last executing test programs: 1m42.511174927s ago: executing program 3 (id=4351): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r4, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r9}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r10 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)) write$cgroup_subtree(r10, 0x0, 0x0) 1m42.303327141s ago: executing program 3 (id=4355): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'virt_wifi0\x00', 0x1003}) write$cgroup_subtree(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) close(r1) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000001000"/28], 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r10}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r7}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m42.201066103s ago: executing program 3 (id=4358): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000680)=""/151, 0x97}, {&(0x7f00000003c0)=""/107, 0x6b}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000000)=""/162, 0xa2}], 0x4, 0xfffffffffffffffe, 0xfffffffffffffe15}, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 1m42.124161714s ago: executing program 3 (id=4361): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x4, 0x810}, 0x50) close(r2) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x804) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x18) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) 1m42.002208257s ago: executing program 3 (id=4364): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4}, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r6}, &(0x7f00000004c0), &(0x7f0000000540)=r5}, 0x20) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m41.81923235s ago: executing program 3 (id=4370): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) close(0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000001080)='ns/pid_for_children\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r5, &(0x7f0000000100)=ANY=[], 0xffdd) (async) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f0000001040)) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) (async) close(0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) 1m41.8067689s ago: executing program 32 (id=4370): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) close(0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000001080)='ns/pid_for_children\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r5, &(0x7f0000000100)=ANY=[], 0xffdd) (async) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f0000001040)) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) (async) close(0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) 2.686707019s ago: executing program 0 (id=5655): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095", @ANYRES32, @ANYBLOB="1800000000000000000000000000000018010000", @ANYRES64=r0, @ANYRES64, @ANYRES8=r0], &(0x7f0000000280)='GPL\x00', 0x4003, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0xf) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x3) 1.720271758s ago: executing program 1 (id=5661): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="180600000000000000000000000000001801000020"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x4805) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000840), 0x4) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007110aa00000000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x80) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18020000ffffffff0000edff00000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000068d75c8ac9c2333d2b0dadbabb15e107010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.690971948s ago: executing program 0 (id=5662): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) sendmsg$inet(r0, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xf}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x4040, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000640)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x2, {0x4e24}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x40) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.496988432s ago: executing program 2 (id=5665): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="3400eaffffff000004000031ff000000492a75cd34fcea322b67e985860fa905825c7d9742c6b3e2f6a0bb9cf421a644ec", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x22d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb1, 0x4c027e9c}, 0x11100, 0xffffffffffffffff, 0x31, 0x8, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xaffffffffffffffb, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_subtree(r6, 0x0, 0x9) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x4e}, 0x28) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) 1.462274603s ago: executing program 5 (id=5666): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000000000000e0000000000000008e000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB], 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x16, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xbff7b694, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@map_fd={0x18, 0xb}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x9}, {0x3, 0x1, 0x1, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)=0x6fa6, 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x22, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180075000e55d60400d0f3aef9c1f77b16fc7333df000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 1.269679866s ago: executing program 1 (id=5667): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1ab8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000300)='syzkaller\x00'}, 0x94) 1.268887107s ago: executing program 2 (id=5668): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x80}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r7, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 1.268387447s ago: executing program 4 (id=5669): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYRES16=0x0, @ANYRESDEC=r0, @ANYRES8, @ANYRES16=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1e, 0x7, 0x10001, 0x80000009, 0x2000b, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r4}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}, 0x100080, 0x0, 0x0, 0x0, 0x0, 0x8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff09) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r7 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e00000000000100000000000110000042000100", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYBLOB="96069d2017c57b769080f2c9a4309ae34d53f34043175056c0814b6c7f7fab3a941513493c42fbb15b43b3fec241dd362abbf3d234017bb324de7f0efee6d17796187537b137ed9214d15a604a379e82664e4a10800d3feac7472c3a69f2e032cc6c23e6c98f9532", @ANYBLOB="0400000001270c00000000000000000000000000a82400005adcd6", @ANYRES32, @ANYBLOB], 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) sendmsg$tipc(r6, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e4e6f6cc20859bcb806f18d5e8f7b126c19431f", 0x79}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) (async) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) (async) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x4004743d, 0x110e22fff6) close(r9) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r8, @ANYBLOB="96eefc6363ee6b7049fe011056153a878ae9d9b3e7d4eeda8011c5c179e96b739c9859266fc81ab01d5e783cde8a0c4909061988421734f066346e532df62a66f0cf92cfd4608bbadefbce5dfa9ee1c5d4607ce20d1b2007ea4343b495692b7d23f3f87dc6d0bbfe24f9b794248b", @ANYRES8=r5], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000002000000000000000000001811", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.175108838s ago: executing program 2 (id=5670): bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffe81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000df86c0547d5087961616b8cee061121c000000000009000000e7000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7ff0700140000007b6ff8ff00000000bfa200feffffffffffffff02b8ffffffb70300005835c6ddad59f83c5669ff3e0800000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRESHEX], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x40929, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000300)='\xe4j\x9c[\xc7\xe3S\x86\x00\x00\x00\x00\x00\x00\x00\x00\x00') r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r10}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 1.174083978s ago: executing program 4 (id=5671): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3e}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xa}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x38b7}, 0x0, 0x6, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x14, 0x4, 0x4, 0x3, 0x400}, 0x50) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 1.165947888s ago: executing program 0 (id=5672): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000"], &(0x7f0000000780)='GPL\x00', 0x10, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000001000)='rtc_alarm_irq_enable\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x9, 0x7, 0x7e2a70766c02afe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, &(0x7f0000000040)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071102700000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) 1.08099992s ago: executing program 5 (id=5673): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES8], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x80}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80, 0x1b}, 0x0, 0x1, 0x80000001, 0x8, 0x4000000, 0x4}, 0x0, 0x0, r2, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) write$cgroup_pid(r5, &(0x7f00000005c0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x200fffe, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x30}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) 1.002231751s ago: executing program 1 (id=5674): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) (async, rerun: 64) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c", 0xd4d}], 0x1}, 0x0) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x7, 0x2, 0x4, 0x10810, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r4, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x94) (async, rerun: 32) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x2}, 0x50) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) close(r10) recvmsg$unix(r9, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) write$cgroup_subtree(r11, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00ff"], 0xfdef) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0xd, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r14, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES32], &(0x7f0000000300)='GPL\x00', 0x2, 0x100d, &(0x7f0000003540)=""/4109, 0x0, 0x5}, 0x5c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 978.232952ms ago: executing program 0 (id=5675): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000f10000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/19], 0x48) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000540)={0x0, r5}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x18, 0xc, &(0x7f0000000380)=ANY=[@ANYRES8=r4, @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000, 0x5f}, 0x1e) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000004000000ff00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000008000000000"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000580)=r4, 0x4) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 770.086456ms ago: executing program 4 (id=5676): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x3, 0x200000000000009a, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x4, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) ioctl$TUNSETFILTEREBPF(r7, 0x800454e1, &(0x7f00000001c0)=r8) 666.491888ms ago: executing program 5 (id=5677): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_kthread_work_execute_end\x00', r0, 0x0, 0x3}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) sendmsg$inet(r1, &(0x7f00000007c0)={&(0x7f0000000380)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, &(0x7f0000000740)=[{&(0x7f00000003c0)="78e2a4090e6cb65987e24474ff2f3170a8eff38c46a51d9eef27282590c850afb45a9830106ea31148bfaaf5fdc75625df935388fe887af484af624f515c7f5c9d081c9c505159b16ee316a788fbad459ae9fbc31f165c62f64122fdf81206533f1b2b4a1f7aa7f6dbb430e0ebec25479b38949722b529eb6749d69d742593d1f4397394f381c5c2d776fe108c94f8d08ac9819aa695b669beb10141ce8f82863f19310e1112d532e97b3b087e8367ad5baf4841", 0xb4}, {&(0x7f0000000480)="dce40d72fbd685c5dae9a47088ca1ce3e292976f9c47edc3aba193a0c48efa1d26aab2a7c301f01f9d8e4d365c9c78f619927dd5c8605d12ef9c7a6c9c769701d418b1ee36d03f322c8c161ac5113890b323aeea6ac98b1836c51d8c82895115817ed2eef02832e5918c505add2a267c28ffa6d2b70e9a4195b7d602ccca626c2b186efa8275412aea097ae5b7c70f6887fce934bb67fd5cd63398d0e7a5eec9c5a5d1c3c0035bec014d77149d10fe6890bdfbc0db5a4829ea2b6ac8f7ea1fa7a9a0e04f6ef64cebcd18908485bfec5863e4e54d2c8478b0858689f85ef791e0ba72e8f3d148f39ce2e1533e41e416d0d92168", 0xf3}, {&(0x7f0000000580)="4b516909f27e966e332a208c3417ac30b8a3691053cd6047ba412b589d3eb2e682ca65f682b59e9d38bf4e4b77654ecf8db90052a4ac1396d954af6bfe2387b1636cab74f36d024ae2211306b52b126f3e68b4005cb3cecd65604ca3c1011468b499a57908895bced33cb280e397b17009bee04d68f9bfe20d926f52719d2a5b86d960a16af050c88cc92f6c2208a959180af5535639917dd0408fa5b88569d297cc3423d80666b4cade289ae9f31bdc4db1d4b8d8a1df545b4851a7ea46c3f035cb95f140045a422d9c57b8e52050a3abf8de44c39bd9658e31f0694ad64c354d71cb606b19820d39e1dc1246359f8803d44e8ea22548b051", 0xf9}, {&(0x7f0000000680)="88907bccf53836cbdc165e574179c61a436675d7ff9f9085343d9e10162a05d4bc15029855003fa2a5ebf01671a5a9742f3bb2d87a53bf9f6917a82062fa96c54a88f1e2c85d43c9d33f53a94c4313606c3ff21734e9abc5a5027f1420140a8e42beaa95d6ecc463499dbf34c041455a15bcd7992e8e8249e9915378b1b5ce4aef80de9e33b55f73ed2c87b900343c22f9349e1a7a2468aed7c68dc8bea5", 0x9e}], 0x4, &(0x7f0000000780)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0x30}, 0x800) 665.538508ms ago: executing program 1 (id=5678): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0xf0, 0x1000, &(0x7f0000000180)="85427565b142ef0dfca5a054edb2f4574b4b99e61a21ef7063b0b3bcf5f6b298cff4d6d88e1e9f3d6d5d0c9ad448ff5c545261089cb259d192babd7085fc5cad5c8d1d54580e81dd9fdc822227348c57cedbafee938979841025f28b815687267516fe7cba22db94637a09f4f71e47e447986d52ce84d6d35916e98b7d296684085689b3049a548012297c7475f238ab8f8a82aef57a7fccef55f3dbd21d74631c0bd9d4430ed0f9e3be6c436c6af0e8c5415555593b2e018234e31a0257bc31d70f5eec6742b5d6673da9e9b838e92031661d479609c847679928a8de939b3824680df07588d4230c0db7fb9fc52b75", &(0x7f0000000680)=""/4096, 0x2, 0x0, 0xc2, 0xd8, &(0x7f0000000280)="f981f24fd79d37a610942504c466071c6f5ff6b2f2b7b7beb70e52902ffb60837e0905df7f49b22bc1314f66e56cf585ec68a36ed07dd907392ef232e93cb04113590be40847fd468f854acd82e0a9818edce94e1c7c4538a5719b871fd323c9c32b80da3ec1f998a6f1e6ff4bc8d94c7f6e6b37040dba168c1425b4dccfc96892836b7be275134eceea35eb8660b3ef4ae5c611982b4e85b6040a16cd16b1960ae2e6bd54635f28fa2d351568e688f3d050658eb6b974988ecd6626f48791b4d4d5", &(0x7f0000001680)="2f18cc3bf46f2ef4a6ecc02638cb9f215f0ecb9e1a36932b988c5a2952a83fdea539f81303f990dff543c097613bda9a61ab55cbb26fe54bc45e4d84c413ff145e2bf64ca7f189b14315581f00db548b9cbfba48254278b69f267b8e9994f495d182dcb5c9be564e0f21f03356aff50acc81c9f9f31e9e9f554b76489ca9c4212687ec7c30fc5a93ece4295e4853255d9fc71b469faee9b37b85dc30e4a69c3fa1bebb9e57b38b951b78c31db0dd7532890c927ec013d670ae798c0974641dd0d30290ef1b33c4f1492cd50367cb6bd736c774566a9d8fbd", 0x4, 0x0, 0x6}, 0x50) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 618.768369ms ago: executing program 5 (id=5679): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000600"/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000f1ffffff000000000000000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007010000f8ffffffb703000008000000b704000002000000850000005400000095"], &(0x7f0000000b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r1}, 0xc) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f00000003c0)}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='module_request\x00', r3}, 0x18) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) 610.160919ms ago: executing program 2 (id=5680): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0, 0x4}, 0x184071, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r11, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r13, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)=r13}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ldst={0x1, 0x2, 0x4, 0x8, 0xb, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='GPL\x00', 0x76, 0x78, &(0x7f0000000500)=""/120, 0x40f00, 0x20, '\x00', r7, 0x0, r10, 0x8, &(0x7f0000000680)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x3, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000880)=[r14], &(0x7f00000008c0)=[{0x0, 0x1, 0x6, 0x8}, {0x3, 0x2, 0x4, 0x2}], 0x10, 0x1}, 0x94) write$cgroup_subtree(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r16}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fe08000000000200875a65969ff57b00ff00"], 0xfdef) close(r0) 510.370761ms ago: executing program 5 (id=5681): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r0, &(0x7f00000004c0), 0x0}, 0x20) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x18) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 509.506421ms ago: executing program 2 (id=5682): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRES16, @ANYBLOB="cca53db03b154c158cd238168f9b0b5929544d90f6e995536011939f571823852c730c5f493124a7d87a4caf002ad882bd4d203142632949687e819a7e60c2d97828b645239d177706830db9b965de1eab", @ANYRESHEX], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0ae7000004000000ff0f00000700000000000000b5", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ffef2d1fb0b7cc00000000000085000000010000000000000000001f6c95d0c92d048a0225300e60d81bdcfbfdf7a3be105101097cbaf3a9a7c49a051d7e32ef18c06274e9488848b1a7c9839b1e1de519a0ae4b5786a588d6f35efdff7ba4f1bb8c088ce26a11ed3c5c76bb9d7ce1dd36cdd5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYRESHEX=r5], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="020000000400009ae10000e6ed28afa00b962431f4fb73a018517d296209aa2a78ea7ad175afb5a8003805503f4cb0efa39a2a83d266be847b3d58e6efb7907ce0837f83b100de8c7f082806bedce12e856062c1642b91f4e57f3adde577ae2e4188ac6bce01dd81a5d6a42c388e2021a5659602f31fa5cca1e389a60c7c3b0b602a6b07d204b2f2914fb44fe4e1f251cc0601f0ffffffffffff74eb", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000000100"/28], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYRES64=r4, @ANYRES32, @ANYRESOCT=r6, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000940)=ANY=[@ANYRESDEC=r5, @ANYRESOCT, @ANYRES32=r8, @ANYRES8=r6, @ANYRESHEX=r3, @ANYBLOB="a13f1831d2723e992fdf41fb8c9c8963f087c9ba412dd0d4526539e4b1a0ef2b93b8d098a5922ba9b83e6404fd581ad7bec79864696ab18732e7329d9e9ca61a2f3f693c873d437ec95307259b358ff51fb2a56753bdd55a780502a310cd9ce5808793ea67ee1197e598a589c4d5e6b5833b2bd022a4b5d6bed9510d21bf1f1183099df670cb6f41c600e6ebefd58d6d6ad0b267581db3cdc0", @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x12, 0xc, &(0x7f0000000c80)=ANY=[@ANYBLOB="1801bc4c43850ae7f5eb4eda3ee8d99684f6fb1200eb1782c58c11359955874c69f93b73fbef823b20456a6e7da99c27d74035513d1b1b6ed165302236104f56d38212342c07fa660300000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000000008000"/28], 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(0x0, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000023000000955aa06e359453bd688162b57a4cbe5e86896b211c84f10edf71a86da87e29482b8d8fd360cb73bed132f7f459e101dddae30c641b6330cedb16fe0b936367a68b549c0214"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='mm_page_alloc\x00', r11}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 508.905531ms ago: executing program 5 (id=5683): r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001100)='cpu&00\t&&') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0b00000000000000000000000000000018111e00", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'bridge0\x00', 0x400}) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r2, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x84}, [], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r6, @sk_skb=0x5, 0xffffffffffffffff, 0x6}, 0x94) 500.873491ms ago: executing program 1 (id=5684): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x4, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x2}, 0x10b100, 0xf, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x2b, 'pids'}]}, 0x6) r5 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x18, 0x17, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x2, 0x4, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2b}, @ldst={0x0, 0x1, 0x0, 0x1, 0x7, 0xffffffffffffffc0, 0xfffffffffffffffc}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000440)=""/4096, 0x40f00, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x2, 0x10, 0x1, 0x6f41}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000300)=[r1, r5, r1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x5, 0x4, 0x7, 0xb}, {0x3, 0x2, 0xb}, {0x2, 0x5, 0xd, 0xa8a751a12e389e4}], 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001500)={&(0x7f0000000040)='rxrpc_tx_fail\x00', r6, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) 479.204962ms ago: executing program 4 (id=5685): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x64, &(0x7f0000000600)}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000dc0)=[0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000e40)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000e80), &(0x7f0000000ec0), 0x8, 0x4a, 0x8, 0x8, &(0x7f0000000f00)}}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x9}, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {&(0x7f00000002c0)}], 0x3}, 0x8010) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x0, 0x0, 0x8, 0x8}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0xfffff15e, 0x8000, 0x1a0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xffffff7f, 0x0, 0xfffffff7, 0x6, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x5}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 310.109395ms ago: executing program 4 (id=5686): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000008000000e27f000001"], 0x48) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x1b, 0x2, 0x0, 0xffff, 0x8, 0xffffffffffffffff, 0x3}, 0x50) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r5, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="002010000018110000ffff0000", @ANYBLOB="83b40587b8a1188b955e9ff12bac41c2f35102127edab587d6764d249c0c7356d075d3636d7963cfff9383cc2a85764af2d41bcdeae87aebd9d39fefa4f923cae893cd1f3584b655674325168177094743c01c4dbbe07bf8ecc2d2bf3ef8bacb10743202e53b1e76ec4637a12057a69c690f9723bb3f1bdcf199d6776202d95b425e6198fc60c24d6952daea46ae32439f5afb59064977d3d0fdd8ccd37a0bb4e9dfb54bc53e5ef4fc16aad1ceb340bb70a7d7802301db73fa1593d7970545cb8a1301c5eaff144e1cf5f262d9b08580b474d1aba8904444d9645ce792b016e79eb638626410b65f76", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x13, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000ffff0000000000000900000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181d0000", @ANYRES32, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000851000000700000018290000", @ANYRES32, @ANYBLOB="000000000200000018580000010000000000000000000000bf918500000008000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x3d, &(0x7f0000000400)=""/61, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, r3, 0x8, &(0x7f00000005c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xe, 0x3, 0x1}, 0x10, r6, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000640)=[{0x3, 0x4, 0x3, 0x4}, {0x4, 0x1, 0x2}], 0x10, 0x1}, 0x94) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0xdf, 0x0, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0100000008000000010000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000005000000002100017faa893aa2f926de8c809a570685d6b7d10000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x16, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xb28}, {}, {}, [@jmp={0x5, 0x0, 0xd, 0xb, 0x1, 0x7ffffffffffffff0, 0xfffffffffffffff0}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='GPL\x00', 0x1, 0xe8, &(0x7f00000007c0)=""/232, 0x41100, 0x10, '\x00', 0x0, @cgroup_sysctl=0xe518afc40fa228df, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xc, 0x7, 0x7}, 0x10, r6, 0xffffffffffffffff, 0x1, &(0x7f0000000640)=[r2, r7, r0, r0, r1, r1, r8, r0, r9, r0], &(0x7f0000000740)=[{0x2, 0x1, 0x5, 0x5}], 0x10, 0x6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000780), 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000cc0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) close(0xffffffffffffffff) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7030070628b3e7c8f54f05a21024be10000000000850000000c00040000000000000095000000800000002000a00213d2a9afa6d80a5764c6c30100010000000000034a81099cb89d9f69d4a5e3d8e3e1ddf09a7cbf2473"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r12}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)=r12}, 0x20) 248.203356ms ago: executing program 4 (id=5687): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000040), 0x2, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x50, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x404, 0x9, 0x0, 0xffffffffffffffff, 0x4}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x3, 0x4, 0x801, 0x1, r5, 0x15b4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6}, &(0x7f0000000840), &(0x7f0000000880)=r5}, 0x20) (async) close(r5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r6, &(0x7f0000000900)}, 0x20) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x52) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000efea54b875462f4b2dbbd36435a3e4e95fe14a9bf2b827e824fd0119cfef58924246b51630f095e475e8fb522f07f7893871f2fdedfa6dc837fdaa62d10be02703e084d83face50fd3039f4e3451cb8b45aeab4e9f0b562b39cf2a94f0fd86e20c5d951fba052664b3e193ee08cf992fec4c66edeb"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r11}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) 180.458947ms ago: executing program 2 (id=5688): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000009ee8062c0500cdc39f8365e1e9efcaee3fa5e3836f9d9f4b811ce34fe482f77392b188d59f76ed180aedc42d061c693178c4d247341f95412de58cdd06daa76840f1391505127eeeb062860e49128e05f1fe917a7e17eef72c7b8151c26e9a858ca5d251da6c2ec700c2daee4e3bd173b2b4e715965ca1625df5febae461c2fd1c3b01c5cc9ef66518b4ae8c14288c0eda5c3e7c18a45b940b24018b15cf"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000240)=ANY=[@ANYRESHEX=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xa5, '\x00', 0x0, 0x2}, 0xb6) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000cddce6a469e23c3363a578d1deb584f426c7521b55d294ecc8d4bbe34a98c9928fbcfefbb300ccb9f9f2883dbed2481f85b43011a75cddcfab037b4666036dde0db6d112d42b3c62fb637a3928952def9f27b06d13b135379d1741457391c3b8cbefb6ddd246a100be75220b20831379"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001400)={r4, &(0x7f00000012c0), 0x0}, 0x20) socketpair(0xb, 0x3, 0x200000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_spread_page\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r7, @ANYRES8=r0, @ANYBLOB="0000000000000000b700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a000000950000000000", @ANYRES32=r0, @ANYRESHEX=r0, @ANYRESOCT=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000eefffcff2e2e"], 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, 0x0) 109.685038ms ago: executing program 0 (id=5689): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00'}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b000000070000000100010008000000010000006ed2c985e162d65ed4179d9b033f64ea5606e2eefd533cf153b4653c64f25c894801fe8c75c34d9fa0ff5e86f2ca0b24e089687f094d4dc6238554dd453d3806c9522e26d151be8a5e60470ccf6b59fbca014f94ef354852d84e3e6a8b3a2fcdfddfb4b7d9", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0}, 0x0, 0x0}, 0x5) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) 55.65557ms ago: executing program 1 (id=5690): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x63) close(r0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x63) (async) close(r0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) (async) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) (async) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) (async) 0s ago: executing program 0 (id=5691): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r1}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='.\x00', r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r6}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.146' (ED25519) to the list of known hosts. [ 21.044635][ T24] audit: type=1400 audit(1758209396.760:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.046090][ T267] cgroup: Unknown subsys name 'net' [ 21.067756][ T24] audit: type=1400 audit(1758209396.770:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.095045][ T24] audit: type=1400 audit(1758209396.790:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.095206][ T267] cgroup: Unknown subsys name 'devices' [ 21.237127][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.242774][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.413843][ T24] audit: type=1400 audit(1758209397.130:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.437363][ T24] audit: type=1400 audit(1758209397.130:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.462303][ T24] audit: type=1400 audit(1758209397.130:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.469759][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.494284][ T24] audit: type=1400 audit(1758209397.210:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.519786][ T24] audit: type=1400 audit(1758209397.210:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.557818][ T24] audit: type=1400 audit(1758209397.280:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.583630][ T24] audit: type=1400 audit(1758209397.280:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.583711][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.232028][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.239131][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.246608][ T277] device bridge_slave_0 entered promiscuous mode [ 22.254533][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.261876][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.269276][ T277] device bridge_slave_1 entered promiscuous mode [ 22.276178][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.283303][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.290726][ T275] device bridge_slave_0 entered promiscuous mode [ 22.300478][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.307562][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.315050][ T275] device bridge_slave_1 entered promiscuous mode [ 22.346333][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.353657][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.361276][ T276] device bridge_slave_0 entered promiscuous mode [ 22.369285][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.376351][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.383743][ T276] device bridge_slave_1 entered promiscuous mode [ 22.485727][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.492810][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.500654][ T279] device bridge_slave_0 entered promiscuous mode [ 22.508877][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.515959][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.523416][ T279] device bridge_slave_1 entered promiscuous mode [ 22.552091][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.559309][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.567157][ T278] device bridge_slave_0 entered promiscuous mode [ 22.583144][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.590311][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.597609][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.605084][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.625307][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.632444][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.640013][ T278] device bridge_slave_1 entered promiscuous mode [ 22.652594][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.659658][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.666932][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.673963][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.746413][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.753463][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.760744][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.767779][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.775951][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.782983][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.790356][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.797391][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.817791][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.825052][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.832187][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.839773][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.847101][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.854267][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.861643][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.869556][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.877366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.884889][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.909313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.917291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.925609][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.932725][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.940903][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.949695][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.956769][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.964182][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.972227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.000231][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.008359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.016090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.024227][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.031278][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.039468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.048017][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.055068][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.062500][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.070969][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.078106][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.085698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.093853][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.100985][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.122533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.130245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.138834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.147353][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.154385][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.161948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.170277][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.177333][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.184718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.198085][ T275] device veth0_vlan entered promiscuous mode [ 23.214064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.222731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.230633][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.239015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.247353][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.255517][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.278094][ T275] device veth1_macvtap entered promiscuous mode [ 23.284986][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.293057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.301349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.310888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.319369][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.327705][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.340211][ T276] device veth0_vlan entered promiscuous mode [ 23.348415][ T277] device veth0_vlan entered promiscuous mode [ 23.356585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.364517][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.372681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.380536][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.388362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.396330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.404249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.412316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.420277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.428678][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.437065][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.445108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.452587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.460200][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.480914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.489219][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.497398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.506272][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.514576][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.521626][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.529329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.537768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.546042][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.553057][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.560442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.568857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.577213][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.585308][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.593374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.614209][ T279] device veth0_vlan entered promiscuous mode [ 23.622180][ T277] device veth1_macvtap entered promiscuous mode [ 23.630852][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.639499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.647365][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.656683][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.664547][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.672699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.680728][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.689283][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.697679][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.705609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.713688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.721240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.741705][ T278] device veth0_vlan entered promiscuous mode [ 23.751189][ T276] device veth1_macvtap entered promiscuous mode [ 23.755305][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 23.766000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.774699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.782284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.790533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.799102][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.807554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.815766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.823971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.831653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.840188][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.848640][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.857042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.869306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.881461][ T279] device veth1_macvtap entered promiscuous mode [ 23.890034][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.915149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.923398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.933834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.941815][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.950278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.968624][ T278] device veth1_macvtap entered promiscuous mode [ 23.983748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.992631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.002076][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.010469][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.145180][ C0] hrtimer: interrupt took 28955 ns [ 24.332192][ T305] device syzkaller0 entered promiscuous mode [ 24.343564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.353159][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.361987][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.370787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.740353][ T352] syz.4.16[352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.740448][ T352] syz.4.16[352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.746298][ T348] device syzkaller0 entered promiscuous mode [ 24.805311][ T354] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 24.935146][ T364] cgroup: syz.2.19 (364) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.961296][ T364] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.582792][ T388] device pim6reg1 entered promiscuous mode [ 26.128585][ T395] device syzkaller0 entered promiscuous mode [ 26.382779][ T418] device wg2 entered promiscuous mode [ 26.480188][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 26.480201][ T24] audit: type=1400 audit(1758209402.200:118): avc: denied { read } for pid=425 comm="syz.4.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.636564][ T436] device sit0 entered promiscuous mode [ 27.033744][ T24] audit: type=1400 audit(1758209402.750:119): avc: denied { create } for pid=474 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.248345][ T24] audit: type=1400 audit(1758209402.970:120): avc: denied { create } for pid=498 comm="syz.4.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 27.498787][ T511] ------------[ cut here ]------------ [ 27.504297][ T511] trace type BPF program uses run-time allocation [ 27.536972][ T511] WARNING: CPU: 0 PID: 511 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 27.548121][ T511] Modules linked in: [ 27.553129][ T511] CPU: 0 PID: 511 Comm: syz.0.60 Not tainted syzkaller #0 [ 27.624053][ T511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 27.697859][ T511] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 27.714947][ T511] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 27.769317][ T511] RSP: 0018:ffffc90000eaf468 EFLAGS: 00010246 [ 27.784388][ T24] audit: type=1400 audit(1758209403.500:121): avc: denied { create } for pid=528 comm="syz.3.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 27.826544][ T511] RAX: bc0e8b8af9fef100 RBX: 0000000000000001 RCX: 0000000000080000 [ 27.900340][ T511] RDX: ffffc9000150b000 RSI: 0000000000002174 RDI: 0000000000002175 [ 27.925110][ T511] RBP: ffffc90000eaf4b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 27.941748][ T24] audit: type=1400 audit(1758209403.660:122): avc: denied { create } for pid=537 comm="syz.2.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 28.065028][ T511] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff888115884000 [ 28.073058][ T511] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881165e0000 [ 28.115139][ T511] FS: 00007f18348306c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 28.145112][ T511] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.195493][ T511] CR2: 0000000100000000 CR3: 000000010eccf000 CR4: 00000000003506a0 [ 28.275041][ T511] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.311186][ T511] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 28.408803][ T511] Call Trace: [ 28.412178][ T511] ? __fdget+0x1a1/0x230 [ 28.484760][ T511] resolve_pseudo_ldimm64+0x526/0x1020 [ 28.495259][ T511] ? bpf_check+0xd680/0xd680 [ 28.499909][ T511] ? kvmalloc_node+0x88/0x130 [ 28.507321][ T511] bpf_check+0x8d4b/0xd680 [ 28.511870][ T511] ? bpf_get_btf_vmlinux+0x60/0x60 [ 28.535071][ T511] ? is_bpf_text_address+0x177/0x190 [ 28.540414][ T511] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.551194][ T24] audit: type=1400 audit(1758209404.270:123): avc: denied { ioctl } for pid=555 comm="syz.4.72" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 28.612397][ T511] ? __kernel_text_address+0xa0/0x100 [ 28.646458][ T511] ? unwind_get_return_address+0x4d/0x90 [ 28.656283][ T24] audit: type=1400 audit(1758209404.380:124): avc: denied { create } for pid=576 comm="syz.3.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 28.663506][ T511] ? stack_trace_save+0xe0/0xe0 [ 28.728330][ T511] ? arch_stack_walk+0xee/0x140 [ 28.733063][ T24] audit: type=1400 audit(1758209404.400:125): avc: denied { write } for pid=555 comm="syz.4.72" name="cgroup.subtree_control" dev="cgroup2" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.746040][ T511] ? stack_trace_save+0x98/0xe0 [ 28.801339][ T511] ? stack_trace_snprint+0xf0/0xf0 [ 28.824076][ T511] ? __kasan_slab_alloc+0x69/0xf0 [ 28.829558][ T511] ? pcpu_block_update+0x3ec/0x900 [ 28.835139][ T511] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.840645][ T511] ? __kasan_kmalloc+0xec/0x110 [ 28.845924][ T511] ? __kasan_kmalloc+0xda/0x110 [ 28.850807][ T511] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 28.864224][ T511] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.870023][ T511] ? security_bpf_prog_alloc+0x62/0x90 [ 28.875712][ T511] ? bpf_prog_load+0x949/0x1420 [ 28.880659][ T511] ? __se_sys_bpf+0x442/0x680 [ 28.882809][ T24] audit: type=1400 audit(1758209404.400:126): avc: denied { open } for pid=555 comm="syz.4.72" path="" dev="cgroup2" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.885729][ T511] ? __x64_sys_bpf+0x7b/0x90 [ 28.915380][ T511] ? do_syscall_64+0x31/0x40 [ 28.922899][ T511] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 28.934924][ T511] ? memset+0x35/0x40 [ 28.939041][ T511] ? bpf_obj_name_cpy+0x193/0x1e0 [ 28.944144][ T511] bpf_prog_load+0xf5a/0x1420 [ 28.964895][ T511] ? map_freeze+0x320/0x320 [ 28.969674][ T511] ? selinux_bpf+0xc7/0xf0 [ 28.974099][ T511] ? security_bpf+0x82/0xa0 [ 29.083269][ T511] __se_sys_bpf+0x442/0x680 [ 29.115605][ T511] ? __x64_sys_bpf+0x90/0x90 [ 29.120381][ T511] ? ____fput+0x15/0x20 [ 29.124564][ T511] ? __kasan_check_read+0x11/0x20 [ 29.135452][ T511] __x64_sys_bpf+0x7b/0x90 [ 29.140175][ T511] do_syscall_64+0x31/0x40 [ 29.144733][ T511] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.152650][ T511] RIP: 0033:0x7f1835dc7ba9 [ 29.158105][ T511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.194889][ T511] RSP: 002b:00007f1834830038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.211889][ T511] RAX: ffffffffffffffda RBX: 00007f183600efa0 RCX: 00007f1835dc7ba9 [ 29.231343][ T511] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 29.247599][ T511] RBP: 00007f1835e4ae19 R08: 0000000000000000 R09: 0000000000000000 [ 29.264951][ T511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 29.285116][ T511] R13: 00007f183600f038 R14: 00007f183600efa0 R15: 00007ffcd17eb9c8 [ 29.301661][ T511] ---[ end trace aba798a960de4ca5 ]--- [ 29.718668][ T649] device wg2 left promiscuous mode [ 29.736030][ T24] audit: type=1400 audit(1758209405.460:127): avc: denied { relabelfrom } for pid=648 comm="syz.3.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.755994][ T649] device wg2 entered promiscuous mode [ 29.863747][ T659] device pim6reg1 entered promiscuous mode [ 30.089370][ T678] syz.4.110[678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.089409][ T678] syz.4.110[678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.113016][ T678] device wg2 entered promiscuous mode [ 31.186357][ T746] device pim6reg1 entered promiscuous mode [ 31.764563][ T790] device veth0_vlan left promiscuous mode [ 31.771966][ T790] device veth0_vlan entered promiscuous mode [ 31.793467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.835470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.855390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.971210][ T798] device pim6reg1 entered promiscuous mode [ 32.195149][ T807] device syzkaller0 entered promiscuous mode [ 32.990529][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 32.990541][ T24] audit: type=1400 audit(1758209408.710:131): avc: denied { create } for pid=868 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 33.370820][ T24] audit: type=1400 audit(1758209409.090:132): avc: denied { create } for pid=901 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 33.528291][ T24] audit: type=1400 audit(1758209409.090:133): avc: denied { create } for pid=901 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 33.554445][ T914] device wg2 entered promiscuous mode [ 34.972471][ T24] audit: type=1400 audit(1758209410.690:134): avc: denied { ioctl } for pid=1020 comm="syz.3.208" path="" dev="cgroup2" ino=129 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.115462][ T1033] device syzkaller0 entered promiscuous mode [ 35.421213][ T1057] device sit0 entered promiscuous mode [ 35.542010][ T1065] device veth0_vlan left promiscuous mode [ 35.590625][ T1065] device veth0_vlan entered promiscuous mode [ 35.746803][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.773913][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.843837][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.162937][ T1074] device syzkaller0 entered promiscuous mode [ 36.198822][ T24] audit: type=1400 audit(1758209411.920:135): avc: denied { tracepoint } for pid=1070 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.343694][ T24] audit: type=1400 audit(1758209412.060:136): avc: denied { create } for pid=1087 comm="syz.3.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 36.649471][ T1106] device pim6reg1 entered promiscuous mode [ 36.903225][ T24] audit: type=1400 audit(1758209412.620:137): avc: denied { create } for pid=1120 comm="syz.3.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 37.493331][ T24] audit: type=1400 audit(1758209413.210:138): avc: denied { create } for pid=1189 comm="syz.2.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 37.574548][ T1198] device pim6reg1 entered promiscuous mode [ 37.828477][ T24] audit: type=1400 audit(1758209413.550:139): avc: denied { create } for pid=1210 comm="syz.4.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 37.917526][ T1205] device syzkaller0 entered promiscuous mode [ 38.012244][ T1207] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.190186][ T1218] device syzkaller0 entered promiscuous mode [ 38.216693][ T1207] : renamed from pim6reg1 [ 38.868370][ T1264] device syzkaller0 entered promiscuous mode [ 39.817038][ T1320] device syzkaller0 entered promiscuous mode [ 39.966154][ T1322] device veth1_to_team entered promiscuous mode [ 40.220717][ T1322] device wg2 entered promiscuous mode [ 40.565421][ T1346] device veth0_vlan left promiscuous mode [ 40.603549][ T1346] device veth0_vlan entered promiscuous mode [ 40.645797][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.661293][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.678403][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.278088][ T1402] syz.0.309[1402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.278146][ T1402] syz.0.309[1402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.199522][ T24] audit: type=1400 audit(1758209417.920:140): avc: denied { create } for pid=1459 comm="syz.2.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 42.463374][ T24] audit: type=1400 audit(1758209418.030:141): avc: denied { append } for pid=1459 comm="syz.2.326" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.937692][ T1484] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.187488][ T1504] @ÿ: renamed from bond_slave_0 [ 43.246088][ T1505] device wg2 left promiscuous mode [ 43.364544][ T1505] device wg2 entered promiscuous mode [ 43.442217][ T24] audit: type=1400 audit(1758209419.160:142): avc: denied { create } for pid=1518 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 43.987017][ T1542] device syzkaller0 entered promiscuous mode [ 44.839470][ T24] audit: type=1400 audit(1758209420.560:143): avc: denied { create } for pid=1593 comm="syz.2.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 44.900308][ T1605] device syzkaller0 entered promiscuous mode [ 44.938122][ T1607] device veth1_macvtap left promiscuous mode [ 45.195333][ T24] audit: type=1400 audit(1758209420.920:144): avc: denied { create } for pid=1636 comm="syz.4.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 45.280889][ T1611] device syzkaller0 entered promiscuous mode [ 45.282704][ T1644] syz.4.376[1644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.287244][ T1645] syz.4.376[1645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.295277][ T1644] syz.4.376[1644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.299394][ T1645] syz.4.376[1645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.477362][ T1651] device pim6reg1 entered promiscuous mode [ 47.443805][ T24] audit: type=1400 audit(1758209423.160:145): avc: denied { create } for pid=1757 comm="syz.3.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 47.546459][ T1766] device wg2 left promiscuous mode [ 47.639033][ T1774] device veth1_macvtap left promiscuous mode [ 47.688621][ T1774] device sit0 entered promiscuous mode [ 47.884272][ T1779] device veth0_vlan left promiscuous mode [ 47.935806][ T1779] device veth0_vlan entered promiscuous mode [ 47.996457][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.035450][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.073166][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.692823][ T1877] device sit0 left promiscuous mode [ 49.727439][ T1877] device sit0 entered promiscuous mode [ 50.204577][ T1904] device syzkaller0 entered promiscuous mode [ 50.339997][ T1914] tun0: tun_chr_ioctl cmd 1074025678 [ 50.354999][ T1914] tun0: group set to 1 [ 51.216302][ T1966] syz.4.464[1966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.216366][ T1966] syz.4.464[1966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.423680][ T1977] device wg2 left promiscuous mode [ 51.517007][ T1968] device sit0 entered promiscuous mode [ 52.339747][ T2042] device sit0 entered promiscuous mode [ 52.449251][ T24] audit: type=1400 audit(1758209428.170:146): avc: denied { create } for pid=2049 comm="syz.0.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 52.695777][ T2060] device sit0 left promiscuous mode [ 53.582624][ T2105] device syzkaller0 entered promiscuous mode [ 54.322702][ T2167] device veth1_macvtap left promiscuous mode [ 54.334275][ T2167] device veth1_macvtap entered promiscuous mode [ 54.344153][ T2167] device macsec0 entered promiscuous mode [ 55.136583][ T2196] device sit0 left promiscuous mode [ 55.947216][ T24] audit: type=1400 audit(1758209431.670:147): avc: denied { setattr } for pid=2230 comm="syz.0.541" path="pipe:[1688]" dev="pipefs" ino=1688 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 58.499128][ T24] audit: type=1400 audit(1758209434.220:148): avc: denied { create } for pid=2341 comm="syz.3.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 59.736973][ T2384] device syzkaller0 entered promiscuous mode [ 60.396490][ T2421] syz.1.589[2421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.396565][ T2421] syz.1.589[2421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.220751][ T2449] device syzkaller0 entered promiscuous mode [ 62.015361][ T2490] device pim6reg1 entered promiscuous mode [ 62.038732][ T2490] device pim6reg1 left promiscuous mode [ 62.423143][ T24] audit: type=1400 audit(1758209438.140:149): avc: denied { create } for pid=2507 comm="syz.2.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 62.745287][ T2531] device syzkaller0 entered promiscuous mode [ 62.888640][ T2508] device sit0 left promiscuous mode [ 63.202386][ T2571] syz.0.631[2571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.202487][ T2571] syz.0.631[2571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.633767][ T2600] p: renamed from pim6reg1 [ 63.808304][ T2609] device pim6reg1 entered promiscuous mode [ 64.730389][ T2663] device syzkaller0 entered promiscuous mode [ 64.886801][ T2675] ÿÿÿÿÿÿ: renamed from vlan1 [ 65.271698][ T2693] device syzkaller0 entered promiscuous mode [ 65.435630][ T2712] syz.3.677[2712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.526619][ T549] syzkaller0: tun_net_xmit 76 [ 65.554916][ C0] syzkaller0: tun_net_xmit 76 [ 65.573712][ T549] syzkaller0: tun_net_xmit 48 [ 65.584849][ T2727] syzkaller0: create flow: hash 1988300106 index 1 [ 65.648858][ T2727] syzkaller0: delete flow: hash 1988300106 index 1 [ 66.598130][ T2777] device syzkaller0 entered promiscuous mode [ 68.558110][ T2863] device wg2 entered promiscuous mode [ 68.843584][ T2891] device sit0 entered promiscuous mode [ 69.009012][ T2917] ÿÿÿÿÿÿ: renamed from vlan1 [ 69.085055][ T2931] device veth1_macvtap left promiscuous mode [ 69.113870][ T2931] device macsec0 left promiscuous mode [ 70.114208][ T2970] device wg2 left promiscuous mode [ 70.163764][ T2970] device wg2 entered promiscuous mode [ 70.901501][ T3008] device pim6reg1 entered promiscuous mode [ 72.515897][ T3091] device veth0_vlan left promiscuous mode [ 72.539946][ T3091] device veth0_vlan entered promiscuous mode [ 72.598831][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.607392][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.615349][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.274431][ T3225] device syzkaller0 entered promiscuous mode [ 74.833563][ T3266] device syzkaller0 entered promiscuous mode [ 74.998369][ T24] audit: type=1400 audit(1758209450.720:150): avc: denied { create } for pid=3287 comm="syz.4.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 75.040607][ T3290] cgroup: fork rejected by pids controller in /syz2 [ 75.184701][ T3297] syz.4.840[3297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.185150][ T3297] syz.4.840[3297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.272764][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.291629][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.300091][ T3298] device bridge_slave_0 entered promiscuous mode [ 75.316126][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.323291][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.330837][ T3298] device bridge_slave_1 entered promiscuous mode [ 75.374873][ T3297] device veth0_vlan left promiscuous mode [ 75.421609][ T3297] device veth0_vlan entered promiscuous mode [ 75.456402][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.465531][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.473155][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 75.544441][ T3316] device sit0 entered promiscuous mode [ 75.555818][ T24] audit: type=1400 audit(1758209451.280:151): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.570520][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.583688][ T3298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.591222][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.598298][ T3298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.735417][ T24] audit: type=1400 audit(1758209451.280:152): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.785482][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.817256][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.875220][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.892050][ T24] audit: type=1400 audit(1758209451.280:153): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.912985][ T24] audit: type=1400 audit(1758209451.400:154): avc: denied { create } for pid=3319 comm="syz.4.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 75.957751][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.975128][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.982412][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.025196][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.033681][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.040869][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.048602][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.056704][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.078686][ T3298] device veth0_vlan entered promiscuous mode [ 76.093700][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.192886][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.244722][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.266185][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.317782][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.336834][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.359038][ T3298] device veth1_macvtap entered promiscuous mode [ 76.397398][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 76.406231][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.416320][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.425086][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.434209][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.527040][ T3367] device pim6reg1 entered promiscuous mode [ 76.600773][ T3373] device wg2 left promiscuous mode [ 76.626936][ T3378] device wg2 entered promiscuous mode [ 76.720099][ T7] device bridge_slave_1 left promiscuous mode [ 76.735564][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.756520][ T7] device bridge_slave_0 left promiscuous mode [ 76.763106][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.843134][ T7] device veth0_vlan left promiscuous mode [ 77.363216][ T3434] device wg2 left promiscuous mode [ 77.435281][ T3434] device wg2 entered promiscuous mode [ 77.661946][ T3442] device syzkaller0 entered promiscuous mode [ 77.748318][ T3446] device sit0 entered promiscuous mode [ 78.124750][ T3485] syz.0.890[3485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.125385][ T3485] syz.0.890[3485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.316122][ T3489] device syzkaller0 entered promiscuous mode [ 80.707930][ T3583] device sit0 left promiscuous mode [ 80.877676][ T3590] device syzkaller0 entered promiscuous mode [ 80.886557][ T3594] syz.1.916[3594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.886649][ T3594] syz.1.916[3594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.100903][ T3597] device pim6reg1 entered promiscuous mode [ 82.328387][ T24] audit: type=1400 audit(1758209458.050:155): avc: denied { create } for pid=3645 comm="syz.2.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 82.521622][ T24] audit: type=1400 audit(1758209458.240:156): avc: denied { create } for pid=3649 comm="syz.1.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 82.733992][ T3658] device veth0_vlan left promiscuous mode [ 82.741082][ T3658] device veth0_vlan entered promiscuous mode [ 82.792823][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.801854][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.809643][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.365264][ T3702] -1: renamed from syzkaller0 [ 84.200963][ T3781] device veth1_macvtap left promiscuous mode [ 85.338137][ T3810] device syzkaller0 entered promiscuous mode [ 86.730448][ T3860] device pim6reg1 entered promiscuous mode [ 86.946423][ T3885] syz.3.999[3885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.946484][ T3885] syz.3.999[3885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.971037][ T3882] device wg2 entered promiscuous mode [ 87.317801][ T3915] tun0: tun_chr_ioctl cmd 1074025676 [ 87.323370][ T3915] tun0: owner set to 0 [ 87.791195][ T3947] device sit0 left promiscuous mode [ 90.042605][ T4107] device pim6reg1 entered promiscuous mode [ 90.140765][ T4119] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.148054][ T4119] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.778895][ T4233] device pim6reg1 entered promiscuous mode [ 92.004298][ T4255] syz.4.1102[4255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.004358][ T4255] syz.4.1102[4255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.624624][ T4300] device pim6reg1 entered promiscuous mode [ 92.908276][ T4309] device syzkaller0 entered promiscuous mode [ 93.306859][ T4337] syz.2.1124[4337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.306929][ T4337] syz.2.1124[4337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.198026][ T4410] device veth0_vlan left promiscuous mode [ 94.272370][ T4410] device veth0_vlan entered promiscuous mode [ 94.347700][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.366914][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.392191][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 94.412542][ T4417] device pim6reg1 left promiscuous mode [ 94.676796][ T4443] device syzkaller0 entered promiscuous mode [ 94.912117][ T24] audit: type=1400 audit(1758209470.630:157): avc: denied { create } for pid=4463 comm="syz.2.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 95.483911][ T4493] device syzkaller0 entered promiscuous mode [ 96.043058][ T4524] syz.4.1178 uses obsolete (PF_INET,SOCK_PACKET) [ 96.091563][ T4530] @0Ù: renamed from bond_slave_1 [ 96.138064][ T4524] device sit0 entered promiscuous mode [ 97.011040][ T4559] ref_ctr_offset mismatch. inode: 0x4f9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 97.227752][ T4560] GPL: port 1(erspan0) entered blocking state [ 97.244987][ T4560] GPL: port 1(erspan0) entered disabled state [ 97.256992][ T4560] device erspan0 entered promiscuous mode [ 97.283422][ T4564] GPL: port 1(erspan0) entered blocking state [ 97.289600][ T4564] GPL: port 1(erspan0) entered forwarding state [ 97.347057][ T4574] device sit0 left promiscuous mode [ 97.471972][ T4574] device sit0 entered promiscuous mode [ 98.338316][ T4613] device sit0 left promiscuous mode [ 98.447971][ T4618] device pim6reg1 entered promiscuous mode [ 98.462132][ T4618] device wg2 left promiscuous mode [ 98.482505][ T4618] device wg2 entered promiscuous mode [ 98.890817][ T4640] device pim6reg1 entered promiscuous mode [ 101.042807][ T4749] device sit0 left promiscuous mode [ 101.478958][ T4766] device syzkaller0 entered promiscuous mode [ 102.417995][ T4823] syz.1.1264[4823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.418078][ T4823] syz.1.1264[4823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.619324][ T4931] lo: mtu less than device minimum [ 106.048545][ T4997] device syzkaller0 entered promiscuous mode [ 106.436336][ T5011] device sit0 left promiscuous mode [ 107.638335][ T5062] device syzkaller0 entered promiscuous mode [ 108.659562][ T5116] device syzkaller0 entered promiscuous mode [ 109.605827][ T5151] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 109.611735][ T5151] syzkaller0: linktype set to 0 [ 111.021317][ T5242] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 112.119583][ T5296] device syzkaller0 entered promiscuous mode [ 113.486695][ T5397] device sit0 entered promiscuous mode [ 114.260349][ T5436] device veth0_vlan left promiscuous mode [ 114.370261][ T5436] device veth0_vlan entered promiscuous mode [ 114.568288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.583240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.614177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 114.727429][ T24] audit: type=1400 audit(1758209490.450:158): avc: denied { create } for pid=5452 comm="syz.2.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 115.391194][ T5495] device sit0 entered promiscuous mode [ 115.671410][ T5501] device veth0_vlan left promiscuous mode [ 115.704597][ T5501] device veth0_vlan entered promiscuous mode [ 115.761172][ T5501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.793270][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.802518][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 115.813938][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.933616][ T5514] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.940917][ T5514] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.979187][ T5514] device bridge_slave_1 left promiscuous mode [ 115.988933][ T5514] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.042323][ T5514] device bridge_slave_0 left promiscuous mode [ 116.076021][ T5514] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.498203][ T5550] syz.2.1480[5550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.498304][ T5550] syz.2.1480[5550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.575611][ T5555] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.594500][ T5555] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.636067][ T5555] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.643257][ T5555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.650604][ T5555] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.657783][ T5555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.780875][ T5555] device bridge0 entered promiscuous mode [ 116.806756][ T5550] device pim6reg1 entered promiscuous mode [ 119.930634][ T5665] device veth0_vlan left promiscuous mode [ 119.943361][ T5665] device veth0_vlan entered promiscuous mode [ 120.002613][ T5665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.144941][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.153037][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 120.203826][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.225207][ T5672] ªªªªªª: renamed from team_slave_1 [ 121.083223][ T5732] device pim6reg1 entered promiscuous mode [ 121.105569][ T5734] device veth0_vlan left promiscuous mode [ 121.111976][ T5734] device veth0_vlan entered promiscuous mode [ 121.147093][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.157594][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.165853][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.493171][ T5791] device sit0 left promiscuous mode [ 121.614041][ T5798] device wg2 left promiscuous mode [ 122.282727][ T5832] device wg2 left promiscuous mode [ 122.361770][ T5832] device wg2 entered promiscuous mode [ 124.740657][ T5951] syz.3.1601[5951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.418753][ T5996] device syzkaller0 entered promiscuous mode [ 136.163537][ T6054] device syzkaller0 entered promiscuous mode [ 136.260616][ T6061] syz.3.1636[6061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.260662][ T6061] syz.3.1636[6061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.288266][ T6061] syz.3.1636[6061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.305647][ T6061] syz.3.1636[6061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.390340][ T6060] device wg2 left promiscuous mode [ 136.483437][ T6061] device wg2 entered promiscuous mode [ 136.587469][ T6070] device wg2 left promiscuous mode [ 136.663813][ T6070] device wg2 entered promiscuous mode [ 138.306305][ T6155] syz.4.1660[6155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.306366][ T6155] syz.4.1660[6155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.452171][ T6159] device sit0 left promiscuous mode [ 138.514556][ T6165] device sit0 entered promiscuous mode [ 138.831350][ T6186] device wg2 left promiscuous mode [ 138.867364][ T6186] device wg2 entered promiscuous mode [ 138.915861][ T6190] device syzkaller0 entered promiscuous mode [ 139.212889][ T6215] bridge0: port 3(veth0) entered blocking state [ 139.222321][ T6215] bridge0: port 3(veth0) entered disabled state [ 139.230582][ T6215] device veth0 entered promiscuous mode [ 139.241840][ T6221] device veth0 left promiscuous mode [ 139.247499][ T6221] bridge0: port 3(veth0) entered disabled state [ 139.469897][ T6236] @0Ù: renamed from bond_slave_1 [ 140.037730][ T6262] device syzkaller0 entered promiscuous mode [ 140.519784][ T24] audit: type=1400 audit(1758209516.240:159): avc: denied { read } for pid=6314 comm="syz.3.1709" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 142.033112][ T6423] device pim6reg1 entered promiscuous mode [ 143.415836][ T6519] device wg2 left promiscuous mode [ 143.505299][ T6519] device wg2 entered promiscuous mode [ 143.629716][ T6532] device syzkaller0 entered promiscuous mode [ 144.010961][ T6565] device syzkaller0 entered promiscuous mode [ 144.232116][ T6601] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 144.638129][ T6640] device syzkaller0 entered promiscuous mode [ 144.760398][ T6646] syz.3.1800 (6646) used obsolete PPPIOCDETACH ioctl [ 145.620160][ T6686] device syzkaller0 entered promiscuous mode [ 146.797609][ T6737] device pim6reg1 entered promiscuous mode [ 146.921780][ T6753] device veth1_macvtap entered promiscuous mode [ 146.928776][ T6753] device macsec0 entered promiscuous mode [ 146.936195][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.144925][ T6758] device syzkaller0 entered promiscuous mode [ 147.520560][ T6776] device syzkaller0 entered promiscuous mode [ 148.389418][ T6795] device syzkaller0 entered promiscuous mode [ 148.773191][ T6810] device pim6reg1 entered promiscuous mode [ 148.869919][ T6823] device syzkaller0 entered promiscuous mode [ 149.361557][ T6865] syz.0.1867[6865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.361621][ T6865] syz.0.1867[6865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.754565][ T6948] device veth0_vlan left promiscuous mode [ 150.802796][ T6948] device veth0_vlan entered promiscuous mode [ 150.814131][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.835520][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.843440][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.434513][ T24] audit: type=1400 audit(1758209527.150:160): avc: denied { create } for pid=6972 comm="syz.3.1902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 152.130080][ T7014] device pim6reg1 entered promiscuous mode [ 152.443883][ T7024] device syzkaller0 entered promiscuous mode [ 152.586061][ T7037] device sit0 entered promiscuous mode [ 161.191698][ T7127] syz.1.1947[7127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.191759][ T7127] syz.1.1947[7127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.440155][ T7129] device veth0_vlan left promiscuous mode [ 161.646937][ T7129] device veth0_vlan entered promiscuous mode [ 161.667367][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.735664][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.814597][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 163.306471][ T24] audit: type=1400 audit(1758209539.020:161): avc: denied { create } for pid=7218 comm="syz.0.1970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 163.454439][ T24] audit: type=1400 audit(1758209539.170:162): avc: denied { read } for pid=7220 comm="syz.0.1971" dev="nsfs" ino=4026532368 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 163.546263][ T24] audit: type=1400 audit(1758209539.200:163): avc: denied { open } for pid=7220 comm="syz.0.1971" path="mnt:[4026532368]" dev="nsfs" ino=4026532368 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 163.644899][ T24] audit: type=1400 audit(1758209539.210:164): avc: denied { ioctl } for pid=7220 comm="syz.0.1971" path="mnt:[4026532368]" dev="nsfs" ino=4026532368 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 164.457019][ T7249] ÿ: renamed from bond_slave_0 [ 164.695967][ T7262] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.703282][ T7262] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.896654][ T7294] device wg2 left promiscuous mode [ 166.073493][ T7296] device wg2 entered promiscuous mode [ 166.197727][ T7299] device veth0_vlan left promiscuous mode [ 166.205085][ T7299] device veth0_vlan entered promiscuous mode [ 166.422439][ T24] audit: type=1400 audit(1758209542.140:165): avc: denied { attach_queue } for pid=7311 comm="syz.2.1998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 166.825617][ T7329] device pim6reg1 entered promiscuous mode [ 166.853665][ T7335] device sit0 left promiscuous mode [ 166.940598][ T7336] device sit0 entered promiscuous mode [ 167.283354][ T7343] device syzkaller0 entered promiscuous mode [ 167.311871][ T7349] device sit0 left promiscuous mode [ 167.623841][ T7354] device syzkaller0 entered promiscuous mode [ 168.923466][ T24] audit: type=1400 audit(1758209544.640:166): avc: denied { create } for pid=7427 comm="syz.4.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 169.961484][ T7501] device syzkaller0 entered promiscuous mode [ 170.285694][ T7527] device syzkaller0 entered promiscuous mode [ 171.825453][ T7608] device sit0 left promiscuous mode [ 172.055710][ T7612] device sit0 entered promiscuous mode [ 172.455330][ T7625] syz.2.2083[7625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.455423][ T7625] syz.2.2083[7625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.192522][ T24] audit: type=1400 audit(1758209548.910:167): avc: denied { create } for pid=7658 comm="syz.4.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 173.787926][ T7716] syz.2.2110[7716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.788108][ T7716] syz.2.2110[7716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.891090][ T7705] syz.2.2110[7705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.910442][ T7705] syz.2.2110[7705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.028030][ T7727] device bridge_slave_1 left promiscuous mode [ 174.102563][ T7727] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.125364][ T7727] device bridge_slave_0 left promiscuous mode [ 174.131681][ T7727] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.223350][ T7734] €Â0: renamed from pim6reg1 [ 175.045943][ T7783] device wg2 entered promiscuous mode [ 175.219362][ T7794] device sit0 entered promiscuous mode [ 175.709844][ T7824] device syzkaller0 entered promiscuous mode [ 176.259506][ T7876] syz.1.2162[7876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.259557][ T7876] syz.1.2162[7876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.322551][ T7877] syz.1.2162[7877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.387512][ T7881] syz.1.2162[7881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.585384][ T24] audit: type=1400 audit(1758209552.310:168): avc: denied { create } for pid=7902 comm="syz.4.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 176.738273][ T7890] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.747292][ T7890] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.818936][ T7890] device bridge0 left promiscuous mode [ 176.869162][ T7923] device veth0_vlan left promiscuous mode [ 176.912680][ T7923] device veth0_vlan entered promiscuous mode [ 176.975769][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.986526][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.002463][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 178.657076][ T8020] device sit0 left promiscuous mode [ 178.834895][ T8024] device sit0 entered promiscuous mode [ 179.186233][ T8028] device pim6reg1 left promiscuous mode [ 179.560310][ T8040] device syzkaller0 entered promiscuous mode [ 181.125756][ T8109] tap0: tun_chr_ioctl cmd 1074025677 [ 181.131111][ T8109] tap0: linktype set to 769 [ 181.431025][ T8132] bpf_get_probe_write_proto: 2 callbacks suppressed [ 181.431036][ T8132] syz.2.2227[8132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.448881][ T8132] syz.2.2227[8132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.650213][ T8132] device veth0_vlan left promiscuous mode [ 181.683194][ T8132] device veth0_vlan entered promiscuous mode [ 181.717849][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.730638][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.743307][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.796392][ T8145] device vlan1 entered promiscuous mode [ 182.268194][ T24] audit: type=1400 audit(1758209557.980:169): avc: denied { create } for pid=8162 comm="syz.0.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 183.311735][ T8201] device pim6reg1 entered promiscuous mode [ 183.604580][ T8230] device syzkaller0 entered promiscuous mode [ 184.045339][ T8257] device veth0_vlan left promiscuous mode [ 184.111493][ T8257] device veth0_vlan entered promiscuous mode [ 184.214669][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.255573][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.288333][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.085113][ T8303] Ÿë: port 1(veth0_to_team) entered blocking state [ 185.092053][ T8303] Ÿë: port 1(veth0_to_team) entered disabled state [ 185.144715][ T8303] device veth0_to_team entered promiscuous mode [ 185.677599][ T8331] device pim6reg1 entered promiscuous mode [ 186.485900][ T8364] device syzkaller0 entered promiscuous mode [ 187.136689][ T8391] device pim6reg1 entered promiscuous mode [ 187.502021][ T8397] device wg2 left promiscuous mode [ 188.343251][ T8438] device bridge_slave_1 left promiscuous mode [ 188.371861][ T8438] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.440427][ T8438] device bridge_slave_0 left promiscuous mode [ 188.531165][ T8438] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.796854][ T8439] device veth0_vlan left promiscuous mode [ 188.803426][ T8439] device veth0_vlan entered promiscuous mode [ 188.959367][ T24] audit: type=1400 audit(1758209564.680:170): avc: denied { create } for pid=8455 comm="syz.3.2327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 189.381286][ T8468] device syzkaller0 entered promiscuous mode [ 190.255464][ T8485] @ÿ: renamed from bond_slave_0 [ 190.971452][ T24] audit: type=1400 audit(1758209566.690:171): avc: denied { associate } for pid=8539 comm="syz.4.2350" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 191.073768][ T24] audit: type=1400 audit(1758209566.790:172): avc: denied { create } for pid=8554 comm="syz.1.2354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 191.796467][ T8597] syz.3.2361[8597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.796526][ T8597] syz.3.2361[8597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.178792][ T24] audit: type=1400 audit(1758209568.900:173): avc: denied { create } for pid=8668 comm="syz.3.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 193.211233][ T8676] syz.3.2382[8676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.211288][ T8676] syz.3.2382[8676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.336436][ T8684] device pim6reg1 entered promiscuous mode [ 193.522542][ T8693] device veth0_vlan left promiscuous mode [ 193.556694][ T8693] device veth0_vlan entered promiscuous mode [ 193.586152][ T8692] device wg2 left promiscuous mode [ 194.348596][ T8741] device sit0 entered promiscuous mode [ 194.759934][ T8755] device wg2 entered promiscuous mode [ 194.836262][ T8753] device syzkaller0 entered promiscuous mode [ 196.834251][ T8843] device sit0 entered promiscuous mode [ 197.238954][ T8861] device syzkaller0 entered promiscuous mode [ 198.165104][ T8921] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.172336][ T8921] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.226977][ T8921] device bridge_slave_1 left promiscuous mode [ 198.233701][ T8921] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.319394][ T8921] device bridge_slave_0 left promiscuous mode [ 198.326404][ T8921] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.494164][ T8947] device sit0 left promiscuous mode [ 198.563255][ T8948] device sit0 entered promiscuous mode [ 198.937053][ T8950] device syzkaller0 entered promiscuous mode [ 199.002377][ T8961] syz.0.2469[8961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.002438][ T8961] syz.0.2469[8961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.171452][ T8972] device syzkaller0 entered promiscuous mode [ 199.207300][ T8986] -1: renamed from syzkaller0 [ 199.373419][ T8976] device syzkaller0 entered promiscuous mode [ 200.697395][ T9031] device syzkaller0 entered promiscuous mode [ 200.862192][ T24] audit: type=1400 audit(1758209576.580:174): avc: denied { create } for pid=9056 comm="syz.4.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 201.231585][ T9078] device syzkaller0 entered promiscuous mode [ 201.402267][ T9098] €Â0: renamed from bond_slave_1 [ 201.630985][ T9113] device pim6reg1 entered promiscuous mode [ 201.638113][ T9115] device pim6reg1 entered promiscuous mode [ 202.351037][ T9169] device wg2 left promiscuous mode [ 202.381861][ T9169] device wg2 entered promiscuous mode [ 203.311408][ T9224] device sit0 left promiscuous mode [ 204.183851][ T9239] device syzkaller0 entered promiscuous mode [ 204.765401][ T9304] device pim6reg1 entered promiscuous mode [ 205.961670][ T9382] device wg2 entered promiscuous mode [ 206.486948][ T9403] device syzkaller0 entered promiscuous mode [ 206.572870][ T9416] device syzkaller0 entered promiscuous mode [ 207.606664][ T9491] device veth0_vlan left promiscuous mode [ 207.623018][ T9491] device veth0_vlan entered promiscuous mode [ 207.654880][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.679772][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.705395][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 207.863183][ T9503] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 208.666111][ T9549] device syzkaller0 entered promiscuous mode [ 209.703370][ T9606] device pim6reg1 entered promiscuous mode [ 210.132871][ T9615] device syzkaller0 entered promiscuous mode [ 211.283667][ T9699] device pim6reg1 entered promiscuous mode [ 212.017724][ T9725] device syzkaller0 entered promiscuous mode [ 212.121871][ T9742] -1: renamed from syzkaller0 [ 212.654957][ T9780] device sit0 left promiscuous mode [ 213.398838][ T9798] device veth1_macvtap left promiscuous mode [ 213.410150][ T9798] device macsec0 left promiscuous mode [ 214.613181][ T24] audit: type=1400 audit(1758209590.330:175): avc: denied { create } for pid=9860 comm="syz.0.2727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 214.899564][ T9876] device veth0_vlan left promiscuous mode [ 214.967001][ T9876] device veth0_vlan entered promiscuous mode [ 215.062630][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.105225][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.112562][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 215.675614][ T9922] geneve1: tun_chr_ioctl cmd 1074025672 [ 215.685045][ T9922] geneve1: ignored: set checksum enabled [ 215.729603][ T9923] geneve1: tun_chr_ioctl cmd 1074025672 [ 215.759188][ T9923] geneve1: ignored: set checksum enabled [ 216.045642][ T9944] syz.3.2753[9944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.045730][ T9944] syz.3.2753[9944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.057145][ T24] audit: type=1400 audit(1758209591.770:176): avc: denied { mounton } for pid=9946 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 216.338457][ T9946] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.354795][ T9946] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.372340][ T9946] device bridge_slave_0 entered promiscuous mode [ 216.411807][ T9946] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.435023][ T9946] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.454845][ T9946] device bridge_slave_1 entered promiscuous mode [ 216.570747][ T9946] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.578038][ T9946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.585361][ T9946] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.592486][ T9946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.657747][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.685220][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.695096][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.817402][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.825847][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.832904][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.887418][ T9980] device pim6reg1 entered promiscuous mode [ 216.906391][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.925408][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.932487][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.956760][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.991790][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.037961][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.060380][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.075280][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.088544][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.116095][ T9946] device veth0_vlan entered promiscuous mode [ 217.142465][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.155352][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.167700][ T9946] device veth1_macvtap entered promiscuous mode [ 217.192220][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.215170][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.224680][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.251870][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.265234][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.303152][ T24] audit: type=1400 audit(1758209593.020:177): avc: denied { unmount } for pid=9946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 217.975244][ T7] device veth0_vlan left promiscuous mode [ 218.265597][T10054] device wg2 left promiscuous mode [ 219.021581][T10148] syz.0.2806[10148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.021669][T10148] syz.0.2806[10148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.065175][T10149] syz.0.2806[10149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.123976][T10150] device pim6reg1 entered promiscuous mode [ 219.139262][T10149] syz.0.2806[10149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.924056][T10183] device syzkaller0 entered promiscuous mode [ 220.452875][T10205] device syzkaller0 entered promiscuous mode [ 220.487152][T10209] device veth0_vlan left promiscuous mode [ 220.493159][T10209] device veth0_vlan entered promiscuous mode [ 220.527480][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.576216][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.595132][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.710186][T10380] device pim6reg1 entered promiscuous mode [ 224.020314][T10435] device pim6reg1 entered promiscuous mode [ 224.818633][T10502] syz.0.2905[10502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.818694][T10502] syz.0.2905[10502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.251197][T10522] device bridge_slave_1 left promiscuous mode [ 225.310192][T10522] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.350500][T10522] device bridge_slave_0 left promiscuous mode [ 225.382568][T10522] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.128005][T10555] device pim6reg1 entered promiscuous mode [ 226.883001][T10620] device pim6reg1 entered promiscuous mode [ 226.910645][T10620] device veth1_macvtap left promiscuous mode [ 226.934889][T10620] device macsec0 entered promiscuous mode [ 228.417836][T10727] device pim6reg1 entered promiscuous mode [ 228.710844][T10746] ÿÿÿÿÿÿ: renamed from vlan1 [ 229.730446][T10775] device veth0_vlan left promiscuous mode [ 229.861932][T10775] device veth0_vlan entered promiscuous mode [ 229.959822][T10775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.981533][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.015037][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 230.022958][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.612801][T10866] device veth0_vlan left promiscuous mode [ 231.639051][T10866] device veth0_vlan entered promiscuous mode [ 231.683002][T10866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.718987][T10871] device syzkaller0 entered promiscuous mode [ 231.730654][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.738799][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 231.748157][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.782069][T10873] device wg2 left promiscuous mode [ 232.089793][T10894] device wg2 entered promiscuous mode [ 233.290800][T10985] device sit0 left promiscuous mode [ 233.461228][T10990] device sit0 entered promiscuous mode [ 233.555155][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.575381][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.605239][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.647864][T10993] device sit0 entered promiscuous mode [ 235.697174][ T7] device veth1_macvtap left promiscuous mode [ 245.767681][T10986] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.775279][T10986] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.786488][T10986] device bridge_slave_0 entered promiscuous mode [ 245.793703][T10986] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.801144][T10986] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.809085][T10986] device bridge_slave_1 entered promiscuous mode [ 245.852921][T11014] device syzkaller0 entered promiscuous mode [ 245.912969][T10986] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.920087][T10986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.927411][T10986] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.934440][T10986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.990450][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.039048][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.058384][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.102291][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.140936][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.162113][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.169222][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.267226][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.284494][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.291599][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.334444][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.345608][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.620234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.718219][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.726835][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.735531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.795262][T10986] device veth0_vlan entered promiscuous mode [ 246.876358][T10986] device veth1_macvtap entered promiscuous mode [ 246.904320][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.919857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.929946][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.956055][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.964549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.978904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.991608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.064037][T11075] ªªªªªª: renamed from vlan0 [ 247.158938][T11082] device wg2 entered promiscuous mode [ 247.218618][T11083] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.226169][T11083] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.234478][T11083] device bridge_slave_0 entered promiscuous mode [ 247.255345][T11083] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.262708][T11083] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.285584][T11083] device bridge_slave_1 entered promiscuous mode [ 247.385701][T11083] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.392838][T11083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.400178][T11083] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.407425][T11083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.436587][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.445875][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.453333][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.472655][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.481385][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.488632][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.497320][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.506426][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.513608][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.536794][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.546054][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.573473][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.589347][T11083] device veth0_vlan entered promiscuous mode [ 247.596489][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.605795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.613487][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.643185][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.660012][T11083] device veth1_macvtap entered promiscuous mode [ 247.673544][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.719882][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.250963][ T48] GPL: port 1(erspan0) entered disabled state [ 248.262375][ T48] device erspan0 left promiscuous mode [ 248.269801][ T48] GPL: port 1(erspan0) entered disabled state [ 248.557262][ T48] device veth0_vlan left promiscuous mode [ 248.823725][T11148] device sit0 entered promiscuous mode [ 248.989438][T11161] syz.0.3089[11161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.989513][T11161] syz.0.3089[11161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.868304][T11208] device pim6reg1 entered promiscuous mode [ 249.948077][T11211] tap0: tun_chr_ioctl cmd 2148553947 [ 250.035544][T11201] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.084777][T11201] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.092325][T11201] device bridge_slave_0 entered promiscuous mode [ 250.165247][T11201] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.172445][T11201] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.252862][T11201] device bridge_slave_1 entered promiscuous mode [ 250.399112][T11234] Ÿë: port 1(veth0_to_team) entered blocking state [ 250.406190][T11234] Ÿë: port 1(veth0_to_team) entered disabled state [ 250.413323][T11234] device veth0_to_team entered promiscuous mode [ 250.465159][T11201] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.472293][T11201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.479605][T11201] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.486651][T11201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.712829][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.726559][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.748701][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.759494][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.811550][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.819897][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.863750][T11201] device veth0_vlan entered promiscuous mode [ 250.892216][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.912268][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.951736][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.002802][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.097336][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.147990][T11201] device veth1_macvtap entered promiscuous mode [ 251.188936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 251.217383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.340599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.443056][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 251.727111][ T48] device veth0_to_team left promiscuous mode [ 251.734920][ T48] Ÿë: port 1(veth0_to_team) entered disabled state [ 251.805110][ T48] device veth0_vlan left promiscuous mode [ 252.080132][T11332] device sit0 left promiscuous mode [ 252.175259][T11340] device pim6reg1 entered promiscuous mode [ 252.301844][T11348] device syzkaller0 entered promiscuous mode [ 253.398948][T11429] device syzkaller0 entered promiscuous mode [ 253.471866][T11424] @ÿ: renamed from bond_slave_0 [ 253.926791][T11442] ÿÿÿÿÿÿ: renamed from vlan1 [ 253.969033][T11458] device pim6reg1 entered promiscuous mode [ 255.070007][T11556] device veth1_macvtap left promiscuous mode [ 255.118553][T11556] device macsec0 entered promiscuous mode [ 255.203469][T11575] device veth0_vlan left promiscuous mode [ 255.209621][T11575] device veth0_vlan entered promiscuous mode [ 255.216994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.229588][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 255.245799][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.748343][T11600] device pim6reg1 entered promiscuous mode [ 256.238695][T11632] device veth1_macvtap left promiscuous mode [ 256.402326][T11632] device veth1_macvtap entered promiscuous mode [ 256.419758][T11632] device macsec0 entered promiscuous mode [ 257.405987][T11656] device wg2 entered promiscuous mode [ 263.348664][T11778] device sit0 entered promiscuous mode [ 263.766518][T11835] device pim6reg1 entered promiscuous mode [ 265.780787][T11964] device veth0_vlan left promiscuous mode [ 265.796410][T11964] device veth0_vlan entered promiscuous mode [ 265.813129][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.821775][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.829967][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 266.638728][T12020] syz.1.3335[12020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.638794][T12020] syz.1.3335[12020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.783862][T12029] device pim6reg1 entered promiscuous mode [ 266.821476][T12031] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 266.858841][T12034] syz.2.3339[12034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.858888][T12034] syz.2.3339[12034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.117621][T12072] device syzkaller0 entered promiscuous mode [ 268.161317][T12069] device pim6reg1 entered promiscuous mode [ 269.877140][T12159] device sit0 entered promiscuous mode [ 270.689975][T12208] device pim6reg1 entered promiscuous mode [ 271.449794][T12255] device sit0 left promiscuous mode [ 271.493941][T12259] device sit0 entered promiscuous mode [ 271.652951][T12269] syz.4.3410[12269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.652991][T12269] syz.4.3410[12269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.665507][T12268] syz.4.3410[12268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.679704][T12268] syz.4.3410[12268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.801360][T12296] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 272.554477][T12307] device syzkaller0 entered promiscuous mode [ 274.407351][T12420] syz.2.3452[12420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.407417][T12420] syz.2.3452[12420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.826794][T12428] device syzkaller0 entered promiscuous mode [ 274.974454][T12426] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.983983][T12426] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.180312][T12451] device pim6reg1 entered promiscuous mode [ 276.379179][T12488] device pim6reg1 entered promiscuous mode [ 276.665411][T12507] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 278.244922][T12590] device pim6reg1 entered promiscuous mode [ 280.100786][T12681] device syzkaller0 entered promiscuous mode [ 283.076977][T12887] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.086488][T12887] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.153004][T12889] device syzkaller0 entered promiscuous mode [ 283.483940][ T24] audit: type=1400 audit(1758209659.200:178): avc: denied { create } for pid=12902 comm="syz.0.3588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 283.878261][T12914] ªªªªªª: renamed from vlan0 [ 284.520463][T12954] syz.2.3604[12954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.520559][T12954] syz.2.3604[12954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.550920][T12956] device wg2 left promiscuous mode [ 284.586421][T12962] device wg2 left promiscuous mode [ 284.598097][T12962] device wg2 entered promiscuous mode [ 284.896316][T12979] device veth0_vlan left promiscuous mode [ 284.918083][T12979] device veth0_vlan entered promiscuous mode [ 284.929304][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.956734][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 285.000279][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.108702][T12984] device syzkaller0 entered promiscuous mode [ 285.671357][T13046] device veth0_vlan left promiscuous mode [ 285.678722][T13046] device veth0_vlan entered promiscuous mode [ 285.686563][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.698239][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 285.706655][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.619283][T13151] device veth0_vlan left promiscuous mode [ 286.627082][T13151] device veth0_vlan entered promiscuous mode [ 286.635852][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.645642][T13149] syz.3.3660[13149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.645707][T13149] syz.3.3660[13149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.660199][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.708068][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 287.174362][T13180] device wg2 entered promiscuous mode [ 287.736697][T13233] Â: renamed from pim6reg1 [ 287.937330][ T95] udevd[95]: worker [11725] terminated by signal 33 (Unknown signal 33) [ 288.005116][ T95] udevd[95]: worker [11725] failed while handling '/devices/virtual/block/loop0' [ 288.080301][ T95] udevd[95]: worker [11726] terminated by signal 33 (Unknown signal 33) [ 288.164908][ T95] udevd[95]: worker [11726] failed while handling '/devices/virtual/block/loop1' [ 288.235609][ T95] udevd[95]: worker [11769] terminated by signal 33 (Unknown signal 33) [ 288.244187][ T95] udevd[95]: worker [11769] failed while handling '/devices/virtual/block/loop2' [ 288.337445][ T95] udevd[95]: worker [13269] terminated by signal 33 (Unknown signal 33) [ 288.388536][ T95] udevd[95]: worker [13269] failed while handling '/devices/virtual/block/loop4' [ 288.530160][ T95] udevd[95]: worker [13271] terminated by signal 33 (Unknown signal 33) [ 288.557308][ T95] udevd[95]: worker [13271] failed while handling '/devices/virtual/block/loop3' [ 288.846513][T13282] device veth0_vlan left promiscuous mode [ 288.875964][T13282] device veth0_vlan entered promiscuous mode [ 288.921777][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.945689][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 289.015595][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.881677][T13345] device pim6reg1 entered promiscuous mode [ 289.974204][T13357] device macsec0 left promiscuous mode [ 290.106590][T13389] device wg2 left promiscuous mode [ 290.148506][T13391] device syzkaller0 entered promiscuous mode [ 290.235593][T13383] device wg2 entered promiscuous mode [ 291.087887][T13427] device pim6reg1 entered promiscuous mode [ 291.905954][T13499] device sit0 left promiscuous mode [ 292.143788][T13518] device sit0 entered promiscuous mode [ 294.514851][T13531] device veth0_vlan left promiscuous mode [ 294.521497][T13531] device veth0_vlan entered promiscuous mode [ 294.676255][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.705714][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 294.754990][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.225563][T13535] device pim6reg1 entered promiscuous mode [ 296.629028][T13558] device sit0 entered promiscuous mode [ 297.012110][T13572] device veth0_vlan left promiscuous mode [ 297.026072][T13572] device veth0_vlan entered promiscuous mode [ 297.071490][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.083028][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.091720][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 297.745788][T13609] device syzkaller0 entered promiscuous mode [ 298.289720][T13659] device veth1_to_bond entered promiscuous mode [ 299.696277][T13744] device sit0 left promiscuous mode [ 299.760508][T13731] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.767809][T13731] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.775612][T13731] device bridge_slave_0 entered promiscuous mode [ 299.791404][T13744] device sit0 entered promiscuous mode [ 299.856748][T13731] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.864002][T13731] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.872004][T13731] device bridge_slave_1 entered promiscuous mode [ 299.959947][T13731] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.967458][T13731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.975221][T13731] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.982457][T13731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.051229][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.064296][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.075310][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.100047][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.115213][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.135225][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.142293][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.150255][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.159075][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.167537][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.174579][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.187486][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.195982][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.222713][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 300.240025][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.297627][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 300.325542][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.366601][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 300.374627][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.386035][T13731] device veth0_vlan entered promiscuous mode [ 300.400418][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.416129][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.458495][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 300.475643][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.487650][T13731] device veth1_macvtap entered promiscuous mode [ 300.519707][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.537592][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.551896][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.583463][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.598285][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.616328][T13794] device veth1_macvtap left promiscuous mode [ 300.659746][T13802] device pim6reg1 entered promiscuous mode [ 300.675992][T13794] device veth1_macvtap entered promiscuous mode [ 300.682877][T13794] device macsec0 entered promiscuous mode [ 300.698831][ T48] device veth0_to_team left promiscuous mode [ 300.715422][ T48] Ÿë: port 1(veth0_to_team) entered disabled state [ 303.373985][T13875] device syzkaller0 entered promiscuous mode [ 303.457082][T13894] device pim6reg1 entered promiscuous mode [ 305.032971][T13998] syz.4.3898[13998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.033041][T13998] syz.4.3898[13998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.091962][T14007] syz.0.3901[14007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.098317][T14008] syz.0.3901[14008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.104106][T14007] syz.0.3901[14007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.127727][T14008] syz.0.3901[14008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.828704][T14030] device pim6reg1 entered promiscuous mode [ 307.522158][T14114] IPv6: sit1: Disabled Multicast RS [ 307.633527][T14118] device wg2 entered promiscuous mode [ 308.566550][T14169] device pim6reg1 entered promiscuous mode [ 309.307924][T14228] device syzkaller0 entered promiscuous mode [ 310.566560][T14361] device veth1_macvtap left promiscuous mode [ 310.573539][T14361] device macsec0 left promiscuous mode [ 310.652955][T14361] device veth1_macvtap entered promiscuous mode [ 310.675256][T14361] device macsec0 entered promiscuous mode [ 310.745903][T14370] device wg2 entered promiscuous mode [ 311.069013][T14412] device veth1_macvtap left promiscuous mode [ 311.101219][T14412] device macsec0 entered promiscuous mode [ 311.208866][T14426] device wg2 left promiscuous mode [ 312.213967][T14486] device wg2 left promiscuous mode [ 312.628215][T14486] device syzkaller0 entered promiscuous mode [ 312.760475][T14494] device pim6reg1 entered promiscuous mode [ 312.936463][T14515] syz.1.4048[14515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.936539][T14515] syz.1.4048[14515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.231009][T14526] syz.0.4051[14526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.262312][T14515] device veth0_vlan left promiscuous mode [ 313.285076][T14526] syz.0.4051[14526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.321663][T14515] device veth0_vlan entered promiscuous mode [ 313.486942][T14539] device wg2 entered promiscuous mode [ 314.265284][T14568] syz.2.4064[14568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.265467][T14568] syz.2.4064[14568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.931899][T14602] device wg2 entered promiscuous mode [ 315.195871][T14630] device pim6reg1 entered promiscuous mode [ 315.438779][T14646] device syzkaller0 entered promiscuous mode [ 315.728550][T14642] device syzkaller0 entered promiscuous mode [ 316.190447][T14696] device pim6reg1 entered promiscuous mode [ 317.208998][T14764] device veth0_vlan left promiscuous mode [ 317.250005][T14764] device veth0_vlan entered promiscuous mode [ 317.260991][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.274364][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.282822][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.417709][T14922] device veth1_macvtap entered promiscuous mode [ 321.431250][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 321.631573][T14929] device veth0_vlan left promiscuous mode [ 321.645686][T14929] device veth0_vlan entered promiscuous mode [ 322.557276][T14991] device pim6reg1 entered promiscuous mode [ 323.594504][T15055] syz.4.4198[15055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.594568][T15055] syz.4.4198[15055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.728397][T15068] device sit0 entered promiscuous mode [ 324.109004][T15087] device sit0 left promiscuous mode [ 324.266177][T15097] device sit0 entered promiscuous mode [ 325.144867][T15144] device wg2 entered promiscuous mode [ 325.489954][T15159] device pim6reg1 entered promiscuous mode [ 326.082896][T15196] device syzkaller0 entered promiscuous mode [ 326.113190][T15201] device pim6reg1 entered promiscuous mode [ 327.893341][T15299] device syzkaller0 entered promiscuous mode [ 327.981958][T15297] ÿÿÿÿÿÿ: renamed from vlan1 [ 328.276014][T15316] tun0: tun_chr_ioctl cmd 1074025678 [ 328.281500][T15316] tun0: group set to 1 [ 328.355294][T15324] bridge0: port 3(gretap0) entered blocking state [ 328.362190][T15324] bridge0: port 3(gretap0) entered disabled state [ 328.421934][T15324] device gretap0 entered promiscuous mode [ 328.448804][T15324] bridge0: port 3(gretap0) entered blocking state [ 328.455901][T15324] bridge0: port 3(gretap0) entered forwarding state [ 329.813536][T15432] device veth0_vlan left promiscuous mode [ 329.871954][T15432] device veth0_vlan entered promiscuous mode [ 330.961832][T15506] syz.2.4327[15506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.961897][T15506] syz.2.4327[15506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.262136][T15516] device veth0_vlan left promiscuous mode [ 331.339895][T15516] device veth0_vlan entered promiscuous mode [ 331.952136][T15569] syz.4.4346[15569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.952195][T15569] syz.4.4346[15569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.291736][T15654] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.310651][T15654] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.319978][T15654] device bridge_slave_0 entered promiscuous mode [ 333.327755][T15654] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.337246][T15654] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.345948][T15654] device bridge_slave_1 entered promiscuous mode [ 333.784450][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.793662][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.816792][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.826932][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.843099][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.850231][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.859343][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.868826][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.877414][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.884491][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.905282][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.917467][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.936055][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.015024][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 334.059849][T15654] device veth0_vlan entered promiscuous mode [ 334.091646][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.110584][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.123350][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.171541][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.194248][T15654] device veth1_macvtap entered promiscuous mode [ 334.211161][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.234100][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.660826][T15742] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.668145][T15742] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.995213][ T48] device bridge_slave_1 left promiscuous mode [ 335.006083][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.064875][ T48] device bridge_slave_0 left promiscuous mode [ 335.084121][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.652531][T15814] device syzkaller0 entered promiscuous mode [ 339.347957][T15858] device sit0 left promiscuous mode [ 339.835054][T15891] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.842280][T15891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.849632][T15891] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.856686][T15891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.965063][T15891] device bridge0 entered promiscuous mode [ 340.579214][T15922] device wg2 left promiscuous mode [ 340.642251][T15922] device wg2 entered promiscuous mode [ 340.662323][T15922] device veth0_vlan left promiscuous mode [ 340.688755][T15922] device veth0_vlan entered promiscuous mode [ 340.756265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.779328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.807368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.825411][T15917] syz.2.4447[15917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.832569][T15917] syz.2.4447[15917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.841716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 340.903184][T15925] device veth1_macvtap left promiscuous mode [ 340.914848][T15925] device macsec0 left promiscuous mode [ 340.979847][T15929] device veth1_macvtap entered promiscuous mode [ 340.996627][T15929] device macsec0 entered promiscuous mode [ 341.065845][T15948] device syzkaller0 entered promiscuous mode [ 341.196432][T15957] syz.1.4457[15957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.196530][T15957] syz.1.4457[15957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.208486][T15959] device wg2 left promiscuous mode [ 341.382749][T15959] device wg2 entered promiscuous mode [ 343.135118][T16039] device pim6reg1 entered promiscuous mode [ 343.929858][T16062] device pim6reg1 entered promiscuous mode [ 344.768346][T16071] device sit0 entered promiscuous mode [ 346.569876][T16118] device syzkaller0 entered promiscuous mode [ 346.899023][T16121] device veth1_macvtap left promiscuous mode [ 346.945766][T16121] device macsec0 left promiscuous mode [ 348.005909][T16160] device syzkaller0 entered promiscuous mode [ 348.177595][T16195] device wg2 left promiscuous mode [ 348.231737][T16197] device syzkaller0 entered promiscuous mode [ 348.539529][T16225] device pim6reg1 entered promiscuous mode [ 348.854726][T16220] device syzkaller0 entered promiscuous mode [ 350.397024][T16323] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.404189][T16323] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.642773][T16323] device bridge0 left promiscuous mode [ 350.874199][T16339] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.881319][T16339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.888666][T16339] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.896250][T16339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.018880][T16339] device bridge0 entered promiscuous mode [ 351.407302][T16367] device sit0 entered promiscuous mode [ 352.464276][T16441] device pim6reg1 entered promiscuous mode [ 353.019179][T16479] device pim6reg1 entered promiscuous mode [ 353.114746][T16471] device wg2 entered promiscuous mode [ 353.385821][T16530] device pim6reg1 entered promiscuous mode [ 354.277972][T16559] device pim6reg1 entered promiscuous mode [ 356.216111][T16645] device sit0 left promiscuous mode [ 356.400225][T16662] device veth1_macvtap left promiscuous mode [ 357.123520][T16701] syz.1.4670[16701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.123585][T16701] syz.1.4670[16701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.567780][T16730] device sit0 left promiscuous mode [ 357.734908][T16733] device sit0 entered promiscuous mode [ 357.900479][T16743] device syzkaller0 entered promiscuous mode [ 358.098483][T16747] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.105752][T16747] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.116047][T16753] device bridge_slave_1 left promiscuous mode [ 358.154876][T16753] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.163719][T16753] device bridge_slave_0 left promiscuous mode [ 358.171391][T16753] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.562862][T16788] device sit0 left promiscuous mode [ 360.972777][T16869] device wg2 left promiscuous mode [ 361.044271][T16869] device wg2 entered promiscuous mode [ 362.728758][T16963] device syzkaller0 entered promiscuous mode [ 364.116699][T17066] device bridge0 entered promiscuous mode [ 365.143891][T17100] device syzkaller0 entered promiscuous mode [ 365.154913][T17092] device pim6reg1 entered promiscuous mode [ 365.712134][T17104] device syzkaller0 entered promiscuous mode [ 366.538793][T17172] syz.1.4799[17172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.538880][T17172] syz.1.4799[17172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.116478][T17196] device sit0 entered promiscuous mode [ 367.499737][T17223] device wg2 left promiscuous mode [ 369.022909][T17271] device syzkaller0 entered promiscuous mode [ 369.678931][T17314] device sit0 left promiscuous mode [ 369.855052][T17318] device sit0 entered promiscuous mode [ 370.164119][T17346] device wg2 left promiscuous mode [ 371.491079][T17395] device syzkaller0 entered promiscuous mode [ 371.609005][T17409] device syzkaller0 entered promiscuous mode [ 372.090595][T17439] device pim6reg1 entered promiscuous mode [ 372.276979][T17437] device syzkaller0 entered promiscuous mode [ 373.631697][T17518] device pim6reg1 entered promiscuous mode [ 375.312087][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 375.451192][T17623] device pim6reg1 entered promiscuous mode [ 376.043596][T17650] device syzkaller0 entered promiscuous mode [ 376.110480][T17646] device pim6reg1 entered promiscuous mode [ 376.661838][T17662] GPL: port 1(erspan0) entered blocking state [ 376.670460][T17662] GPL: port 1(erspan0) entered disabled state [ 376.697380][T17662] device erspan0 entered promiscuous mode [ 376.764233][T17674] GPL: port 1(erspan0) entered blocking state [ 376.770417][T17674] GPL: port 1(erspan0) entered forwarding state [ 378.559060][T17816] device veth1_macvtap left promiscuous mode [ 379.117390][T17852] device pim6reg1 entered promiscuous mode [ 379.756813][T17865] device syzkaller0 entered promiscuous mode [ 382.463130][T17903] device syzkaller0 entered promiscuous mode [ 383.109484][T17933] device pim6reg1 entered promiscuous mode [ 384.892794][T18035] device pim6reg1 entered promiscuous mode [ 385.586511][T18064] device veth0_vlan left promiscuous mode [ 385.695526][T18064] device veth0_vlan entered promiscuous mode [ 386.759046][T18136] ÿÿÿÿÿÿ: renamed from vlan1 [ 388.193724][T18211] device pim6reg1 entered promiscuous mode [ 389.173837][T18249] device wg2 left promiscuous mode [ 389.612107][T18280] device syzkaller0 entered promiscuous mode [ 390.804178][T18346] syz.2.5143[18346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.806041][T18346] syz.2.5143[18346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.123498][T18379] device sit0 left promiscuous mode [ 391.210900][T18373] device sit0 entered promiscuous mode [ 391.345307][T18406] device pim6reg1 entered promiscuous mode [ 392.441960][T18452] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.449137][T18452] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.457960][T18452] device bridge0 left promiscuous mode [ 392.465784][T18455] device veth0_vlan left promiscuous mode [ 392.567048][T18455] device veth0_vlan entered promiscuous mode [ 392.631626][T18465] syz.5.5178[18465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.631722][T18465] syz.5.5178[18465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.742776][T18459] device bridge_slave_1 left promiscuous mode [ 392.764590][T18459] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.794621][T18459] device bridge_slave_0 left promiscuous mode [ 392.802403][T18459] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.847646][T18549] device sit0 left promiscuous mode [ 393.947193][T18549] device sit0 entered promiscuous mode [ 395.213800][T18630] device pim6reg1 entered promiscuous mode [ 396.050505][T18685] IPv6: ADDRCONF(NETDEV_CHANGE): ip6tnl0: link becomes ready [ 398.056612][T18773] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 398.062457][T18773] syzkaller0: linktype set to 778 [ 398.490157][T18804] device macsec0 left promiscuous mode [ 398.511577][T18796] device veth1_macvtap entered promiscuous mode [ 398.520495][T18796] device macsec0 entered promiscuous mode [ 398.563293][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 399.117067][T18838] device wg2 entered promiscuous mode [ 400.818863][T18911] device sit0 left promiscuous mode [ 401.729887][T18953] device wg2 entered promiscuous mode [ 401.791871][T18957] device wg2 left promiscuous mode [ 403.847986][T18825] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 403.861520][T18825] CPU: 0 PID: 18825 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 403.870398][T18825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 403.880557][T18825] Call Trace: [ 403.883870][T18825] __dump_stack+0x21/0x24 [ 403.888653][T18825] dump_stack_lvl+0x169/0x1d8 [ 403.893445][T18825] ? show_regs_print_info+0x18/0x18 [ 403.898658][T18825] ? ___ratelimit+0x3d1/0x560 [ 403.903351][T18825] ? __kasan_check_write+0x14/0x20 [ 403.908467][T18825] ? _raw_spin_lock+0x8e/0xe0 [ 403.913172][T18825] dump_stack+0x15/0x1c [ 403.917352][T18825] dump_header+0xdd/0x650 [ 403.921701][T18825] oom_kill_process+0x1fa/0x2c0 [ 403.926567][T18825] out_of_memory+0x94a/0xd70 [ 403.931256][T18825] ? unregister_oom_notifier+0x20/0x20 [ 403.936736][T18825] ? mutex_lock_killable+0x8c/0xe0 [ 403.941857][T18825] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 403.948381][T18825] mem_cgroup_out_of_memory+0x260/0x310 [ 403.954041][T18825] ? mem_cgroup_oom_trylock+0x350/0x350 [ 403.959602][T18825] ? _raw_spin_lock+0x8e/0xe0 [ 403.964298][T18825] ? _raw_spin_trylock_bh+0x130/0x130 [ 403.969782][T18825] ? _raw_spin_unlock+0x4d/0x70 [ 403.974730][T18825] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 403.980289][T18825] ? _raw_spin_unlock_irq+0x4e/0x70 [ 403.985498][T18825] try_charge+0xf61/0x14e0 [ 403.989953][T18825] ? __memcg_kmem_charge+0x140/0x140 [ 403.995260][T18825] ? percpu_counter_add_batch+0x13c/0x160 [ 404.001001][T18825] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 404.006562][T18825] __mem_cgroup_charge+0x14c/0x6d0 [ 404.011686][T18825] shmem_add_to_page_cache+0x55e/0xe10 [ 404.017158][T18825] ? shmem_alloc_page+0x300/0x300 [ 404.022196][T18825] ? _raw_spin_lock_irqsave+0x110/0x110 [ 404.027756][T18825] ? find_lock_entry+0x4b/0x200 [ 404.032610][T18825] ? lru_cache_add+0x164/0x380 [ 404.037616][T18825] ? shmem_getpage_gfp+0x8f3/0x2110 [ 404.042824][T18825] shmem_getpage_gfp+0x8e8/0x2110 [ 404.047867][T18825] shmem_write_begin+0xce/0x1b0 [ 404.053017][T18825] generic_perform_write+0x2be/0x510 [ 404.058301][T18825] ? atime_needs_update+0x5b0/0x5b0 [ 404.063502][T18825] ? grab_cache_page_write_begin+0xb0/0xb0 [ 404.069315][T18825] ? file_remove_privs+0x580/0x580 [ 404.074428][T18825] ? __kasan_check_write+0x14/0x20 [ 404.079809][T18825] ? down_write+0xac/0x110 [ 404.084233][T18825] __generic_file_write_iter+0x24b/0x480 [ 404.089881][T18825] ? generic_write_checks+0x3d4/0x480 [ 404.095258][T18825] generic_file_write_iter+0xa9/0x1d0 [ 404.100730][T18825] __kernel_write+0x55a/0x910 [ 404.105431][T18825] ? vfs_read+0xa10/0xa10 [ 404.109783][T18825] ? populate_vma_page_range+0xf0/0xf0 [ 404.115251][T18825] ? cgroup_freezing+0x86/0xb0 [ 404.120020][T18825] ? freezing_slow_path+0x10a/0x150 [ 404.125224][T18825] dump_emit+0x240/0x360 [ 404.129593][T18825] ? wait_for_dump_helpers+0x390/0x390 [ 404.135068][T18825] dump_user_range+0x6a/0x1a0 [ 404.139757][T18825] elf_core_dump+0x278a/0x2bc0 [ 404.144544][T18825] ? load_elf_binary+0x2890/0x2890 [ 404.149668][T18825] ? kvmalloc_node+0x88/0x130 [ 404.154446][T18825] ? _raw_spin_unlock+0x4d/0x70 [ 404.159302][T18825] ? cgroup_freezing+0x86/0xb0 [ 404.164077][T18825] ? freezing_slow_path+0x10a/0x150 [ 404.169682][T18825] do_coredump+0x1ac9/0x27f0 [ 404.174471][T18825] ? simple_acl_create+0x1c0/0x1c0 [ 404.179592][T18825] ? debug_smp_processor_id+0x17/0x20 [ 404.184961][T18825] ? kmem_cache_free+0x100/0x2d0 [ 404.189889][T18825] ? ____kasan_slab_free+0x130/0x160 [ 404.195168][T18825] ? get_signal+0xb98/0x12e0 [ 404.199767][T18825] ? kmem_cache_free+0x100/0x2d0 [ 404.204702][T18825] get_signal+0xf23/0x12e0 [ 404.209120][T18825] arch_do_signal_or_restart+0xbf/0x10f0 [ 404.214773][T18825] ? __send_signal+0x8b8/0xb80 [ 404.219536][T18825] ? send_signal+0x479/0x5b0 [ 404.224128][T18825] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 404.229816][T18825] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 404.235805][T18825] ? force_sig+0xb5/0x100 [ 404.240128][T18825] ? send_sig+0x70/0x70 [ 404.244461][T18825] exit_to_user_mode_loop+0xa2/0xe0 [ 404.249653][T18825] exit_to_user_mode_prepare+0x76/0xa0 [ 404.255104][T18825] irqentry_exit_to_user_mode+0x9/0x10 [ 404.260566][T18825] irqentry_exit+0x12/0x60 [ 404.264987][T18825] exc_general_protection+0x1ca/0x250 [ 404.270379][T18825] ? debug_smp_processor_id+0x17/0x20 [ 404.275756][T18825] ? asm_exc_general_protection+0x8/0x30 [ 404.281384][T18825] asm_exc_general_protection+0x1e/0x30 [ 404.286938][T18825] RIP: 0033:0x7f9b64279bb1 [ 404.291362][T18825] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 404.311184][T18825] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 404.317499][T18825] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 404.325696][T18825] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 404.333696][T18825] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 404.341666][T18825] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 404.349631][T18825] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 404.377113][T18957] device wg2 entered promiscuous mode [ 404.520854][T18825] memory: usage 307180kB, limit 307200kB, failcnt 10548 [ 404.545262][T18975] device syzkaller0 entered promiscuous mode [ 404.574821][T18825] memory+swap: usage 419444kB, limit 9007199254740988kB, failcnt 0 [ 404.618160][T18825] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 404.625433][T18825] Memory cgroup stats for /syz4: [ 404.625579][T18825] anon 135168 [ 404.625579][T18825] file 301154304 [ 404.625579][T18825] kernel_stack 0 [ 404.625579][T18825] percpu 0 [ 404.625579][T18825] sock 0 [ 404.625579][T18825] shmem 301019136 [ 404.625579][T18825] file_mapped 135168 [ 404.625579][T18825] file_dirty 135168 [ 404.625579][T18825] file_writeback 0 [ 404.625579][T18825] anon_thp 0 [ 404.625579][T18825] inactive_anon 313643008 [ 404.625579][T18825] active_anon 675840 [ 404.625579][T18825] inactive_file 40960 [ 404.625579][T18825] active_file 135168 [ 404.625579][T18825] unevictable 0 [ 404.625579][T18825] slab_reclaimable 0 [ 404.625579][T18825] slab_unreclaimable 0 [ 404.625579][T18825] slab 0 [ 404.625579][T18825] workingset_refault_anon 0 [ 404.625579][T18825] workingset_refault_file 132 [ 404.625579][T18825] workingset_activate_anon 0 [ 404.625579][T18825] workingset_activate_file 33 [ 404.625579][T18825] workingset_restore_anon 0 [ 404.625579][T18825] workingset_restore_file 0 [ 404.727121][T18825] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18821,uid=0 [ 404.742185][T18825] Memory cgroup out of memory: Killed process 18821 (syz.4.5284) total-vm:90040kB, anon-rss:1088kB, file-rss:49920kB, shmem-rss:0kB, UID:0 pgtables:168kB oom_score_adj:1000 [ 405.041628][T18996] sock: sock_set_timeout: `syz.2.5327' (pid 18996) tries to set negative timeout [ 406.011258][T19035] device veth1_macvtap left promiscuous mode [ 406.256720][T18833] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 406.524785][T18833] CPU: 0 PID: 18833 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 406.533676][T18833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 406.543739][T18833] Call Trace: [ 406.547064][T18833] __dump_stack+0x21/0x24 [ 406.551404][T18833] dump_stack_lvl+0x169/0x1d8 [ 406.556100][T18833] ? show_regs_print_info+0x18/0x18 [ 406.561304][T18833] ? ___ratelimit+0x3d1/0x560 [ 406.566149][T18833] ? __kasan_check_write+0x14/0x20 [ 406.571247][T18833] ? _raw_spin_lock+0x8e/0xe0 [ 406.575914][T18833] dump_stack+0x15/0x1c [ 406.580069][T18833] dump_header+0xdd/0x650 [ 406.584385][T18833] oom_kill_process+0x1fa/0x2c0 [ 406.589223][T18833] out_of_memory+0x94a/0xd70 [ 406.593957][T18833] ? unregister_oom_notifier+0x20/0x20 [ 406.599422][T18833] ? mutex_lock_killable+0x8c/0xe0 [ 406.604548][T18833] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 406.611050][T18833] mem_cgroup_out_of_memory+0x260/0x310 [ 406.616592][T18833] ? mem_cgroup_oom_trylock+0x350/0x350 [ 406.622144][T18833] ? _raw_spin_lock+0x8e/0xe0 [ 406.626951][T18833] ? _raw_spin_trylock_bh+0x130/0x130 [ 406.632315][T18833] ? _raw_spin_unlock+0x4d/0x70 [ 406.637189][T18833] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 406.642757][T18833] ? _raw_spin_unlock_irq+0x4e/0x70 [ 406.647961][T18833] try_charge+0xf61/0x14e0 [ 406.652380][T18833] ? __memcg_kmem_charge+0x140/0x140 [ 406.657791][T18833] ? percpu_counter_add_batch+0x13c/0x160 [ 406.663513][T18833] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 406.669055][T18833] __mem_cgroup_charge+0x14c/0x6d0 [ 406.674164][T18833] shmem_add_to_page_cache+0x55e/0xe10 [ 406.679619][T18833] ? shmem_alloc_page+0x300/0x300 [ 406.684636][T18833] ? _raw_spin_lock_irqsave+0x110/0x110 [ 406.690195][T18833] ? find_lock_entry+0x4b/0x200 [ 406.695042][T18833] ? lru_cache_add+0x164/0x380 [ 406.699802][T18833] ? shmem_getpage_gfp+0x8f3/0x2110 [ 406.704996][T18833] shmem_getpage_gfp+0x8e8/0x2110 [ 406.710048][T18833] shmem_write_begin+0xce/0x1b0 [ 406.715025][T18833] generic_perform_write+0x2be/0x510 [ 406.720329][T18833] ? atime_needs_update+0x5b0/0x5b0 [ 406.725641][T18833] ? grab_cache_page_write_begin+0xb0/0xb0 [ 406.731463][T18833] ? file_remove_privs+0x580/0x580 [ 406.736699][T18833] ? __kasan_check_write+0x14/0x20 [ 406.741832][T18833] ? down_write+0xac/0x110 [ 406.746369][T18833] __generic_file_write_iter+0x24b/0x480 [ 406.752059][T18833] ? generic_write_checks+0x3d4/0x480 [ 406.757459][T18833] generic_file_write_iter+0xa9/0x1d0 [ 406.762854][T18833] __kernel_write+0x55a/0x910 [ 406.767557][T18833] ? vfs_read+0xa10/0xa10 [ 406.771909][T18833] ? populate_vma_page_range+0xf0/0xf0 [ 406.777390][T18833] ? cgroup_freezing+0x86/0xb0 [ 406.782192][T18833] ? freezing_slow_path+0x10a/0x150 [ 406.787433][T18833] dump_emit+0x240/0x360 [ 406.791715][T18833] ? wait_for_dump_helpers+0x390/0x390 [ 406.797179][T18833] ? freezing_slow_path+0x10a/0x150 [ 406.802378][T18833] dump_user_range+0x6a/0x1a0 [ 406.807053][T18833] elf_core_dump+0x278a/0x2bc0 [ 406.811819][T18833] ? load_elf_binary+0x2890/0x2890 [ 406.817368][T18833] ? kvmalloc_node+0x88/0x130 [ 406.822051][T18833] ? _raw_spin_unlock+0x4d/0x70 [ 406.826897][T18833] ? cgroup_freezing+0x86/0xb0 [ 406.831657][T18833] ? freezing_slow_path+0x10a/0x150 [ 406.836868][T18833] do_coredump+0x1ac9/0x27f0 [ 406.841617][T18833] ? simple_acl_create+0x1c0/0x1c0 [ 406.846743][T18833] ? debug_smp_processor_id+0x17/0x20 [ 406.852126][T18833] ? kmem_cache_free+0x100/0x2d0 [ 406.857062][T18833] ? ____kasan_slab_free+0x130/0x160 [ 406.862356][T18833] ? get_signal+0xb98/0x12e0 [ 406.866940][T18833] ? kmem_cache_free+0x100/0x2d0 [ 406.871877][T18833] get_signal+0xf23/0x12e0 [ 406.876314][T18833] arch_do_signal_or_restart+0xbf/0x10f0 [ 406.881962][T18833] ? __send_signal+0x8b8/0xb80 [ 406.886718][T18833] ? send_signal+0x479/0x5b0 [ 406.891311][T18833] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 406.897027][T18833] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 406.902832][T18833] ? force_sig+0xb5/0x100 [ 406.907242][T18833] ? send_sig+0x70/0x70 [ 406.911439][T18833] exit_to_user_mode_loop+0xa2/0xe0 [ 406.916642][T18833] exit_to_user_mode_prepare+0x76/0xa0 [ 406.922197][T18833] irqentry_exit_to_user_mode+0x9/0x10 [ 406.927647][T18833] irqentry_exit+0x12/0x60 [ 406.932057][T18833] exc_general_protection+0x1ca/0x250 [ 406.937428][T18833] ? debug_smp_processor_id+0x17/0x20 [ 406.942796][T18833] ? asm_exc_general_protection+0x8/0x30 [ 406.948421][T18833] asm_exc_general_protection+0x1e/0x30 [ 406.953956][T18833] RIP: 0033:0x7f9b64279bb1 [ 406.958365][T18833] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 406.978140][T18833] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 406.984207][T18833] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 406.992180][T18833] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 407.000239][T18833] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 407.008223][T18833] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 407.016203][T18833] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 407.037469][T18833] memory: usage 307200kB, limit 307200kB, failcnt 13886 [ 407.044577][T18833] memory+swap: usage 430776kB, limit 9007199254740988kB, failcnt 0 [ 407.059403][T18833] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.072484][T18833] Memory cgroup stats for /syz4: [ 407.072619][T18833] anon 270336 [ 407.072619][T18833] file 312778752 [ 407.072619][T18833] kernel_stack 0 [ 407.072619][T18833] percpu 0 [ 407.072619][T18833] sock 0 [ 407.072619][T18833] shmem 312643584 [ 407.072619][T18833] file_mapped 135168 [ 407.072619][T18833] file_dirty 135168 [ 407.072619][T18833] file_writeback 0 [ 407.072619][T18833] anon_thp 0 [ 407.072619][T18833] inactive_anon 313462784 [ 407.072619][T18833] active_anon 946176 [ 407.072619][T18833] inactive_file 0 [ 407.072619][T18833] active_file 36864 [ 407.072619][T18833] unevictable 0 [ 407.072619][T18833] slab_reclaimable 0 [ 407.072619][T18833] slab_unreclaimable 0 [ 407.072619][T18833] slab 0 [ 407.072619][T18833] workingset_refault_anon 0 [ 407.072619][T18833] workingset_refault_file 1518 [ 407.072619][T18833] workingset_activate_anon 0 [ 407.072619][T18833] workingset_activate_file 924 [ 407.072619][T18833] workingset_restore_anon 0 [ 407.072619][T18833] workingset_restore_file 858 [ 407.168185][T18833] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18820,uid=0 [ 407.185553][T18833] Memory cgroup out of memory: Killed process 18820 (syz.4.5284) total-vm:90040kB, anon-rss:1088kB, file-rss:53352kB, shmem-rss:0kB, UID:0 pgtables:180kB oom_score_adj:1000 [ 407.203500][ T27] oom_reaper: reaped process 18820 (syz.4.5284), now anon-rss:0kB, file-rss:53376kB, shmem-rss:0kB [ 407.223047][T18833] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 407.233031][T19063] device macsec0 left promiscuous mode [ 407.260746][T19063] device sit0 entered promiscuous mode [ 407.293822][T18833] CPU: 0 PID: 18833 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 407.302713][T18833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 407.312780][T18833] Call Trace: [ 407.316197][T18833] __dump_stack+0x21/0x24 [ 407.320544][T18833] dump_stack_lvl+0x169/0x1d8 [ 407.325237][T18833] ? show_regs_print_info+0x18/0x18 [ 407.330456][T18833] ? ___ratelimit+0x3d1/0x560 [ 407.335148][T18833] ? __kasan_check_write+0x14/0x20 [ 407.340281][T18833] ? _raw_spin_lock+0x8e/0xe0 [ 407.344980][T18833] dump_stack+0x15/0x1c [ 407.349151][T18833] dump_header+0xdd/0x650 [ 407.353497][T18833] oom_kill_process+0x1fa/0x2c0 [ 407.358361][T18833] out_of_memory+0x94a/0xd70 [ 407.362962][T18833] ? unregister_oom_notifier+0x20/0x20 [ 407.368435][T18833] ? mutex_lock_killable+0xd3/0xe0 [ 407.373568][T18833] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 407.380104][T18833] mem_cgroup_out_of_memory+0x260/0x310 [ 407.385677][T18833] ? mem_cgroup_oom_trylock+0x350/0x350 [ 407.391237][T18833] ? _raw_spin_lock+0x8e/0xe0 [ 407.395939][T18833] ? _raw_spin_trylock_bh+0x130/0x130 [ 407.401327][T18833] ? _raw_spin_unlock+0x4d/0x70 [ 407.406203][T18833] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 407.411761][T18833] ? _raw_spin_unlock_irq+0x4e/0x70 [ 407.416981][T18833] try_charge+0xf61/0x14e0 [ 407.421626][T18833] ? __memcg_kmem_charge+0x140/0x140 [ 407.427029][T18833] ? percpu_counter_add_batch+0x13c/0x160 [ 407.432774][T18833] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 407.438345][T18833] __mem_cgroup_charge+0x14c/0x6d0 [ 407.443471][T18833] shmem_add_to_page_cache+0x55e/0xe10 [ 407.448949][T18833] ? shmem_alloc_page+0x300/0x300 [ 407.454022][T18833] ? _raw_spin_lock_irqsave+0x110/0x110 [ 407.459601][T18833] ? find_lock_entry+0x4b/0x200 [ 407.464466][T18833] ? lru_cache_add+0x164/0x380 [ 407.469327][T18833] ? shmem_getpage_gfp+0x8f3/0x2110 [ 407.474536][T18833] shmem_getpage_gfp+0x8e8/0x2110 [ 407.479587][T18833] shmem_write_begin+0xce/0x1b0 [ 407.484459][T18833] generic_perform_write+0x2be/0x510 [ 407.489761][T18833] ? atime_needs_update+0x5b0/0x5b0 [ 407.494983][T18833] ? grab_cache_page_write_begin+0xb0/0xb0 [ 407.500880][T18833] ? file_remove_privs+0x580/0x580 [ 407.506016][T18833] ? __kasan_check_write+0x14/0x20 [ 407.511148][T18833] ? down_write+0xac/0x110 [ 407.515603][T18833] __generic_file_write_iter+0x24b/0x480 [ 407.521269][T18833] ? generic_write_checks+0x3d4/0x480 [ 407.526663][T18833] generic_file_write_iter+0xa9/0x1d0 [ 407.532073][T18833] __kernel_write+0x55a/0x910 [ 407.536772][T18833] ? vfs_read+0xa10/0xa10 [ 407.541557][T18833] ? populate_vma_page_range+0xf0/0xf0 [ 407.547043][T18833] ? cgroup_freezing+0x86/0xb0 [ 407.551829][T18833] ? freezing_slow_path+0x10a/0x150 [ 407.557051][T18833] dump_emit+0x240/0x360 [ 407.561313][T18833] ? wait_for_dump_helpers+0x390/0x390 [ 407.566784][T18833] ? freezing_slow_path+0x10a/0x150 [ 407.571990][T18833] dump_user_range+0x6a/0x1a0 [ 407.576679][T18833] elf_core_dump+0x278a/0x2bc0 [ 407.581458][T18833] ? load_elf_binary+0x2890/0x2890 [ 407.586582][T18833] ? kvmalloc_node+0x88/0x130 [ 407.591282][T18833] ? _raw_spin_unlock+0x4d/0x70 [ 407.596240][T18833] ? cgroup_freezing+0x86/0xb0 [ 407.601107][T18833] ? freezing_slow_path+0x10a/0x150 [ 407.606316][T18833] do_coredump+0x1ac9/0x27f0 [ 407.610938][T18833] ? simple_acl_create+0x1c0/0x1c0 [ 407.616062][T18833] ? debug_smp_processor_id+0x17/0x20 [ 407.621441][T18833] ? kmem_cache_free+0x100/0x2d0 [ 407.626388][T18833] ? ____kasan_slab_free+0x130/0x160 [ 407.631681][T18833] ? get_signal+0xb98/0x12e0 [ 407.636297][T18833] ? kmem_cache_free+0x100/0x2d0 [ 407.641248][T18833] get_signal+0xf23/0x12e0 [ 407.645684][T18833] arch_do_signal_or_restart+0xbf/0x10f0 [ 407.651328][T18833] ? __send_signal+0x8b8/0xb80 [ 407.656124][T18833] ? send_signal+0x479/0x5b0 [ 407.660720][T18833] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 407.666367][T18833] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 407.672191][T18833] ? force_sig+0xb5/0x100 [ 407.676532][T18833] ? send_sig+0x70/0x70 [ 407.680793][T18833] exit_to_user_mode_loop+0xa2/0xe0 [ 407.686000][T18833] exit_to_user_mode_prepare+0x76/0xa0 [ 407.691474][T18833] irqentry_exit_to_user_mode+0x9/0x10 [ 407.696942][T18833] irqentry_exit+0x12/0x60 [ 407.701363][T18833] exc_general_protection+0x1ca/0x250 [ 407.706757][T18833] ? debug_smp_processor_id+0x17/0x20 [ 407.712141][T18833] ? asm_exc_general_protection+0x8/0x30 [ 407.717787][T18833] asm_exc_general_protection+0x1e/0x30 [ 407.723338][T18833] RIP: 0033:0x7f9b64279bb1 [ 407.727852][T18833] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 407.747464][T18833] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 407.753553][T18833] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 407.761538][T18833] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 407.769528][T18833] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 407.777607][T18833] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 407.785591][T18833] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 407.857909][T18833] memory: usage 307200kB, limit 307200kB, failcnt 14077 [ 407.907307][T18833] memory+swap: usage 431168kB, limit 9007199254740988kB, failcnt 0 [ 408.149128][T18833] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 408.247977][T18833] Memory cgroup stats for /syz4: [ 408.248134][T18833] anon 135168 [ 408.248134][T18833] file 310886400 [ 408.248134][T18833] kernel_stack 0 [ 408.248134][T18833] percpu 0 [ 408.248134][T18833] sock 0 [ 408.248134][T18833] shmem 310751232 [ 408.248134][T18833] file_mapped 135168 [ 408.248134][T18833] file_dirty 135168 [ 408.248134][T18833] file_writeback 0 [ 408.248134][T18833] anon_thp 0 [ 408.248134][T18833] inactive_anon 311119872 [ 408.248134][T18833] active_anon 946176 [ 408.248134][T18833] inactive_file 0 [ 408.248134][T18833] active_file 172032 [ 408.248134][T18833] unevictable 0 [ 408.248134][T18833] slab_reclaimable 0 [ 408.248134][T18833] slab_unreclaimable 0 [ 408.248134][T18833] slab 0 [ 408.248134][T18833] workingset_refault_anon 0 [ 408.248134][T18833] workingset_refault_file 1551 [ 408.248134][T18833] workingset_activate_anon 0 [ 408.248134][T18833] workingset_activate_file 957 [ 408.248134][T18833] workingset_restore_anon 0 [ 408.248134][T18833] workingset_restore_file 858 [ 408.588712][T18833] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18829,uid=0 [ 408.764759][T18833] Memory cgroup out of memory: Killed process 18829 (syz.4.5284) total-vm:90040kB, anon-rss:1088kB, file-rss:52864kB, shmem-rss:0kB, UID:0 pgtables:180kB oom_score_adj:1000 [ 408.914557][T19112] device veth0_vlan left promiscuous mode [ 409.001768][T19112] device veth0_vlan entered promiscuous mode [ 409.097080][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.115542][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.156893][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 409.225966][T19130] device pim6reg1 entered promiscuous mode [ 410.885688][T19175] device pim6reg1 entered promiscuous mode [ 411.353073][T18832] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 411.664935][T18832] CPU: 0 PID: 18832 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 411.673827][T18832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 411.684058][T18832] Call Trace: [ 411.687351][T18832] __dump_stack+0x21/0x24 [ 411.691677][T18832] dump_stack_lvl+0x169/0x1d8 [ 411.696349][T18832] ? show_regs_print_info+0x18/0x18 [ 411.701626][T18832] ? ___ratelimit+0x3d1/0x560 [ 411.706335][T18832] ? _raw_spin_lock+0x8e/0xe0 [ 411.711098][T18832] dump_stack+0x15/0x1c [ 411.715337][T18832] dump_header+0xdd/0x650 [ 411.719659][T18832] oom_kill_process+0x1fa/0x2c0 [ 411.724504][T18832] out_of_memory+0x94a/0xd70 [ 411.729179][T18832] ? unregister_oom_notifier+0x20/0x20 [ 411.734721][T18832] ? mutex_lock_killable+0x8c/0xe0 [ 411.739843][T18832] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 411.746342][T18832] mem_cgroup_out_of_memory+0x260/0x310 [ 411.751887][T18832] ? mem_cgroup_oom_trylock+0x350/0x350 [ 411.757427][T18832] ? _raw_spin_lock+0x8e/0xe0 [ 411.762123][T18832] ? _raw_spin_trylock_bh+0x130/0x130 [ 411.767489][T18832] ? _raw_spin_unlock+0x4d/0x70 [ 411.772441][T18832] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 411.777978][T18832] ? _raw_spin_unlock_irq+0x4e/0x70 [ 411.783182][T18832] try_charge+0xf61/0x14e0 [ 411.787601][T18832] ? __memcg_kmem_charge+0x140/0x140 [ 411.792971][T18832] ? percpu_counter_add_batch+0x13c/0x160 [ 411.798708][T18832] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 411.804248][T18832] __mem_cgroup_charge+0x14c/0x6d0 [ 411.809362][T18832] shmem_add_to_page_cache+0x55e/0xe10 [ 411.814930][T18832] ? shmem_alloc_page+0x300/0x300 [ 411.819964][T18832] ? _raw_spin_lock_irqsave+0x110/0x110 [ 411.825506][T18832] ? find_lock_entry+0x4b/0x200 [ 411.830353][T18832] ? lru_cache_add+0x164/0x380 [ 411.835211][T18832] ? shmem_getpage_gfp+0x8f3/0x2110 [ 411.840399][T18832] shmem_getpage_gfp+0x8e8/0x2110 [ 411.845430][T18832] shmem_write_begin+0xce/0x1b0 [ 411.850277][T18832] generic_perform_write+0x2be/0x510 [ 411.855580][T18832] ? atime_needs_update+0x5b0/0x5b0 [ 411.860810][T18832] ? grab_cache_page_write_begin+0xb0/0xb0 [ 411.866698][T18832] ? file_remove_privs+0x580/0x580 [ 411.871888][T18832] ? __kasan_check_write+0x14/0x20 [ 411.876994][T18832] ? down_write+0xac/0x110 [ 411.881406][T18832] __generic_file_write_iter+0x24b/0x480 [ 411.887030][T18832] ? generic_write_checks+0x3d4/0x480 [ 411.892397][T18832] generic_file_write_iter+0xa9/0x1d0 [ 411.897771][T18832] __kernel_write+0x55a/0x910 [ 411.902446][T18832] ? vfs_read+0xa10/0xa10 [ 411.906774][T18832] ? populate_vma_page_range+0xf0/0xf0 [ 411.912246][T18832] ? cgroup_freezing+0x86/0xb0 [ 411.917000][T18832] ? freezing_slow_path+0x10a/0x150 [ 411.922217][T18832] dump_emit+0x240/0x360 [ 411.926455][T18832] ? wait_for_dump_helpers+0x390/0x390 [ 411.931911][T18832] dump_user_range+0x6a/0x1a0 [ 411.936580][T18832] elf_core_dump+0x278a/0x2bc0 [ 411.941356][T18832] ? load_elf_binary+0x2890/0x2890 [ 411.946493][T18832] ? kvmalloc_node+0x88/0x130 [ 411.951194][T18832] ? _raw_spin_unlock+0x4d/0x70 [ 411.956061][T18832] ? cgroup_freezing+0x86/0xb0 [ 411.960830][T18832] ? freezing_slow_path+0x10a/0x150 [ 411.966031][T18832] do_coredump+0x1ac9/0x27f0 [ 411.970712][T18832] ? simple_acl_create+0x1c0/0x1c0 [ 411.975825][T18832] ? debug_smp_processor_id+0x17/0x20 [ 411.981198][T18832] ? kmem_cache_free+0x100/0x2d0 [ 411.986127][T18832] ? ____kasan_slab_free+0x130/0x160 [ 411.991430][T18832] ? get_signal+0xb98/0x12e0 [ 411.996013][T18832] ? kmem_cache_free+0x100/0x2d0 [ 412.000943][T18832] get_signal+0xf23/0x12e0 [ 412.005377][T18832] arch_do_signal_or_restart+0xbf/0x10f0 [ 412.011089][T18832] ? __send_signal+0x8b8/0xb80 [ 412.015974][T18832] ? send_signal+0x479/0x5b0 [ 412.020572][T18832] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 412.026204][T18832] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 412.032011][T18832] ? force_sig+0xb5/0x100 [ 412.036335][T18832] ? send_sig+0x70/0x70 [ 412.040506][T18832] exit_to_user_mode_loop+0xa2/0xe0 [ 412.045698][T18832] exit_to_user_mode_prepare+0x76/0xa0 [ 412.051157][T18832] irqentry_exit_to_user_mode+0x9/0x10 [ 412.056609][T18832] irqentry_exit+0x12/0x60 [ 412.061020][T18832] exc_general_protection+0x1ca/0x250 [ 412.066388][T18832] ? debug_smp_processor_id+0x17/0x20 [ 412.071768][T18832] ? asm_exc_general_protection+0x8/0x30 [ 412.077394][T18832] asm_exc_general_protection+0x1e/0x30 [ 412.082931][T18832] RIP: 0033:0x7f9b64279bb1 [ 412.087340][T18832] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 412.107034][T18832] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 412.113099][T18832] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 412.121062][T18832] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 412.129024][T18832] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 412.136991][T18832] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 412.145220][T18832] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 412.207606][T18832] memory: usage 307200kB, limit 307200kB, failcnt 15982 [ 412.218286][T18832] memory+swap: usage 428520kB, limit 9007199254740988kB, failcnt 0 [ 412.264813][T18832] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 412.401974][T19222] device veth0_vlan left promiscuous mode [ 412.410394][T18832] Memory cgroup stats for /syz4: [ 412.410536][T18832] anon 270336 [ 412.410536][T18832] file 310480896 [ 412.410536][T18832] kernel_stack 0 [ 412.410536][T18832] percpu 0 [ 412.410536][T18832] sock 0 [ 412.410536][T18832] shmem 310616064 [ 412.410536][T18832] file_mapped 135168 [ 412.410536][T18832] file_dirty 135168 [ 412.410536][T18832] file_writeback 0 [ 412.410536][T18832] anon_thp 0 [ 412.410536][T18832] inactive_anon 278466560 [ 412.410536][T18832] active_anon 35954688 [ 412.410536][T18832] inactive_file 53248 [ 412.410536][T18832] active_file 98304 [ 412.410536][T18832] unevictable 0 [ 412.410536][T18832] slab_reclaimable 0 [ 412.410536][T18832] slab_unreclaimable 0 [ 412.410536][T18832] slab 0 [ 412.410536][T18832] workingset_refault_anon 0 [ 412.410536][T18832] workingset_refault_file 3135 [ 412.410536][T18832] workingset_activate_anon 0 [ 412.410536][T18832] workingset_activate_file 2112 [ 412.410536][T18832] workingset_restore_anon 0 [ 412.410536][T18832] workingset_restore_file 1683 [ 412.425211][T19222] device veth0_vlan entered promiscuous mode [ 412.514837][T18832] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18833,uid=0 [ 412.550014][T18832] Memory cgroup out of memory: Killed process 18833 (syz.4.5284) total-vm:90040kB, anon-rss:1116kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 412.654796][T18824] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 412.733914][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.741772][T18824] CPU: 1 PID: 18824 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 412.742519][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.750728][T18824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 412.750732][T18824] Call Trace: [ 412.750755][T18824] __dump_stack+0x21/0x24 [ 412.750766][T18824] dump_stack_lvl+0x169/0x1d8 [ 412.750778][T18824] ? show_regs_print_info+0x18/0x18 [ 412.750791][T18824] ? ___ratelimit+0x3d1/0x560 [ 412.750804][T18824] ? __kasan_check_write+0x14/0x20 [ 412.750815][T18824] ? _raw_spin_lock+0x8e/0xe0 [ 412.750829][T18824] dump_stack+0x15/0x1c [ 412.750839][T18824] dump_header+0xdd/0x650 [ 412.750853][T18824] oom_kill_process+0x1fa/0x2c0 [ 412.750863][T18824] out_of_memory+0x94a/0xd70 [ 412.750882][T18824] ? unregister_oom_notifier+0x20/0x20 [ 412.759620][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.768236][T18824] ? mutex_lock_killable+0xd3/0xe0 [ 412.768251][T18824] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 412.768277][T18824] mem_cgroup_out_of_memory+0x260/0x310 [ 412.847921][T18824] ? mem_cgroup_oom_trylock+0x350/0x350 [ 412.853456][T18824] ? _raw_spin_lock+0x8e/0xe0 [ 412.858502][T18824] ? _raw_spin_trylock_bh+0x130/0x130 [ 412.863953][T18824] ? _raw_spin_unlock+0x4d/0x70 [ 412.868887][T18824] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 412.874468][T18824] ? _raw_spin_unlock_irq+0x4e/0x70 [ 412.879662][T18824] try_charge+0xf61/0x14e0 [ 412.884096][T18824] ? __memcg_kmem_charge+0x140/0x140 [ 412.889391][T18824] ? percpu_counter_add_batch+0x13c/0x160 [ 412.895204][T18824] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 412.900761][T18824] __mem_cgroup_charge+0x14c/0x6d0 [ 412.905867][T18824] shmem_add_to_page_cache+0x55e/0xe10 [ 412.911338][T18824] ? shmem_alloc_page+0x300/0x300 [ 412.916446][T18824] ? _raw_spin_lock_irqsave+0x110/0x110 [ 412.921993][T18824] ? find_lock_entry+0x4b/0x200 [ 412.926847][T18824] ? lru_cache_add+0x164/0x380 [ 412.931608][T18824] ? shmem_getpage_gfp+0x8f3/0x2110 [ 412.936819][T18824] shmem_getpage_gfp+0x8e8/0x2110 [ 412.941848][T18824] shmem_write_begin+0xce/0x1b0 [ 412.946708][T18824] generic_perform_write+0x2be/0x510 [ 412.952020][T18824] ? atime_needs_update+0x5b0/0x5b0 [ 412.957224][T18824] ? grab_cache_page_write_begin+0xb0/0xb0 [ 412.963028][T18824] ? file_remove_privs+0x580/0x580 [ 412.968324][T18824] ? __kasan_check_write+0x14/0x20 [ 412.973442][T18824] ? down_write+0xac/0x110 [ 412.977940][T18824] __generic_file_write_iter+0x24b/0x480 [ 412.983560][T18824] ? generic_write_checks+0x3d4/0x480 [ 412.988928][T18824] generic_file_write_iter+0xa9/0x1d0 [ 412.994287][T18824] __kernel_write+0x55a/0x910 [ 412.998950][T18824] ? vfs_read+0xa10/0xa10 [ 413.003273][T18824] ? populate_vma_page_range+0xf0/0xf0 [ 413.008736][T18824] ? cgroup_freezing+0x86/0xb0 [ 413.013503][T18824] ? freezing_slow_path+0x10a/0x150 [ 413.018694][T18824] dump_emit+0x240/0x360 [ 413.022927][T18824] ? wait_for_dump_helpers+0x390/0x390 [ 413.028394][T18824] dump_user_range+0x6a/0x1a0 [ 413.033086][T18824] elf_core_dump+0x278a/0x2bc0 [ 413.037875][T18824] ? load_elf_binary+0x2890/0x2890 [ 413.043008][T18824] ? kvmalloc_node+0x88/0x130 [ 413.047797][T18824] ? _raw_spin_unlock+0x4d/0x70 [ 413.052749][T18824] ? cgroup_freezing+0x86/0xb0 [ 413.057527][T18824] ? freezing_slow_path+0x10a/0x150 [ 413.062744][T18824] do_coredump+0x1ac9/0x27f0 [ 413.067378][T18824] ? simple_acl_create+0x1c0/0x1c0 [ 413.072510][T18824] ? debug_smp_processor_id+0x17/0x20 [ 413.078093][T18824] ? kmem_cache_free+0x100/0x2d0 [ 413.083037][T18824] ? ____kasan_slab_free+0x130/0x160 [ 413.088348][T18824] ? get_signal+0xb98/0x12e0 [ 413.092956][T18824] ? kmem_cache_free+0x100/0x2d0 [ 413.098001][T18824] get_signal+0xf23/0x12e0 [ 413.102458][T18824] arch_do_signal_or_restart+0xbf/0x10f0 [ 413.108120][T18824] ? __send_signal+0x8b8/0xb80 [ 413.113268][T18824] ? send_signal+0x479/0x5b0 [ 413.117896][T18824] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 413.123558][T18824] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 413.129394][T18824] ? force_sig+0xb5/0x100 [ 413.133740][T18824] ? send_sig+0x70/0x70 [ 413.137924][T18824] exit_to_user_mode_loop+0xa2/0xe0 [ 413.143161][T18824] exit_to_user_mode_prepare+0x76/0xa0 [ 413.148643][T18824] irqentry_exit_to_user_mode+0x9/0x10 [ 413.154116][T18824] irqentry_exit+0x12/0x60 [ 413.158567][T18824] exc_general_protection+0x1ca/0x250 [ 413.164233][T18824] ? debug_smp_processor_id+0x17/0x20 [ 413.169637][T18824] ? asm_exc_general_protection+0x8/0x30 [ 413.175304][T18824] asm_exc_general_protection+0x1e/0x30 [ 413.181336][T18824] RIP: 0033:0x7f9b64279bb1 [ 413.185770][T18824] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 413.205392][T18824] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 413.211505][T18824] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 413.219592][T18824] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 413.227584][T18824] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 413.235641][T18824] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 413.243699][T18824] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 413.276943][T18824] memory: usage 297928kB, limit 307200kB, failcnt 16190 [ 413.346565][T18824] memory+swap: usage 413052kB, limit 9007199254740988kB, failcnt 0 [ 413.362261][T18824] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 413.387674][T18824] Memory cgroup stats for /syz4: [ 413.387836][T18824] anon 270336 [ 413.387836][T18824] file 295882752 [ 413.387836][T18824] kernel_stack 0 [ 413.387836][T18824] percpu 0 [ 413.387836][T18824] sock 0 [ 413.387836][T18824] shmem 295882752 [ 413.387836][T18824] file_mapped 135168 [ 413.387836][T18824] file_dirty 135168 [ 413.387836][T18824] file_writeback 0 [ 413.387836][T18824] anon_thp 0 [ 413.387836][T18824] inactive_anon 253669376 [ 413.387836][T18824] active_anon 54607872 [ 413.387836][T18824] inactive_file 53248 [ 413.387836][T18824] active_file 98304 [ 413.387836][T18824] unevictable 0 [ 413.387836][T18824] slab_reclaimable 0 [ 413.387836][T18824] slab_unreclaimable 0 [ 413.387836][T18824] slab 0 [ 413.387836][T18824] workingset_refault_anon 0 [ 413.387836][T18824] workingset_refault_file 3135 [ 413.387836][T18824] workingset_activate_anon 0 [ 413.387836][T18824] workingset_activate_file 2112 [ 413.387836][T18824] workingset_restore_anon 0 [ 413.387836][T18824] workingset_restore_file 1683 [ 413.613390][T18824] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18830,uid=0 [ 413.709038][T18824] Memory cgroup out of memory: Killed process 18830 (syz.4.5284) total-vm:90040kB, anon-rss:1088kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 414.997115][T19322] device wg2 left promiscuous mode [ 415.037608][T19323] device pim6reg1 entered promiscuous mode [ 415.100186][T19322] device wg2 entered promiscuous mode [ 415.122733][T18832] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 415.201837][T18832] CPU: 0 PID: 18832 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 415.210733][T18832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 415.220803][T18832] Call Trace: [ 415.224113][T18832] __dump_stack+0x21/0x24 [ 415.228476][T18832] dump_stack_lvl+0x169/0x1d8 [ 415.233179][T18832] ? show_regs_print_info+0x18/0x18 [ 415.238388][T18832] ? ___ratelimit+0x3d1/0x560 [ 415.243075][T18832] ? __kasan_check_write+0x14/0x20 [ 415.248190][T18832] ? _raw_spin_lock+0x8e/0xe0 [ 415.252877][T18832] dump_stack+0x15/0x1c [ 415.257238][T18832] dump_header+0xdd/0x650 [ 415.261588][T18832] oom_kill_process+0x1fa/0x2c0 [ 415.266455][T18832] out_of_memory+0x94a/0xd70 [ 415.271067][T18832] ? unregister_oom_notifier+0x20/0x20 [ 415.276540][T18832] ? mutex_lock_killable+0x8c/0xe0 [ 415.281670][T18832] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 415.288191][T18832] mem_cgroup_out_of_memory+0x260/0x310 [ 415.293755][T18832] ? mem_cgroup_oom_trylock+0x350/0x350 [ 415.299362][T18832] ? _raw_spin_lock+0x8e/0xe0 [ 415.304056][T18832] ? _raw_spin_trylock_bh+0x130/0x130 [ 415.309450][T18832] ? _raw_spin_unlock+0x4d/0x70 [ 415.314332][T18832] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 415.319997][T18832] ? _raw_spin_unlock_irq+0x4e/0x70 [ 415.325262][T18832] try_charge+0xf61/0x14e0 [ 415.325774][T19333] device pim6reg1 entered promiscuous mode [ 415.329706][T18832] ? __memcg_kmem_charge+0x140/0x140 [ 415.329728][T18832] ? percpu_counter_add_batch+0x13c/0x160 [ 415.346903][T18832] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 415.352522][T18832] __mem_cgroup_charge+0x14c/0x6d0 [ 415.357661][T18832] shmem_add_to_page_cache+0x55e/0xe10 [ 415.363294][T18832] ? shmem_alloc_page+0x300/0x300 [ 415.368353][T18832] ? _raw_spin_lock_irqsave+0x110/0x110 [ 415.373927][T18832] ? find_lock_entry+0x4b/0x200 [ 415.378809][T18832] ? lru_cache_add+0x164/0x380 [ 415.383592][T18832] ? shmem_getpage_gfp+0x8f3/0x2110 [ 415.388809][T18832] shmem_getpage_gfp+0x8e8/0x2110 [ 415.393861][T18832] shmem_write_begin+0xce/0x1b0 [ 415.398735][T18832] generic_perform_write+0x2be/0x510 [ 415.404061][T18832] ? atime_needs_update+0x5b0/0x5b0 [ 415.409381][T18832] ? grab_cache_page_write_begin+0xb0/0xb0 [ 415.415203][T18832] ? file_remove_privs+0x580/0x580 [ 415.420341][T18832] ? __kasan_check_write+0x14/0x20 [ 415.425485][T18832] ? down_write+0xac/0x110 [ 415.429937][T18832] __generic_file_write_iter+0x24b/0x480 [ 415.435603][T18832] ? generic_write_checks+0x3d4/0x480 [ 415.441000][T18832] generic_file_write_iter+0xa9/0x1d0 [ 415.446396][T18832] __kernel_write+0x55a/0x910 [ 415.451206][T18832] ? vfs_read+0xa10/0xa10 [ 415.455637][T18832] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 415.461472][T18832] ? populate_vma_page_range+0xf0/0xf0 [ 415.467043][T18832] ? cgroup_freezing+0x86/0xb0 [ 415.471922][T18832] ? freezing_slow_path+0x10a/0x150 [ 415.477278][T18832] dump_emit+0x240/0x360 [ 415.481557][T18832] ? wait_for_dump_helpers+0x390/0x390 [ 415.487040][T18832] ? dump_user_range+0x11b/0x1a0 [ 415.492005][T18832] dump_user_range+0x6a/0x1a0 [ 415.496690][T18832] elf_core_dump+0x278a/0x2bc0 [ 415.501474][T18832] ? load_elf_binary+0x2890/0x2890 [ 415.506619][T18832] ? kvmalloc_node+0x88/0x130 [ 415.511325][T18832] ? _raw_spin_unlock+0x4d/0x70 [ 415.516179][T18832] ? cgroup_freezing+0x86/0xb0 [ 415.520950][T18832] ? freezing_slow_path+0x10a/0x150 [ 415.526163][T18832] do_coredump+0x1ac9/0x27f0 [ 415.530763][T18832] ? simple_acl_create+0x1c0/0x1c0 [ 415.535864][T18832] ? debug_smp_processor_id+0x17/0x20 [ 415.541343][T18832] ? kmem_cache_free+0x100/0x2d0 [ 415.546282][T18832] ? ____kasan_slab_free+0x130/0x160 [ 415.551574][T18832] ? get_signal+0xb98/0x12e0 [ 415.556171][T18832] ? kmem_cache_free+0x100/0x2d0 [ 415.561106][T18832] get_signal+0xf23/0x12e0 [ 415.565520][T18832] arch_do_signal_or_restart+0xbf/0x10f0 [ 415.571140][T18832] ? __send_signal+0x8b8/0xb80 [ 415.575918][T18832] ? send_signal+0x479/0x5b0 [ 415.580500][T18832] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 415.586126][T18832] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 415.591926][T18832] ? force_sig+0xb5/0x100 [ 415.596245][T18832] ? send_sig+0x70/0x70 [ 415.600401][T18832] exit_to_user_mode_loop+0xa2/0xe0 [ 415.605595][T18832] exit_to_user_mode_prepare+0x76/0xa0 [ 415.611144][T18832] irqentry_exit_to_user_mode+0x9/0x10 [ 415.616590][T18832] irqentry_exit+0x12/0x60 [ 415.621008][T18832] exc_general_protection+0x1ca/0x250 [ 415.626369][T18832] ? debug_smp_processor_id+0x17/0x20 [ 415.631733][T18832] ? asm_exc_general_protection+0x8/0x30 [ 415.637365][T18832] asm_exc_general_protection+0x1e/0x30 [ 415.642906][T18832] RIP: 0033:0x7f9b64279bb1 [ 415.647318][T18832] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 415.666914][T18832] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 415.672977][T18832] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 415.680962][T18832] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 415.688924][T18832] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 415.696911][T18832] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 415.705067][T18832] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 415.715343][T18832] memory: usage 307088kB, limit 307200kB, failcnt 18680 [ 415.722359][T18832] memory+swap: usage 427944kB, limit 9007199254740988kB, failcnt 0 [ 415.730342][T18832] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 415.737425][T18832] Memory cgroup stats for /syz4: [ 415.737565][T18832] anon 270336 [ 415.737565][T18832] file 309940224 [ 415.737565][T18832] kernel_stack 0 [ 415.737565][T18832] percpu 0 [ 415.737565][T18832] sock 0 [ 415.737565][T18832] shmem 309940224 [ 415.737565][T18832] file_mapped 135168 [ 415.737565][T18832] file_dirty 135168 [ 415.737565][T18832] file_writeback 0 [ 415.737565][T18832] anon_thp 0 [ 415.737565][T18832] inactive_anon 265789440 [ 415.737565][T18832] active_anon 48525312 [ 415.737565][T18832] inactive_file 0 [ 415.737565][T18832] active_file 0 [ 415.737565][T18832] unevictable 0 [ 415.737565][T18832] slab_reclaimable 0 [ 415.737565][T18832] slab_unreclaimable 0 [ 415.737565][T18832] slab 0 [ 415.737565][T18832] workingset_refault_anon 33 [ 415.737565][T18832] workingset_refault_file 3894 [ 415.737565][T18832] workingset_activate_anon 0 [ 415.737565][T18832] workingset_activate_file 2541 [ 415.737565][T18832] workingset_restore_anon 0 [ 415.737565][T18832] workingset_restore_file 1881 [ 415.832743][T18832] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18828,uid=0 [ 415.847933][T18832] Memory cgroup out of memory: Killed process 18828 (syz.4.5284) total-vm:90040kB, anon-rss:1088kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 415.866120][ T27] oom_reaper: reaped process 18828 (syz.4.5284), now anon-rss:0kB, file-rss:53376kB, shmem-rss:0kB [ 415.881377][T18825] syz.4.5284 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 415.909962][T18825] CPU: 1 PID: 18825 Comm: syz.4.5284 Tainted: G W syzkaller #0 [ 415.918856][T18825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 415.928941][T18825] Call Trace: [ 415.932258][T18825] __dump_stack+0x21/0x24 [ 415.936624][T18825] dump_stack_lvl+0x169/0x1d8 [ 415.941368][T18825] ? show_regs_print_info+0x18/0x18 [ 415.946597][T18825] ? ___ratelimit+0x3d1/0x560 [ 415.951288][T18825] ? __kasan_check_write+0x14/0x20 [ 415.956423][T18825] ? _raw_spin_lock+0x8e/0xe0 [ 415.961104][T18825] dump_stack+0x15/0x1c [ 415.965259][T18825] dump_header+0xdd/0x650 [ 415.969589][T18825] oom_kill_process+0x1fa/0x2c0 [ 415.974440][T18825] out_of_memory+0x94a/0xd70 [ 415.979043][T18825] ? unregister_oom_notifier+0x20/0x20 [ 415.984504][T18825] ? mutex_lock_killable+0xd3/0xe0 [ 415.989624][T18825] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 415.996158][T18825] mem_cgroup_out_of_memory+0x260/0x310 [ 416.001731][T18825] ? mem_cgroup_oom_trylock+0x350/0x350 [ 416.007275][T18825] ? _raw_spin_lock+0x8e/0xe0 [ 416.011951][T18825] ? _raw_spin_trylock_bh+0x130/0x130 [ 416.017318][T18825] ? _raw_spin_unlock+0x4d/0x70 [ 416.022180][T18825] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 416.027726][T18825] ? _raw_spin_unlock_irq+0x4e/0x70 [ 416.032948][T18825] try_charge+0xf61/0x14e0 [ 416.037395][T18825] ? __memcg_kmem_charge+0x140/0x140 [ 416.042695][T18825] ? percpu_counter_add_batch+0x13c/0x160 [ 416.048442][T18825] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 416.054027][T18825] __mem_cgroup_charge+0x14c/0x6d0 [ 416.059154][T18825] shmem_add_to_page_cache+0x55e/0xe10 [ 416.064643][T18825] ? shmem_alloc_page+0x300/0x300 [ 416.069680][T18825] ? _raw_spin_lock_irqsave+0x110/0x110 [ 416.075241][T18825] ? find_lock_entry+0x4b/0x200 [ 416.080123][T18825] ? lru_cache_add+0x164/0x380 [ 416.085591][T18825] ? shmem_getpage_gfp+0x8f3/0x2110 [ 416.090799][T18825] shmem_getpage_gfp+0x8e8/0x2110 [ 416.095853][T18825] shmem_write_begin+0xce/0x1b0 [ 416.100728][T18825] generic_perform_write+0x2be/0x510 [ 416.106080][T18825] ? atime_needs_update+0x5b0/0x5b0 [ 416.111512][T18825] ? grab_cache_page_write_begin+0xb0/0xb0 [ 416.117342][T18825] ? file_remove_privs+0x580/0x580 [ 416.122473][T18825] ? __kasan_check_write+0x14/0x20 [ 416.127604][T18825] ? down_write+0xac/0x110 [ 416.132035][T18825] __generic_file_write_iter+0x24b/0x480 [ 416.137696][T18825] ? generic_write_checks+0x3d4/0x480 [ 416.143094][T18825] generic_file_write_iter+0xa9/0x1d0 [ 416.148489][T18825] __kernel_write+0x55a/0x910 [ 416.153180][T18825] ? vfs_read+0xa10/0xa10 [ 416.157513][T18825] ? populate_vma_page_range+0xf0/0xf0 [ 416.163059][T18825] ? cgroup_freezing+0x86/0xb0 [ 416.167821][T18825] ? freezing_slow_path+0x10a/0x150 [ 416.173037][T18825] dump_emit+0x240/0x360 [ 416.177292][T18825] ? wait_for_dump_helpers+0x390/0x390 [ 416.182754][T18825] ? dump_user_range+0xaf/0x1a0 [ 416.187617][T18825] dump_user_range+0x6a/0x1a0 [ 416.192294][T18825] elf_core_dump+0x278a/0x2bc0 [ 416.197056][T18825] ? load_elf_binary+0x2890/0x2890 [ 416.202173][T18825] ? kvmalloc_node+0x88/0x130 [ 416.206873][T18825] ? _raw_spin_unlock+0x4d/0x70 [ 416.211718][T18825] ? cgroup_freezing+0x86/0xb0 [ 416.216484][T18825] ? freezing_slow_path+0x10a/0x150 [ 416.221675][T18825] do_coredump+0x1ac9/0x27f0 [ 416.226264][T18825] ? simple_acl_create+0x1c0/0x1c0 [ 416.231371][T18825] ? debug_smp_processor_id+0x17/0x20 [ 416.236742][T18825] ? kmem_cache_free+0x100/0x2d0 [ 416.241760][T18825] ? ____kasan_slab_free+0x130/0x160 [ 416.247106][T18825] ? get_signal+0xb98/0x12e0 [ 416.251697][T18825] ? kmem_cache_free+0x100/0x2d0 [ 416.256681][T18825] get_signal+0xf23/0x12e0 [ 416.261280][T18825] arch_do_signal_or_restart+0xbf/0x10f0 [ 416.266913][T18825] ? __send_signal+0x8b8/0xb80 [ 416.271675][T18825] ? send_signal+0x479/0x5b0 [ 416.276261][T18825] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 416.281894][T18825] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 416.287701][T18825] ? force_sig+0xb5/0x100 [ 416.292024][T18825] ? send_sig+0x70/0x70 [ 416.296210][T18825] exit_to_user_mode_loop+0xa2/0xe0 [ 416.301437][T18825] exit_to_user_mode_prepare+0x76/0xa0 [ 416.306889][T18825] irqentry_exit_to_user_mode+0x9/0x10 [ 416.312423][T18825] irqentry_exit+0x12/0x60 [ 416.316832][T18825] exc_general_protection+0x1ca/0x250 [ 416.322196][T18825] ? debug_smp_processor_id+0x17/0x20 [ 416.327579][T18825] ? asm_exc_general_protection+0x8/0x30 [ 416.333209][T18825] asm_exc_general_protection+0x1e/0x30 [ 416.338749][T18825] RIP: 0033:0x7f9b64279bb1 [ 416.343334][T18825] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 416.363026][T18825] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 416.369111][T18825] RAX: 0000000000000000 RBX: 00007f9b644c1090 RCX: 00007f9b64279ba9 [ 416.377178][T18825] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000001108400 [ 416.385172][T18825] RBP: 00007f9b642fce19 R08: 0000200000000200 R09: 0000200000000200 [ 416.393221][T18825] R10: 00002000000001c0 R11: 0000000000000206 R12: 0000000000000000 [ 416.401186][T18825] R13: 00007f9b644c1128 R14: 00007f9b644c1090 R15: 00007ffd74d43f28 [ 416.424815][T18825] memory: usage 279652kB, limit 307200kB, failcnt 18813 [ 416.441238][T19348] device syzkaller0 entered promiscuous mode [ 416.458213][T18825] memory+swap: usage 383308kB, limit 9007199254740988kB, failcnt 0 [ 416.466821][T18825] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 416.473736][T18825] Memory cgroup stats for /syz4: [ 416.473905][T18825] anon 270336 [ 416.473905][T18825] file 276688896 [ 416.473905][T18825] kernel_stack 0 [ 416.473905][T18825] percpu 0 [ 416.473905][T18825] sock 0 [ 416.473905][T18825] shmem 276553728 [ 416.473905][T18825] file_mapped 135168 [ 416.473905][T18825] file_dirty 135168 [ 416.473905][T18825] file_writeback 0 [ 416.473905][T18825] anon_thp 0 [ 416.473905][T18825] inactive_anon 240242688 [ 416.473905][T18825] active_anon 39874560 [ 416.473905][T18825] inactive_file 0 [ 416.473905][T18825] active_file 0 [ 416.473905][T18825] unevictable 0 [ 416.473905][T18825] slab_reclaimable 0 [ 416.473905][T18825] slab_unreclaimable 0 [ 416.473905][T18825] slab 0 [ 416.473905][T18825] workingset_refault_anon 33 [ 416.473905][T18825] workingset_refault_file 3894 [ 416.473905][T18825] workingset_activate_anon 0 [ 416.473905][T18825] workingset_activate_file 2541 [ 416.473905][T18825] workingset_restore_anon 0 [ 416.473905][T18825] workingset_restore_file 1881 [ 416.568527][T18825] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.5284,pid=18825,uid=0 [ 416.583667][T18825] Memory cgroup out of memory: Killed process 18825 (syz.4.5284) total-vm:90040kB, anon-rss:1088kB, file-rss:53424kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 416.602147][ T27] oom_reaper: reaped process 18825 (syz.4.5284), now anon-rss:0kB, file-rss:53360kB, shmem-rss:0kB [ 417.329320][T19405] device sit0 entered promiscuous mode [ 419.118198][T19504] device syzkaller0 entered promiscuous mode [ 419.937722][T19557] device pim6reg1 entered promiscuous mode [ 420.584341][T19581] device pim6reg1 entered promiscuous mode [ 421.698775][T19663] syz.5.5511[19663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.698861][T19663] syz.5.5511[19663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.518283][T19788] syz.5.5545[19788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.615213][T19788] syz.5.5545[19788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.511539][T19922] device veth1_macvtap entered promiscuous mode [ 426.575312][T19922] device macsec0 entered promiscuous mode [ 426.581971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.266589][T19947] tap0: tun_chr_ioctl cmd 1074025677 [ 427.290162][T19947] tap0: linktype set to 774 [ 427.851648][T19981] device macsec0 entered promiscuous mode [ 427.928768][T19979] device sit0 left promiscuous mode [ 428.221555][T19988] device sit0 entered promiscuous mode [ 428.598754][T20011] device pim6reg1 entered promiscuous mode [ 428.788123][T20017] device syzkaller0 entered promiscuous mode [ 429.099107][T20026] syz.2.5609[20026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.099202][T20026] syz.2.5609[20026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.301099][T20032] syz.5.5610[20032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.383641][T20032] syz.5.5610[20032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.924462][T20062] device syzkaller0 entered promiscuous mode [ 430.251009][T20070] device pim6reg1 entered promiscuous mode [ 430.348289][T20087] device syzkaller0 entered promiscuous mode [ 430.459352][T20098] device wg2 left promiscuous mode [ 430.501306][T20096] device veth0_vlan left promiscuous mode [ 430.575803][T20096] device veth0_vlan entered promiscuous mode [ 430.630028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 430.638599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 430.646290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 431.285584][T20114] device pim6reg1 entered promiscuous mode [ 432.037344][T20170] device syzkaller0 entered promiscuous mode [ 432.909048][T20208] syz.1.5661[20208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.909110][T20208] syz.1.5661[20208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.012022][T20210] Â: renamed from pim6reg1 [ 433.441429][T20240] device wg2 left promiscuous mode [ 433.815174][T20258] device syzkaller0 entered promiscuous mode