2401] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.408243][ T2409] device syzkaller0 entered promiscuous mode [ 114.315390][ T2448] device syzkaller0 entered promiscuous mode [ 119.461050][ T2568] device syzkaller0 entered promiscuous mode [ 119.619775][ T2572] device syzkaller0 entered promiscuous mode [ 120.122646][ T2577] device syzkaller0 entered promiscuous mode [ 120.846975][ T2596] device syzkaller0 entered promiscuous mode [ 122.398654][ T2634] device syzkaller0 entered promiscuous mode [ 123.607043][ T2668] device syzkaller0 entered promiscuous mode [ 124.385225][ T2675] device syzkaller0 entered promiscuous mode [ 126.263266][ T24] audit: type=1400 audit(1758277595.970:127): avc: denied { setattr } for pid=2729 comm="syz.4.954" path="pipe:[1448]" dev="pipefs" ino=1448 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 128.293827][ T2779] device veth1_macvtap left promiscuous mode [ 128.299856][ T2779] device macsec0 entered promiscuous mode [ 128.562365][ T2789] device pim6reg1 entered promiscuous mode [ 129.054724][ T2797] device syzkaller0 entered promiscuous mode [ 129.112347][ T2800] device veth0_vlan left promiscuous mode [ 129.121109][ T2800] device veth0_vlan entered promiscuous mode [ 130.332818][ T2838] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.339969][ T2838] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.402365][ T2838] device bridge0 left promiscuous mode [ 130.898585][ T2853] device veth1_macvtap left promiscuous mode [ 130.910973][ T2853] device macsec0 left promiscuous mode [ 132.582223][ T2911] device pim6reg1 entered promiscuous mode [ 132.833723][ T2918] device veth0_vlan left promiscuous mode [ 132.879644][ T2918] device veth0_vlan entered promiscuous mode [ 133.692546][ T2945] device sit0 left promiscuous mode [ 133.753163][ T24] audit: type=1400 audit(1758277603.450:128): avc: denied { create } for pid=2946 comm="syz.4.1044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 134.710482][ T2956] device syzkaller0 entered promiscuous mode [ 135.357045][ T2988] device wg2 left promiscuous mode [ 135.417024][ T2988] device wg2 entered promiscuous mode [ 136.329891][ T3021] device sit0 left promiscuous mode [ 136.490633][ T3024] device sit0 entered promiscuous mode [ 137.245162][ T3046] device syzkaller0 entered promiscuous mode [ 138.057804][ T3086] syzkaller0: create flow: hash 991010898 index 1 [ 138.101380][ T2484] syzkaller0: tun_net_xmit 76 [ 138.106178][ T2484] syzkaller0: tun_net_xmit 48 [ 138.130686][ C1] syzkaller0: tun_net_xmit 76 [ 138.166292][ T3086] syzkaller0: delete flow: hash 991010898 index 1 [ 138.554083][ T3098] device syzkaller0 entered promiscuous mode [ 139.934064][ T3140] device syzkaller0 entered promiscuous mode [ 140.453366][ T24] audit: type=1400 audit(1758277610.160:129): avc: denied { create } for pid=3162 comm="syz.2.1133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 142.106796][ T3208] device wg2 left promiscuous mode [ 142.276981][ T3208] device wg2 entered promiscuous mode [ 143.015689][ T3223] device syzkaller0 entered promiscuous mode [ 144.806118][ T3276] device syzkaller0 entered promiscuous mode [ 145.591028][ T3302] device pim6reg1 entered promiscuous mode [ 146.985858][ T3335] syzkaller0: create flow: hash 1096346466 index 0 [ 147.064941][ T3329] device syzkaller0 entered promiscuous mode [ 147.290458][ T3335] syzkaller0 (unregistered): delete flow: hash 1096346466 index 0 [ 147.646242][ T3351] device syzkaller0 entered promiscuous mode [ 147.840174][ T3355] device syzkaller0 entered promiscuous mode [ 148.429805][ T3403] device sit0 left promiscuous mode [ 148.528799][ T3403] device sit0 entered promiscuous mode [ 149.636640][ T3435] device veth0_vlan left promiscuous mode [ 149.687699][ T3435] device veth0_vlan entered promiscuous mode [ 149.874868][ T3441] device sit0 left promiscuous mode [ 149.908997][ T3441] device sit0 entered promiscuous mode [ 150.164899][ T3443] device syzkaller0 entered promiscuous mode [ 150.863546][ T3474] device syzkaller0 entered promiscuous mode [ 150.963812][ T24] audit: type=1400 audit(1758277620.670:130): avc: denied { associate } for pid=3483 comm="syz.1.1250" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 151.050663][ T24] audit: type=1400 audit(1758277620.670:131): avc: denied { create } for pid=3483 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 153.600557][ T3564] device sit0 left promiscuous mode [ 153.669280][ T3564] device sit0 entered promiscuous mode [ 153.982435][ T3578] device veth1_macvtap left promiscuous mode [ 154.718184][ T3605] syzkaller0: create flow: hash 1096346466 index 0 [ 154.787394][ T3599] device syzkaller0 entered promiscuous mode [ 154.820693][ T2484] syzkaller0: tun_net_xmit 48 [ 155.040394][ T3599] syzkaller0 (unregistered): delete flow: hash 1096346466 index 0 [ 156.718068][ T3648] syz.3.1313[3648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.718128][ T3648] syz.3.1313[3648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.615839][ T3696] device veth0_vlan left promiscuous mode [ 158.726939][ T3696] device veth0_vlan entered promiscuous mode [ 158.804763][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.831801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.894628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.959349][ T3701] -1: renamed from syzkaller0 [ 159.629799][ T3721] syz.4.1341[3721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.629857][ T3721] syz.4.1341[3721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.714922][ T3729] device veth0_vlan left promiscuous mode [ 159.759377][ T3729] device veth0_vlan entered promiscuous mode [ 159.783163][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.791552][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.799066][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 160.265888][ T3735] device syzkaller0 entered promiscuous mode [ 161.089026][ T3767] device veth0_vlan left promiscuous mode [ 161.100146][ T3767] device veth0_vlan entered promiscuous mode [ 162.248846][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.334633][ T3829] device syzkaller0 entered promiscuous mode [ 163.894540][ T3851] device sit0 left promiscuous mode [ 165.263970][ T3901] device wg2 left promiscuous mode [ 165.424462][ T3906] device wg2 entered promiscuous mode [ 167.228091][ T3951] device sit0 left promiscuous mode [ 167.390710][ T3951] device sit0 entered promiscuous mode [ 168.132563][ T3959] device syzkaller0 entered promiscuous mode [ 168.501421][ T3975] device veth0_vlan left promiscuous mode [ 168.625220][ T3975] device veth0_vlan entered promiscuous mode [ 169.134578][ T24] audit: type=1400 audit(1758277638.840:132): avc: denied { ioctl } for pid=3998 comm="syz.2.1448" path="socket:[27675]" dev="sockfs" ino=27675 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 170.989941][ T4046] device wg2 left promiscuous mode [ 171.047202][ T4046] device wg2 entered promiscuous mode [ 172.119084][ T4075] device pim6reg1 entered promiscuous mode [ 172.140673][ T4077] syz.0.1487[4077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.140726][ T4077] syz.0.1487[4077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.172250][ T4077] device veth0_vlan left promiscuous mode [ 172.205853][ T4077] device veth0_vlan entered promiscuous mode [ 172.234431][ T24] audit: type=1400 audit(1758277641.940:133): avc: denied { create } for pid=4078 comm="syz.2.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 174.527081][ T4136] device syzkaller0 entered promiscuous mode [ 175.224048][ T4152] device syzkaller0 entered promiscuous mode [ 175.463677][ T4172] device wg2 left promiscuous mode [ 175.529269][ T4173] device veth0_vlan left promiscuous mode [ 175.611978][ T4173] device veth0_vlan entered promiscuous mode [ 176.513597][ T4199] device syzkaller0 entered promiscuous mode [ 176.774322][ T4204] device wg2 left promiscuous mode [ 176.815729][ T4206] device wg2 entered promiscuous mode [ 177.610848][ T4232] syz.1.1535[4232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.610906][ T4232] syz.1.1535[4232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.664971][ T4238] device veth0_vlan left promiscuous mode [ 177.781860][ T4238] device veth0_vlan entered promiscuous mode [ 177.869142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.894276][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.948852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.382088][ T4243] device syzkaller0 entered promiscuous mode [ 178.869708][ T4253] device pim6reg1 entered promiscuous mode [ 179.895198][ T24] audit: type=1400 audit(1758277649.600:134): avc: denied { create } for pid=4288 comm="syz.1.1555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 180.038416][ T4285] device syzkaller0 entered promiscuous mode [ 180.320558][ T4299] device syzkaller0 entered promiscuous mode [ 180.347467][ T4299] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 181.201647][ T4315] device syzkaller0 entered promiscuous mode [ 181.411690][ T4332] syz.3.1573[4332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.412625][ T4332] syz.3.1573[4332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.602726][ T4335] device veth0_vlan left promiscuous mode [ 181.707401][ T4335] device veth0_vlan entered promiscuous mode [ 181.761897][ T4340] device veth1_macvtap entered promiscuous mode [ 181.770577][ T4340] device macsec0 entered promiscuous mode [ 181.914127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.272321][ T4368] device pim6reg1 entered promiscuous mode [ 183.716715][ T4379] device syzkaller0 entered promiscuous mode [ 184.683266][ T4400] device veth1_macvtap left promiscuous mode [ 185.136352][ T4415] device pim6reg1 entered promiscuous mode [ 187.128380][ T4467] device wg2 left promiscuous mode [ 187.242257][ T4467] device wg2 entered promiscuous mode [ 190.069051][ T4539] device pim6reg1 entered promiscuous mode [ 191.587490][ T4584] device sit0 entered promiscuous mode [ 192.941431][ T4604] device wg2 left promiscuous mode [ 193.097584][ T4606] device wg2 entered promiscuous mode [ 195.192773][ T4648] device veth0_vlan left promiscuous mode [ 195.235846][ T4648] device veth0_vlan entered promiscuous mode [ 201.957260][ T4793] device veth0_vlan left promiscuous mode [ 202.068324][ T4793] device veth0_vlan entered promiscuous mode [ 202.099773][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.136881][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.190811][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.967038][ T4831] device veth0_vlan left promiscuous mode [ 204.026481][ T4831] device veth0_vlan entered promiscuous mode [ 204.067858][ T4828] device pim6reg1 entered promiscuous mode [ 204.076512][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.111292][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.118889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.390455][ T4858] device veth0_vlan left promiscuous mode [ 205.421028][ T4858] device veth0_vlan entered promiscuous mode [ 207.229022][ T4905] device syzkaller0 entered promiscuous mode [ 208.455223][ T4915] device syzkaller0 entered promiscuous mode [ 209.710317][ T4953] device pim6reg1 entered promiscuous mode [ 209.821747][ T4957] syz.2.1803[4957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.822197][ T4957] syz.2.1803[4957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.938051][ T4957] device pim6reg1 entered promiscuous mode [ 210.371848][ T4973] device pim6reg1 entered promiscuous mode [ 211.251452][ T4990] device syzkaller0 entered promiscuous mode [ 211.698258][ T5004] device sit0 entered promiscuous mode [ 212.493325][ T5018] device sit0 left promiscuous mode [ 212.765744][ T5018] device sit0 entered promiscuous mode [ 213.098911][ T5025] device wg2 left promiscuous mode [ 214.750488][ T5066] device sit0 left promiscuous mode [ 214.921764][ T5068] device sit0 entered promiscuous mode [ 219.263759][ T5177] device pim6reg1 entered promiscuous mode [ 219.770430][ T5184] device sit0 left promiscuous mode [ 219.919872][ T5184] device sit0 entered promiscuous mode [ 220.755812][ T5214] device sit0 left promiscuous mode [ 220.973228][ T5217] device sit0 entered promiscuous mode [ 222.413964][ T5258] device syzkaller0 entered promiscuous mode [ 227.417461][ T5374] device pim6reg1 entered promiscuous mode [ 228.361574][ T5384] device wg2 left promiscuous mode [ 228.407431][ T5390] device wg2 entered promiscuous mode [ 229.586968][ T5406] device syzkaller0 entered promiscuous mode [ 229.834587][ T5423] syz.0.1976[5423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.834640][ T5423] syz.0.1976[5423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.848134][ T5425] syz.1.1975[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.862004][ T5425] syz.1.1975[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.946926][ T5440] device syzkaller0 entered promiscuous mode [ 232.351940][ T5475] device sit0 left promiscuous mode [ 232.416499][ T5479] device sit0 entered promiscuous mode [ 234.194637][ T24] audit: type=1400 audit(1758277703.900:135): avc: denied { create } for pid=5520 comm="syz.4.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 234.200082][ T5522] IPv6: sit1: Disabled Multicast RS [ 234.833202][ T5540] device wg2 entered promiscuous mode [ 234.912884][ T5548] device veth0_vlan left promiscuous mode [ 234.965423][ T5548] device veth0_vlan entered promiscuous mode [ 235.027912][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.076305][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.090834][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.630118][ T5681] syz.2.2067[5681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.630198][ T5681] syz.2.2067[5681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.562063][ T24] audit: type=1400 audit(1758277710.270:136): avc: denied { ioctl } for pid=5706 comm="syz.1.2075" path="pid:[4026532281]" dev="nsfs" ino=4026532281 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 240.912887][ T5719] device sit0 left promiscuous mode [ 240.962062][ T5713] device pim6reg1 entered promiscuous mode [ 240.986442][ T5719] device sit0 entered promiscuous mode [ 241.055819][ T5724] device veth1_macvtap left promiscuous mode [ 241.063071][ T5724] device macsec0 left promiscuous mode [ 241.134829][ T5731] device veth1_macvtap entered promiscuous mode [ 241.258592][ T24] audit: type=1400 audit(1758277710.960:137): avc: denied { create } for pid=5732 comm="syz.2.2087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 242.457754][ T5772] device macsec0 entered promiscuous mode [ 242.534177][ T5777] device veth0_vlan left promiscuous mode [ 242.576341][ T5777] device veth0_vlan entered promiscuous mode [ 242.928143][ T5790] device syzkaller0 entered promiscuous mode [ 243.811405][ T5803] ªªªªªª: renamed from vlan0 [ 246.191763][ T5853] device wg2 left promiscuous mode [ 248.151957][ T5896] device pim6reg1 entered promiscuous mode [ 248.201997][ T5898] device wg2 left promiscuous mode [ 248.446386][ T5904] syz.2.2153[5904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.452128][ T5904] syz.2.2153[5904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.499901][ T5900] device syzkaller0 entered promiscuous mode [ 248.747002][ T5907] ªªªªªª: renamed from vlan0 [ 251.991545][ T5958] device syzkaller0 entered promiscuous mode [ 253.384399][ T6002] Ÿë: port 1(veth0_vlan) entered blocking state [ 253.417706][ T6002] Ÿë: port 1(veth0_vlan) entered disabled state [ 253.698986][ T6011] device sit0 left promiscuous mode [ 253.812710][ T6015] device syzkaller0 entered promiscuous mode [ 253.833172][ T6011] device sit0 entered promiscuous mode [ 254.071145][ T6024] device syzkaller0 entered promiscuous mode [ 254.398212][ T6036] device syzkaller0 entered promiscuous mode [ 254.440776][ T6036] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 255.930558][ T6087] -1: renamed from syzkaller0 [ 257.008790][ T6118] device syzkaller0 entered promiscuous mode [ 258.853693][ T6165] device pim6reg1 entered promiscuous mode [ 259.032353][ T6173] device syzkaller0 entered promiscuous mode [ 261.227620][ T6248] device syzkaller0 entered promiscuous mode [ 261.340653][ T6248] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 262.052798][ T6258] device wg2 left promiscuous mode [ 262.087256][ T6261] device wg2 entered promiscuous mode [ 262.149087][ T6263] device pim6reg1 entered promiscuous mode [ 262.376430][ T6273] ÿÿÿÿÿÿ: renamed from vlan1 [ 262.646179][ T6295] device wg2 left promiscuous mode [ 263.086752][ T6298] device wg2 entered promiscuous mode [ 264.234810][ T6331] device syzkaller0 entered promiscuous mode [ 264.356964][ T6335] device wg2 entered promiscuous mode [ 265.010338][ T6377] device sit0 left promiscuous mode [ 265.127152][ T6380] device sit0 entered promiscuous mode [ 265.844543][ T6394] device wg2 left promiscuous mode [ 266.883926][ T6414] device syzkaller0 entered promiscuous mode [ 266.912405][ T6410] device veth0_vlan left promiscuous mode [ 266.932706][ T6410] device veth0_vlan entered promiscuous mode [ 267.156914][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.169573][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.180672][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 267.394649][ T6419] device syzkaller0 entered promiscuous mode [ 267.859075][ T6435] device syzkaller0 entered promiscuous mode [ 268.228925][ T24] audit: type=1400 audit(1758277737.930:138): avc: denied { create } for pid=6456 comm="syz.0.2367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 268.663218][ T6473] syz.4.2373[6473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.663303][ T6473] syz.4.2373[6473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.895126][ T6476] device syzkaller0 entered promiscuous mode [ 269.354314][ T6481] device wg2 entered promiscuous mode [ 269.804687][ T6493] device veth0_vlan left promiscuous mode [ 269.924658][ T6493] device veth0_vlan entered promiscuous mode [ 270.436730][ T6511] device veth0_vlan left promiscuous mode [ 270.465222][ T6511] device veth0_vlan entered promiscuous mode [ 270.542965][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.565704][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.584323][ T6522] syz.3.2391[6522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.584411][ T6522] syz.3.2391[6522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.586152][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.972077][ T6553] device wg2 left promiscuous mode [ 272.072043][ T6553] device wg2 entered promiscuous mode [ 272.900448][ T6564] device syzkaller0 entered promiscuous mode [ 273.457199][ T6580] device wg2 entered promiscuous mode [ 273.463379][ T6586] syz.0.2411[6586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.463484][ T6586] syz.0.2411[6586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.849224][ T6594] device wg2 left promiscuous mode [ 274.075746][ T6595] device wg2 entered promiscuous mode [ 274.471304][ T6599] device wg2 left promiscuous mode [ 274.548760][ T6605] device wg2 left promiscuous mode [ 274.717915][ T6605] device wg2 entered promiscuous mode [ 275.163603][ T6608] device syzkaller0 entered promiscuous mode [ 275.500987][ T6620] device wg2 left promiscuous mode [ 275.581599][ T6620] device wg2 entered promiscuous mode [ 275.665369][ T6629] device sit0 left promiscuous mode [ 275.818033][ T6631] device sit0 entered promiscuous mode [ 276.618160][ T6642] syz.2.2433[6642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.618247][ T6642] syz.2.2433[6642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.860746][ T6684] syz.0.2453[6684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.980829][ T6684] syz.0.2453[6684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.462290][ T6736] device veth0_vlan left promiscuous mode [ 281.716339][ T6736] device veth0_vlan entered promiscuous mode [ 281.867473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.908704][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 281.966732][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 282.104953][ T6746] device sit0 left promiscuous mode [ 282.323732][ T6749] device sit0 entered promiscuous mode [ 284.077048][ T6778] device syzkaller0 entered promiscuous mode [ 286.017022][ T6819] device pim6reg1 entered promiscuous mode [ 286.255693][ T6830] device syzkaller0 entered promiscuous mode [ 288.168607][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.191067][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 288.282233][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.856328][ T6885] device syzkaller0 entered promiscuous mode [ 290.432982][ T6891] device veth0_vlan left promiscuous mode [ 290.459176][ T6891] device veth0_vlan entered promiscuous mode [ 290.605936][ T6893] ªªªªªª: renamed from vlan0 [ 291.843226][ T6922] device pim6reg1 entered promiscuous mode [ 294.030806][ T6951] device veth0_vlan left promiscuous mode [ 294.044128][ T6951] device veth0_vlan entered promiscuous mode [ 294.172554][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.193734][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.252690][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.538885][ T6962] device syzkaller0 entered promiscuous mode [ 294.649613][ T6971] device pim6reg1 entered promiscuous mode [ 295.928097][ T7003] device veth0_vlan left promiscuous mode [ 295.982509][ T7003] device veth0_vlan entered promiscuous mode [ 296.493688][ T7019] device pim6reg1 entered promiscuous mode [ 298.735396][ T7060] device syzkaller0 entered promiscuous mode [ 298.790839][ T7060] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 301.188327][ T7114] -1: renamed from syzkaller0 [ 305.396780][ T7181] device veth0_vlan left promiscuous mode [ 305.487937][ T7181] device veth0_vlan entered promiscuous mode [ 305.593503][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.619078][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 305.696776][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 308.409711][ T7223] device veth0_vlan left promiscuous mode [ 308.429903][ T7223] device veth0_vlan entered promiscuous mode [ 308.515672][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.532328][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 308.588875][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 310.164032][ T7266] device veth0_vlan left promiscuous mode [ 310.186363][ T7266] device veth0_vlan entered promiscuous mode [ 311.249079][ T7287] device pim6reg1 entered promiscuous mode [ 311.312023][ T7289] device pim6reg1 entered promiscuous mode [ 311.760396][ T7304] ÿÿÿÿÿÿ: renamed from vlan1 [ 317.537892][ T7408] device sit0 left promiscuous mode [ 317.579076][ T7408] device sit0 entered promiscuous mode [ 318.846878][ T7432] syz.3.2715[7432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.849522][ T7432] syz.3.2715[7432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.955801][ T7463] device syzkaller0 entered promiscuous mode [ 321.222327][ T7470] ªªªªªª: renamed from vlan0 [ 321.715690][ T7481] syz.1.2734[7481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.717588][ T7481] syz.1.2734[7481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.996492][ T7518] ªªªªªª: renamed from vlan0 [ 329.318503][ T7597] device syzkaller0 entered promiscuous mode [ 338.087803][ T24] audit: type=1400 audit(1758277807.790:139): avc: denied { create } for pid=7754 comm="syz.1.2835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 339.664591][ T7780] device syzkaller0 entered promiscuous mode [ 340.416090][ T7835] device pim6reg1 entered promiscuous mode [ 340.622444][ T7842] device pim6reg1 entered promiscuous mode [ 340.696555][ T7850] device veth1_macvtap left promiscuous mode [ 340.832449][ T7850] device veth1_macvtap entered promiscuous mode [ 340.857584][ T7850] device macsec0 entered promiscuous mode [ 340.907243][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.453651][ T7859] device syzkaller0 entered promiscuous mode [ 344.099068][ T7924] device pim6reg1 entered promiscuous mode [ 348.761585][ T8024] device wg2 left promiscuous mode [ 348.835582][ T8024] device wg2 entered promiscuous mode [ 351.026407][ T8073] device wg2 entered promiscuous mode [ 351.791092][ T8085] device pim6reg1 entered promiscuous mode [ 351.966747][ T8093] device veth0_vlan left promiscuous mode [ 351.993890][ T8093] device veth0_vlan entered promiscuous mode [ 352.059421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.078038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 352.123887][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.813993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.831557][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 353.858915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.745804][ T8153] device sit0 left promiscuous mode [ 354.996971][ T8154] device sit0 entered promiscuous mode [ 355.669130][ T8182] device pim6reg1 entered promiscuous mode [ 355.822861][ T8186] device sit0 left promiscuous mode [ 355.922858][ T8186] device sit0 entered promiscuous mode [ 356.459694][ T8203] syz.3.2989[8203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.459778][ T8203] syz.3.2989[8203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.898260][ T8220] device macsec0 left promiscuous mode [ 357.033879][ T8227] syz.0.2997[8227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.033993][ T8227] syz.0.2997[8227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.217960][ T8211] device syzkaller0 entered promiscuous mode [ 357.296215][ T8220] device macsec0 entered promiscuous mode [ 357.549724][ T8240] device sit0 left promiscuous mode [ 357.641457][ T8243] device sit0 entered promiscuous mode [ 357.974305][ T8253] syz.2.3007[8253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.974364][ T8253] syz.2.3007[8253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.445477][ T8272] device macsec0 left promiscuous mode [ 358.507760][ T8274] device veth1_macvtap entered promiscuous mode [ 358.524568][ T8274] device macsec0 entered promiscuous mode [ 358.585354][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.713701][ T8282] device pim6reg1 entered promiscuous mode [ 358.973142][ T8279] device syzkaller0 entered promiscuous mode [ 359.246064][ T8294] device sit0 left promiscuous mode [ 359.378281][ T8297] device sit0 entered promiscuous mode [ 359.956539][ T8311] device syzkaller0 entered promiscuous mode [ 361.270303][ T8345] device sit0 left promiscuous mode [ 361.350167][ T8348] device sit0 entered promiscuous mode [ 361.922968][ T8339] device syzkaller0 entered promiscuous mode [ 362.229954][ T8374] device sit0 left promiscuous mode [ 362.467192][ T8376] device sit0 entered promiscuous mode [ 362.716460][ T8388] device pim6reg1 entered promiscuous mode [ 363.302122][ T8401] device sit0 left promiscuous mode [ 363.412614][ T8401] device sit0 entered promiscuous mode [ 364.376983][ T8408] device syzkaller0 entered promiscuous mode [ 364.674553][ T8416] device syzkaller0 entered promiscuous mode [ 364.923980][ T8425] ÿÿÿÿÿÿ: renamed from vlan1 [ 365.118228][ T8430] syz.4.3071[8430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.118293][ T8430] syz.4.3071[8430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.152031][ T8446] device syzkaller0 entered promiscuous mode [ 367.282354][ T8472] device syzkaller0 entered promiscuous mode [ 367.312805][ T8478] device sit0 left promiscuous mode [ 367.356188][ T8481] device sit0 entered promiscuous mode [ 367.815964][ T8483] device syzkaller0 entered promiscuous mode [ 368.656045][ T8516] device wg2 entered promiscuous mode [ 370.047509][ T8539] device syzkaller0 entered promiscuous mode [ 371.265997][ T8568] device syzkaller0 entered promiscuous mode [ 371.498594][ T8582] device pim6reg1 entered promiscuous mode [ 372.569812][ T8604] syz.3.3144[8604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.569872][ T8604] syz.3.3144[8604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.714175][ T8619] device syzkaller0 entered promiscuous mode [ 374.143614][ T8634] device sit0 left promiscuous mode [ 374.302738][ T8635] device sit0 entered promiscuous mode [ 375.631738][ T8644] device syzkaller0 entered promiscuous mode [ 376.330009][ T8677] device sit0 left promiscuous mode [ 376.508762][ T8678] ÿÿÿÿÿÿ: renamed from vlan1 [ 376.549782][ T8681] device sit0 entered promiscuous mode [ 378.093770][ T8710] device syzkaller0 entered promiscuous mode [ 379.634283][ T8748] device sit0 left promiscuous mode [ 379.948427][ T8749] device sit0 entered promiscuous mode [ 380.861142][ T8773] device syzkaller0 entered promiscuous mode [ 381.358345][ T8782] device syzkaller0 entered promiscuous mode [ 381.630404][ T8792] device sit0 left promiscuous mode [ 381.906741][ T8793] device sit0 entered promiscuous mode [ 382.331810][ T8810] device wg2 left promiscuous mode [ 385.561146][ T8856] device syzkaller0 entered promiscuous mode [ 386.656676][ T8879] device syzkaller0 entered promiscuous mode [ 387.003687][ T8903] device sit0 left promiscuous mode [ 387.220275][ T8909] device sit0 entered promiscuous mode [ 388.167748][ T24] audit: type=1400 audit(1758277857.870:140): avc: denied { create } for pid=8932 comm="syz.3.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 389.320386][ T8963] device sit0 left promiscuous mode [ 389.481673][ T8971] device sit0 entered promiscuous mode [ 391.830881][ T9039] ±ÿ: renamed from team_slave_1 [ 391.874419][ T24] audit: type=1400 audit(1758277861.580:141): avc: denied { create } for pid=9038 comm="syz.0.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 392.998321][ T9071] device sit0 left promiscuous mode [ 393.189910][ T9077] device sit0 entered promiscuous mode [ 394.558496][ T9098] device syzkaller0 entered promiscuous mode [ 394.626705][ T9107] device wg2 left promiscuous mode [ 394.721619][ T9109] device wg2 entered promiscuous mode [ 395.024233][ T9116] device syzkaller0 entered promiscuous mode [ 395.128815][ T9124] device syzkaller0 entered promiscuous mode [ 397.567912][ T9185] device pim6reg1 entered promiscuous mode [ 398.279570][ T9191] device syzkaller0 entered promiscuous mode [ 400.927934][ T24] audit: type=1400 audit(1758277870.610:142): avc: denied { write } for pid=9262 comm="syz.1.3373" name="cgroup.subtree_control" dev="cgroup2" ino=306 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 401.170411][ T24] audit: type=1400 audit(1758277870.630:143): avc: denied { open } for pid=9262 comm="syz.1.3373" path="" dev="cgroup2" ino=306 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 402.102153][ T9288] device syzkaller0 entered promiscuous mode [ 402.223706][ T9293] device wg2 left promiscuous mode [ 402.383497][ T9293] device wg2 entered promiscuous mode [ 402.475086][ T9296] device wg2 entered promiscuous mode [ 403.693410][ T9331] device wg2 left promiscuous mode [ 403.792305][ T9334] device wg2 entered promiscuous mode [ 404.118704][ T9348] device syzkaller0 entered promiscuous mode [ 404.843305][ T9353] device syzkaller0 entered promiscuous mode [ 404.987520][ T9371] device veth0_vlan left promiscuous mode [ 405.021343][ T9371] device veth0_vlan entered promiscuous mode [ 405.067567][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.090440][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 405.115327][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 406.732663][ T9409] device syzkaller0 entered promiscuous mode [ 407.147892][ T9418] device syzkaller0 entered promiscuous mode [ 408.859206][ T9465] device syzkaller0 entered promiscuous mode [ 409.091535][ T9471] device syzkaller0 entered promiscuous mode [ 409.548202][ T9495] device wg2 left promiscuous mode [ 409.558268][ T9495] device wg2 entered promiscuous mode [ 410.030963][ T9490] device syzkaller0 entered promiscuous mode [ 410.268085][ T9509] ±ÿ: renamed from team_slave_1 [ 410.770971][ T9522] device veth0_vlan left promiscuous mode [ 410.778360][ T9522] device veth0_vlan entered promiscuous mode [ 410.863499][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.916097][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 410.984134][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 411.466416][ T9539] device syzkaller0 entered promiscuous mode [ 411.648238][ T9547] syz.0.3476[9547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.648326][ T9547] syz.0.3476[9547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.402315][ T9557] device syzkaller0 entered promiscuous mode [ 413.943636][ T9602] device syzkaller0 entered promiscuous mode [ 414.216275][ T9611] device syzkaller0 entered promiscuous mode [ 414.665945][ T9625] device syzkaller0 entered promiscuous mode [ 414.757604][ T9632] device syzkaller0 entered promiscuous mode [ 415.382901][ T9650] device wg2 left promiscuous mode [ 415.444160][ T9649] device wg2 entered promiscuous mode [ 415.662955][ T9663] ±ÿ: renamed from team_slave_1 [ 415.719068][ T9666] device sit0 left promiscuous mode [ 415.802625][ T9672] device sit0 entered promiscuous mode [ 416.243230][ T9680] device syzkaller0 entered promiscuous mode [ 416.639663][ T9693] device wg2 left promiscuous mode [ 416.751600][ T9699] device wg2 entered promiscuous mode [ 417.163220][ T9719] bridge0: port 3(gretap0) entered blocking state [ 417.203098][ T9719] bridge0: port 3(gretap0) entered disabled state [ 417.274445][ T9719] device gretap0 entered promiscuous mode [ 417.325905][ T9719] bridge0: port 3(gretap0) entered blocking state [ 417.332426][ T9719] bridge0: port 3(gretap0) entered forwarding state [ 417.837319][ T9728] device syzkaller0 entered promiscuous mode [ 418.426882][ T9742] device syzkaller0 entered promiscuous mode [ 418.749528][ T9750] device sit0 left promiscuous mode [ 418.765165][ T9751] device sit0 entered promiscuous mode [ 418.973411][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 418.982167][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 418.996165][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 419.020309][ T9753] device sit0 left promiscuous mode [ 419.080297][ T9756] device sit0 entered promiscuous mode [ 419.136565][ T9760] device pim6reg1 entered promiscuous mode [ 419.681458][ T9765] device syzkaller0 entered promiscuous mode [ 420.429599][ T9792] ±ÿ: renamed from team_slave_1 [ 421.757988][ T9814] syz.2.3581[9814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.758049][ T9814] syz.2.3581[9814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.815436][ T9814] syz.2.3581[9814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.885492][ T9814] syz.2.3581[9814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.607259][ T9832] device syzkaller0 entered promiscuous mode [ 423.146067][ T9843] device syzkaller0 entered promiscuous mode [ 423.232797][ T9846] device pim6reg1 entered promiscuous mode [ 424.589087][ T9881] device syzkaller0 entered promiscuous mode [ 424.991895][ T9898] device syzkaller0 entered promiscuous mode [ 425.424023][ T9915] device sit0 left promiscuous mode [ 425.506276][ T9915] device sit0 entered promiscuous mode [ 425.894603][ T9928] device veth0_to_team entered promiscuous mode [ 426.905150][ T9958] syz.3.3623[9958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.905223][ T9958] syz.3.3623[9958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.194839][ T9964] device sit0 left promiscuous mode [ 427.407231][ T9970] device sit0 entered promiscuous mode [ 427.863500][ T9971] device veth0_vlan left promiscuous mode [ 427.907645][ T9971] device veth0_vlan entered promiscuous mode [ 427.970121][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.979264][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 427.987234][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 429.232870][ T9989] ±ÿ: renamed from team_slave_1 [ 429.272474][ T9995] syz.4.3638[9995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.272530][ T9995] syz.4.3638[9995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.285769][ T9995] syz.4.3638[9995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.297473][ T9995] syz.4.3638[9995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.585445][T10000] device syzkaller0 entered promiscuous mode [ 429.620753][T10005] device veth0_vlan left promiscuous mode [ 429.638580][T10005] device veth0_vlan entered promiscuous mode [ 429.684128][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 429.699106][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 429.732034][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 429.858687][T10014] device sit0 left promiscuous mode [ 429.974707][T10014] device sit0 entered promiscuous mode [ 431.297968][T10052] device sit0 left promiscuous mode [ 431.803355][T10057] device syzkaller0 entered promiscuous mode [ 432.379577][T10094] device sit0 left promiscuous mode [ 432.438961][T10095] device sit0 entered promiscuous mode [ 433.495730][T10116] device sit0 left promiscuous mode [ 433.541449][T10120] device sit0 entered promiscuous mode [ 434.771716][T10148] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.955701][T10151] device pim6reg1 entered promiscuous mode [ 435.305721][T10159] device veth0_vlan left promiscuous mode [ 435.391841][T10159] device veth0_vlan entered promiscuous mode [ 435.402857][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.435495][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 435.490956][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 436.659011][T10197] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 436.805529][T10197] device syzkaller0 entered promiscuous mode [ 437.589242][T10220] device sit0 entered promiscuous mode [ 439.653863][T10256] device sit0 left promiscuous mode [ 439.809160][T10260] device sit0 left promiscuous mode [ 440.123648][T10257] device sit0 entered promiscuous mode [ 440.473760][T10273] device syzkaller0 entered promiscuous mode [ 440.658478][T10282] device sit0 left promiscuous mode [ 440.824538][T10286] device sit0 entered promiscuous mode [ 441.181372][T10291] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.188485][T10291] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.229750][T10292] device bridge_slave_1 left promiscuous mode [ 441.252217][T10292] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.287913][T10292] device bridge_slave_0 left promiscuous mode [ 441.305522][T10292] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.799536][T10337] device veth0_vlan left promiscuous mode [ 443.919904][T10337] device veth0_vlan entered promiscuous mode [ 444.050107][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.089034][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 444.097441][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 444.423356][T10356] device syzkaller0 entered promiscuous mode [ 444.441893][T10352] device bridge_slave_1 left promiscuous mode [ 444.451555][T10352] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.477053][T10352] device bridge_slave_0 left promiscuous mode [ 444.489123][T10352] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.688381][T10425] device sit0 left promiscuous mode [ 447.358088][T10438] device syzkaller0 entered promiscuous mode [ 447.379607][T10434] device veth1_macvtap left promiscuous mode [ 447.780844][T10441] device syzkaller0 entered promiscuous mode [ 450.152136][T10513] device syzkaller0 entered promiscuous mode [ 450.341011][T10521] syz.4.3844[10521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.341095][T10521] syz.4.3844[10521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.932124][T10546] device pim6reg1 entered promiscuous mode [ 452.225596][T10555] device syzkaller0 entered promiscuous mode [ 454.716336][T10614] device sit0 left promiscuous mode [ 454.773437][T10614] device sit0 entered promiscuous mode [ 457.048047][T10686] device veth1_macvtap entered promiscuous mode [ 457.063681][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 457.473978][T10690] device syzkaller0 entered promiscuous mode [ 457.709568][T10702] device sit0 left promiscuous mode [ 459.165599][T10749] device syzkaller0 entered promiscuous mode [ 459.824781][ T24] audit: type=1400 audit(1758277929.520:144): avc: denied { create } for pid=10771 comm="syz.3.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 461.020138][T10798] device syzkaller0 entered promiscuous mode [ 461.349979][T10812] device pim6reg1 entered promiscuous mode [ 461.576494][T10824] device sit0 left promiscuous mode [ 463.927440][T10857] ÿ: renamed from bond_slave_0 [ 464.069068][T10863] device sit0 entered promiscuous mode [ 465.116985][T10879] device syzkaller0 entered promiscuous mode [ 466.100871][T10898] ÿ: renamed from bond_slave_0 [ 467.701556][T10944] device veth0_vlan left promiscuous mode [ 467.749218][T10944] device veth0_vlan entered promiscuous mode [ 467.854512][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.889907][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 467.970457][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 469.769428][T11002] device veth1_macvtap entered promiscuous mode [ 469.872674][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 470.128174][T11008] device syzkaller0 entered promiscuous mode [ 471.385847][T11030] device wg2 left promiscuous mode [ 471.534448][T11030] device wg2 entered promiscuous mode [ 475.366366][T11103] device syzkaller0 entered promiscuous mode [ 476.830248][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.844562][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 476.867705][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 479.573025][T11197] device sit0 entered promiscuous mode [ 486.272868][T11347] device wg2 left promiscuous mode [ 486.563472][ T24] audit: type=1400 audit(1758277956.270:145): avc: denied { create } for pid=11350 comm="syz.2.4120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 487.033728][T11355] device syzkaller0 entered promiscuous mode [ 487.626580][T11373] device veth0_vlan left promiscuous mode [ 487.643766][T11373] device veth0_vlan entered promiscuous mode [ 487.697084][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 487.716689][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 487.764791][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 489.378805][T11404] device syzkaller0 entered promiscuous mode [ 489.744292][T11420] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 489.806638][T11420] device syzkaller0 entered promiscuous mode [ 492.181329][T11462] device syzkaller0 entered promiscuous mode [ 494.228685][T11505] device veth0_vlan left promiscuous mode [ 494.447925][T11505] device veth0_vlan entered promiscuous mode [ 494.749309][T11516] device sit0 entered promiscuous mode [ 498.380270][T11603] device veth0_vlan left promiscuous mode [ 498.439907][T11603] device veth0_vlan entered promiscuous mode [ 498.587104][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 498.611938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 498.671708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 502.032009][ T24] audit: type=1400 audit(1758277971.740:146): avc: denied { create } for pid=11684 comm="syz.2.4231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 504.195302][T11720] device sit0 left promiscuous mode [ 504.502250][T11722] device sit0 entered promiscuous mode [ 505.595370][T11753] device sit0 left promiscuous mode [ 505.916355][T11759] IPv6: pim6reg1: Disabled Multicast RS [ 510.445607][T11857] device veth0_vlan left promiscuous mode [ 510.513718][T11857] device veth0_vlan entered promiscuous mode [ 510.680283][T11861] device sit0 left promiscuous mode [ 510.754206][T11862] device sit0 entered promiscuous mode [ 510.911704][T11870] device pim6reg1 entered promiscuous mode [ 512.576107][T11909] device veth0_vlan left promiscuous mode [ 512.637381][T11909] device veth0_vlan entered promiscuous mode [ 513.032048][T11918] device sit0 left promiscuous mode [ 513.189059][T11921] device syzkaller0 entered promiscuous mode [ 513.275493][T11918] device sit0 entered promiscuous mode [ 518.408498][T12009] device veth1_macvtap entered promiscuous mode [ 518.440214][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 518.463849][T12009] device veth1_macvtap left promiscuous mode [ 518.905190][T12014] device syzkaller0 entered promiscuous mode [ 519.495280][T12040] syz.0.4364 uses obsolete (PF_INET,SOCK_PACKET) [ 519.786393][T12048] device veth1_macvtap left promiscuous mode [ 522.404994][T12095] device sit0 left promiscuous mode [ 522.471284][T12095] device sit0 entered promiscuous mode [ 522.923012][T12105] syz.2.4389[12105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.923072][T12105] syz.2.4389[12105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.979752][T12119] device veth0_vlan left promiscuous mode [ 524.117362][T12119] device veth0_vlan entered promiscuous mode [ 524.199998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.279258][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 524.396216][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 525.134419][T12139] device syzkaller0 entered promiscuous mode [ 527.116707][T12175] device veth1_macvtap left promiscuous mode [ 527.763608][T12189] device pim6reg1 entered promiscuous mode [ 527.850395][T12189] cgroup: fork rejected by pids controller in /syz0 [ 529.680675][T12212] device sit0 left promiscuous mode [ 530.027866][T12216] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.141368][T12216] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.324310][T12216] device bridge_slave_0 entered promiscuous mode [ 530.383875][T12216] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.446357][T12216] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.520569][T12216] device bridge_slave_1 entered promiscuous mode [ 530.527933][ T8125] device veth0_vlan left promiscuous mode [ 531.189106][ T24] audit: type=1400 audit(1758278000.890:147): avc: denied { create } for pid=12216 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 531.233066][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 531.241312][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 531.261760][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 531.276320][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 531.367680][ T24] audit: type=1400 audit(1758278000.890:148): avc: denied { write } for pid=12216 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 531.367913][ T464] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.395447][ T464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.437007][ T24] audit: type=1400 audit(1758278000.890:149): avc: denied { read } for pid=12216 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 531.538592][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 531.588237][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 531.614171][ T464] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.621302][ T464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.669465][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 531.730751][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 531.835965][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 531.863144][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 531.926658][T12216] device veth0_vlan entered promiscuous mode [ 531.963837][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 531.974858][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 532.010619][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 532.044625][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 532.109104][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 532.148661][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 532.177829][T12216] device veth1_macvtap entered promiscuous mode [ 532.193261][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 532.224874][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 532.289176][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 532.358459][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 532.427542][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 532.504084][T12269] device veth0_vlan left promiscuous mode [ 532.539671][T12269] device veth0_vlan entered promiscuous mode [ 532.848618][T12281] device syzkaller0 entered promiscuous mode [ 533.294873][ T24] audit: type=1400 audit(1758278003.000:150): avc: denied { create } for pid=12282 comm="syz.3.4444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 534.216972][T12305] device syzkaller0 entered promiscuous mode [ 535.165127][T12334] device syzkaller0 entered promiscuous mode [ 540.861110][T12481] device wg2 left promiscuous mode [ 542.095168][T12506] device sit0 left promiscuous mode [ 542.233668][T12509] device sit0 entered promiscuous mode [ 543.650723][T12531] device sit0 left promiscuous mode [ 544.050833][T12540] device wg2 left promiscuous mode [ 544.151317][T12541] device wg2 entered promiscuous mode [ 544.876775][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.901388][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 545.012320][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 545.730491][T12572] device syzkaller0 entered promiscuous mode [ 545.830532][T12579] device wg2 left promiscuous mode [ 546.122448][T12579] device wg2 entered promiscuous mode [ 546.709592][T12599] bridge0: port 3(gretap0) entered disabled state [ 546.717135][T12599] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.997343][T12613] device syzkaller0 entered promiscuous mode [ 548.026356][T12615] device macsec0 entered promiscuous mode [ 548.462842][T12629] device veth1_macvtap left promiscuous mode [ 551.183311][T12703] device pim6reg1 entered promiscuous mode [ 552.006331][T12721] device veth1_macvtap entered promiscuous mode [ 552.077909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 552.097313][T12723] device pim6reg1 entered promiscuous mode [ 557.421296][T12830] device sit0 entered promiscuous mode [ 558.211264][T12845] device veth1_macvtap left promiscuous mode [ 559.642258][T12872] device veth1_macvtap left promiscuous mode [ 559.648308][T12872] device macsec0 left promiscuous mode [ 560.329640][T12884] device sit0 entered promiscuous mode [ 560.721008][T12897] device pim6reg1 entered promiscuous mode [ 560.826562][T12903] syz.0.4661[12903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.826624][T12903] syz.0.4661[12903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.962413][T12903] syz.0.4661[12903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 561.014510][T12903] syz.0.4661[12903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 561.123592][T12907] device syzkaller0 entered promiscuous mode [ 561.279908][T12913] device wg2 entered promiscuous mode [ 562.684075][T12934] device syzkaller0 entered promiscuous mode [ 562.835447][T12946] device syzkaller0 entered promiscuous mode [ 562.894954][T12944] device wg2 left promiscuous mode [ 563.770866][T12975] device macsec0 left promiscuous mode [ 564.976748][T13002] device syzkaller0 entered promiscuous mode [ 565.227400][T13011] device syzkaller0 entered promiscuous mode [ 565.603537][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 567.059954][ T24] audit: type=1400 audit(1758278036.760:151): avc: denied { create } for pid=13055 comm="syz.0.4709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 567.625089][T13060] device syzkaller0 entered promiscuous mode [ 568.023785][T13079] device sit0 left promiscuous mode [ 570.357031][T13122] device veth0_vlan left promiscuous mode [ 570.426833][T13122] device veth0_vlan entered promiscuous mode [ 570.500540][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 570.531723][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 570.539408][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 570.669784][T13129] bridge0: port 3(veth1) entered blocking state [ 570.686271][T13129] bridge0: port 3(veth1) entered disabled state [ 570.726189][T13129] device veth1 entered promiscuous mode [ 570.757793][T13129] bridge0: port 3(veth1) entered blocking state [ 570.764227][T13129] bridge0: port 3(veth1) entered forwarding state [ 571.125032][T13136] device veth0_vlan left promiscuous mode [ 571.207899][T13136] device veth0_vlan entered promiscuous mode [ 571.312729][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 571.326097][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 571.339841][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.676447][T13147] device syzkaller0 entered promiscuous mode [ 575.691887][T13234] device wg2 entered promiscuous mode [ 575.699474][T13237] device veth0_vlan left promiscuous mode [ 575.807591][T13237] device veth0_vlan entered promiscuous mode [ 577.295610][T13264] device syzkaller0 entered promiscuous mode [ 577.397794][T13277] device veth0_vlan left promiscuous mode [ 577.487602][T13277] device veth0_vlan entered promiscuous mode [ 577.646572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.670937][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 577.728181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 580.293158][T13337] device syzkaller0 entered promiscuous mode [ 583.033326][T13397] device wg2 left promiscuous mode [ 583.071500][T13399] syz.1.4824[13399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.071573][T13399] syz.1.4824[13399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.125282][T13397] syz.1.4824[13397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.170253][T13397] syz.1.4824[13397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.380203][T13399] device wg2 entered promiscuous mode [ 584.211093][T13408] device syzkaller0 entered promiscuous mode [ 584.426218][T13424] device veth0_vlan left promiscuous mode [ 584.509404][T13424] device veth0_vlan entered promiscuous mode [ 584.591503][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 584.630915][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 584.662275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 587.095914][T13463] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 587.317736][T13463] device syzkaller0 entered promiscuous mode [ 588.391201][ T24] audit: type=1400 audit(1758278058.100:152): avc: denied { create } for pid=13478 comm="syz.2.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 588.540856][ T24] audit: type=1400 audit(1758278058.160:153): avc: denied { create } for pid=13478 comm="syz.2.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 588.722362][ T24] audit: type=1400 audit(1758278058.390:154): avc: denied { read } for pid=13482 comm="syz.3.4855" dev="nsfs" ino=4026532291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 588.880172][ T24] audit: type=1400 audit(1758278058.390:155): avc: denied { open } for pid=13482 comm="syz.3.4855" path="mnt:[4026532291]" dev="nsfs" ino=4026532291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 588.925360][T13488] device wg2 entered promiscuous mode [ 593.258363][T13576] device pim6reg1 left promiscuous mode [ 599.882678][T13698] bridge0: port 3(veth1) entered disabled state [ 600.840198][T13722] device sit0 left promiscuous mode [ 601.364342][T13728] device syzkaller0 entered promiscuous mode [ 604.563247][T13807] device veth0_vlan left promiscuous mode [ 604.605789][T13807] device veth0_vlan entered promiscuous mode [ 604.717708][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 604.759403][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 604.791982][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 604.830762][T13810] device wg2 left promiscuous mode [ 604.868845][T13811] device wg2 entered promiscuous mode [ 607.505664][ T24] audit: type=1400 audit(1758278077.210:156): avc: denied { create } for pid=13876 comm="syz.0.4990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 607.682515][T13881] bridge0: port 4(veth0_macvtap) entered blocking state [ 607.730582][T13881] bridge0: port 4(veth0_macvtap) entered disabled state [ 607.786955][T13881] device veth0_macvtap entered promiscuous mode [ 611.069020][T13950] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 611.118852][T13950] device syzkaller0 entered promiscuous mode [ 614.764947][T14041] device veth0_vlan left promiscuous mode [ 614.839797][T14041] device veth0_vlan entered promiscuous mode [ 615.033689][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 615.076694][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 615.134807][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 615.798279][T14060] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 615.974792][T14060] device syzkaller0 entered promiscuous mode [ 616.810618][T14089] device veth0_vlan left promiscuous mode [ 616.828577][T14089] device veth0_vlan entered promiscuous mode [ 617.027438][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.070961][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 617.168153][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 617.618388][T14107] syz.3.5076[14107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.618475][T14107] syz.3.5076[14107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.132546][T14148] device syzkaller0 entered promiscuous mode [ 622.770325][T14215] device veth0_vlan left promiscuous mode [ 622.805968][T14215] device veth0_vlan entered promiscuous mode [ 622.947195][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.984293][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 622.993181][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 626.561738][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 626.591441][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 626.627751][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 628.402306][T14316] device wg2 entered promiscuous mode [ 628.484703][T14320] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 628.526041][T14320] device syzkaller0 entered promiscuous mode [ 630.871357][T14396] device wg2 left promiscuous mode [ 631.005412][T14396] device wg2 entered promiscuous mode [ 632.034265][T14426] device wg2 left promiscuous mode [ 632.287141][T14433] device syzkaller0 entered promiscuous mode [ 633.291427][T14463] device sit0 entered promiscuous mode [ 633.823735][T14473] device sit0 left promiscuous mode [ 634.037556][T14483] device wg2 entered promiscuous mode [ 634.963601][T14515] device sit0 entered promiscuous mode [ 635.119610][T14524] device pim6reg1 entered promiscuous mode [ 636.454055][T14546] device veth0_vlan left promiscuous mode [ 636.508341][T14546] device veth0_vlan entered promiscuous mode [ 636.609521][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 636.650767][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 636.772064][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 638.525636][T14597] device wg2 left promiscuous mode [ 638.651008][T14597] device wg2 entered promiscuous mode [ 642.769657][T14715] device sit0 left promiscuous mode [ 643.092550][T14722] ÿÿÿÿÿÿ: renamed from vlan1 [ 643.646899][T14743] device pim6reg1 entered promiscuous mode [ 646.314453][T14802] device sit0 left promiscuous mode [ 647.150639][T14825] device wg2 left promiscuous mode [ 647.256977][T14825] device wg2 entered promiscuous mode [ 647.620228][T14836] device wg2 left promiscuous mode [ 647.693215][T14837] device wg2 entered promiscuous mode [ 651.774486][T14918] device macsec0 entered promiscuous mode [ 652.512976][T14946] device veth0_vlan left promiscuous mode [ 652.533416][T14946] device veth0_vlan entered promiscuous mode [ 653.901594][T14970] device veth0_vlan left promiscuous mode [ 654.059664][T14970] device veth0_vlan entered promiscuous mode [ 656.055708][T15028] device wg2 left promiscuous mode [ 656.278946][T15028] device wg2 entered promiscuous mode [ 659.597926][T15097] device veth0_vlan left promiscuous mode [ 659.638732][T15097] device veth0_vlan entered promiscuous mode [ 659.863074][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.896639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.990324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 660.156929][T15108] device sit0 entered promiscuous mode [ 662.930860][T15168] device wg2 left promiscuous mode [ 662.980771][T15169] syz.2.5484[15169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.980833][T15169] syz.2.5484[15169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.070735][T15168] syz.2.5484[15168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.119765][T15168] syz.2.5484[15168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.274781][T15168] device wg2 entered promiscuous mode [ 664.991358][T15226] device syzkaller0 entered promiscuous mode [ 665.066675][T15231] device sit0 entered promiscuous mode [ 667.668828][T15268] device sit0 entered promiscuous mode [ 669.325830][T15320] device syzkaller0 entered promiscuous mode [ 669.381907][T15326] device sit0 entered promiscuous mode [ 669.496339][T15338] device wg2 left promiscuous mode [ 669.515258][T15343] device wg2 entered promiscuous mode [ 670.190465][T15366] device veth0_vlan left promiscuous mode [ 670.301568][T15366] device veth0_vlan entered promiscuous mode [ 671.910895][T15414] device syzkaller0 entered promiscuous mode [ 672.026008][T15422] device macsec0 left promiscuous mode [ 672.063666][T15423] device veth1_macvtap entered promiscuous mode [ 672.069970][T15423] device macsec0 entered promiscuous mode [ 672.089585][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 672.535825][T15439] ªªªªªª: renamed from vlan0 [ 673.042564][T15450] syz.3.5593[15450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.042653][T15450] syz.3.5593[15450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.707375][T15490] device wg2 left promiscuous mode [ 676.446302][T15507] device sit0 left promiscuous mode [ 676.604893][T15510] device sit0 entered promiscuous mode [ 676.790669][T15515] device sit0 entered promiscuous mode [ 677.420307][T15535] device syzkaller0 entered promiscuous mode [ 677.789136][T15560] device wg2 left promiscuous mode [ 678.155820][T15575] device sit0 left promiscuous mode [ 678.251028][T15584] device sit0 entered promiscuous mode [ 679.133487][T15615] device macsec0 left promiscuous mode [ 679.192717][T15615] device veth1_macvtap entered promiscuous mode [ 679.212590][T15615] device macsec0 entered promiscuous mode [ 679.267116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 679.897353][T15640] device sit0 left promiscuous mode [ 679.953624][T15640] device sit0 entered promiscuous mode [ 680.184812][T15655] device wg2 left promiscuous mode [ 680.886868][T15682] device wg2 entered promiscuous mode [ 681.027175][T15693] device wg2 left promiscuous mode [ 682.019295][T15730] device wg2 entered promiscuous mode [ 682.577699][T15751] syz.0.5715[15751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.577777][T15751] syz.0.5715[15751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.711270][T15751] syz.0.5715[15751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.812640][T15751] syz.0.5715[15751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.027620][T15765] device wg2 left promiscuous mode [ 683.201807][T15773] device wg2 left promiscuous mode [ 683.238476][T15765] device wg2 entered promiscuous mode [ 683.378868][T15783] device wg2 left promiscuous mode [ 683.732901][T15783] device wg2 entered promiscuous mode [ 684.270749][T15806] device wg2 entered promiscuous mode [ 684.400316][T15814] device wg2 left promiscuous mode [ 684.478674][T15814] device wg2 entered promiscuous mode [ 684.731809][T15829] device wg2 left promiscuous mode [ 684.842552][T15829] device wg2 entered promiscuous mode [ 685.203162][T15846] device wg2 entered promiscuous mode [ 685.477610][T15851] device wg2 left promiscuous mode [ 685.662845][T15851] device wg2 entered promiscuous mode [ 685.920350][T15870] device wg2 left promiscuous mode [ 685.984898][T15870] device wg2 entered promiscuous mode [ 686.173232][T15876] device macsec0 left promiscuous mode [ 686.246091][T15877] device veth1_macvtap entered promiscuous mode [ 686.262605][T15877] device macsec0 entered promiscuous mode [ 686.285757][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 687.315178][T15897] device wg2 left promiscuous mode [ 687.368999][T15903] device wg2 left promiscuous mode [ 687.473761][T15903] device wg2 entered promiscuous mode [ 688.007954][T15929] syz.4.5786[15929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.008048][T15929] syz.4.5786[15929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.377032][T15939] device wg2 left promiscuous mode [ 688.625202][T15939] device wg2 entered promiscuous mode [ 688.785565][T15941] device wg2 left promiscuous mode [ 688.875514][T15941] device wg2 entered promiscuous mode [ 689.154043][T15950] device wg2 entered promiscuous mode [ 689.603226][T15969] device wg2 left promiscuous mode [ 689.947772][T15969] device wg2 entered promiscuous mode [ 690.132094][ T24] audit: type=1400 audit(1758278159.840:157): avc: denied { create } for pid=15980 comm="syz.2.5806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 690.255417][T15983] device wg2 left promiscuous mode [ 690.370624][T15983] device wg2 entered promiscuous mode [ 691.305830][T16010] device wg2 entered promiscuous mode [ 691.434725][T16004] device veth0_vlan left promiscuous mode [ 691.497910][T16004] device veth0_vlan entered promiscuous mode [ 691.584974][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 691.593306][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 691.601470][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 692.189250][T16046] device wg2 left promiscuous mode [ 692.313923][T16046] device wg2 entered promiscuous mode [ 692.507913][T16063] device pim6reg1 entered promiscuous mode [ 692.964425][T16083] device sit0 left promiscuous mode [ 693.090755][T16089] device wg2 left promiscuous mode [ 693.148887][T16090] device wg2 entered promiscuous mode [ 693.637055][T16096] device syzkaller0 entered promiscuous mode [ 693.704664][T16113] device wg2 left promiscuous mode [ 693.711304][T16118] syz.2.5862[16118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.711366][T16118] syz.2.5862[16118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.730843][T16116] device wg2 entered promiscuous mode [ 694.084343][T16127] device wg2 left promiscuous mode [ 694.147793][T16127] device wg2 entered promiscuous mode [ 694.267312][T16129] device wg2 left promiscuous mode [ 694.428790][T16129] device wg2 entered promiscuous mode [ 694.973527][T16150] device wg2 left promiscuous mode [ 695.025017][T16150] device wg2 entered promiscuous mode [ 695.072057][T16158] device wg2 left promiscuous mode [ 695.115211][T16160] device wg2 left promiscuous mode [ 695.204404][T16158] device wg2 entered promiscuous mode [ 695.283001][T16160] device wg2 entered promiscuous mode [ 695.459621][T16171] device wg2 left promiscuous mode [ 695.534153][T16171] device wg2 entered promiscuous mode [ 695.858536][T16183] device syzkaller0 entered promiscuous mode [ 695.865949][T16188] device veth0_vlan left promiscuous mode [ 695.900786][T16188] device veth0_vlan entered promiscuous mode [ 696.028041][T16205] device wg2 left promiscuous mode [ 696.083560][T16205] device wg2 entered promiscuous mode [ 696.354819][T16203] device syzkaller0 entered promiscuous mode [ 696.442263][T16216] device wg2 left promiscuous mode [ 696.501136][T16221] device wg2 entered promiscuous mode [ 696.941004][T16230] device syzkaller0 entered promiscuous mode [ 697.076374][T16245] device wg2 left promiscuous mode [ 697.115922][T16247] device wg2 entered promiscuous mode [ 698.018313][T16257] device syzkaller0 entered promiscuous mode [ 698.357504][T16282] device syzkaller0 entered promiscuous mode [ 698.650503][T16292] device veth0_vlan left promiscuous mode [ 698.676627][T16292] device veth0_vlan entered promiscuous mode [ 698.781742][T16302] syz.0.5930[16302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.781840][T16302] syz.0.5930[16302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.888609][T16310] device wg2 left promiscuous mode [ 698.969907][T16314] device sit0 left promiscuous mode [ 699.025791][T16310] device wg2 entered promiscuous mode [ 699.299690][T16327] syz.1.5941[16327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.299752][T16327] syz.1.5941[16327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.700795][T16333] device syzkaller0 entered promiscuous mode [ 699.991009][T16336] device syzkaller0 entered promiscuous mode [ 700.285095][T16347] device syzkaller0 entered promiscuous mode [ 700.539136][ T24] audit: type=1400 audit(1758278170.240:158): avc: denied { ioctl } for pid=16350 comm="syz.4.5953" path="mnt:[4026532460]" dev="nsfs" ino=4026532460 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 700.605916][T16367] device wg2 left promiscuous mode [ 700.730810][T16367] device wg2 entered promiscuous mode [ 701.255799][T16377] device syzkaller0 entered promiscuous mode [ 701.721014][T16411] device wg2 left promiscuous mode [ 701.785337][T16411] device wg2 entered promiscuous mode [ 702.843101][T16446] device wg2 left promiscuous mode [ 702.941381][T16446] device wg2 entered promiscuous mode [ 703.256659][T16467] device veth0_vlan left promiscuous mode [ 703.275762][T16467] device veth0_vlan entered promiscuous mode [ 703.921155][T16484] device veth0_vlan left promiscuous mode [ 703.950552][T16484] device veth0_vlan entered promiscuous mode [ 703.978689][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 704.059200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 704.078656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 704.341490][T16499] device wg2 left promiscuous mode [ 704.689520][T16500] device veth0_vlan left promiscuous mode [ 704.702287][T16500] device veth0_vlan entered promiscuous mode [ 704.734474][T16499] device wg2 entered promiscuous mode [ 704.838797][T16515] device wg2 left promiscuous mode [ 705.228296][T16515] device wg2 entered promiscuous mode [ 706.535446][T16545] device wg2 left promiscuous mode [ 706.609208][T16545] device wg2 entered promiscuous mode [ 706.806407][T16556] device wg2 left promiscuous mode [ 706.947988][T16556] device wg2 entered promiscuous mode [ 707.015123][T16565] device wg2 left promiscuous mode [ 707.193778][T16565] device wg2 entered promiscuous mode [ 707.492810][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.521373][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 707.552891][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 707.938466][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.947296][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 707.955403][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 707.965094][T16595] device wg2 left promiscuous mode [ 708.043463][T16595] device wg2 entered promiscuous mode [ 708.071013][T16602] device wg2 left promiscuous mode [ 708.112981][T16601] device wg2 left promiscuous mode [ 708.163644][T16601] device wg2 entered promiscuous mode [ 708.233810][T16602] device wg2 entered promiscuous mode [ 709.365815][ T24] audit: type=1400 audit(1758278179.070:159): avc: denied { attach_queue } for pid=16638 comm="syz.0.6069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 709.407608][T16643] device wg2 left promiscuous mode [ 709.492200][T16645] device wg2 left promiscuous mode [ 709.530776][T16646] device wg2 entered promiscuous mode [ 709.626987][T16645] device wg2 entered promiscuous mode [ 709.954136][T16655] device wg2 left promiscuous mode [ 709.967894][T16657] device wg2 left promiscuous mode [ 710.158892][T16655] device wg2 entered promiscuous mode [ 710.189355][T16657] device wg2 entered promiscuous mode [ 710.201012][T16669] device wg2 left promiscuous mode [ 710.300687][T16669] device wg2 entered promiscuous mode [ 710.308733][T16674] syz.3.6079[16674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.308800][T16674] syz.3.6079[16674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.360662][T16672] device wg2 left promiscuous mode [ 710.495651][T16677] device wg2 entered promiscuous mode [ 712.116756][T16705] device veth0_vlan left promiscuous mode [ 712.205844][T16705] device veth0_vlan entered promiscuous mode [ 712.329183][T16715] device wg2 left promiscuous mode [ 712.433594][T16715] device wg2 entered promiscuous mode [ 713.039892][T16734] device veth0_vlan left promiscuous mode [ 713.047371][T16734] device veth0_vlan entered promiscuous mode [ 713.104021][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 713.136193][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 713.169187][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 716.143602][T16793] device wg2 left promiscuous mode [ 716.294633][T16793] device wg2 entered promiscuous mode [ 716.676985][T16802] device veth0_vlan left promiscuous mode [ 716.701840][T16802] device veth0_vlan entered promiscuous mode [ 716.755557][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 716.812399][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 716.878546][ T8125] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 717.395330][T16829] device veth0_vlan left promiscuous mode [ 717.403775][T16829] device veth0_vlan entered promiscuous mode [ 717.447720][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 717.457196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 717.465192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 717.486842][T16834] device wg2 left promiscuous mode [ 717.517874][T16837] device wg2 entered promiscuous mode [ 720.404503][T16885] device veth0_vlan left promiscuous mode [ 720.453372][T16885] device veth0_vlan entered promiscuous mode [ 720.516605][T16885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.577697][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.594585][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 720.633426][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 720.845246][T16895] device veth0_vlan left promiscuous mode [ 720.902343][T16895] device veth0_vlan entered promiscuous mode [ 724.074475][T16944] device syzkaller0 entered promiscuous mode [ 726.056679][T16982] device veth0_vlan left promiscuous mode [ 726.080305][T16982] device veth0_vlan entered promiscuous mode [ 726.588471][T16993] device wg2 left promiscuous mode [ 726.594790][T16995] device wg2 left promiscuous mode [ 726.684912][T16995] device wg2 entered promiscuous mode [ 726.723415][T16993] device wg2 entered promiscuous mode [ 727.955523][T17033] device wg2 left promiscuous mode [ 728.137125][T17033] device wg2 entered promiscuous mode [ 728.261718][T17039] device wg2 left promiscuous mode [ 728.402748][T17042] device wg2 entered promiscuous mode [ 729.299823][T17072] device wg2 left promiscuous mode [ 729.474751][T17072] device wg2 entered promiscuous mode [ 729.681111][T17078] device wg2 left promiscuous mode [ 729.777579][T17078] device wg2 entered promiscuous mode [ 730.042239][ T24] audit: type=1400 audit(1758278199.750:160): avc: denied { create } for pid=17091 comm="syz.1.6234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 731.099997][T17117] device wg2 left promiscuous mode [ 731.170125][T17118] device veth0_vlan left promiscuous mode [ 731.200565][T17118] device veth0_vlan entered promiscuous mode [ 731.243140][T17118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 731.271134][T17119] device wg2 entered promiscuous mode [ 731.338683][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 731.427445][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 731.467252][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 732.551620][T17157] device wg2 left promiscuous mode [ 732.723728][T17157] device wg2 entered promiscuous mode [ 734.059307][T17196] device macsec0 left promiscuous mode [ 740.198402][T17319] device wg2 left promiscuous mode [ 740.316755][T17321] device wg2 entered promiscuous mode [ 740.669065][T17311] device syzkaller0 entered promiscuous mode [ 741.908352][T17353] device wg2 left promiscuous mode [ 742.012438][T17353] device wg2 entered promiscuous mode [ 746.032857][T17450] device syzkaller0 entered promiscuous mode [ 748.390803][T17487] device syzkaller0 entered promiscuous mode [ 748.403802][T17494] device wg2 left promiscuous mode [ 748.414906][T17495] device wg2 entered promiscuous mode [ 748.561391][T17501] device sit0 entered promiscuous mode [ 748.724997][T17509] device pim6reg1 entered promiscuous mode [ 750.520848][T17534] device wg2 left promiscuous mode [ 750.529081][T17536] device wg2 entered promiscuous mode [ 750.952398][T17552] device syzkaller0 entered promiscuous mode [ 751.678630][T17569] device wg2 left promiscuous mode [ 751.801637][T17569] device wg2 entered promiscuous mode [ 752.757991][T17591] device syzkaller0 entered promiscuous mode [ 753.148454][T17597] device wg2 left promiscuous mode [ 753.157868][T17598] device wg2 entered promiscuous mode [ 755.496150][T17638] device syzkaller0 entered promiscuous mode [ 755.954938][T17642] device sit0 left promiscuous mode [ 756.246080][T17648] device sit0 entered promiscuous mode [ 757.450862][T17675] device veth0_vlan left promiscuous mode [ 757.484093][T17675] device veth0_vlan entered promiscuous mode [ 757.557571][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 757.568300][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 757.595721][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 757.838287][T17687] device wg2 left promiscuous mode [ 757.865794][T17688] device wg2 entered promiscuous mode [ 758.465601][T17702] device sit0 left promiscuous mode [ 758.745152][T17710] device sit0 entered promiscuous mode [ 758.954170][T17726] device wg2 left promiscuous mode [ 759.043058][T17726] device wg2 entered promiscuous mode [ 759.483362][ T24] audit: type=1400 audit(1758278229.190:161): avc: denied { create } for pid=17745 comm="syz.0.6475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 760.447122][T17763] device syzkaller0 entered promiscuous mode [ 760.539543][T17768] device wg2 left promiscuous mode [ 760.640239][T17768] device wg2 entered promiscuous mode [ 761.824166][T17798] device syzkaller0 entered promiscuous mode [ 762.105618][T17801] device wg2 left promiscuous mode [ 762.111600][T17803] device wg2 left promiscuous mode [ 762.119015][T17804] device wg2 entered promiscuous mode [ 762.131028][T17805] device wg2 entered promiscuous mode [ 762.691205][T17832] device syzkaller0 entered promiscuous mode [ 762.810988][T17842] device wg2 left promiscuous mode [ 763.273813][T17842] device wg2 entered promiscuous mode [ 763.292649][T17844] device wg2 left promiscuous mode [ 763.305498][T17845] device wg2 entered promiscuous mode [ 763.349387][T17847] device wg2 left promiscuous mode [ 763.431109][T17848] device wg2 entered promiscuous mode [ 763.530367][T17855] device sit0 left promiscuous mode [ 764.935012][T17884] device wg2 left promiscuous mode [ 765.083024][T17887] device pim6reg1 left promiscuous mode [ 765.214178][T17884] device wg2 entered promiscuous mode [ 765.259264][T17890] device wg2 left promiscuous mode [ 765.281537][T17890] device wg2 entered promiscuous mode [ 766.210207][T17912] device pim6reg1 entered promiscuous mode [ 766.314406][T17921] device wg2 left promiscuous mode [ 766.391037][T17923] device wg2 left promiscuous mode [ 766.529980][T17921] device wg2 entered promiscuous mode [ 766.568972][T17923] device wg2 entered promiscuous mode [ 766.773974][T17933] device sit0 entered promiscuous mode [ 767.107179][T17946] device wg2 left promiscuous mode [ 767.203410][T17955] device wg2 left promiscuous mode [ 767.275887][T17946] device wg2 entered promiscuous mode [ 767.311534][T17955] device wg2 entered promiscuous mode [ 767.320502][T17963] device wg2 left promiscuous mode [ 767.392066][T17963] device wg2 entered promiscuous mode [ 768.180407][T17987] device wg2 left promiscuous mode [ 768.344790][T17987] device wg2 entered promiscuous mode [ 768.447882][T17994] device syzkaller0 entered promiscuous mode [ 769.655403][T18025] device wg2 left promiscuous mode [ 769.682193][T18026] device wg2 entered promiscuous mode [ 769.802407][T18032] device wg2 left promiscuous mode [ 769.866776][T18032] device wg2 entered promiscuous mode [ 770.812583][T18058] device syzkaller0 entered promiscuous mode [ 770.993346][T18063] device wg2 left promiscuous mode [ 771.007034][T18066] device wg2 entered promiscuous mode [ 771.492469][T18089] device wg2 left promiscuous mode [ 771.611414][T18089] device wg2 entered promiscuous mode [ 771.713155][T18093] device wg2 left promiscuous mode [ 771.792498][T18096] device wg2 entered promiscuous mode [ 771.924099][T18099] device wg2 left promiscuous mode [ 771.961250][T18101] device wg2 left promiscuous mode [ 771.984699][T18104] device wg2 entered promiscuous mode [ 772.024244][T18099] device wg2 entered promiscuous mode [ 772.371584][T18115] device syzkaller0 entered promiscuous mode [ 772.600340][T18130] device wg2 left promiscuous mode [ 772.652172][T18132] device wg2 entered promiscuous mode [ 772.755151][T18140] device wg2 left promiscuous mode [ 772.764335][T18142] device wg2 left promiscuous mode [ 772.799630][T18140] device wg2 entered promiscuous mode [ 772.959242][T18142] device wg2 entered promiscuous mode [ 773.115528][T18154] device sit0 left promiscuous mode [ 773.343373][T18153] device sit0 entered promiscuous mode [ 773.863780][T18177] device wg2 left promiscuous mode [ 773.914032][T18179] device wg2 left promiscuous mode [ 773.999126][T18177] device wg2 entered promiscuous mode [ 774.079116][T18179] device wg2 entered promiscuous mode [ 774.312781][T18201] device wg2 left promiscuous mode [ 774.473118][T18201] device wg2 entered promiscuous mode [ 774.927209][T18220] device wg2 left promiscuous mode [ 774.951389][T18221] device pim6reg1 entered promiscuous mode [ 775.021698][T18224] device wg2 entered promiscuous mode [ 775.424181][T18240] device syzkaller0 entered promiscuous mode [ 776.001196][T18257] device wg2 left promiscuous mode [ 776.058012][T18257] device wg2 entered promiscuous mode [ 776.613343][T18270] device syzkaller0 entered promiscuous mode [ 776.952839][T18279] device wg2 left promiscuous mode [ 776.974667][T18280] device wg2 entered promiscuous mode [ 777.093827][T18290] device wg2 left promiscuous mode [ 777.163132][T18290] device wg2 entered promiscuous mode [ 778.056888][T18321] device wg2 left promiscuous mode [ 778.173886][T18321] device wg2 entered promiscuous mode [ 778.489540][T18329] device wg2 left promiscuous mode [ 778.571774][T18329] device wg2 entered promiscuous mode [ 778.845014][T18339] device syzkaller0 entered promiscuous mode [ 779.040540][T18350] device wg2 left promiscuous mode [ 779.053323][T18352] device wg2 entered promiscuous mode [ 779.448867][T18373] device wg2 left promiscuous mode [ 779.578315][T18373] device wg2 entered promiscuous mode [ 780.059398][T18396] device sit0 left promiscuous mode [ 780.138026][T18399] device sit0 entered promiscuous mode [ 781.060799][T18421] device syzkaller0 entered promiscuous mode [ 781.833185][T18448] device sit0 entered promiscuous mode [ 782.469928][T18465] device wg2 left promiscuous mode [ 782.505280][T18465] device wg2 entered promiscuous mode [ 782.571643][T18469] device wg2 left promiscuous mode [ 782.696511][T18469] device wg2 entered promiscuous mode [ 783.242020][T18486] device veth0_vlan left promiscuous mode [ 783.275243][T18486] device veth0_vlan entered promiscuous mode [ 783.455164][T18497] device sit0 left promiscuous mode [ 783.499813][T18497] device sit0 entered promiscuous mode [ 784.683164][T18525] device wg2 left promiscuous mode [ 784.836156][T18525] device wg2 entered promiscuous mode [ 785.032687][T18536] device pim6reg1 entered promiscuous mode [ 785.281381][T18545] device veth0_vlan left promiscuous mode [ 785.412426][T18545] device veth0_vlan entered promiscuous mode [ 785.568088][T18560] device wg2 left promiscuous mode [ 785.660260][T18560] device wg2 entered promiscuous mode [ 786.557434][T18599] device pim6reg1 entered promiscuous mode [ 786.982224][T18609] device wg2 left promiscuous mode [ 787.339233][T18609] device wg2 entered promiscuous mode [ 787.394014][T18619] device wg2 left promiscuous mode [ 787.485343][T18620] device wg2 entered promiscuous mode [ 788.064854][T18628] device wg2 left promiscuous mode [ 788.280896][T18628] device wg2 entered promiscuous mode [ 788.612310][T18652] device wg2 left promiscuous mode [ 788.696927][T18652] device wg2 entered promiscuous mode [ 789.282900][T18667] device wg2 left promiscuous mode [ 789.472767][T18667] device wg2 entered promiscuous mode [ 790.009643][T18699] device wg2 left promiscuous mode [ 790.266416][T18699] device wg2 entered promiscuous mode [ 790.518165][T18709] device sit0 left promiscuous mode [ 790.663369][T18714] device sit0 entered promiscuous mode [ 790.945962][T18718] device wg2 left promiscuous mode [ 790.955513][T18721] device wg2 entered promiscuous mode [ 791.325515][T18735] device wg2 left promiscuous mode [ 791.456550][T18735] device wg2 entered promiscuous mode [ 791.964974][T18743] device syzkaller0 entered promiscuous mode [ 792.072250][T18752] device wg2 left promiscuous mode [ 792.090027][T18753] device wg2 entered promiscuous mode [ 793.040166][T18773] device wg2 left promiscuous mode [ 793.048097][T18774] device wg2 entered promiscuous mode [ 793.116864][T18782] device wg2 left promiscuous mode [ 793.186595][T18782] device wg2 entered promiscuous mode [ 794.334152][T18803] device wg2 left promiscuous mode [ 794.378803][T18803] device wg2 entered promiscuous mode [ 794.878127][T18817] device wg2 left promiscuous mode [ 794.924981][T18817] device wg2 entered promiscuous mode [ 795.268725][T18832] device sit0 left promiscuous mode [ 795.538354][T18834] device sit0 entered promiscuous mode [ 795.906038][T18842] device wg2 left promiscuous mode [ 796.022903][T18842] device wg2 entered promiscuous mode [ 796.730032][T18858] device wg2 left promiscuous mode [ 796.785777][T18862] device wg2 entered promiscuous mode [ 796.822915][T18867] device syzkaller0 entered promiscuous mode [ 797.349447][ T24] audit: type=1400 audit(1758278267.050:162): avc: denied { read } for pid=18878 comm="syz.0.6916" name="cgroup.subtree_control" dev="cgroup2" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 797.479409][T18888] device sit0 left promiscuous mode [ 797.561848][T18888] device sit0 entered promiscuous mode [ 798.167853][T18909] device veth0_vlan left promiscuous mode [ 798.304446][T18909] device veth0_vlan entered promiscuous mode [ 799.340161][T18935] device sit0 left promiscuous mode [ 799.476753][T18933] device wg2 left promiscuous mode [ 799.498694][T18935] device sit0 entered promiscuous mode [ 799.686485][T18942] device pim6reg1 entered promiscuous mode [ 801.751531][T18987] device wg2 left promiscuous mode [ 801.834093][T18987] device wg2 entered promiscuous mode [ 801.966214][T18991] device sit0 left promiscuous mode [ 802.242541][T18993] device sit0 entered promiscuous mode [ 802.609353][T19014] device wg2 left promiscuous mode [ 802.618397][T19019] device wg2 entered promiscuous mode [ 803.660137][T19052] device sit0 left promiscuous mode [ 803.933472][T19057] device sit0 entered promiscuous mode [ 804.169450][T19063] device wg2 left promiscuous mode [ 804.465279][T19081] device syzkaller0 entered promiscuous mode [ 805.183070][T19108] device wg2 left promiscuous mode [ 805.464827][T19108] device wg2 entered promiscuous mode [ 806.184370][T19139] device pim6reg1 entered promiscuous mode [ 807.219919][T19181] device wg2 entered promiscuous mode [ 807.637481][T19179] device syzkaller0 entered promiscuous mode [ 808.339767][T19213] device pim6reg1 entered promiscuous mode [ 808.625846][T19227] device wg2 left promiscuous mode [ 808.748944][T19233] device wg2 left promiscuous mode [ 808.863373][T19228] device wg2 entered promiscuous mode [ 809.273900][T19233] device wg2 entered promiscuous mode [ 809.385831][T19249] device wg2 left promiscuous mode [ 809.514997][T19249] device wg2 entered promiscuous mode [ 809.650265][T19262] device wg2 left promiscuous mode [ 809.699527][T19262] device wg2 entered promiscuous mode [ 810.120509][T19275] device wg2 left promiscuous mode [ 810.356949][T19275] device wg2 entered promiscuous mode [ 810.802666][T19287] device wg2 entered promiscuous mode [ 811.024498][T19294] device wg2 left promiscuous mode [ 811.079447][T19295] device wg2 entered promiscuous mode [ 811.401740][T19308] device wg2 left promiscuous mode [ 811.608109][T19308] device wg2 entered promiscuous mode [ 811.685206][T19311] device sit0 left promiscuous mode [ 811.838095][T19315] device sit0 entered promiscuous mode [ 812.066176][T19327] device sit0 left promiscuous mode [ 812.290647][T19329] device wg2 left promiscuous mode [ 812.319506][T19336] device wg2 entered promiscuous mode [ 812.347937][T19335] device sit0 entered promiscuous mode [ 812.561108][T19347] device wg2 left promiscuous mode [ 812.571569][T19348] device wg2 entered promiscuous mode [ 814.341034][T19390] device wg2 left promiscuous mode [ 814.638159][T19390] device wg2 entered promiscuous mode [ 814.942500][T19404] device wg2 left promiscuous mode [ 815.062989][T19404] device wg2 entered promiscuous mode [ 817.326607][T19478] device pim6reg1 entered promiscuous mode [ 820.724814][T19555] device sit0 left promiscuous mode [ 820.963731][T19556] device sit0 entered promiscuous mode [ 821.996358][T19571] device syzkaller0 entered promiscuous mode [ 822.357292][T19586] device wg2 left promiscuous mode [ 822.431704][T19586] device wg2 entered promiscuous mode [ 822.819986][T19598] device pim6reg1 entered promiscuous mode [ 824.075597][T19608] device wg2 left promiscuous mode [ 824.091964][T19609] device wg2 entered promiscuous mode [ 824.516144][T19636] device veth0_macvtap left promiscuous mode [ 824.550190][T19636] bridge0: port 4(veth0_macvtap) entered disabled state [ 824.557830][T19636] device gretap0 left promiscuous mode [ 824.563506][T19636] bridge0: port 3(gretap0) entered disabled state [ 824.577429][T19636] device bridge_slave_1 left promiscuous mode [ 824.723930][T19636] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.823356][T19636] device bridge_slave_0 left promiscuous mode [ 824.870149][T19636] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.952073][T19643] device wg2 left promiscuous mode [ 824.959448][T19644] device wg2 entered promiscuous mode [ 826.696412][T19699] device sit0 left promiscuous mode [ 826.982185][T19694] device sit0 entered promiscuous mode [ 827.037206][T19706] device sit0 left promiscuous mode [ 827.196994][T19709] device sit0 entered promiscuous mode [ 827.216792][T19721] device wg2 left promiscuous mode [ 827.319745][T19721] device wg2 entered promiscuous mode [ 827.520532][T19734] device wg2 left promiscuous mode [ 828.160508][T19734] device wg2 entered promiscuous mode [ 828.372158][T19756] device wg2 left promiscuous mode [ 828.595343][T19756] device wg2 entered promiscuous mode [ 828.785470][T19770] device wg2 left promiscuous mode [ 828.899476][T19770] device wg2 entered promiscuous mode [ 829.255185][T19780] device wg2 left promiscuous mode [ 829.285869][T19780] device wg2 entered promiscuous mode [ 829.417374][T19793] device wg2 left promiscuous mode [ 829.515154][T19793] device wg2 entered promiscuous mode [ 830.262404][T19810] device wg2 left promiscuous mode [ 830.455592][T19810] device wg2 entered promiscuous mode [ 830.691943][T19822] device wg2 left promiscuous mode [ 830.874000][T19822] device wg2 entered promiscuous mode [ 830.894414][T19825] device wg2 left promiscuous mode [ 830.931311][T19825] device wg2 entered promiscuous mode [ 831.937541][T19851] device wg2 left promiscuous mode [ 831.996093][T19853] device wg2 entered promiscuous mode [ 832.019663][T19857] device wg2 left promiscuous mode [ 832.115152][T19859] device wg2 left promiscuous mode [ 832.124827][T19857] device wg2 entered promiscuous mode [ 832.159658][T19859] device wg2 entered promiscuous mode [ 832.489296][T19880] device wg2 left promiscuous mode [ 832.564825][T19880] device wg2 entered promiscuous mode [ 832.897558][T19888] device wg2 left promiscuous mode [ 833.080287][T19888] device wg2 entered promiscuous mode [ 833.087502][T19895] device wg2 left promiscuous mode [ 833.195009][T19899] device wg2 left promiscuous mode [ 833.282590][T19895] device wg2 entered promiscuous mode [ 833.336504][T19899] device wg2 entered promiscuous mode [ 833.603667][T19914] device wg2 left promiscuous mode [ 833.734749][T19914] device wg2 entered promiscuous mode [ 833.965657][T19924] device wg2 left promiscuous mode [ 834.006034][T19930] device wg2 left promiscuous mode [ 834.023324][T19929] device wg2 entered promiscuous mode [ 834.068028][T19930] device wg2 entered promiscuous mode [ 834.115461][T19933] device wg2 left promiscuous mode [ 834.342534][T19933] device wg2 entered promiscuous mode [ 834.400103][T19943] device sit0 left promiscuous mode [ 834.597913][T19943] device sit0 entered promiscuous mode [ 834.834677][T19959] device wg2 left promiscuous mode [ 834.952331][T19959] device wg2 entered promiscuous mode [ 835.093847][T19968] device wg2 left promiscuous mode [ 835.255937][T19968] device wg2 entered promiscuous mode [ 835.279472][T19973] device wg2 left promiscuous mode [ 835.423933][T19980] device wg2 left promiscuous mode [ 835.435708][T19973] device wg2 entered promiscuous mode [ 835.474256][T19984] device sit0 left promiscuous mode [ 835.591365][T19980] device wg2 entered promiscuous mode [ 835.674205][T19985] device sit0 entered promiscuous mode [ 835.802722][T19993] device wg2 left promiscuous mode [ 835.822224][T20003] device wg2 left promiscuous mode [ 835.841898][T19999] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.849334][T19999] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.892532][T20000] device wg2 entered promiscuous mode [ 835.932118][T20003] device wg2 entered promiscuous mode [ 836.009689][T19999] device veth1 left promiscuous mode [ 836.017418][T19999] bridge0: port 3(veth1) entered disabled state [ 836.072214][T19999] device bridge_slave_1 left promiscuous mode [ 836.136075][T19999] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.203790][T19999] device bridge_slave_0 left promiscuous mode [ 836.240390][T19999] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.366708][T20016] device wg2 left promiscuous mode [ 836.382846][T20020] device wg2 entered promiscuous mode [ 836.750521][T20037] device wg2 left promiscuous mode [ 836.921179][T20037] device wg2 entered promiscuous mode [ 837.033265][T20040] device wg2 left promiscuous mode [ 837.184942][T20040] device wg2 entered promiscuous mode [ 839.890499][T20106] device wg2 left promiscuous mode [ 839.963474][T20106] device wg2 entered promiscuous mode [ 840.962807][T20129] device wg2 left promiscuous mode [ 840.990090][T20131] device wg2 entered promiscuous mode [ 842.102460][T20164] device wg2 left promiscuous mode [ 842.187054][T20164] device wg2 entered promiscuous mode [ 842.746222][T20174] device wg2 left promiscuous mode [ 842.895615][T20174] device wg2 entered promiscuous mode [ 843.031003][T20193] device wg2 left promiscuous mode [ 843.235498][T20193] device wg2 entered promiscuous mode [ 844.496134][T20225] device wg2 left promiscuous mode [ 844.602102][T20225] device wg2 entered promiscuous mode [ 844.680016][T20236] device wg2 left promiscuous mode [ 844.864450][T20236] device wg2 entered promiscuous mode [ 846.253524][T20274] device wg2 left promiscuous mode [ 846.366295][T20274] device wg2 entered promiscuous mode [ 846.474621][T20282] device wg2 left promiscuous mode [ 846.624163][T20287] device wg2 left promiscuous mode [ 846.681541][T20287] device wg2 entered promiscuous mode [ 846.732349][T20282] device wg2 entered promiscuous mode [ 847.263743][T20312] device wg2 left promiscuous mode [ 847.534637][T20312] device wg2 entered promiscuous mode [ 847.572664][T20316] device wg2 left promiscuous mode [ 847.589580][T20319] device wg2 entered promiscuous mode [ 847.675045][T20321] device wg2 left promiscuous mode [ 847.785993][T20321] device wg2 entered promiscuous mode [ 847.861072][T20325] device wg2 left promiscuous mode [ 848.011786][T20325] device wg2 entered promiscuous mode [ 848.724827][T20353] device wg2 left promiscuous mode [ 848.878490][T20354] device wg2 left promiscuous mode [ 848.888231][T20355] device wg2 entered promiscuous mode [ 848.914656][T20353] device wg2 entered promiscuous mode [ 849.022090][T20366] device wg2 left promiscuous mode [ 849.120739][T20364] device wg2 left promiscuous mode [ 849.129317][T20366] device wg2 entered promiscuous mode [ 849.275927][T20368] device wg2 entered promiscuous mode [ 849.971612][T20390] device wg2 left promiscuous mode [ 850.091409][T20390] device wg2 entered promiscuous mode [ 850.164781][T20392] device wg2 left promiscuous mode [ 850.210816][T20400] device wg2 left promiscuous mode [ 850.256245][T20392] device wg2 entered promiscuous mode [ 850.328374][T20400] device wg2 entered promiscuous mode [ 851.754240][T20438] device wg2 left promiscuous mode [ 851.863157][T20438] device wg2 entered promiscuous mode [ 852.685853][T20460] device wg2 left promiscuous mode [ 852.825772][T20460] device wg2 entered promiscuous mode [ 853.032766][T20476] device wg2 left promiscuous mode [ 853.201008][T20476] device wg2 entered promiscuous mode [ 853.927972][T20496] device sit0 left promiscuous mode [ 853.970493][T20500] device sit0 entered promiscuous mode [ 853.985727][T20504] device wg2 left promiscuous mode [ 854.044043][T20504] device wg2 entered promiscuous mode [ 854.100107][T20509] device wg2 left promiscuous mode [ 854.126856][T20512] device wg2 left promiscuous mode [ 854.200356][T20509] device wg2 entered promiscuous mode [ 854.282407][T20512] device wg2 entered promiscuous mode [ 857.664491][T20596] device wg2 left promiscuous mode [ 857.796362][T20596] device wg2 entered promiscuous mode [ 859.305361][T20640] device wg2 left promiscuous mode [ 859.741713][T20640] device wg2 entered promiscuous mode [ 861.004488][T20669] device wg2 left promiscuous mode [ 861.121809][T20669] device wg2 entered promiscuous mode [ 861.802354][T20679] device wg2 left promiscuous mode [ 861.951718][T20679] device wg2 entered promiscuous mode [ 862.924295][T20699] device wg2 left promiscuous mode [ 863.042812][T20700] device wg2 entered promiscuous mode [ 863.072628][T20704] device wg2 left promiscuous mode [ 863.163283][T20710] device wg2 left promiscuous mode [ 863.231910][T20704] device wg2 entered promiscuous mode [ 863.326511][T20710] device wg2 entered promiscuous mode [ 864.326099][T20733] device wg2 left promiscuous mode [ 864.437088][T20733] device wg2 entered promiscuous mode [ 864.900559][T20749] device wg2 left promiscuous mode [ 865.122073][T20749] device wg2 entered promiscuous mode [ 865.376575][T20771] device wg2 left promiscuous mode [ 865.434977][T20771] device wg2 entered promiscuous mode [ 865.481671][T20773] device wg2 left promiscuous mode [ 865.525943][T20773] device wg2 entered promiscuous mode [ 865.759301][T20782] device wg2 left promiscuous mode [ 865.812203][T20782] device wg2 entered promiscuous mode [ 866.259843][T20801] device wg2 left promiscuous mode [ 866.331980][T20803] device wg2 entered promiscuous mode [ 866.445600][T20809] device wg2 left promiscuous mode [ 866.464969][T20811] device wg2 entered promiscuous mode [ 866.860883][T20826] device wg2 left promiscuous mode [ 866.914444][T20827] device wg2 entered promiscuous mode [ 867.332930][T20839] device wg2 left promiscuous mode [ 867.355876][T20841] device wg2 entered promiscuous mode [ 867.532972][T20850] device wg2 left promiscuous mode [ 867.633152][T20851] device wg2 entered promiscuous mode [ 867.751509][T20855] device wg2 left promiscuous mode [ 867.846143][T20857] device wg2 entered promiscuous mode [ 868.530030][T20870] device wg2 left promiscuous mode [ 868.686091][T20870] device wg2 entered promiscuous mode [ 868.814720][T20879] device wg2 left promiscuous mode [ 868.913895][T20881] device wg2 entered promiscuous mode [ 869.357999][T20890] device wg2 left promiscuous mode [ 869.367348][T20892] device wg2 entered promiscuous mode [ 869.409468][T20894] device wg2 left promiscuous mode [ 869.545433][T20894] device wg2 entered promiscuous mode [ 870.841716][T20908] device wg2 left promiscuous mode [ 870.858122][T20911] device wg2 entered promiscuous mode [ 870.907414][T20915] device wg2 left promiscuous mode [ 871.014408][T20915] device wg2 entered promiscuous mode [ 871.392459][T20921] device wg2 left promiscuous mode [ 871.479914][T20923] device wg2 left promiscuous mode [ 871.522536][T20921] device wg2 entered promiscuous mode [ 871.596887][T20923] device wg2 entered promiscuous mode [ 872.410047][T20945] device wg2 left promiscuous mode [ 872.482710][T20945] device wg2 entered promiscuous mode [ 872.498834][T20949] device wg2 left promiscuous mode [ 872.874921][T20949] device wg2 entered promiscuous mode [ 873.140141][T20958] device sit0 left promiscuous mode [ 873.323406][T20962] device sit0 entered promiscuous mode [ 874.334365][T20984] device wg2 left promiscuous mode [ 874.572842][T20984] device wg2 entered promiscuous mode [ 876.808405][T21021] device wg2 left promiscuous mode [ 876.845386][T21026] device wg2 entered promiscuous mode [ 876.916213][T21035] device wg2 left promiscuous mode [ 877.054142][T21035] device wg2 entered promiscuous mode [ 878.647464][T21071] device wg2 left promiscuous mode [ 878.767954][T21071] device wg2 entered promiscuous mode [ 879.244328][T21082] device pim6reg1 left promiscuous mode [ 880.321566][T21105] device wg2 left promiscuous mode [ 880.413262][T21105] device wg2 entered promiscuous mode [ 880.671491][T21115] device wg2 left promiscuous mode [ 880.921841][T21126] device wg2 entered promiscuous mode [ 881.395580][T21130] device wg2 left promiscuous mode [ 881.452502][T21130] device wg2 entered promiscuous mode [ 881.484251][T21136] device wg2 left promiscuous mode [ 881.566238][T21140] device wg2 entered promiscuous mode [ 883.643225][T21179] device wg2 left promiscuous mode [ 884.003307][T21179] device wg2 entered promiscuous mode [ 887.083364][T21211] device wg2 left promiscuous mode [ 887.138174][T21215] device pim6reg1 entered promiscuous mode [ 887.150009][T21211] device wg2 entered promiscuous mode [ 888.458551][T21250] device wg2 left promiscuous mode [ 888.586851][T21251] device wg2 entered promiscuous mode [ 889.190097][T21263] device sit0 left promiscuous mode [ 889.524797][T21266] device sit0 entered promiscuous mode [ 890.180447][T21288] device wg2 left promiscuous mode [ 890.409746][T21288] device wg2 entered promiscuous mode [ 891.469566][T21313] device wg2 left promiscuous mode [ 891.683728][T21316] device wg2 entered promiscuous mode [ 891.882367][T21320] device sit0 left promiscuous mode [ 892.027309][T21321] device sit0 entered promiscuous mode [ 893.041479][T21342] device wg2 left promiscuous mode [ 893.162351][T21342] device wg2 entered promiscuous mode [ 893.420821][T21351] device wg2 left promiscuous mode [ 893.567110][T21351] device wg2 entered promiscuous mode [ 894.636334][T21379] device wg2 left promiscuous mode [ 894.816147][T21379] device wg2 entered promiscuous mode [ 895.369492][T21407] device wg2 left promiscuous mode [ 895.474078][T21407] device wg2 entered promiscuous mode [ 895.624031][T21412] device veth0_vlan left promiscuous mode [ 895.665640][T21412] device veth0_vlan entered promiscuous mode [ 895.832325][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 895.875776][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 895.950679][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 896.148221][T21423] device wg2 left promiscuous mode [ 896.167161][T21424] device wg2 entered promiscuous mode [ 896.858870][T21440] device wg2 left promiscuous mode [ 896.998623][T21440] device wg2 entered promiscuous mode [ 897.964981][T21472] device wg2 left promiscuous mode [ 897.980921][T21476] device wg2 entered promiscuous mode [ 898.938600][T21507] device wg2 left promiscuous mode [ 899.007707][T21507] device wg2 entered promiscuous mode [ 899.551222][T21521] device wg2 left promiscuous mode [ 899.653644][T21521] device wg2 entered promiscuous mode [ 899.857000][T21529] device wg2 left promiscuous mode [ 899.891694][T21529] device wg2 entered promiscuous mode [ 900.047413][T21544] device wg2 left promiscuous mode [ 900.088525][T21544] device wg2 entered promiscuous mode [ 900.291467][T21550] device wg2 left promiscuous mode [ 900.348857][T21550] device wg2 entered promiscuous mode [ 900.481862][T21562] device wg2 left promiscuous mode [ 900.514747][T21562] device wg2 entered promiscuous mode [ 900.697302][T21572] device wg2 left promiscuous mode [ 900.776571][T21572] device wg2 entered promiscuous mode [ 900.987677][T21582] device wg2 left promiscuous mode [ 901.029329][T21582] device wg2 entered promiscuous mode [ 901.141292][T21587] device pim6reg1 entered promiscuous mode [ 901.189465][T21592] device wg2 left promiscuous mode [ 901.251290][T21592] device wg2 entered promiscuous mode [ 901.394691][T21603] device wg2 left promiscuous mode [ 901.422137][T21605] device veth0_vlan left promiscuous mode [ 901.431948][T21605] device veth0_vlan entered promiscuous mode [ 901.449954][T21603] device wg2 entered promiscuous mode [ 901.540290][T21607] device wg2 left promiscuous mode [ 901.670555][T21607] device wg2 entered promiscuous mode [ 902.165481][T21624] device wg2 left promiscuous mode [ 902.191303][T21628] device pim6reg1 entered promiscuous mode [ 902.276600][T21624] device wg2 entered promiscuous mode [ 902.446753][T21641] device wg2 left promiscuous mode [ 902.489882][T21641] device wg2 entered promiscuous mode [ 903.094188][T21654] device sit0 left promiscuous mode [ 903.442953][T21659] device sit0 entered promiscuous mode [ 903.455853][T21664] device wg2 left promiscuous mode [ 903.478940][T21665] device wg2 entered promiscuous mode [ 904.110619][T21678] device wg2 left promiscuous mode [ 904.265479][T21678] device wg2 entered promiscuous mode [ 905.166802][T21699] device wg2 left promiscuous mode [ 905.233613][T21699] device wg2 entered promiscuous mode [ 905.295393][T21703] device wg2 left promiscuous mode [ 905.466154][T21703] device wg2 entered promiscuous mode [ 905.791908][T21721] device wg2 left promiscuous mode [ 905.833654][T21722] device wg2 entered promiscuous mode [ 905.895827][T21728] device pim6reg1 entered promiscuous mode [ 906.342935][T21746] device wg2 left promiscuous mode [ 906.382665][T21746] device wg2 entered promiscuous mode [ 906.909933][T21759] device wg2 left promiscuous mode [ 906.955785][T21759] device wg2 entered promiscuous mode [ 907.862793][T21783] device wg2 left promiscuous mode [ 908.165175][T21783] device wg2 entered promiscuous mode [ 908.280821][T21792] device wg2 left promiscuous mode [ 908.474533][T21792] device wg2 entered promiscuous mode [ 909.634305][T21822] device wg2 left promiscuous mode [ 909.680770][T21824] device wg2 entered promiscuous mode [ 909.870610][T21832] device wg2 left promiscuous mode [ 910.010764][T21832] device wg2 entered promiscuous mode [ 910.399174][T21851] device pim6reg1 entered promiscuous mode [ 910.736466][T21863] device wg2 left promiscuous mode [ 910.755449][T21863] device wg2 entered promiscuous mode [ 911.393963][T21881] device wg2 left promiscuous mode [ 911.429126][T21883] device wg2 entered promiscuous mode [ 911.691609][T21904] device wg2 left promiscuous mode [ 911.710160][T21904] device wg2 entered promiscuous mode [ 911.823312][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 911.854659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 911.904633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 912.776731][T21938] device wg2 left promiscuous mode [ 912.906334][T21938] device wg2 entered promiscuous mode [ 914.190375][T21976] device wg2 left promiscuous mode [ 914.325029][T21976] device wg2 entered promiscuous mode [ 914.870336][T21994] device wg2 left promiscuous mode [ 915.176806][T21994] device wg2 entered promiscuous mode [ 915.370847][T22003] device wg2 left promiscuous mode [ 915.633959][T22007] device wg2 left promiscuous mode [ 915.755757][T22007] device wg2 entered promiscuous mode [ 916.284540][T22033] device wg2 left promiscuous mode [ 916.316057][T22037] device wg2 left promiscuous mode [ 916.324941][T22033] device wg2 entered promiscuous mode [ 916.667267][T22046] device wg2 entered promiscuous mode [ 916.765944][T22051] device wg2 entered promiscuous mode [ 917.282090][T22069] device wg2 left promiscuous mode [ 918.120691][T22081] device wg2 left promiscuous mode [ 918.132741][T22085] device wg2 left promiscuous mode [ 918.168596][T22081] device wg2 entered promiscuous mode [ 918.247147][T22085] device wg2 entered promiscuous mode [ 918.933913][T22107] device pim6reg1 entered promiscuous mode [ 919.112144][T22118] device wg2 left promiscuous mode [ 919.324087][T22118] device wg2 entered promiscuous mode [ 919.453943][T22123] device wg2 left promiscuous mode [ 919.601736][T22127] device wg2 left promiscuous mode [ 919.837612][T22127] device wg2 entered promiscuous mode [ 920.819824][T22161] device syzkaller0 entered promiscuous mode [ 921.086720][T22170] device wg2 entered promiscuous mode [ 922.494209][T22203] device wg2 left promiscuous mode [ 922.706330][T22203] device wg2 entered promiscuous mode [ 925.271496][T22267] device wg2 left promiscuous mode [ 926.700790][T22309] device wg2 entered promiscuous mode [ 927.554914][T22323] device wg2 entered promiscuous mode [ 928.883409][T22351] device wg2 left promiscuous mode [ 928.962251][T22351] device wg2 entered promiscuous mode [ 929.340691][T22361] device wg2 left promiscuous mode [ 929.451406][T22362] device wg2 entered promiscuous mode [ 930.826159][T22391] device wg2 left promiscuous mode [ 930.923614][T22391] device wg2 entered promiscuous mode [ 931.366170][T22399] device wg2 left promiscuous mode [ 931.639186][T22417] device wg2 left promiscuous mode [ 931.758121][T22417] device wg2 entered promiscuous mode [ 932.232358][T22438] device wg2 left promiscuous mode [ 932.477839][T22438] device wg2 entered promiscuous mode [ 933.807744][T22477] device wg2 left promiscuous mode [ 933.843664][T22477] device wg2 entered promiscuous mode [ 935.755822][T22521] device wg2 left promiscuous mode [ 935.775921][T22521] device wg2 entered promiscuous mode [ 937.221838][T22557] device wg2 entered promiscuous mode [ 937.624672][T22564] device wg2 left promiscuous mode [ 937.866199][T22577] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 937.891814][T22577] device syzkaller0 entered promiscuous mode [ 938.591271][T22595] device wg2 left promiscuous mode [ 938.663876][T22595] device wg2 entered promiscuous mode [ 939.542857][T22614] device wg2 left promiscuous mode [ 940.412881][T22638] device wg2 left promiscuous mode [ 940.501697][T22638] device wg2 entered promiscuous mode [ 942.015226][T22678] device wg2 left promiscuous mode [ 942.162398][T22678] device wg2 entered promiscuous mode [ 943.472461][T22732] device sit0 left promiscuous mode [ 944.496108][T22764] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 944.535244][T22764] device syzkaller0 entered promiscuous mode [ 944.934061][T22781] device wg2 left promiscuous mode [ 945.034782][T22781] device wg2 entered promiscuous mode [ 946.317419][T22811] device wg2 entered promiscuous mode [ 947.612342][T22854] device wg2 left promiscuous mode [ 947.737170][T22854] device wg2 entered promiscuous mode [ 947.810672][T22860] device wg2 left promiscuous mode [ 947.891814][T22860] device wg2 entered promiscuous mode [ 950.062890][T22903] device wg2 left promiscuous mode [ 950.143367][T22903] device wg2 entered promiscuous mode [ 950.250970][T22909] device wg2 left promiscuous mode [ 950.314716][T22908] device wg2 entered promiscuous mode [ 952.227151][T22944] device sit0 left promiscuous mode [ 954.366919][T22996] device wg2 entered promiscuous mode [ 954.412877][T22993] device veth0_vlan left promiscuous mode [ 954.419553][T22993] device veth0_vlan entered promiscuous mode [ 954.429893][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 954.438329][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 954.450329][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 955.721989][T23027] device wg2 left promiscuous mode [ 955.911473][T23027] device wg2 entered promiscuous mode [ 956.535787][T23063] device wg2 left promiscuous mode [ 956.569508][T23063] device wg2 entered promiscuous mode [ 957.666372][T23093] device wg2 left promiscuous mode [ 957.821913][T23093] device wg2 entered promiscuous mode [ 958.400205][T23128] device wg2 left promiscuous mode [ 958.454364][T23128] device wg2 entered promiscuous mode [ 958.950453][T23145] device wg2 left promiscuous mode [ 959.049449][T23145] device wg2 entered promiscuous mode [ 959.200039][T23151] device wg2 left promiscuous mode [ 959.306100][T23151] device wg2 entered promiscuous mode [ 960.270247][T23185] device wg2 left promiscuous mode [ 960.365874][T23185] device wg2 entered promiscuous mode [ 961.033951][T23221] device wg2 left promiscuous mode [ 961.258389][T23221] device wg2 entered promiscuous mode [ 962.112694][T23255] device wg2 left promiscuous mode [ 962.179418][T23257] device wg2 left promiscuous mode [ 962.219257][T23255] device wg2 entered promiscuous mode [ 962.246082][T23257] device wg2 entered promiscuous mode [ 962.655697][T23267] device sit0 left promiscuous mode [ 963.491430][T23302] device wg2 left promiscuous mode [ 964.954602][T23335] device wg2 left promiscuous mode [ 967.252742][T23370] device wg2 left promiscuous mode [ 967.322027][T23370] device wg2 entered promiscuous mode [ 967.508686][T23375] device wg2 left promiscuous mode [ 970.176908][T23417] device wg2 left promiscuous mode [ 977.169328][T23507] device sit0 left promiscuous mode [ 977.211481][T23507] device sit0 entered promiscuous mode [ 984.370826][T23645] device wg2 left promiscuous mode [ 984.482616][T23649] device wg2 entered promiscuous mode [ 994.756464][T23874] device wg2 entered promiscuous mode [ 994.898461][T23880] device sit0 entered promiscuous mode [ 997.220367][T23909] device wg2 left promiscuous mode [ 997.357170][T23910] device wg2 entered promiscuous mode [ 998.517554][T23924] device syzkaller0 entered promiscuous mode [ 1009.202713][T24164] device syzkaller0 entered promiscuous mode [ 1012.061982][T24217] device wg2 left promiscuous mode [ 1012.070064][T24218] device wg2 entered promiscuous mode [ 1015.968478][T24296] device wg2 left promiscuous mode [ 1016.070304][T24297] device wg2 entered promiscuous mode [ 1024.770965][T24442] device wg2 left promiscuous mode [ 1024.863010][T24442] device wg2 entered promiscuous mode [ 1029.055331][T24541] device syzkaller0 entered promiscuous mode [ 1029.876848][T24571] device sit0 entered promiscuous mode [ 1030.917144][T24588] device wg2 entered promiscuous mode [ 1031.208557][T24599] device wg2 left promiscuous mode [ 1031.327147][T24597] device wg2 entered promiscuous mode [ 1033.067856][T24642] device wg2 left promiscuous mode [ 1033.204581][T24642] device wg2 entered promiscuous mode [ 1035.580611][T24686] device wg2 left promiscuous mode [ 1035.840557][T24687] device veth1_to_team entered promiscuous mode [ 1035.904311][T24690] device wg2 entered promiscuous mode [ 1043.865325][T24865] device wg2 entered promiscuous mode [ 1045.182966][T24880] device syzkaller0 entered promiscuous mode [ 1054.573269][T25024] device wg2 left promiscuous mode [ 1054.693200][T25024] device wg2 entered promiscuous mode [ 1063.534528][T25181] device wg2 left promiscuous mode [ 1063.614068][T25181] device wg2 entered promiscuous mode [ 1064.278395][T25208] device pim6reg1 entered promiscuous mode [ 1065.512624][T25225] device wg2 left promiscuous mode [ 1069.135870][T25286] device wg2 left promiscuous mode [ 1069.240176][T25287] device wg2 entered promiscuous mode [ 1070.528587][T25322] device wg2 left promiscuous mode [ 1070.581591][T25326] device wg2 entered promiscuous mode [ 1072.702785][T25367] device wg2 entered promiscuous mode [ 1072.791436][T25372] device wg2 entered promiscuous mode [ 1074.990098][T25407] device wg2 left promiscuous mode [ 1075.064945][T25407] device wg2 entered promiscuous mode [ 1080.615569][T25510] device wg2 left promiscuous mode [ 1081.245351][T25536] device wg2 left promiscuous mode [ 1081.315443][T25538] device wg2 entered promiscuous mode [ 1082.202545][T25566] device wg2 left promiscuous mode [ 1082.333370][T25563] device wg2 entered promiscuous mode [ 1084.061202][T25605] device wg2 left promiscuous mode [ 1084.119215][T25607] device wg2 entered promiscuous mode [ 1087.519755][T25706] device wg2 entered promiscuous mode [ 1090.510385][T25751] device wg2 left promiscuous mode [ 1093.316599][T25805] device sit0 entered promiscuous mode [ 1097.235342][T25859] device wg2 left promiscuous mode [ 1097.296428][T25859] device wg2 entered promiscuous mode [ 1099.647562][T25899] device wg2 left promiscuous mode [ 1099.826606][T25902] device wg2 entered promiscuous mode [ 1101.745149][T25944] device wg2 left promiscuous mode [ 1101.831017][T25947] device wg2 entered promiscuous mode [ 1103.541307][T25990] device wg2 left promiscuous mode [ 1103.663303][T25985] device wg2 entered promiscuous mode [ 1104.931851][T26022] device wg2 entered promiscuous mode [ 1105.561612][T26033] device wg2 left promiscuous mode [ 1105.658908][T26035] device wg2 entered promiscuous mode [ 1106.166628][T26051] device syzkaller0 entered promiscuous mode [ 1106.445221][T26066] device wg2 left promiscuous mode [ 1106.487913][T26061] device wg2 entered promiscuous mode [ 1107.243231][T26090] device wg2 left promiscuous mode [ 1107.368156][T26084] device wg2 entered promiscuous mode [ 1109.281551][ T24] audit: type=1400 audit(1758278578.990:163): avc: denied { create } for pid=26142 comm="syz.2.9404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 1116.953562][T26293] device wg2 left promiscuous mode [ 1117.241752][T26298] device sit0 left promiscuous mode [ 1117.342220][T26302] device sit0 entered promiscuous mode [ 1119.963113][T26343] device sit0 left promiscuous mode [ 1120.264348][T26348] device sit0 entered promiscuous mode [ 1127.665174][T26491] device wg2 left promiscuous mode [ 1127.838060][T26487] device wg2 entered promiscuous mode [ 1128.348512][T26503] device wg2 left promiscuous mode [ 1128.407132][T26501] device wg2 entered promiscuous mode [ 1130.205054][T26538] device wg2 left promiscuous mode [ 1130.232252][T26538] device wg2 entered promiscuous mode [ 1130.775719][T26556] device sit0 left promiscuous mode [ 1132.524178][T26581] device wg2 left promiscuous mode [ 1132.644246][T26578] device wg2 entered promiscuous mode [ 1134.200009][T26603] device wg2 left promiscuous mode [ 1134.541527][T26608] device wg2 entered promiscuous mode [ 1134.931775][T26627] device wg2 left promiscuous mode [ 1136.049399][T26655] device wg2 left promiscuous mode [ 1136.093336][T26658] device wg2 entered promiscuous mode [ 1136.374567][T26665] device sit0 left promiscuous mode [ 1136.520193][T26669] device sit0 entered promiscuous mode [ 1138.077782][T26697] device wg2 left promiscuous mode [ 1138.139785][T26700] device wg2 entered promiscuous mode [ 1142.619111][T26770] device wg2 left promiscuous mode [ 1142.679021][T26767] device wg2 entered promiscuous mode [ 1143.754277][T26786] device pim6reg1 entered promiscuous mode [ 1145.786688][T26814] device wg2 entered promiscuous mode [ 1147.186834][T26837] device sit0 left promiscuous mode [ 1147.293915][T26838] device sit0 entered promiscuous mode [ 1148.097362][T26859] device wg2 left promiscuous mode [ 1148.123509][T26857] device wg2 entered promiscuous mode [ 1149.157145][T26867] device wg2 entered promiscuous mode [ 1151.414211][T26896] device wg2 left promiscuous mode [ 1151.465822][T26899] device wg2 entered promiscuous mode [ 1152.156661][T26911] device macsec0 entered promiscuous mode [ 1152.746970][T26923] device wg2 left promiscuous mode [ 1152.863379][T26922] device wg2 entered promiscuous mode [ 1153.343678][T26937] device wg2 left promiscuous mode [ 1153.554754][T26933] device wg2 entered promiscuous mode [ 1154.061837][T26947] device pim6reg1 entered promiscuous mode [ 1156.619259][T26984] device wg2 left promiscuous mode [ 1157.746384][T27000] device wg2 left promiscuous mode [ 1157.759813][T27000] device wg2 entered promiscuous mode [ 1158.803080][T27014] device veth1_macvtap left promiscuous mode [ 1160.596999][T27041] device wg2 left promiscuous mode [ 1160.735060][T27041] device wg2 entered promiscuous mode [ 1164.407118][T27087] device pim6reg1 entered promiscuous mode [ 1165.943573][T27101] device veth1_macvtap left promiscuous mode [ 1171.873948][T27182] device wg2 left promiscuous mode [ 1173.373157][T27218] device wg2 entered promiscuous mode [ 1173.788055][T27226] device wg2 left promiscuous mode [ 1173.888549][T27225] device wg2 entered promiscuous mode [ 1176.040007][T27253] device veth0_vlan left promiscuous mode [ 1176.045914][T27253] device veth0_vlan entered promiscuous mode [ 1176.178285][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1176.211324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1176.374413][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1177.051178][T27275] device veth0_vlan left promiscuous mode [ 1177.057156][T27275] device veth0_vlan entered promiscuous mode [ 1177.081434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1177.092304][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1177.100089][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1182.765682][T27369] device wg2 entered promiscuous mode [ 1193.782633][T27522] device wg2 left promiscuous mode [ 1193.944615][T27524] device wg2 entered promiscuous mode [ 1194.367442][T27528] device sit0 left promiscuous mode [ 1194.499143][T27528] device sit0 entered promiscuous mode [ 1196.762446][T27576] device wg2 left promiscuous mode [ 1196.904832][T27575] device wg2 entered promiscuous mode [ 1196.939136][T27583] device wg2 left promiscuous mode [ 1197.000738][T27584] device wg2 entered promiscuous mode [ 1199.219089][T27621] device wg2 left promiscuous mode [ 1199.333811][T27621] device wg2 entered promiscuous mode [ 1205.115743][T27716] device veth0_vlan left promiscuous mode [ 1205.121888][T27716] device veth0_vlan entered promiscuous mode [ 1205.145306][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1205.153751][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1205.161461][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1206.269288][T27740] device syzkaller0 entered promiscuous mode [ 1207.473475][T27762] device wg2 left promiscuous mode [ 1207.541008][T27763] device wg2 left promiscuous mode [ 1207.551533][T27757] device wg2 entered promiscuous mode [ 1207.582109][T27765] device wg2 entered promiscuous mode [ 1209.390513][T27794] device syzkaller0 entered promiscuous mode [ 1210.282294][T27803] device wg2 left promiscuous mode [ 1210.382376][T27809] device wg2 entered promiscuous mode [ 1213.308219][T27845] device wg2 left promiscuous mode [ 1213.393054][T27845] device wg2 entered promiscuous mode [ 1213.636759][T27853] device wg2 left promiscuous mode [ 1216.394316][T27885] device wg2 left promiscuous mode [ 1216.484469][T27886] device wg2 entered promiscuous mode [ 1223.486946][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1223.496217][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1223.503860][T15102] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1223.653684][T27953] device wg2 entered promiscuous mode [ 1223.809494][T27957] device wg2 left promiscuous mode [ 1223.946884][T27957] device wg2 entered promiscuous mode [ 1226.234845][ T24] audit: type=1400 audit(1758278695.930:164): avc: denied { ioctl } for pid=27986 comm="syz.1.10013" path="" dev="cgroup2" ino=306 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1226.289005][T27984] device syzkaller0 entered promiscuous mode [ 1226.625875][T27992] device wg2 left promiscuous mode [ 1226.678300][T27995] device wg2 entered promiscuous mode [ 1226.851835][T27998] device wg2 left promiscuous mode [ 1227.036023][T27998] device wg2 entered promiscuous mode [ 1228.279941][T28015] device veth0_vlan left promiscuous mode [ 1228.368320][T28015] device veth0_vlan entered promiscuous mode [ 1229.699070][T28032] device syzkaller0 entered promiscuous mode [ 1229.708214][T28031] device wg2 left promiscuous mode [ 1235.033772][T28112] device wg2 entered promiscuous mode [ 1238.507106][T28158] device wg2 left promiscuous mode [ 1240.591898][T28201] device wg2 left promiscuous mode [ 1240.695007][T28199] device wg2 entered promiscuous mode [ 1241.027164][T28206] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 1243.823726][T28239] device wg2 left promiscuous mode [ 1243.908990][T28239] device wg2 entered promiscuous mode [ 1245.364123][T28284] device wg2 left promiscuous mode [ 1245.547844][T28276] device wg2 entered promiscuous mode [ 1247.597473][T28332] device wg2 left promiscuous mode [ 1249.674458][T28376] device wg2 left promiscuous mode [ 1249.822581][T28379] device wg2 entered promiscuous mode [ 1251.871697][T28412] device wg2 entered promiscuous mode [ 1253.454044][T28454] device wg2 left promiscuous mode [ 1253.497048][T28456] device wg2 entered promiscuous mode [ 1255.311055][T28489] device wg2 left promiscuous mode [ 1255.484776][T28491] device wg2 left promiscuous mode [ 1255.605730][T28491] device wg2 entered promiscuous mode [ 1257.397877][T28526] device wg2 entered promiscuous mode [ 1259.847677][T28575] device wg2 left promiscuous mode [ 1263.972286][T28650] device wg2 left promiscuous mode [ 1264.110799][T28645] device wg2 entered promiscuous mode [ 1266.016923][T28699] device wg2 left promiscuous mode [ 1266.166935][T28699] device wg2 entered promiscuous mode [ 1267.588590][T28734] syz.0.10260[28734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1267.588669][T28734] syz.0.10260[28734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1272.852832][T28828] device wg2 left promiscuous mode [ 1272.978399][T28827] device wg2 entered promiscuous mode [ 1276.021621][T28861] syz.0.10304[28861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1276.021677][T28861] syz.0.10304[28861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1276.168191][T28862] device wg2 left promiscuous mode [ 1276.543038][T28869] device wg2 left promiscuous mode [ 1276.639606][T28874] device wg2 entered promiscuous mode [ 1278.991320][T28904] device wg2 entered promiscuous mode [ 1279.210386][T28906] syz.3.10318[28906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1279.210476][T28906] syz.3.10318[28906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1279.920819][T28912] device sit0 left promiscuous mode [ 1280.150207][T28913] device sit0 entered promiscuous mode [ 1281.805609][T28938] device wg2 entered promiscuous mode [ 1282.814469][T28945] device wg2 left promiscuous mode [ 1282.908574][T28945] device wg2 entered promiscuous mode [ 1284.683021][T28970] device wg2 entered promiscuous mode [ 1290.706448][T29036] syz.1.10362[29036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1290.706541][T29036] syz.1.10362[29036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1294.277432][ T24] audit: type=1400 audit(1758278763.980:165): avc: denied { create } for pid=29076 comm="syz.1.10376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1294.405797][T29082] device sit0 entered promiscuous mode [ 1296.738926][T29151] GPL: port 1(erspan0) entered blocking state [ 1296.882156][T29151] GPL: port 1(erspan0) entered disabled state [ 1296.961397][T29151] device erspan0 entered promiscuous mode [ 1297.021785][T29151] GPL: port 1(erspan0) entered blocking state [ 1297.027908][T29151] GPL: port 1(erspan0) entered forwarding state [ 1297.452585][T29162] device wg2 left promiscuous mode [ 1297.529695][T29162] device wg2 entered promiscuous mode [ 1298.603318][T29194] device wg2 left promiscuous mode [ 1298.642716][T29194] device wg2 entered promiscuous mode [ 1299.947226][T29229] device wg2 left promiscuous mode [ 1300.070927][T29224] device wg2 entered promiscuous mode [ 1300.312589][T29233] device wg2 left promiscuous mode [ 1300.373439][T29235] device wg2 entered promiscuous mode [ 1302.140792][T29272] device wg2 left promiscuous mode [ 1302.226171][T29271] device wg2 entered promiscuous mode [ 1302.504467][T29283] device wg2 left promiscuous mode [ 1302.585258][T29283] device wg2 entered promiscuous mode [ 1303.682493][T29297] device wg2 left promiscuous mode [ 1303.737401][T29300] device wg2 entered promiscuous mode [ 1304.345490][T29320] device wg2 left promiscuous mode [ 1304.384534][T29319] device wg2 entered promiscuous mode [ 1304.535108][T29328] device wg2 left promiscuous mode [ 1306.081216][T29364] device wg2 entered promiscuous mode [ 1306.797100][T29389] device wg2 left promiscuous mode [ 1306.881349][T29389] device wg2 entered promiscuous mode [ 1307.410588][T29404] device wg2 left promiscuous mode [ 1307.469072][T29403] device wg2 entered promiscuous mode [ 1309.856163][T29447] syz.4.10501[29447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1309.856242][T29447] syz.4.10501[29447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1310.452837][T29459] device wg2 left promiscuous mode [ 1310.585001][T29456] device wg2 entered promiscuous mode [ 1312.136815][T29497] syz.2.10520[29497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1312.136882][T29497] syz.2.10520[29497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1312.166048][T29501] device wg2 left promiscuous mode [ 1312.280664][T29501] device wg2 entered promiscuous mode [ 1313.087309][T29511] device wg2 left promiscuous mode [ 1313.427471][T29514] device wg2 entered promiscuous mode [ 1314.880863][T29567] device wg2 left promiscuous mode [ 1314.934356][T29569] device wg2 entered promiscuous mode [ 1315.686890][T29584] device wg2 left promiscuous mode [ 1316.093610][T29584] device wg2 entered promiscuous mode [ 1317.006987][T29607] device wg2 left promiscuous mode [ 1317.092095][T29610] device wg2 entered promiscuous mode [ 1317.718949][T29622] device wg2 left promiscuous mode [ 1319.090221][T29640] device wg2 left promiscuous mode [ 1319.204926][T29640] device wg2 entered promiscuous mode [ 1320.566733][T29679] device wg2 entered promiscuous mode [ 1333.727997][T29962] device wg2 left promiscuous mode [ 1335.179261][T30012] device wg2 left promiscuous mode [ 1335.276256][T30012] device wg2 entered promiscuous mode [ 1337.770222][T30049] GPL: port 1(erspan0) entered blocking state [ 1337.809990][T30049] GPL: port 1(erspan0) entered disabled state [ 1337.866228][T30049] device erspan0 entered promiscuous mode [ 1337.899515][T30053] GPL: port 1(erspan0) entered blocking state [ 1337.905662][T30053] GPL: port 1(erspan0) entered forwarding state [ 1337.926027][ T24] audit: type=1400 audit(1758278807.630:166): avc: denied { read } for pid=30056 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1338.060166][T30062] device wg2 left promiscuous mode [ 1338.165293][T30058] device wg2 entered promiscuous mode [ 1338.245718][T30066] device syzkaller0 entered promiscuous mode Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 1339.014356][ T24] audit: type=1400 audit(1758278808.720:167): avc: denied { search } for pid=30091 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1339.089863][T30095] device veth0_vlan left promiscuous mode [ 1339.142358][T30095] device veth0_vlan entered promiscuous mode Stopping network: [ 1339.890603][ T24] audit: type=1400 audit(1758278809.600:168): avc: denied { write } for pid=134 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 1339.955836][ T24] audit: type=1400 audit(1758278809.600:169): avc: denied { remove_name } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=414 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping iptables: OK Stopping system message bus: [ 1340.087742][ T24] audit: type=1400 audit(1758278809.600:170): avc: denied { unlink } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=414 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 done [ 1340.199459][ T24] audit: type=1400 audit(1758278809.620:171): avc: denied { unlink } for pid=134 comm="dhcpcd" name="pid" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1340.338153][ T24] audit: type=1400 audit(1758278809.710:172): avc: denied { search } for pid=30121 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1340.379368][ T24] audit: type=1400 audit(1758278809.710:173): avc: denied { write } for pid=30121 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 killall: can't kill pid 298: No such process killall: can't kill pid 1229: No such process [ 1340.757368][ T24] audit: type=1400 audit(1758278809.710:174): avc: denied { add_name } for pid=30121 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1340.780090][ T24] audit: type=1400 audit(1758278809.710:175): avc: denied { create } for pid=30121 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping klogd: OK Stopping acpid: [ 1341.041924][T30140] device wg2 entered promiscuous mode [ 1341.730514][T30152] device sit0 left promiscuous mode OK [ 1342.197675][T30155] device sit0 entered promiscuous mode Stopping syslogd: stopped /sbin/syslogd (pid 77) OK umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW![ 1343.358246][ T24] kauditd_printk_skb: 6 callbacks suppressed [ 1343.358259][ T24] audit: type=1400 audit(1758278813.060:182): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[1431]" dev="pipefs" ino=1431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Connection to 10.128.1.109 closed by remote host. Sent SIGKILL to all processes Requesting system poweroff [ 1345.201898][ T7] GPL: port 1(erspan0) entered disabled state [ 1345.208480][ T7] GPL: port 1(erspan0) entered disabled state [ 1345.216717][ T7] device erspan0 left promiscuous mode [ 1345.222183][ T7] GPL: port 1(erspan0) entered disabled state [ 1345.229423][ T7] device erspan0 left promiscuous mode [ 1345.234915][ T7] GPL: port 1(erspan0) entered disabled state [ 1345.560937][ T7] Ÿë: port 1(veth0_vlan) entered disabled state [ 1345.570552][ T7] device veth0_vlan left promiscuous mode [ 1345.576377][ T7] device veth0_vlan left promiscuous mode [ 1345.582646][ T7] device veth1_macvtap left promiscuous mode [ 1345.582756][T30182] kvm: exiting hardware virtualization [ 1345.594313][ T7] device veth0_vlan left promiscuous mode [ 1345.600918][T30182] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1345.608225][T30182] ACPI: Preparing to enter system sleep state S5 [ 1345.615435][T30182] reboot: Power down serialport: VM disconnected.