last executing test programs: 2.782684367s ago: executing program 4 (id=3682): bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x42) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000003c0), 0x2, 0x0) write$cgroup_type(r1, &(0x7f00000000c0), 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x63) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r2, &(0x7f00000004c0), &(0x7f00000003c0)=""/107}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200001200000000000000000000038500000036000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.872770184s ago: executing program 4 (id=3703): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={0x0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r1}, &(0x7f0000000600), &(0x7f00000006c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x378}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x30100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.745801227s ago: executing program 4 (id=3706): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r4, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000f00000018110000180d1d855ffd59c65a84556380b5f9351a2186c9379b84d7ca33b77a161fa4aa61f737e0db5102e7632ba2470176cf120f3548a1d43c118a970f1ccb1e3b3c905d7215662420b0e1b09104e5e80c5f8350f406797b0b2a854b71f65da79998cedd9ad95420903568ab6d077ba9759bd601cdcb41f149fd", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="170000070000000004000000ff00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1}, 0x48) bpf$LINK_DETACH(0x22, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180)={0x4}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) close(0xffffffffffffffff) 1.56440381s ago: executing program 3 (id=3713): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000005000000850000000800000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)="29dd4c808f84a1688ccf6f00f805", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x10000007, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) close(0x4) 1.54973667s ago: executing program 3 (id=3714): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) (async, rerun: 32) mkdir(0x0, 0x0) (rerun: 32) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.256932836s ago: executing program 4 (id=3717): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) write$cgroup_subtree(r5, 0x0, 0x66) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4b}, 0x48) 1.219951977s ago: executing program 3 (id=3718): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000240)='rtc_alarm_irq_enable\x00', r1}, 0xfffffffffffffeec) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x3, {0x4f23, 0x3}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000004c0)="d8489d8ea26602bff8d4843adfd9d39bce806d5818432a263ed31f03b084c14482abe3f03fb0df621e9e8cd2470161aaf6a5d2cc3a91c00c1cdcef8f9ce1f3a3d3adbc44afbe4fbdeaffc7bcf669d866786d2c3265d8e2039282649381c56023ce920b64a80502d4962f17df2e318e81f7d9b841549f7f49e25c023f10ab846c142f88b81846bcadea588e0e4fef1b1e5bd147ed3a711874f26938a76b5b8f1b475baa98ccfc4ca19d31b0e079ca7da12f728fbacb6e018584b3", 0xba}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x10, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x20, 0x0, 0x40000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x90, 0x7, 0xe, 0x0, 0xfffffffffffffff2, 0x28010, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0xe}, 0x69e4e4d737ca5448, 0x6, 0x3d, 0x9, 0xffffffff, 0x1, 0x1, 0x0, 0x3d2af391, 0x0, 0xf}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'ip6gre0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) (async, rerun: 64) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000700000000000009209500000000000000f7315374ce569ec55869bfbcfa7c4e8f52e6288f2fbc43a3af3c6b881320c24423492f2fc14c9de730f42434dfa11c77edc1f06776d8"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) (rerun: 64) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r7}, 0x18) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) (async) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f00000000c0)=ANY=[], 0xfdef) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) 1.175490317s ago: executing program 3 (id=3719): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000300007cf10000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000001811000088782106b4a48f327dd15309", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000008bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="192000000d000000000000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="1905000000000000e680c284000000004b"], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r6}, 0x0, &(0x7f00000003c0)=r8}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r6}, &(0x7f0000000080), &(0x7f00000000c0)=r8}, 0x20) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES8=r5, @ANYBLOB="000000000100"], 0x48) (rerun: 64) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f0000003000), 0x201, 0x0) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={0x0, &(0x7f0000001300)=""/181, 0x0, 0xb5, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.06800691s ago: executing program 0 (id=3723): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x27, &(0x7f0000000fc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xff}, [@generic={0x5, 0x2, 0xa, 0xa, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x252}}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000380)='syzkaller\x00', 0xffff0000, 0xfa, &(0x7f00000003c0)=""/250, 0x41000, 0x41, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000540)=[{0x0, 0x5, 0xd, 0xb}, {0x0, 0x1, 0x5, 0x7}, {0x5, 0x1, 0x5, 0x6}], 0x10, 0x5}, 0x94) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000dd00000000000002000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7757, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=@base={0x16, 0x1ff, 0xc, 0x6, 0x400, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x4, 0x1, 0x1}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000500)=[0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x89, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x75, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x1f, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2f5e5d5b}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x7, 0x1, 0x0, r5}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @tail_call, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @ldst={0x1, 0x0, 0x6, 0x3, 0x7, 0xfffffffffffffffe, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000280)='syzkaller\x00', 0xfffffffd, 0x10, &(0x7f0000000440)=""/16, 0x0, 0x40, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x4, 0x10001}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000b40)=[{0x1, 0x3, 0x1}, {0x4, 0x5, 0xd, 0x8}, {0x4, 0x3, 0xb, 0xb}, {0x1, 0x2, 0xb, 0x9}, {0x3, 0x4, 0xe}, {0x1, 0x5, 0x9, 0x2}, {0x2, 0x1, 0x4, 0xb}, {0x4, 0x2, 0x7, 0x7}, {0x3, 0x1, 0x0, 0xc}, {0x1, 0x1, 0xa, 0x9}], 0x10, 0x5}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1e0000007000000006000000617b000008000000", @ANYRES32, @ANYBLOB="01000100"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0400000004000000040000000f00000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x9, &(0x7f00000007c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffd}], &(0x7f00000005c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x3c, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x2, 0x8, 0x3253, 0x8}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[r0, r0, r7], &(0x7f0000000a00)=[{0x2, 0x2, 0xb, 0x2}, {0x1, 0x4, 0x4, 0x7}, {0x6, 0x4, 0xd, 0x2}, {0x1, 0x2, 0xd, 0xc}, {0x2, 0x4, 0x7, 0x2}, {0x0, 0x1, 0x0, 0x9}], 0x10, 0xfffffffc}, 0x94) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000580)=r1) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4000003}, 0x18) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0xc8, 0x2, 0x7, 0x0, 0x10001, 0xa}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r13}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 1.06686356s ago: executing program 3 (id=3724): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x9, 0x1, 0x13505, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x185, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1ffffffffffffdac, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0xfffffffffffffee9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7beab98d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x3) openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="5132ade117db4f61aadb7d99d63748d3d39d40cf7b9d0274627f3ac22ea509d1a03deeae800d070b69face5a13a767", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000380)='module_request\x00', r3}, 0x18) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000440)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20e}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x2020, 0x0, 0x0, 0x4, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) write$cgroup_subtree(r6, &(0x7f0000000140)={[{0x2d, 'hugetlb'}, {0x2b, 'rdma'}]}, 0xf) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001"], 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r7}, 0x38) 991.838721ms ago: executing program 0 (id=3725): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r1], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000007000000b7030000000000008500000072000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r9, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 880.060223ms ago: executing program 2 (id=3727): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r1, 0x22, 0x1, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 852.686984ms ago: executing program 2 (id=3728): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba88", 0x4}], 0x1}, 0x0) (async) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a02000000000018010000202078250000000000202020791af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 796.812185ms ago: executing program 0 (id=3729): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5411, &(0x7f0000000040)={'bridge_slave_0\x00'}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x4, 0x1, 0x13}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@o_path={&(0x7f00000008c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0xd, &(0x7f0000000080), 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 794.915345ms ago: executing program 2 (id=3730): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230005) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c23003f) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000500000000000000", @ANYRES32=0x1, @ANYBLOB="0f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="1f1b000000000051464e3834ce423522c27901000000a05467a4bed8b9924883248f7dbfff6295219be4aa372a651b88b31f4920e5dd3f46f76218ba517af260d2eef8341bcb519188015d5ee78a12fa87bce2734b8def1563feee476f22645d31ede15c9568829f0a000000ac10c754533b91eebdc135c41560ce42ae52ee54e405490e363525d63c98e488dd29564da6509d0fbe6b5a337f14a21ce3eafb6c60585fe91024c8d612339f"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x80, '\x00', r3, r4, 0x4, 0x2, 0x3}, 0x50) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) close(r5) 707.729337ms ago: executing program 0 (id=3733): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xa5bc}, 0x1400, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x1}, 0x8) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x10000002}, 0x800, 0xc8, 0xffff, 0x7, 0xf9, 0xfffffffc, 0x102, 0x0, 0xffffffff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) (async, rerun: 32) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c"], 0x0, 0x37}, 0x28) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010418000000000000000c0000002c00000002000000050241e98cf6016d8d5432c77800514adaa3560c421f2e4213e78fc1b982df662cecdf45ef62c7807d99a753b0492eece8fe1cab32e56c2705a908d7827030d9f8ecbcc1c8dd7f8e98bb9cd12537a511ed06da14bbe657"], 0x0, 0x26, 0x0, 0x1}, 0x28) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='rxrpc_tx_ack\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) (async, rerun: 64) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="14000000000000000100200001000000", @ANYRESOCT=r4], 0x18}, 0x8810) (async, rerun: 64) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) (async) close(0xffffffffffffffff) close(r7) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) (rerun: 64) 587.935679ms ago: executing program 0 (id=3734): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0, 0x0, 0x2000000}, 0x40002001) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[], 0x66) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000080), &(0x7f00000006c0)='%-010d \x00'}, 0x20) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 586.927449ms ago: executing program 1 (id=3735): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) close(0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xfffffffe}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0x8, &(0x7f0000000740)=ANY=[@ANYRES8, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) 511.281691ms ago: executing program 2 (id=3736): socketpair(0x27, 0x80005, 0x0, &(0x7f0000000080)={0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x4, 0xdd, 0xa}, 0x50) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11c167, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200001400e300b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r8}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r10, r9}, 0xc) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r11}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x43}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = getpid() sendmsg$unix(r12, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="0008000014000000000000000100000001"], 0x38}, 0x0) recvmsg$unix(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/132, 0x84}, {&(0x7f00000002c0)=""/10, 0xa}], 0x2, &(0x7f0000000400)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x40000040) recvmsg$unix(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000380)=""/68, 0x44}], 0x1, &(0x7f0000000780)}, 0x2000) 429.170642ms ago: executing program 2 (id=3737): bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="000000000000000100"/20, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000002c0)}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) 254.036835ms ago: executing program 1 (id=3738): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800004000000100000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) (rerun: 32) close(r1) (async, rerun: 64) close(r1) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES8=r1, @ANYRESDEC=r0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r2, &(0x7f0000000080)="f48fb9947c0dd148b3434fa154d97d27578cfc9da430ff909bbe9b7834d1fe8c72a7c9e8dbcf0f01d3f57c8106", &(0x7f0000000300)=""/67}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000002000000020000000400000000000000", @ANYRES32, @ANYBLOB="00000000000003000000000040000000b0000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 246.793466ms ago: executing program 1 (id=3739): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x800}, 0x100001, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000009a1cec8a000027f64fa0911d9c343cf8c9bb5b1a01b1ba65bf17f9627d2e7f75f202f4eb5f47c9166d0b879e2d2a65952149b5abc819ce85cd64c2971e520522b305c633ecece170c1b72baf453b89f0705cdea01af4f1f070c898c913ac9e9b29794b4aff25b3752386fbb687a84543094ea25f7a7ce50852a54f6089b9c4f28a9e9b0d4f74e2a23a38ac515420c2ffacee9a218208418326aa584b8dc6e33cd0408baceb0e6fe7cee97e5447", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcf, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) (rerun: 32) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x3, 0x4, 0x4, 0x4, 0x19100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r7, @void, @value=r6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 32) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) (async, rerun: 32) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async, rerun: 64) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (rerun: 64) 238.833726ms ago: executing program 1 (id=3740): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) close(0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x3, r1}, 0x38) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 220.954876ms ago: executing program 3 (id=3741): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001c00)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e6a65585578f830e9000000", 0x0, 0x80000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70300002100000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 203.869546ms ago: executing program 0 (id=3742): r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='sched_switch\x00') close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 202.859226ms ago: executing program 4 (id=3743): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020000000400000001000000", @ANYRES32=0x1], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc48, 0x8000}, 0x100018, 0xc8, 0x4, 0x5, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) close(0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) close(r9) socketpair(0x10, 0x3, 0x4, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x14, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="850000004d00000066000000000000f195000000000000005e513a62cd1c7ed0b794c1a9f6b391f7ec96ca81e9a3b16801d3fb13569825629e1bce505e55853125c74572031edb11d09502143f80262722d4cbee6d45f95a843291bedbfbdfcd40e8a23b59137e58569d581885619978008138dd3ac2e5bc5d6787f62776d19f6da3955d992f0236b79825ccf5d548edc7984e1cb4657ff150730353c1b3e7bee541033bf79a683865cf8c48dde333cb58393482ffe636d3764a9cca01ae17acf285e031317502cc807fbef6e938825e3777734f4e2d6e1bf3192074b9495479"], &(0x7f0000000140)='GPL\x00', 0x2, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x61, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 86.594249ms ago: executing program 2 (id=3744): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e000000fffc0000080000000000000080000000", @ANYRES32=r2, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000001000000ffffffff0a00"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5, r4}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000010538a599afb04cd9c1efef5b13a5ca2d666e9deca41bec9ad20dcfb2b813a51a0a6f7c100"/56, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x10, 0x8000020}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) 83.365589ms ago: executing program 1 (id=3745): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000055e3d0c8ddd19e46b9f389df8222679018887a45888a54cae1081b34bd3b6fe0f58e42aec72c6b0bbc94cc72f2d00d"], 0x50) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) (async, rerun: 32) close(r3) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7fff, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0xa19c6d0251f404ea, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\v\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, r7, 0x0) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x63) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) 82.944689ms ago: executing program 1 (id=3746): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x40004, 0x0, 0xf800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x20) close(r0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x10000, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x4021, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) 0s ago: executing program 4 (id=3747): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_type(r1, &(0x7f0000000280), 0x9) (async) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0xf6ffffff}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r10}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.184' (ED25519) to the list of known hosts. [ 21.176353][ T24] audit: type=1400 audit(1757949409.490:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.177275][ T267] cgroup: Unknown subsys name 'net' [ 21.199398][ T24] audit: type=1400 audit(1757949409.490:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.228687][ T24] audit: type=1400 audit(1757949409.530:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.228931][ T267] cgroup: Unknown subsys name 'devices' [ 21.462043][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.467819][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.634461][ T24] audit: type=1400 audit(1757949409.950:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.658040][ T24] audit: type=1400 audit(1757949409.950:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.683153][ T24] audit: type=1400 audit(1757949409.950:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.688862][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.715451][ T24] audit: type=1400 audit(1757949410.030:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.741415][ T24] audit: type=1400 audit(1757949410.030:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.795268][ T24] audit: type=1400 audit(1757949410.120:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.821167][ T24] audit: type=1400 audit(1757949410.120:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.847520][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.767995][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.775114][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.782792][ T275] device bridge_slave_0 entered promiscuous mode [ 22.800903][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.808203][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.816154][ T275] device bridge_slave_1 entered promiscuous mode [ 22.869668][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.877025][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.884565][ T277] device bridge_slave_0 entered promiscuous mode [ 22.892465][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.899587][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.907002][ T277] device bridge_slave_1 entered promiscuous mode [ 22.974175][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.981583][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.988975][ T276] device bridge_slave_0 entered promiscuous mode [ 22.995769][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.002895][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.011112][ T278] device bridge_slave_0 entered promiscuous mode [ 23.020007][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.027419][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.034792][ T278] device bridge_slave_1 entered promiscuous mode [ 23.048660][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.055919][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.063636][ T276] device bridge_slave_1 entered promiscuous mode [ 23.083490][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.090573][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.097872][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.105128][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.120927][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.128143][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.135682][ T279] device bridge_slave_0 entered promiscuous mode [ 23.144734][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.151924][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.159245][ T279] device bridge_slave_1 entered promiscuous mode [ 23.198106][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.205449][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.213128][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.220343][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.292711][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.299766][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.307143][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.314179][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.333514][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.341911][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.349137][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.356620][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.364412][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.371749][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.379545][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.387287][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.411028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.419306][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.427487][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.448015][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.462856][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.471551][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.478902][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.486566][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.495095][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.502243][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.509976][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.542174][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.549742][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.558279][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.566305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.574872][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.583548][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.590774][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.598484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.607500][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.614691][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.622284][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.630650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.638677][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.647300][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.655399][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.662989][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.671211][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.678376][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.686328][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.694676][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.702099][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.709636][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.717862][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.724980][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.735156][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.743820][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.765188][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.774045][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.782431][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.792910][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.801831][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.812766][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.823326][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.831440][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.847846][ T279] device veth0_vlan entered promiscuous mode [ 23.858407][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.866774][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.874328][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.882823][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.891253][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.899486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.907920][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.917080][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.925769][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.933835][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.942235][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.949709][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.971221][ T275] device veth0_vlan entered promiscuous mode [ 23.979591][ T278] device veth0_vlan entered promiscuous mode [ 23.986403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.994633][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.003820][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.012449][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.021295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.029860][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.038380][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.046751][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.055673][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.063623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.071553][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.078914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.090557][ T277] device veth0_vlan entered promiscuous mode [ 24.101178][ T275] device veth1_macvtap entered promiscuous mode [ 24.107931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.116392][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.124426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.132661][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.141232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.148791][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.157064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.166914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.175338][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.189737][ T276] device veth0_vlan entered promiscuous mode [ 24.201628][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.209981][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.217825][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.225917][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.234706][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.243491][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.252358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.260959][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.268841][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.277458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.285859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.294280][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.302875][ T278] device veth1_macvtap entered promiscuous mode [ 24.313170][ T279] device veth1_macvtap entered promiscuous mode [ 24.322925][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.331427][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.339658][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.353663][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.362131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.374668][ T277] device veth1_macvtap entered promiscuous mode [ 24.381697][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 24.389630][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.397351][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.405879][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.414326][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.422824][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.431319][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.439912][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.448629][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.457188][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.471185][ T276] device veth1_macvtap entered promiscuous mode [ 24.479979][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.513202][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.526207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.535638][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.544584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.590510][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.602476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.612215][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.620888][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.700258][ C0] hrtimer: interrupt took 25593 ns [ 24.769554][ T315] device pim6reg1 entered promiscuous mode [ 24.887050][ T319] device veth0_vlan left promiscuous mode [ 24.911359][ T319] device veth0_vlan entered promiscuous mode [ 25.527130][ T344] cgroup: syz.0.13 (344) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.645911][ T344] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.755942][ T359] device veth1_macvtap left promiscuous mode [ 25.890451][ T359] device macsec0 entered promiscuous mode [ 26.106189][ T371] syz.0.22[371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.106297][ T371] syz.0.22[371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.588983][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 26.588994][ T24] audit: type=1400 audit(1757949414.900:115): avc: denied { read } for pid=388 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.198760][ T444] device syzkaller0 entered promiscuous mode [ 27.384859][ T24] audit: type=1400 audit(1757949415.700:116): avc: denied { ioctl } for pid=447 comm="syz.0.44" path="socket:[15284]" dev="sockfs" ino=15284 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.432099][ T451] device syzkaller0 entered promiscuous mode [ 28.237750][ T24] audit: type=1400 audit(1757949416.550:117): avc: denied { create } for pid=480 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 29.194928][ T535] device syzkaller0 entered promiscuous mode [ 29.361722][ T554] device pim6reg1 entered promiscuous mode [ 29.485707][ T24] audit: type=1400 audit(1757949417.800:118): avc: denied { create } for pid=569 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 29.937508][ T24] audit: type=1400 audit(1757949418.250:119): avc: denied { create } for pid=605 comm="syz.2.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 30.264192][ T612] device pim6reg1 entered promiscuous mode [ 32.680839][ T646] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.689782][ T646] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.855273][ T24] audit: type=1400 audit(1757949421.170:120): avc: denied { create } for pid=653 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.168401][ T674] -1: renamed from syzkaller0 [ 33.369319][ T24] audit: type=1400 audit(1757949421.680:121): avc: denied { create } for pid=686 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 33.525174][ T697] device syzkaller0 entered promiscuous mode [ 33.587879][ T700] device macsec0 entered promiscuous mode [ 34.146653][ T726] device wg2 entered promiscuous mode [ 34.285576][ T24] audit: type=1400 audit(1757949422.600:122): avc: denied { create } for pid=733 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 34.395562][ T24] audit: type=1400 audit(1757949422.600:123): avc: denied { create } for pid=733 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.507659][ T24] audit: type=1400 audit(1757949422.600:124): avc: denied { create } for pid=733 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 34.659413][ T24] audit: type=1400 audit(1757949422.640:125): avc: denied { create } for pid=731 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 34.788160][ T24] audit: type=1400 audit(1757949423.100:126): avc: denied { create } for pid=751 comm="syz.3.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 34.886279][ T758] device syzkaller0 entered promiscuous mode [ 34.940365][ T24] audit: type=1400 audit(1757949423.260:127): avc: denied { relabelfrom } for pid=757 comm="syz.4.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.973864][ T24] audit: type=1400 audit(1757949423.290:128): avc: denied { relabelto } for pid=757 comm="syz.4.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.136701][ T24] audit: type=1400 audit(1757949423.450:129): avc: denied { create } for pid=788 comm="syz.2.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 35.205334][ T787] device wg2 entered promiscuous mode [ 36.206561][ T842] device wg2 left promiscuous mode [ 36.854260][ T881] device wg2 entered promiscuous mode [ 37.099755][ T909] device syzkaller0 entered promiscuous mode [ 37.173729][ T919] device veth1_macvtap left promiscuous mode [ 37.463721][ T936] device syzkaller0 entered promiscuous mode [ 37.531312][ T939] GPL: port 1(erspan0) entered blocking state [ 37.537421][ T939] GPL: port 1(erspan0) entered disabled state [ 37.546003][ T939] device erspan0 entered promiscuous mode [ 37.553111][ T957] GPL: port 1(erspan0) entered blocking state [ 37.559689][ T957] GPL: port 1(erspan0) entered forwarding state [ 37.640415][ T963] device pim6reg1 entered promiscuous mode [ 37.827842][ T970] device pim6reg1 entered promiscuous mode [ 38.793048][ T1010] device veth1_macvtap left promiscuous mode [ 38.809247][ T1010] device macsec0 entered promiscuous mode [ 38.895127][ T1013] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 38.910966][ T1013] syzkaller0: linktype set to 0 [ 43.183384][ T1092] device pim6reg1 entered promiscuous mode [ 43.899827][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 43.899839][ T24] audit: type=1400 audit(1757949432.210:133): avc: denied { write } for pid=1134 comm="syz.3.233" name="cgroup.subtree_control" dev="cgroup2" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 43.937306][ T1143] device veth0_vlan left promiscuous mode [ 43.942274][ T24] audit: type=1400 audit(1757949432.250:134): avc: denied { open } for pid=1134 comm="syz.3.233" path="" dev="cgroup2" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 43.944103][ T1143] device veth0_vlan entered promiscuous mode [ 43.973509][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.982471][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.990922][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.084059][ T1145] GPL: port 1(erspan0) entered disabled state [ 44.123581][ T1149] ------------[ cut here ]------------ [ 44.129262][ T1149] trace type BPF program uses run-time allocation [ 44.136080][ T1149] WARNING: CPU: 0 PID: 1149 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 44.147329][ T1149] Modules linked in: [ 44.151620][ T1149] CPU: 0 PID: 1149 Comm: syz.3.237 Not tainted syzkaller #0 [ 44.159048][ T1149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 44.174613][ T1149] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 44.189144][ T1149] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 44.209711][ T1149] RSP: 0018:ffffc9000145f468 EFLAGS: 00010246 [ 44.219897][ T1149] RAX: e2934324a8339900 RBX: 0000000000000001 RCX: 0000000000080000 [ 44.228570][ T1149] RDX: ffffc90003d35000 RSI: 00000000000022b0 RDI: 00000000000022b1 [ 44.240588][ T1149] RBP: ffffc9000145f4b0 R08: dffffc0000000000 R09: fffff5200028bdbd [ 44.258640][ T1149] R10: fffff5200028bdbd R11: 1ffff9200028bdbc R12: ffff88810ad54000 [ 44.272033][ T1149] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810f8fe000 [ 44.280921][ T1149] FS: 00007f50cada06c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 44.314264][ T1149] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.324366][ T1149] CR2: 0000000100000001 CR3: 0000000117247000 CR4: 00000000003506a0 [ 44.336908][ T1149] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.346817][ T1149] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 44.363976][ T1149] Call Trace: [ 44.369396][ T1149] ? __fdget+0x1a1/0x230 [ 44.374375][ T24] audit: type=1400 audit(1757949432.690:135): avc: denied { tracepoint } for pid=1165 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 44.396504][ T1149] resolve_pseudo_ldimm64+0x526/0x1020 [ 44.406240][ T1149] ? bpf_check+0xd680/0xd680 [ 44.418668][ T1149] ? kvmalloc_node+0x88/0x130 [ 44.449143][ T1149] bpf_check+0x8d4b/0xd680 [ 44.456757][ T1149] ? bpf_get_btf_vmlinux+0x60/0x60 [ 44.480957][ T1149] ? 0xffffffffa002a000 [ 44.488687][ T1149] ? is_bpf_text_address+0x177/0x190 [ 44.522106][ T1170] device wg2 left promiscuous mode [ 44.527899][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 44.537580][ T1149] ? __kernel_text_address+0xa0/0x100 [ 44.578867][ T1149] ? unwind_get_return_address+0x4d/0x90 [ 44.602181][ T1149] ? stack_trace_save+0xe0/0xe0 [ 44.620600][ T1149] ? arch_stack_walk+0xee/0x140 [ 44.627765][ T1149] ? stack_trace_save+0x98/0xe0 [ 44.637955][ T1149] ? stack_trace_snprint+0xf0/0xf0 [ 44.643575][ T1149] ? __kasan_slab_alloc+0x69/0xf0 [ 44.652498][ T1149] ? pcpu_block_update+0x3ec/0x900 [ 44.657981][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 44.681081][ T1149] ? __kasan_kmalloc+0xec/0x110 [ 44.690378][ T1149] ? __kasan_kmalloc+0xda/0x110 [ 44.708713][ T1149] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 44.749105][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 44.777232][ T24] audit: type=1400 audit(1757949433.090:136): avc: denied { create } for pid=1185 comm="syz.4.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 44.845861][ T1149] ? security_bpf_prog_alloc+0x62/0x90 [ 44.853014][ T1149] ? bpf_prog_load+0x949/0x1420 [ 44.861069][ T1149] ? __se_sys_bpf+0x442/0x680 [ 44.865996][ T1149] ? __x64_sys_bpf+0x7b/0x90 [ 44.871996][ T1149] ? do_syscall_64+0x31/0x40 [ 44.899494][ T1149] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.906774][ T1149] ? memset+0x35/0x40 [ 44.913605][ T1149] ? bpf_obj_name_cpy+0x193/0x1e0 [ 44.918864][ T1149] bpf_prog_load+0xf5a/0x1420 [ 44.924311][ T1149] ? map_freeze+0x320/0x320 [ 44.928934][ T1149] ? slab_free_freelist_hook+0xc5/0x190 [ 44.969273][ T24] audit: type=1400 audit(1757949433.280:137): avc: denied { create } for pid=1203 comm="syz.2.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 44.999558][ T1149] ? selinux_bpf+0xc7/0xf0 [ 45.007333][ T1149] ? security_bpf+0x82/0xa0 [ 45.019755][ T1149] __se_sys_bpf+0x442/0x680 [ 45.036398][ T24] audit: type=1400 audit(1757949433.340:138): avc: denied { ioctl } for pid=1200 comm="syz.0.252" path="mnt:[4026532450]" dev="nsfs" ino=4026532450 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.043301][ T1149] ? __x64_sys_bpf+0x90/0x90 [ 45.067515][ T1149] ? ____fput+0x15/0x20 [ 45.076131][ T1149] ? __kasan_check_read+0x11/0x20 [ 45.082632][ T1149] __x64_sys_bpf+0x7b/0x90 [ 45.087650][ T1149] do_syscall_64+0x31/0x40 [ 45.092462][ T1149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.098580][ T1149] RIP: 0033:0x7f50cc337ba9 [ 45.143425][ T1149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.171248][ T1149] RSP: 002b:00007f50cada0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.194949][ T1149] RAX: ffffffffffffffda RBX: 00007f50cc57efa0 RCX: 00007f50cc337ba9 [ 45.207469][ T1149] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 45.216260][ T1149] RBP: 00007f50cc3bae19 R08: 0000000000000000 R09: 0000000000000000 [ 45.224739][ T1149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.238406][ T1149] R13: 00007f50cc57f038 R14: 00007f50cc57efa0 R15: 00007ffdf5d09f98 [ 45.251616][ T1149] ---[ end trace ac63c8e6c7e44ead ]--- [ 46.821698][ T24] audit: type=1400 audit(1757949435.140:139): avc: denied { create } for pid=1316 comm="syz.4.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 48.028874][ T1375] device veth1_macvtap left promiscuous mode [ 48.051227][ T24] audit: type=1400 audit(1757949436.370:140): avc: denied { create } for pid=1364 comm="syz.4.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 48.300075][ T1366] device syzkaller0 entered promiscuous mode [ 48.535640][ T24] audit: type=1400 audit(1757949436.850:141): avc: denied { create } for pid=1415 comm="syz.3.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 48.639068][ T24] audit: type=1400 audit(1757949436.910:142): avc: denied { create } for pid=1416 comm="syz.4.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 48.711256][ T1426] device wg2 left promiscuous mode [ 48.771262][ T1426] device wg2 entered promiscuous mode [ 49.011108][ T1430] device syzkaller0 entered promiscuous mode [ 49.359176][ T24] audit: type=1400 audit(1757949437.670:143): avc: denied { create } for pid=1456 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 50.391710][ T1496] device syzkaller0 entered promiscuous mode [ 51.222760][ T1540] device pim6reg1 entered promiscuous mode [ 51.373297][ T24] audit: type=1400 audit(1757949439.690:144): avc: denied { create } for pid=1541 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 52.074928][ T1579] device syzkaller0 entered promiscuous mode [ 52.089861][ T1582] device sit0 entered promiscuous mode [ 52.456395][ T1608] device sit0 entered promiscuous mode [ 53.224801][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.230202][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.236234][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.242345][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.251448][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.262800][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.268490][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.278363][ T1644] tun0: tun_chr_ioctl cmd 1074025681 [ 53.287552][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.298346][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.313022][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.323845][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.338631][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.362709][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.420915][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.460668][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.476779][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.488257][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.508158][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.516720][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.523328][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.530093][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.536107][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.573325][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.579074][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.590007][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.602108][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.619119][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.631042][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.645040][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.652305][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.658673][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 53.665313][ T1642] tun0: tun_chr_ioctl cmd 1074025673 [ 54.638011][ T1763] device pim6reg1 entered promiscuous mode [ 54.671628][ T24] audit: type=1400 audit(1757949442.990:145): avc: denied { create } for pid=1762 comm="syz.4.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 54.925835][ T1797] syz.1.421 (1797) used obsolete PPPIOCDETACH ioctl [ 55.260210][ T1826] device pim6reg1 entered promiscuous mode [ 55.473461][ T1841] device pim6reg1 entered promiscuous mode [ 55.916794][ T1874] device veth0_vlan left promiscuous mode [ 55.947887][ T1874] device veth0_vlan entered promiscuous mode [ 56.561743][ T1931] device syzkaller0 entered promiscuous mode [ 58.250685][ T1988] syz.4.478[1988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.250738][ T1988] syz.4.478[1988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.252754][ T2036] bridge0: port 3(gretap0) entered blocking state [ 60.310362][ T2036] bridge0: port 3(gretap0) entered disabled state [ 60.327567][ T2036] device gretap0 entered promiscuous mode [ 60.356085][ T2036] bridge0: port 3(gretap0) entered blocking state [ 60.362806][ T2036] bridge0: port 3(gretap0) entered forwarding state [ 61.214888][ T24] audit: type=1400 audit(1757949449.530:146): avc: denied { create } for pid=2087 comm="syz.0.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 61.930647][ T2125] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 62.320693][ T2152] device pim6reg1 entered promiscuous mode [ 63.289708][ T24] audit: type=1400 audit(1757949451.600:147): avc: denied { create } for pid=2220 comm="syz.4.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 63.483098][ T2219] device sit0 left promiscuous mode [ 63.605242][ T2224] device sit0 entered promiscuous mode [ 63.810889][ T2240] device wg2 entered promiscuous mode [ 64.783119][ T2320] device veth0_vlan left promiscuous mode [ 64.790020][ T2320] device veth0_vlan entered promiscuous mode [ 64.823577][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.838546][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.875836][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.937491][ T2324] device syzkaller0 entered promiscuous mode [ 65.385363][ T2367] device sit0 entered promiscuous mode [ 65.842814][ T2410] device syzkaller0 entered promiscuous mode [ 66.334550][ T24] audit: type=1400 audit(1757949454.650:148): avc: denied { create } for pid=2462 comm="syz.2.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 66.335706][ T2463] device pim6reg1 entered promiscuous mode [ 66.612950][ T2471] device pim6reg1 entered promiscuous mode [ 66.619244][ T24] audit: type=1400 audit(1757949454.930:149): avc: denied { create } for pid=2483 comm="syz.0.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 66.864330][ T2495] device syzkaller0 entered promiscuous mode [ 67.207833][ T2511] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.215542][ T2511] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.321342][ T2602] syz.0.646[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.321424][ T2602] syz.0.646[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.099731][ T2628] device syzkaller0 entered promiscuous mode [ 69.506372][ T24] audit: type=1400 audit(1757949457.820:150): avc: denied { create } for pid=2655 comm="syz.0.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 69.549087][ T2656] device wg2 entered promiscuous mode [ 70.524707][ T2698] tun0: tun_chr_ioctl cmd 1074025678 [ 70.535966][ T2698] tun0: group set to 1 [ 70.699986][ T24] audit: type=1400 audit(1757949459.010:151): avc: denied { create } for pid=2728 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 70.840549][ T2763] device veth0_vlan left promiscuous mode [ 70.853015][ T2763] device veth0_vlan entered promiscuous mode [ 70.877381][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.886466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.894592][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.926434][ T2782] device veth1_macvtap entered promiscuous mode [ 71.158266][ T2812] device syzkaller0 entered promiscuous mode [ 71.217701][ T2817] device veth0_vlan left promiscuous mode [ 71.231485][ T2817] device veth0_vlan entered promiscuous mode [ 71.327265][ T2824] cgroup: fork rejected by pids controller in /syz2 [ 71.789144][ T24] audit: type=1400 audit(1757949460.100:152): avc: denied { create } for pid=2948 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 71.943360][ T2952] device veth0_vlan left promiscuous mode [ 71.960661][ T2952] device veth0_vlan entered promiscuous mode [ 72.303649][ T1400] device erspan0 left promiscuous mode [ 72.318429][ T1400] GPL: port 1(erspan0) entered disabled state [ 72.391325][ T2969] device syzkaller0 entered promiscuous mode [ 72.580655][ T2975] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.590044][ T2975] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.598259][ T2975] device bridge_slave_0 entered promiscuous mode [ 72.606236][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.613792][ T2975] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.621746][ T2975] device bridge_slave_1 entered promiscuous mode [ 72.684004][ T1400] device bridge_slave_1 left promiscuous mode [ 72.691118][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.706524][ T1400] device bridge_slave_0 left promiscuous mode [ 72.713468][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.888869][ T24] audit: type=1400 audit(1757949461.200:153): avc: denied { create } for pid=2975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.917622][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.924740][ T2975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.932027][ T2975] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.939049][ T2975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.957019][ T24] audit: type=1400 audit(1757949461.230:154): avc: denied { write } for pid=2975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.003496][ T24] audit: type=1400 audit(1757949461.230:155): avc: denied { read } for pid=2975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.024394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.043683][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.054599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.063663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.072167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.092146][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.105949][ T2975] device veth0_vlan entered promiscuous mode [ 73.152171][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.170532][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.178024][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.208090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.221316][ T2975] device veth1_macvtap entered promiscuous mode [ 73.263596][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.272181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.901421][ T3035] syz.1.735 uses obsolete (PF_INET,SOCK_PACKET) [ 73.945494][ T3036] device sit0 left promiscuous mode [ 76.040758][ T3163] device syzkaller0 entered promiscuous mode [ 76.460640][ T3186] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.468923][ T3186] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.544357][ T3186] device bridge_slave_1 left promiscuous mode [ 76.558279][ T3186] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.584239][ T3186] device bridge_slave_0 left promiscuous mode [ 76.591998][ T3186] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.755007][ T3223] device wg2 left promiscuous mode [ 77.962040][ T3241] syz.3.795[3241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.962124][ T3241] syz.3.795[3241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.987950][ T3242] syz.3.795[3242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.000176][ T3244] device wg2 left promiscuous mode [ 78.047386][ T3244] syz.1.796[3244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.047450][ T3244] syz.1.796[3244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.062452][ T3244] syz.1.796[3244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.074144][ T3244] syz.1.796[3244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.161866][ T3253] ±ÿ: renamed from team_slave_1 [ 78.213123][ T24] audit: type=1400 audit(1757949466.530:156): avc: denied { create } for pid=3249 comm="syz.3.797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 79.574076][ T3318] device syzkaller0 entered promiscuous mode [ 79.868938][ T3336] device sit0 left promiscuous mode [ 80.776475][ T24] audit: type=1400 audit(1757949469.090:157): avc: denied { read } for pid=3389 comm="syz.2.837" dev="nsfs" ino=4026533087 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.860383][ T24] audit: type=1400 audit(1757949469.090:158): avc: denied { open } for pid=3389 comm="syz.2.837" path="cgroup:[4026533087]" dev="nsfs" ino=4026533087 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.797888][ T3448] device syzkaller0 entered promiscuous mode [ 81.843989][ T3453] device sit0 entered promiscuous mode [ 82.520761][ T3510] device syzkaller0 entered promiscuous mode [ 82.636651][ T3525] device syzkaller0 entered promiscuous mode [ 83.126916][ T3556] device syzkaller0 entered promiscuous mode [ 83.434657][ T3589] Â: renamed from pim6reg1 [ 83.707168][ T3583] device syzkaller0 entered promiscuous mode [ 84.266170][ T3624] device veth0_vlan left promiscuous mode [ 84.277453][ T3624] device veth0_vlan entered promiscuous mode [ 84.578016][ T3663] device syzkaller0 entered promiscuous mode [ 85.308801][ T24] audit: type=1400 audit(1757949473.620:159): avc: denied { create } for pid=3688 comm="syz.2.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 85.575016][ T3710] device pim6reg1 entered promiscuous mode [ 86.654409][ T3745] Q±6ã×\b‹¡Y­4: renamed from lo [ 86.869919][ T3757] device sit0 entered promiscuous mode [ 87.095342][ T3765] device syzkaller0 entered promiscuous mode [ 87.226604][ T3777] device pim6reg1 entered promiscuous mode [ 87.661732][ T3792] bridge0: port 3(gretap0) entered disabled state [ 87.668818][ T3792] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.677055][ T3792] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.837448][ T3810] syz.1.957[3810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.837510][ T3810] syz.1.957[3810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.840810][ T3792] device gretap0 left promiscuous mode [ 87.871945][ T3792] bridge0: port 3(gretap0) entered disabled state [ 87.898205][ T3792] device bridge_slave_1 left promiscuous mode [ 87.908559][ T3792] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.930311][ T3792] device bridge_slave_0 left promiscuous mode [ 87.938407][ T3792] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.061453][ T3824] device sit0 left promiscuous mode [ 88.719539][ T24] audit: type=1400 audit(1757949477.030:160): avc: denied { create } for pid=3921 comm="syz.0.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 88.847455][ T3926] -1: renamed from syzkaller0 [ 89.022627][ T3936] device veth0_vlan left promiscuous mode [ 89.033661][ T3936] device veth0_vlan entered promiscuous mode [ 90.744485][ T4004] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.751726][ T4004] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.857934][ T4004] device bridge_slave_1 left promiscuous mode [ 90.874029][ T4004] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.898813][ T4004] device bridge_slave_0 left promiscuous mode [ 90.924442][ T4004] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.255157][ T4028] device macsec0 left promiscuous mode [ 91.877499][ T4028] device veth1_macvtap entered promiscuous mode [ 91.898291][ T4028] device macsec0 entered promiscuous mode [ 92.132376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.900669][ T4065] device pim6reg1 entered promiscuous mode [ 93.185437][ T4095] syz.0.1034[4095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.185495][ T4095] syz.0.1034[4095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.020386][ T4102] device veth0_vlan left promiscuous mode [ 94.037961][ T4102] device veth0_vlan entered promiscuous mode [ 95.334158][ T4155] device syzkaller0 entered promiscuous mode [ 97.028512][ T4207] device pim6reg1 entered promiscuous mode [ 97.364545][ T4223] syz.1.1068[4223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.364606][ T4223] syz.1.1068[4223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.359833][ T4253] tap0: tun_chr_ioctl cmd 1074025677 [ 98.465924][ T4253] tap0: linktype set to 23 [ 98.582208][ T4262] syz.3.1078[4262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.642707][ T4271] syz.0.1080[4271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.671150][ T4271] syz.0.1080[4271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.038315][ T4329] syz.1.1093[4329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.059951][ T4329] syz.1.1093[4329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.492693][ T4329] device veth0_vlan left promiscuous mode [ 100.622210][ T4329] device veth0_vlan entered promiscuous mode [ 100.911591][ T4350] device pim6reg1 entered promiscuous mode [ 101.196699][ T4374] device pim6reg1 entered promiscuous mode [ 101.478169][ T4387] device veth1_to_team entered promiscuous mode [ 101.588784][ T4397] device wg2 entered promiscuous mode [ 102.506958][ T4465] device bridge_slave_1 left promiscuous mode [ 102.547449][ T4465] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.560948][ T4465] device bridge_slave_0 left promiscuous mode [ 102.610414][ T4465] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.913657][ T24] audit: type=1400 audit(1757949491.230:161): avc: denied { create } for pid=4473 comm="syz.0.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 103.338318][ T4492] device syzkaller0 entered promiscuous mode [ 103.861551][ T4523] device veth0_vlan left promiscuous mode [ 103.903708][ T4523] device veth0_vlan entered promiscuous mode [ 104.015746][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.032695][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.060720][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.715900][ T4560] device syzkaller0 entered promiscuous mode [ 104.904723][ T4565] device veth0_vlan left promiscuous mode [ 104.923677][ T4565] device veth0_vlan entered promiscuous mode [ 104.944181][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.974699][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.988989][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.376743][ T4612] device pim6reg1 entered promiscuous mode [ 106.770672][ T4714] device syzkaller0 entered promiscuous mode [ 107.518556][ T4738] device wg2 left promiscuous mode [ 107.543592][ T4736] device wg2 entered promiscuous mode [ 107.575928][ T4738] device wg2 entered promiscuous mode [ 107.645240][ T4745] device veth0_vlan left promiscuous mode [ 107.678951][ T4745] device veth0_vlan entered promiscuous mode [ 107.709038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.718335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.725956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.041313][ T4789] device pim6reg1 entered promiscuous mode [ 108.050097][ T4791] device veth0_vlan left promiscuous mode [ 108.057467][ T4791] device veth0_vlan entered promiscuous mode [ 108.281876][ T24] audit: type=1400 audit(1757949496.600:162): avc: denied { ioctl } for pid=4801 comm="syz.2.1234" path="cgroup:[4026533087]" dev="nsfs" ino=4026533087 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 108.713653][ T4822] device syzkaller0 entered promiscuous mode [ 109.011773][ T4831] syz.1.1243[4831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.011831][ T4831] syz.1.1243[4831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.049781][ T4833] device syzkaller0 entered promiscuous mode [ 109.346189][ T4851] device veth0_to_team entered promiscuous mode [ 109.626372][ T4872] device veth0_vlan left promiscuous mode [ 109.648563][ T4872] device veth0_vlan entered promiscuous mode [ 109.871209][ T4883] syz.4.1257[4883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.871246][ T4883] syz.4.1257[4883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.013199][ T4890] bridge0: port 3(veth1) entered blocking state [ 110.085126][ T4890] bridge0: port 3(veth1) entered disabled state [ 110.111519][ T4890] device veth1 entered promiscuous mode [ 110.118387][ T4890] bridge0: port 3(veth1) entered blocking state [ 110.124832][ T4890] bridge0: port 3(veth1) entered forwarding state [ 110.137258][ T4892] device macsec0 entered promiscuous mode [ 111.137126][ T4974] device wg2 left promiscuous mode [ 111.149532][ T4974] device wg2 entered promiscuous mode [ 112.189428][ T5031] device syzkaller0 entered promiscuous mode [ 114.955229][ T24] audit: type=1400 audit(1757949503.270:163): avc: denied { create } for pid=5196 comm="syz.2.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 115.127565][ T5202] device pim6reg1 entered promiscuous mode [ 117.235779][ T5357] device wg2 left promiscuous mode [ 117.245713][ T5357] device wg2 entered promiscuous mode [ 117.541667][ T5365] device pim6reg1 entered promiscuous mode [ 117.694002][ T5380] device pim6reg1 entered promiscuous mode [ 117.741680][ T5387] device veth1_macvtap left promiscuous mode [ 117.749727][ T5387] device veth1_macvtap entered promiscuous mode [ 117.756380][ T5387] device macsec0 entered promiscuous mode [ 117.831316][ T5397] device syzkaller0 entered promiscuous mode [ 118.520089][ T5436] device wg2 left promiscuous mode [ 118.867156][ T5468] device sit0 entered promiscuous mode [ 119.929502][ T5495] device sit0 entered promiscuous mode [ 120.462101][ T5507] device syzkaller0 entered promiscuous mode [ 121.767257][ T5521] device syzkaller0 entered promiscuous mode [ 121.909597][ T5528] syz.3.1414[5528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.909635][ T5528] syz.3.1414[5528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.947222][ T5525] device pim6reg1 entered promiscuous mode [ 121.991745][ T5525] device syzkaller0 entered promiscuous mode [ 122.176990][ T5537] device veth0_vlan left promiscuous mode [ 122.185315][ T5537] device veth0_vlan entered promiscuous mode [ 122.874510][ T5607] device pim6reg1 entered promiscuous mode [ 124.769774][ T5679] device veth1_macvtap left promiscuous mode [ 124.782641][ T5679] device macsec0 left promiscuous mode [ 124.845054][ T5689] device sit0 left promiscuous mode [ 125.955721][ T5770] syz.0.1478[5770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.955771][ T5770] syz.0.1478[5770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.181824][ T5904] device wg2 left promiscuous mode [ 128.292935][ T5907] device wg2 entered promiscuous mode [ 129.629672][ T5974] device syzkaller0 entered promiscuous mode [ 131.053175][ T6094] device pim6reg1 entered promiscuous mode [ 131.193045][ T6102] device pim6reg1 entered promiscuous mode [ 131.469655][ T6128] : renamed from pim6reg1 [ 131.482744][ T6127] device veth0_vlan left promiscuous mode [ 131.505587][ T6127] device veth0_vlan entered promiscuous mode [ 131.540582][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.555322][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.610047][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.067298][ T6225] syzkaller0: create flow: hash 2818260351 index 0 [ 133.251087][ T6219] device syzkaller0 entered promiscuous mode [ 133.331650][ T6239] device pim6reg1 entered promiscuous mode [ 133.360519][ T6225] syzkaller0 (unregistered): delete flow: hash 2818260351 index 0 [ 134.482824][ T6309] device veth0_vlan left promiscuous mode [ 134.492439][ T6309] device veth0_vlan entered promiscuous mode [ 134.656088][ T6319] device sit0 left promiscuous mode [ 134.712587][ T6319] device sit0 entered promiscuous mode [ 134.920027][ T6326] tap0: tun_chr_ioctl cmd 2147767507 [ 135.878121][ T24] audit: type=1400 audit(1757949524.190:164): avc: denied { create } for pid=6362 comm="syz.2.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 135.903410][ T6353] device syzkaller0 entered promiscuous mode [ 138.532220][ T6462] device macsec0 left promiscuous mode [ 138.700718][ T6492] device veth0_virt_wifi entered promiscuous mode [ 138.828437][ T6500] device sit0 entered promiscuous mode [ 139.211596][ T6529] device syzkaller0 entered promiscuous mode [ 139.313228][ T6532] bridge0: port 3(veth1) entered disabled state [ 140.694004][ T6617] device veth0_vlan left promiscuous mode [ 140.770145][ T6617] device veth0_vlan entered promiscuous mode [ 150.981833][ T6711] device wg2 left promiscuous mode [ 151.005986][ T6719] syz.3.1749[6719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.006037][ T6719] syz.3.1749[6719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.022215][ T6716] device sit0 left promiscuous mode [ 151.089947][ T6716] device sit0 entered promiscuous mode [ 151.225154][ T6711] device wg2 entered promiscuous mode [ 151.325858][ T6733] tap0: tun_chr_ioctl cmd 1074025680 [ 151.376609][ T6737] device pim6reg1 entered promiscuous mode [ 153.785613][ T95] udevd[95]: worker [6712] terminated by signal 33 (Unknown signal 33) [ 153.820344][ T95] udevd[95]: worker [6712] failed while handling '/devices/virtual/block/loop4' [ 153.910516][ T95] udevd[95]: worker [6714] terminated by signal 33 (Unknown signal 33) [ 153.930251][ T95] udevd[95]: worker [6714] failed while handling '/devices/virtual/block/loop0' [ 154.007427][ T6928] device sit0 left promiscuous mode [ 154.291100][ T6942] device syzkaller0 entered promiscuous mode [ 154.682808][ T6989] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 154.715269][ T6989] device syzkaller0 entered promiscuous mode [ 154.973920][ T7004] device wg2 left promiscuous mode [ 155.001276][ T7004] device wg2 entered promiscuous mode [ 155.174062][ T7013] device syzkaller0 entered promiscuous mode [ 155.584326][ T24] audit: type=1400 audit(1757949543.880:165): avc: denied { ioctl } for pid=7028 comm="syz.2.1839" path="" dev="cgroup2" ino=149 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 155.872287][ T7049] device sit0 entered promiscuous mode [ 156.211852][ T7061] device syzkaller0 entered promiscuous mode [ 156.268366][ T7072] device pim6reg1 entered promiscuous mode [ 156.670727][ T7106] ÿÿÿÿÿÿ: renamed from vlan1 [ 157.427014][ T7145] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 157.773698][ T7178] device macsec0 left promiscuous mode [ 158.860519][ T7226] syz.0.1898[7226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.862421][ T7226] syz.0.1898[7226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.984732][ T7245] device sit0 entered promiscuous mode [ 160.460275][ T7290] device sit0 left promiscuous mode [ 160.563742][ T7296] device sit0 entered promiscuous mode [ 161.232371][ T7323] device sit0 left promiscuous mode [ 161.444428][ T7330] device veth0_vlan left promiscuous mode [ 161.460769][ T7330] device veth0_vlan entered promiscuous mode [ 161.484656][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.510880][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.520713][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.801758][ T7371] syz.0.1938[7371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.801813][ T7371] syz.0.1938[7371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.813899][ T7370] syz.0.1938[7370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.830584][ T7372] syz.0.1938[7372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.857499][ T7364] device syzkaller0 entered promiscuous mode [ 162.016305][ T7380] ªªªªªª: renamed from vlan0 [ 167.085253][ T7455] device pim6reg1 entered promiscuous mode [ 167.793244][ T7514] device wg2 left promiscuous mode [ 168.086433][ T7540] device syzkaller0 entered promiscuous mode [ 168.308371][ T7551] device sit0 left promiscuous mode [ 168.475994][ T7570] device wg2 left promiscuous mode [ 169.411935][ T7620] device syzkaller0 entered promiscuous mode [ 169.798582][ T7642] device veth0_vlan left promiscuous mode [ 169.830559][ T7642] device veth0_vlan entered promiscuous mode [ 169.837534][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.888036][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 169.900544][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.986102][ T7772] device veth0_vlan left promiscuous mode [ 172.023181][ T7772] device veth0_vlan entered promiscuous mode [ 172.055643][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.066080][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.116931][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 172.846801][ T7811] device pim6reg1 entered promiscuous mode [ 173.434965][ T7869] syz.1.2075[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.435006][ T7869] syz.1.2075[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.451237][ T7869] syz.1.2075[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.463022][ T7869] syz.1.2075[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.526960][ T7869] device wg2 entered promiscuous mode [ 173.595734][ T7872] device syzkaller0 entered promiscuous mode [ 173.655265][ T7874] syzkaller0: create flow: hash 2457625917 index 1 [ 173.760195][ T7874] syzkaller0: delete flow: hash 2457625917 index 1 [ 173.992215][ T7883] device veth0_vlan left promiscuous mode [ 174.128526][ T7883] device veth0_vlan entered promiscuous mode [ 174.193912][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.217693][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.260853][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.468701][ T7981] device sit0 left promiscuous mode [ 175.592390][ T7983] device sit0 entered promiscuous mode [ 176.483291][ T8067] device veth0_vlan left promiscuous mode [ 176.496571][ T8067] device veth0_vlan entered promiscuous mode [ 177.246104][ T8177] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.253338][ T8177] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.486019][ T8192] device syzkaller0 entered promiscuous mode [ 177.583039][ T8201] device sit0 left promiscuous mode [ 177.684241][ T8218] device pim6reg1 entered promiscuous mode [ 177.851751][ T8231] syz.4.2163[8231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.851825][ T8231] syz.4.2163[8231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.000470][ T8231] device pim6reg1 entered promiscuous mode [ 178.567408][ T8248] device pim6reg1 entered promiscuous mode [ 180.228508][ T8295] device veth0_vlan left promiscuous mode [ 180.253893][ T8295] device veth0_vlan entered promiscuous mode [ 180.314919][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.326474][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.344333][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 180.364168][ T8301] device pim6reg1 entered promiscuous mode [ 180.481946][ T8304] syz.4.2185[8304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.482004][ T8304] syz.4.2185[8304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.886984][ T8315] device syzkaller0 entered promiscuous mode [ 182.543145][ T8388] device syzkaller0 entered promiscuous mode [ 183.127071][ T8465] device veth1_macvtap entered promiscuous mode [ 183.138870][ T8465] device macsec0 entered promiscuous mode [ 183.196332][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.247087][ T8467] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 183.257032][ T8467] syzkaller0: linktype set to 0 [ 183.596967][ T8528] device syzkaller0 entered promiscuous mode [ 183.933901][ T8544] device syzkaller0 entered promiscuous mode [ 184.073820][ T8561] device wg2 left promiscuous mode [ 184.351346][ T8581] device sit0 entered promiscuous mode [ 185.277827][ T8610] device macsec0 entered promiscuous mode [ 185.307753][ T8608] device wg2 entered promiscuous mode [ 186.443353][ T8678] device wg2 entered promiscuous mode [ 186.786977][ T8700] device veth0_vlan left promiscuous mode [ 186.803289][ T8700] device veth0_vlan entered promiscuous mode [ 186.810887][ T8716] syz.2.2304[8716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.827999][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.855930][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.863961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.943238][ T8736] device sit0 left promiscuous mode [ 187.042234][ T8748] device syzkaller0 entered promiscuous mode [ 187.054564][ T8749] device sit0 entered promiscuous mode [ 187.382130][ T8774] device wg2 left promiscuous mode [ 187.410002][ T8768] device wg2 entered promiscuous mode [ 187.416026][ T8774] syz.1.2318[8774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.416084][ T8774] syz.1.2318[8774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.472246][ T8779] syz.1.2318[8779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.542758][ T8779] syz.1.2318[8779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.598797][ T8779] syz.1.2318[8779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.632377][ T8778] device syzkaller0 entered promiscuous mode [ 187.663421][ T8779] syz.1.2318[8779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.749870][ T8774] device wg2 entered promiscuous mode [ 188.354919][ T8816] device veth0_to_team entered promiscuous mode [ 189.953532][ T8926] device veth0_vlan left promiscuous mode [ 189.982846][ T8926] device veth0_vlan entered promiscuous mode [ 190.018830][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.043966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.061553][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.240048][ T9013] device pim6reg1 entered promiscuous mode [ 192.971429][ T9081] device syzkaller0 entered promiscuous mode [ 193.101990][ T9096] device pim6reg1 left promiscuous mode [ 193.242329][ T9099] device pim6reg1 entered promiscuous mode [ 193.461789][ T95] udevd[95]: worker [7397] terminated by signal 33 (Unknown signal 33) [ 193.482803][ T95] udevd[95]: worker [7397] failed while handling '/devices/virtual/block/loop1' [ 193.699302][ T9137] syz.3.2420[9137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.699360][ T9137] syz.3.2420[9137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.452171][ T9159] device macsec0 entered promiscuous mode [ 194.497822][ T9161] ÿ: renamed from team_slave_1 [ 194.568535][ T9168] ªªªªªª: renamed from vlan0 [ 195.017368][ T9201] device pim6reg1 entered promiscuous mode [ 195.031908][ T9211] device pim6reg1 entered promiscuous mode [ 196.185590][ T9259] device pim6reg1 entered promiscuous mode [ 197.759805][ T9333] device pim6reg1 entered promiscuous mode [ 197.926903][ T9340] device syzkaller0 entered promiscuous mode [ 198.318561][ T9362] device sit0 entered promiscuous mode [ 199.180315][ T9408] device veth0_vlan left promiscuous mode [ 199.207777][ T9408] device veth0_vlan entered promiscuous mode [ 199.816396][ T9456] device sit0 entered promiscuous mode [ 200.131747][ T9472] device veth0_vlan left promiscuous mode [ 200.138371][ T9472] device veth0_vlan entered promiscuous mode [ 200.478758][ T9493] device syzkaller0 entered promiscuous mode [ 202.180464][ T24] audit: type=1400 audit(1757949590.490:166): avc: denied { associate } for pid=9650 comm="syz.1.2565" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 202.797181][ T9677] €Â0: renamed from pim6reg1 [ 203.764725][ T9732] device syzkaller0 entered promiscuous mode [ 203.783647][ T9751] device sit0 left promiscuous mode [ 205.233734][ T9898] device wg2 left promiscuous mode [ 205.349556][ T9898] device wg2 entered promiscuous mode [ 205.471851][ T9918] syz.4.2633[9918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.471913][ T9918] syz.4.2633[9918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.506036][ T9918] syz.4.2633[9918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.556032][ T9918] syz.4.2633[9918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.799249][ T9918] device syzkaller0 entered promiscuous mode [ 206.355443][ T9951] device pim6reg1 entered promiscuous mode [ 206.946854][ T9991] device pim6reg1 entered promiscuous mode [ 207.459908][T10044] €Â0: renamed from pim6reg1 [ 207.589430][T10057] device pim6reg1 entered promiscuous mode [ 207.727686][T10073] tap0: tun_chr_ioctl cmd 1074812118 [ 207.796375][T10073] tap0: tun_chr_ioctl cmd 1074812117 [ 208.277650][T10103] device syzkaller0 entered promiscuous mode [ 208.937746][T10133] device syzkaller0 entered promiscuous mode [ 209.387516][T10173] device wg2 left promiscuous mode [ 209.546867][T10179] device syzkaller0 entered promiscuous mode [ 210.507600][T10227] @ÿ: renamed from bond_slave_0 [ 212.047376][T10344] device wg2 left promiscuous mode [ 212.099034][T10344] device wg2 entered promiscuous mode [ 212.252752][T10364] device syzkaller0 entered promiscuous mode [ 212.742467][T10417] device syzkaller0 entered promiscuous mode [ 213.402018][ T24] audit: type=1400 audit(1757949601.720:167): avc: denied { create } for pid=10467 comm="syz.1.2784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 213.543943][T10482] device syzkaller0 entered promiscuous mode [ 214.025646][T10515] device wg2 entered promiscuous mode [ 214.178815][T10536] device pim6reg1 entered promiscuous mode [ 214.372335][T10550] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 214.451983][T10560] device wg2 left promiscuous mode [ 214.782381][T10583] device syzkaller0 entered promiscuous mode [ 214.902574][T10603] device veth0_vlan left promiscuous mode [ 214.920380][T10603] device veth0_vlan entered promiscuous mode [ 214.934867][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.945700][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 214.963678][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.021888][T10610] device syzkaller0 entered promiscuous mode [ 215.138901][T10624] device sit0 left promiscuous mode [ 215.247062][T10629] device veth0_vlan left promiscuous mode [ 215.259839][T10629] device veth0_vlan entered promiscuous mode [ 215.269857][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.288125][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.295694][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.684327][T10697] : renamed from pim6reg1 [ 216.818068][T10721] device macsec0 left promiscuous mode [ 216.895200][ T24] audit: type=1400 audit(1757949605.210:168): avc: denied { mounton } for pid=10729 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 217.080690][T10729] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.149066][T10729] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.188815][T10729] device bridge_slave_0 entered promiscuous mode [ 217.230494][T10729] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.237530][T10729] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.268829][T10729] device bridge_slave_1 entered promiscuous mode [ 217.544660][T10729] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.551752][T10729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.559032][T10729] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.566106][T10729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.685496][T10754] device veth1_macvtap left promiscuous mode [ 217.691880][T10754] device macsec0 left promiscuous mode [ 217.728239][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.738077][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.798647][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.809561][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.888276][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.936262][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.967563][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.974653][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.012051][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.020653][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.029226][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.036322][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.044133][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.052396][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.075759][T10781] @ÿ: renamed from bond_slave_0 [ 218.087204][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.095772][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.129757][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.138547][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.152845][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.161228][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.179484][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.187550][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.196299][T10729] device veth0_vlan entered promiscuous mode [ 218.239803][T10788] device syzkaller0 entered promiscuous mode [ 218.249112][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.260641][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.297966][T10729] device veth1_macvtap entered promiscuous mode [ 218.322467][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.337399][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.352046][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.397751][T10808] device wg2 entered promiscuous mode [ 218.415011][T10810] device veth0_vlan left promiscuous mode [ 218.432564][T10810] device veth0_vlan entered promiscuous mode [ 218.439527][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.468293][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.490571][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.533000][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 218.574484][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.638457][ T24] audit: type=1400 audit(1757949606.950:169): avc: denied { unmount } for pid=10729 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 219.032618][ T7] device veth0_vlan left promiscuous mode [ 219.650526][T10872] syz.3.2902[10872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.650616][T10872] syz.3.2902[10872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.811591][T10889] device pim6reg1 entered promiscuous mode [ 220.367698][T10934] device pim6reg1 entered promiscuous mode [ 220.526421][T10939] device pim6reg1 entered promiscuous mode [ 220.956708][T10950] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.009895][T10950] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.055854][T10950] device bridge_slave_0 entered promiscuous mode [ 221.154580][T10950] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.168395][T10950] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.204554][T10950] device bridge_slave_1 entered promiscuous mode [ 221.296630][T10958] device syzkaller0 entered promiscuous mode [ 221.684396][T10982] device bond_slave_0 entered promiscuous mode [ 221.711125][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 221.727704][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.849889][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.857577][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.025110][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.035017][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.043607][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.050660][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.058170][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.135537][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.144491][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.152930][ T1400] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.160072][ T1400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.244562][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.261044][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.319075][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.331183][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.355924][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.381590][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.405836][T10950] device veth0_vlan entered promiscuous mode [ 222.429163][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.459904][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.484485][T10950] device veth1_macvtap entered promiscuous mode [ 222.503378][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.525656][ T7] device veth0_vlan left promiscuous mode [ 222.776000][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.790699][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.799590][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.809694][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.257244][T11036] device syzkaller0 entered promiscuous mode [ 226.416883][T11180] device pim6reg1 entered promiscuous mode [ 226.773625][T11216] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.780957][T11216] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.788814][T11216] device bridge_slave_0 entered promiscuous mode [ 226.796262][T11216] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.803455][T11216] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.811017][T11216] device bridge_slave_1 entered promiscuous mode [ 227.077106][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.084675][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.098468][T11236] device syzkaller0 entered promiscuous mode [ 227.130391][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.139208][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.148073][ T1400] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.155318][ T1400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.164485][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.173601][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.182039][ T1400] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.189196][ T1400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.543217][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.552403][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.560934][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.586827][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.596521][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.657324][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.700615][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.731434][T11216] device veth0_vlan entered promiscuous mode [ 227.746969][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 227.755816][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.765718][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.775423][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.814171][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 227.830047][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.839931][T11216] device veth1_macvtap entered promiscuous mode [ 227.857406][T11268] syz.1.3013[11268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.857498][T11268] syz.1.3013[11268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.861424][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.894496][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.903044][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.951792][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.990783][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.010025][T11282] device pim6reg1 entered promiscuous mode [ 228.769997][T11331] device syzkaller0 entered promiscuous mode [ 228.917682][T11369] syz.4.3040[11369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.917740][T11369] syz.4.3040[11369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.001532][ T7] device veth1_macvtap left promiscuous mode [ 229.020036][ T7] device veth0_vlan left promiscuous mode [ 229.464941][T11418] device syzkaller0 entered promiscuous mode [ 229.569297][T11431] device veth0_vlan left promiscuous mode [ 229.591587][T11431] device veth0_vlan entered promiscuous mode [ 229.612148][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.630683][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.650805][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 230.244818][T11474] device macsec0 left promiscuous mode [ 230.537409][T11477] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.545194][T11477] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.553217][T11477] device bridge_slave_0 entered promiscuous mode [ 230.600313][T11477] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.635060][T11477] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.671792][T11477] device bridge_slave_1 entered promiscuous mode [ 230.988518][T11477] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.995647][T11477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.002938][T11477] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.009986][T11477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.118175][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.125790][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.133190][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.142294][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.151116][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.159262][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.166322][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.183904][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.192856][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.201295][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.208347][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.230289][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.239212][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.247799][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.259920][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.275653][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.285024][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.293841][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.308289][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.317408][T11477] device veth0_vlan entered promiscuous mode [ 231.324385][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.340499][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.362591][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.382382][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.397648][T11477] device veth1_macvtap entered promiscuous mode [ 231.466877][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.482376][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.490922][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.539014][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.567468][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.425592][ T7] device veth0_vlan left promiscuous mode [ 232.700074][T11609] tap0: tun_chr_ioctl cmd 1074025675 [ 232.716372][T11609] tap0: persist enabled [ 232.772772][T11611] tap0: tun_chr_ioctl cmd 1074025675 [ 232.779218][T11611] tap0: persist enabled [ 232.986696][T11621] device syzkaller0 entered promiscuous mode [ 233.495792][T11655] device syzkaller0 entered promiscuous mode [ 233.763117][T11672] syz.3.3129[11672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.763174][T11672] syz.3.3129[11672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.700519][T11709] syz.3.3141[11709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.724850][T11709] syz.3.3141[11709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.757651][T11710] syz.3.3141[11710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.772211][T11709] syz.3.3141[11709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.804333][T11710] syz.3.3141[11710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.761154][T11753] device syzkaller0 entered promiscuous mode [ 236.268188][T11803] syz.2.3159[11803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.269315][T11803] syz.2.3159[11803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.943101][T11881] device syzkaller0 entered promiscuous mode [ 239.352612][T11938] device syzkaller0 entered promiscuous mode [ 240.125999][ T24] audit: type=1400 audit(1757949628.440:170): avc: denied { setattr } for pid=11954 comm="syz.4.3210" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 241.004283][T11760] syz.2.3153 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 241.018475][T11760] CPU: 0 PID: 11760 Comm: syz.2.3153 Tainted: G W syzkaller #0 [ 241.027440][T11760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 241.037505][T11760] Call Trace: [ 241.040805][T11760] __dump_stack+0x21/0x24 [ 241.045141][T11760] dump_stack_lvl+0x169/0x1d8 [ 241.049831][T11760] ? show_regs_print_info+0x18/0x18 [ 241.055049][T11760] ? ___ratelimit+0x3d1/0x560 [ 241.059729][T11760] ? __kasan_check_write+0x14/0x20 [ 241.064842][T11760] ? _raw_spin_lock+0x8e/0xe0 [ 241.069527][T11760] dump_stack+0x15/0x1c [ 241.073690][T11760] dump_header+0xdd/0x650 [ 241.078024][T11760] oom_kill_process+0x1fa/0x2c0 [ 241.082874][T11760] out_of_memory+0x94a/0xd70 [ 241.087473][T11760] ? unregister_oom_notifier+0x20/0x20 [ 241.092935][T11760] ? mutex_lock_killable+0x8c/0xe0 [ 241.098045][T11760] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 241.104562][T11760] mem_cgroup_out_of_memory+0x260/0x310 [ 241.110230][T11760] ? mem_cgroup_oom_trylock+0x350/0x350 [ 241.115788][T11760] ? _raw_spin_lock+0x8e/0xe0 [ 241.120477][T11760] ? _raw_spin_trylock_bh+0x130/0x130 [ 241.125855][T11760] ? _raw_spin_unlock+0x4d/0x70 [ 241.130711][T11760] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 241.136275][T11760] ? _raw_spin_unlock_irq+0x4e/0x70 [ 241.141464][T11760] try_charge+0xf61/0x14e0 [ 241.145960][T11760] ? __memcg_kmem_charge+0x140/0x140 [ 241.151307][T11760] ? percpu_counter_add_batch+0x13c/0x160 [ 241.157023][T11760] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 241.162561][T11760] __mem_cgroup_charge+0x14c/0x6d0 [ 241.167689][T11760] shmem_add_to_page_cache+0x55e/0xe10 [ 241.173268][T11760] ? shmem_alloc_page+0x300/0x300 [ 241.178291][T11760] ? _raw_spin_lock_irqsave+0x110/0x110 [ 241.183833][T11760] ? find_lock_entry+0x4b/0x200 [ 241.188675][T11760] ? lru_cache_add+0x164/0x380 [ 241.193424][T11760] ? shmem_getpage_gfp+0x8f3/0x2110 [ 241.198615][T11760] shmem_getpage_gfp+0x8e8/0x2110 [ 241.203633][T11760] shmem_write_begin+0xce/0x1b0 [ 241.208477][T11760] generic_perform_write+0x2be/0x510 [ 241.213753][T11760] ? atime_needs_update+0x5b0/0x5b0 [ 241.218943][T11760] ? grab_cache_page_write_begin+0xb0/0xb0 [ 241.224737][T11760] ? file_remove_privs+0x580/0x580 [ 241.229841][T11760] ? __kasan_check_write+0x14/0x20 [ 241.234943][T11760] ? down_write+0xac/0x110 [ 241.239443][T11760] __generic_file_write_iter+0x24b/0x480 [ 241.245078][T11760] ? generic_write_checks+0x3d4/0x480 [ 241.250438][T11760] generic_file_write_iter+0xa9/0x1d0 [ 241.255799][T11760] __kernel_write+0x55a/0x910 [ 241.260560][T11760] ? vfs_read+0xa10/0xa10 [ 241.264893][T11760] ? populate_vma_page_range+0xf0/0xf0 [ 241.270346][T11760] ? __kasan_check_write+0x14/0x20 [ 241.275621][T11760] ? get_dump_page+0x46b/0x5b0 [ 241.280469][T11760] dump_emit+0x240/0x360 [ 241.284705][T11760] ? wait_for_dump_helpers+0x390/0x390 [ 241.290153][T11760] ? dump_user_range+0x13b/0x1a0 [ 241.295085][T11760] dump_user_range+0x6a/0x1a0 [ 241.299749][T11760] elf_core_dump+0x278a/0x2bc0 [ 241.304502][T11760] ? load_elf_binary+0x2890/0x2890 [ 241.309629][T11760] ? __fsnotify_parent+0x5ff/0x6c0 [ 241.314765][T11760] ? shmem_unused_huge_scan+0xa0/0xa0 [ 241.320159][T11760] ? do_truncate+0x1ad/0x210 [ 241.324830][T11760] ? putname+0xfe/0x150 [ 241.328982][T11760] ? __kasan_check_read+0x11/0x20 [ 241.334348][T11760] ? __ia32_sys_unshare+0x40/0x40 [ 241.339366][T11760] do_coredump+0x1ac9/0x27f0 [ 241.343948][T11760] ? simple_acl_create+0x1c0/0x1c0 [ 241.349051][T11760] ? debug_smp_processor_id+0x17/0x20 [ 241.354417][T11760] ? kmem_cache_free+0x100/0x2d0 [ 241.359343][T11760] ? ____kasan_slab_free+0x130/0x160 [ 241.364618][T11760] ? get_signal+0xb98/0x12e0 [ 241.369195][T11760] ? kmem_cache_free+0x100/0x2d0 [ 241.374128][T11760] get_signal+0xf23/0x12e0 [ 241.380423][T11760] arch_do_signal_or_restart+0xbf/0x10f0 [ 241.386058][T11760] ? __bad_area_nosemaphore+0x2b0/0x420 [ 241.391624][T11760] ? down_read_trylock+0x100/0x150 [ 241.396818][T11760] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 241.402472][T11760] ? bad_area+0x6a/0x80 [ 241.406972][T11760] exit_to_user_mode_loop+0xa2/0xe0 [ 241.412161][T11760] exit_to_user_mode_prepare+0x76/0xa0 [ 241.417618][T11760] irqentry_exit_to_user_mode+0x9/0x10 [ 241.423067][T11760] irqentry_exit+0x12/0x60 [ 241.427488][T11760] exc_page_fault+0x67/0xc0 [ 241.431979][T11760] ? asm_exc_page_fault+0x8/0x30 [ 241.436904][T11760] asm_exc_page_fault+0x1e/0x30 [ 241.441741][T11760] RIP: 0033:0x8a7f [ 241.445452][T11760] Code: Unable to access opcode bytes at RIP 0x8a55. [ 241.452130][T11760] RSP: 002b:00002000000002a8 EFLAGS: 00010217 [ 241.458189][T11760] RAX: 0000000000000000 RBX: 00007f69aecb9fa0 RCX: 00007f69aea72ba9 [ 241.466325][T11760] RDX: 0000200000000000 RSI: 00002000000002a0 RDI: 0000000020000000 [ 241.474390][T11760] RBP: 00007f69aeaf5e19 R08: 0000200000000740 R09: 0000200000000740 [ 241.482527][T11760] R10: 0000200000000080 R11: 0000000000000206 R12: 0000000000000000 [ 241.490490][T11760] R13: 00007f69aecba038 R14: 00007f69aecb9fa0 R15: 00007ffc228e4a08 [ 241.511167][T11760] memory: usage 307200kB, limit 307200kB, failcnt 10121 [ 241.523717][T11760] memory+swap: usage 422092kB, limit 9007199254740988kB, failcnt 0 [ 241.531799][T11760] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 241.538691][T11760] Memory cgroup stats for /syz2: [ 241.538819][T11760] anon 405504 [ 241.538819][T11760] file 303857664 [ 241.538819][T11760] kernel_stack 0 [ 241.538819][T11760] percpu 0 [ 241.538819][T11760] sock 0 [ 241.538819][T11760] shmem 303722496 [ 241.538819][T11760] file_mapped 135168 [ 241.538819][T11760] file_dirty 135168 [ 241.538819][T11760] file_writeback 0 [ 241.538819][T11760] anon_thp 0 [ 241.538819][T11760] inactive_anon 308391936 [ 241.538819][T11760] active_anon 6082560 [ 241.538819][T11760] inactive_file 106496 [ 241.538819][T11760] active_file 196608 [ 241.538819][T11760] unevictable 0 [ 241.538819][T11760] slab_reclaimable 0 [ 241.538819][T11760] slab_unreclaimable 0 [ 241.538819][T11760] slab 0 [ 241.538819][T11760] workingset_refault_anon 33 [ 241.538819][T11760] workingset_refault_file 33 [ 241.538819][T11760] workingset_activate_anon 0 [ 241.538819][T11760] workingset_activate_file 33 [ 241.538819][T11760] workingset_restore_anon 0 [ 241.538819][T11760] workingset_restore_file 33 [ 241.627391][T11990] device syzkaller0 entered promiscuous mode [ 241.640605][T11760] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.3153,pid=11758,uid=0 [ 241.661536][T11760] Memory cgroup out of memory: Killed process 11758 (syz.2.3153) total-vm:90040kB, anon-rss:1112kB, file-rss:53372kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 241.679410][ T27] oom_reaper: reaped process 11758 (syz.2.3153), now anon-rss:0kB, file-rss:53308kB, shmem-rss:0kB [ 241.883183][T11767] syz.2.3153 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 241.976983][T12013] device syzkaller0 entered promiscuous mode [ 241.992002][T11767] CPU: 1 PID: 11767 Comm: syz.2.3153 Tainted: G W syzkaller #0 [ 242.000883][T11767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 242.010951][T11767] Call Trace: [ 242.014250][T11767] __dump_stack+0x21/0x24 [ 242.018589][T11767] dump_stack_lvl+0x169/0x1d8 [ 242.023282][T11767] ? show_regs_print_info+0x18/0x18 [ 242.028582][T11767] ? ___ratelimit+0x3d1/0x560 [ 242.033270][T11767] ? __kasan_check_write+0x14/0x20 [ 242.038386][T11767] ? _raw_spin_lock+0x8e/0xe0 [ 242.043110][T11767] dump_stack+0x15/0x1c [ 242.047261][T11767] dump_header+0xdd/0x650 [ 242.051597][T11767] oom_kill_process+0x1fa/0x2c0 [ 242.056459][T11767] out_of_memory+0x94a/0xd70 [ 242.061058][T11767] ? unregister_oom_notifier+0x20/0x20 [ 242.066505][T11767] ? mutex_lock_killable+0x8c/0xe0 [ 242.071604][T11767] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 242.078274][T11767] mem_cgroup_out_of_memory+0x260/0x310 [ 242.083812][T11767] ? mem_cgroup_oom_trylock+0x350/0x350 [ 242.089344][T11767] ? _raw_spin_lock+0x8e/0xe0 [ 242.094101][T11767] ? _raw_spin_trylock_bh+0x130/0x130 [ 242.099458][T11767] ? _raw_spin_unlock+0x4d/0x70 [ 242.104311][T11767] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 242.109844][T11767] ? _raw_spin_unlock_irq+0x4e/0x70 [ 242.115031][T11767] try_charge+0xf61/0x14e0 [ 242.119441][T11767] ? __memcg_kmem_charge+0x140/0x140 [ 242.124802][T11767] ? percpu_counter_add_batch+0x13c/0x160 [ 242.130843][T11767] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 242.136453][T11767] __mem_cgroup_charge+0x14c/0x6d0 [ 242.141558][T11767] shmem_add_to_page_cache+0x55e/0xe10 [ 242.147010][T11767] ? shmem_alloc_page+0x300/0x300 [ 242.152025][T11767] ? _raw_spin_lock_irqsave+0x110/0x110 [ 242.157561][T11767] ? find_lock_entry+0x4b/0x200 [ 242.162406][T11767] ? lru_cache_add+0x164/0x380 [ 242.167180][T11767] ? shmem_getpage_gfp+0x8f3/0x2110 [ 242.172453][T11767] shmem_getpage_gfp+0x8e8/0x2110 [ 242.177474][T11767] shmem_write_begin+0xce/0x1b0 [ 242.182316][T11767] generic_perform_write+0x2be/0x510 [ 242.187611][T11767] ? atime_needs_update+0x5b0/0x5b0 [ 242.192952][T11767] ? grab_cache_page_write_begin+0xb0/0xb0 [ 242.198854][T11767] ? file_remove_privs+0x580/0x580 [ 242.204053][T11767] ? __kasan_check_write+0x14/0x20 [ 242.209251][T11767] ? down_write+0xac/0x110 [ 242.213663][T11767] __generic_file_write_iter+0x24b/0x480 [ 242.219283][T11767] ? generic_write_checks+0x3d4/0x480 [ 242.224644][T11767] generic_file_write_iter+0xa9/0x1d0 [ 242.230012][T11767] __kernel_write+0x55a/0x910 [ 242.234687][T11767] ? vfs_read+0xa10/0xa10 [ 242.239008][T11767] ? __irq_exit_rcu+0x40/0x150 [ 242.243775][T11767] ? populate_vma_page_range+0xf0/0xf0 [ 242.249228][T11767] ? __kasan_check_write+0x14/0x20 [ 242.254327][T11767] ? get_dump_page+0x46b/0x5b0 [ 242.259081][T11767] dump_emit+0x240/0x360 [ 242.263312][T11767] ? wait_for_dump_helpers+0x390/0x390 [ 242.268757][T11767] dump_user_range+0x6a/0x1a0 [ 242.273424][T11767] elf_core_dump+0x278a/0x2bc0 [ 242.278178][T11767] ? load_elf_binary+0x2890/0x2890 [ 242.283278][T11767] ? __fsnotify_parent+0x5ff/0x6c0 [ 242.288465][T11767] ? shmem_unused_huge_scan+0xa0/0xa0 [ 242.293838][T11767] ? do_truncate+0x1ad/0x210 [ 242.298416][T11767] ? putname+0xfe/0x150 [ 242.302568][T11767] ? __kasan_check_read+0x11/0x20 [ 242.307668][T11767] ? __ia32_sys_unshare+0x40/0x40 [ 242.312681][T11767] do_coredump+0x1ac9/0x27f0 [ 242.317263][T11767] ? simple_acl_create+0x1c0/0x1c0 [ 242.322361][T11767] ? debug_smp_processor_id+0x17/0x20 [ 242.327724][T11767] ? kmem_cache_free+0x100/0x2d0 [ 242.332653][T11767] ? ____kasan_slab_free+0x130/0x160 [ 242.337926][T11767] ? get_signal+0xb98/0x12e0 [ 242.342504][T11767] ? kmem_cache_free+0x100/0x2d0 [ 242.347435][T11767] get_signal+0xf23/0x12e0 [ 242.351845][T11767] arch_do_signal_or_restart+0xbf/0x10f0 [ 242.357470][T11767] ? __bad_area_nosemaphore+0x2b0/0x420 [ 242.363002][T11767] ? down_read_trylock+0x100/0x150 [ 242.368108][T11767] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 242.373730][T11767] ? bad_area+0x6a/0x80 [ 242.377877][T11767] exit_to_user_mode_loop+0xa2/0xe0 [ 242.383147][T11767] exit_to_user_mode_prepare+0x76/0xa0 [ 242.388614][T11767] irqentry_exit_to_user_mode+0x9/0x10 [ 242.394061][T11767] irqentry_exit+0x12/0x60 [ 242.398464][T11767] exc_page_fault+0x67/0xc0 [ 242.402955][T11767] ? asm_exc_page_fault+0x8/0x30 [ 242.407974][T11767] asm_exc_page_fault+0x1e/0x30 [ 242.412813][T11767] RIP: 0033:0x8a7f [ 242.416527][T11767] Code: Unable to access opcode bytes at RIP 0x8a55. [ 242.423190][T11767] RSP: 002b:00002000000002a8 EFLAGS: 00010217 [ 242.429265][T11767] RAX: 0000000000000000 RBX: 00007f69aecb9fa0 RCX: 00007f69aea72ba9 [ 242.437227][T11767] RDX: 0000200000000000 RSI: 00002000000002a0 RDI: 0000000020000000 [ 242.445189][T11767] RBP: 00007f69aeaf5e19 R08: 0000200000000740 R09: 0000200000000740 [ 242.453150][T11767] R10: 0000200000000080 R11: 0000000000000206 R12: 0000000000000000 [ 242.461129][T11767] R13: 00007f69aecba038 R14: 00007f69aecb9fa0 R15: 00007ffc228e4a08 [ 242.477992][T11767] memory: usage 288712kB, limit 307200kB, failcnt 11232 [ 242.518599][T11767] memory+swap: usage 391016kB, limit 9007199254740988kB, failcnt 0 [ 242.570203][T11767] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 242.646402][T11767] Memory cgroup stats for /syz2: [ 242.646523][T11767] anon 270336 [ 242.646523][T11767] file 284798976 [ 242.646523][T11767] kernel_stack 0 [ 242.646523][T11767] percpu 0 [ 242.646523][T11767] sock 0 [ 242.646523][T11767] shmem 284934144 [ 242.646523][T11767] file_mapped 135168 [ 242.646523][T11767] file_dirty 135168 [ 242.646523][T11767] file_writeback 0 [ 242.646523][T11767] anon_thp 0 [ 242.646523][T11767] inactive_anon 282464256 [ 242.646523][T11767] active_anon 5947392 [ 242.646523][T11767] inactive_file 106496 [ 242.646523][T11767] active_file 8192 [ 242.646523][T11767] unevictable 0 [ 242.646523][T11767] slab_reclaimable 0 [ 242.646523][T11767] slab_unreclaimable 0 [ 242.646523][T11767] slab 0 [ 242.646523][T11767] workingset_refault_anon 33 [ 242.646523][T11767] workingset_refault_file 165 [ 242.646523][T11767] workingset_activate_anon 0 [ 242.646523][T11767] workingset_activate_file 132 [ 242.646523][T11767] workingset_restore_anon 0 [ 242.646523][T11767] workingset_restore_file 99 [ 242.891036][T11767] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.3153,pid=11772,uid=0 [ 242.945821][T11767] Memory cgroup out of memory: Killed process 11772 (syz.2.3153) total-vm:90172kB, anon-rss:1088kB, file-rss:49916kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 243.209035][T12057] device syzkaller0 entered promiscuous mode [ 243.923535][T12101] device wg2 entered promiscuous mode [ 244.479291][T12130] device syzkaller0 entered promiscuous mode [ 244.812231][ T2975] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 244.911998][ T2975] CPU: 0 PID: 2975 Comm: syz-executor Tainted: G W syzkaller #0 [ 244.920962][ T2975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 244.931022][ T2975] Call Trace: [ 244.934324][ T2975] __dump_stack+0x21/0x24 [ 244.938653][ T2975] dump_stack_lvl+0x169/0x1d8 [ 244.943349][ T2975] ? show_regs_print_info+0x18/0x18 [ 244.948563][ T2975] ? ___ratelimit+0x3d1/0x560 [ 244.953255][ T2975] ? __kasan_check_write+0x14/0x20 [ 244.958375][ T2975] ? _raw_spin_lock+0x8e/0xe0 [ 244.963055][ T2975] dump_stack+0x15/0x1c [ 244.967214][ T2975] dump_header+0xdd/0x650 [ 244.971548][ T2975] oom_kill_process+0x1fa/0x2c0 [ 244.976391][ T2975] out_of_memory+0x94a/0xd70 [ 244.980969][ T2975] ? unregister_oom_notifier+0x20/0x20 [ 244.986415][ T2975] ? mutex_lock_killable+0x8c/0xe0 [ 244.991516][ T2975] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 244.998009][ T2975] mem_cgroup_out_of_memory+0x260/0x310 [ 245.003546][ T2975] ? mem_cgroup_oom_trylock+0x350/0x350 [ 245.009079][ T2975] ? _raw_spin_lock+0x8e/0xe0 [ 245.013743][ T2975] ? _raw_spin_trylock_bh+0x130/0x130 [ 245.019100][ T2975] ? _raw_spin_unlock+0x4d/0x70 [ 245.023940][ T2975] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 245.029471][ T2975] ? _raw_spin_unlock_irq+0x4e/0x70 [ 245.034659][ T2975] try_charge+0xf61/0x14e0 [ 245.039065][ T2975] ? __memcg_kmem_charge+0x140/0x140 [ 245.044339][ T2975] ? get_page_from_freelist+0x2235/0x23d0 [ 245.050046][ T2975] ? _raw_spin_trylock+0xb1/0x140 [ 245.055065][ T2975] ? __add_to_page_cache_locked+0x7f6/0x980 [ 245.060949][ T2975] ? read_pages+0x636/0xb50 [ 245.065440][ T2975] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 245.070978][ T2975] __mem_cgroup_charge+0x14c/0x6d0 [ 245.076078][ T2975] __add_to_page_cache_locked+0x1e7/0x980 [ 245.081796][ T2975] ? __page_cache_release+0x893/0x920 [ 245.087158][ T2975] ? __alloc_pages_nodemask+0x268/0x5f0 [ 245.092709][ T2975] ? put_page+0xd0/0xd0 [ 245.096855][ T2975] ? workingset_activation+0x250/0x250 [ 245.102313][ T2975] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 245.107940][ T2975] ? find_get_entry+0x366/0x3c0 [ 245.112781][ T2975] ? page_cache_prev_miss+0x210/0x270 [ 245.118145][ T2975] add_to_page_cache_lru+0xa7/0x210 [ 245.123338][ T2975] pagecache_get_page+0x704/0x930 [ 245.128351][ T2975] filemap_fault+0x1ac7/0x2040 [ 245.133249][ T2975] ? generic_file_read_iter+0x560/0x560 [ 245.138825][ T2975] ? wait_consider_task+0x128f/0x28b0 [ 245.144217][ T2975] ? filemap_allow_speculation+0x10/0x10 [ 245.149839][ T2975] ? __kasan_check_write+0x14/0x20 [ 245.154940][ T2975] ext4_filemap_fault+0x8a/0xa0 [ 245.159781][ T2975] handle_pte_fault+0x1fa5/0x3750 [ 245.164807][ T2975] handle_mm_fault+0xf3f/0x16a0 [ 245.169649][ T2975] ? can_reuse_spf_vma+0xe0/0xe0 [ 245.174577][ T2975] ? kernel_wait4+0x1fe/0x260 [ 245.179243][ T2975] ? __kasan_check_write+0x14/0x20 [ 245.184346][ T2975] ? down_read_trylock+0x100/0x150 [ 245.189441][ T2975] ? __init_rwsem+0x1c0/0x1c0 [ 245.194106][ T2975] ? vmacache_update+0xb7/0x120 [ 245.198961][ T2975] ? find_vma+0x13b/0x150 [ 245.203302][ T2975] do_user_addr_fault+0x5a2/0xc80 [ 245.208332][ T2975] ? do_kern_addr_fault+0x80/0x80 [ 245.213354][ T2975] ? debug_smp_processor_id+0x17/0x20 [ 245.218711][ T2975] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 245.224766][ T2975] exc_page_fault+0x5a/0xc0 [ 245.229263][ T2975] ? asm_exc_page_fault+0x8/0x30 [ 245.234187][ T2975] asm_exc_page_fault+0x1e/0x30 [ 245.239144][ T2975] RIP: 0033:0x7f69ae949be4 [ 245.243550][ T2975] Code: 85 ed 09 00 00 48 b8 db 34 b6 d7 82 de 1b 43 48 f7 a4 24 98 00 00 00 48 8b 05 b8 fb e9 00 48 69 8c 24 90 00 00 00 e8 03 00 00 <8b> 78 08 48 8b 44 24 18 48 c1 ea 12 4c 8b 0d c9 fa e9 00 48 01 d1 [ 245.263141][ T2975] RSP: 002b:00007ffc228e4d90 EFLAGS: 00010202 [ 245.269199][ T2975] RAX: 0000001b2d524000 RBX: 00000000000006d6 RCX: 000000000003b920 [ 245.277163][ T2975] RDX: 000000000c0f9bec RSI: 00007ffc228e4e20 RDI: 000000002e024b3c [ 245.285124][ T2975] RBP: 00007ffc228e4dcc R08: 00000000000000f4 R09: 002d4fdff9978206 [ 245.293109][ T2975] R10: 0000007ea05efd89 R11: 000000000000b09e R12: 0000000000001388 [ 245.301073][ T2975] R13: 00000000000927c0 R14: 000000000003bbe7 R15: 00007ffc228e4e20 [ 245.314636][ T2975] memory: usage 306920kB, limit 307200kB, failcnt 13527 [ 245.342665][ T2975] memory+swap: usage 415360kB, limit 9007199254740988kB, failcnt 0 [ 245.391667][ T2975] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 245.398541][ T2975] Memory cgroup stats for /syz2: [ 245.398671][ T2975] anon 270336 [ 245.398671][ T2975] file 307236864 [ 245.398671][ T2975] kernel_stack 0 [ 245.398671][ T2975] percpu 0 [ 245.398671][ T2975] sock 0 [ 245.398671][ T2975] shmem 306966528 [ 245.398671][ T2975] file_mapped 135168 [ 245.398671][ T2975] file_dirty 135168 [ 245.398671][ T2975] file_writeback 0 [ 245.398671][ T2975] anon_thp 0 [ 245.398671][ T2975] inactive_anon 307359744 [ 245.398671][ T2975] active_anon 4595712 [ 245.398671][ T2975] inactive_file 106496 [ 245.398671][ T2975] active_file 8192 [ 245.398671][ T2975] unevictable 0 [ 245.398671][ T2975] slab_reclaimable 0 [ 245.398671][ T2975] slab_unreclaimable 0 [ 245.398671][ T2975] slab 0 [ 245.398671][ T2975] workingset_refault_anon 33 [ 245.398671][ T2975] workingset_refault_file 198 [ 245.398671][ T2975] workingset_activate_anon 0 [ 245.398671][ T2975] workingset_activate_file 165 [ 245.398671][ T2975] workingset_restore_anon 0 [ 245.398671][ T2975] workingset_restore_file 132 [ 245.643164][ T2975] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.3153,pid=11771,uid=0 [ 245.663716][ T2975] Memory cgroup out of memory: Killed process 11771 (syz.2.3153) total-vm:90172kB, anon-rss:1092kB, file-rss:53372kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 245.684219][ T27] oom_reaper: reaped process 11771 (syz.2.3153), now anon-rss:0kB, file-rss:53308kB, shmem-rss:0kB [ 248.640617][T12299] device pim6reg1 entered promiscuous mode [ 249.043320][T12307] device pim6reg1 entered promiscuous mode [ 249.081281][T12316] device sit0 entered promiscuous mode [ 249.303967][T12323] syz.4.3315[12323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.452450][T12397] syz.2.3336[12397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.515190][T12397] syz.2.3336[12397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.562996][ T24] audit: type=1400 audit(1757949642.880:171): avc: denied { create } for pid=12521 comm="syz.2.3369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 255.244875][T12585] device syzkaller0 entered promiscuous mode [ 255.311811][T12597] device sit0 left promiscuous mode [ 255.343284][T12590] device sit0 entered promiscuous mode [ 255.638810][T12609] device wg2 entered promiscuous mode [ 255.961970][T12635] device sit0 entered promiscuous mode [ 256.481895][T12673] device pim6reg1 entered promiscuous mode [ 256.557007][T12685] device syzkaller0 entered promiscuous mode [ 256.916174][T12706] device pim6reg1 entered promiscuous mode [ 257.142941][T12719] device veth0_vlan left promiscuous mode [ 257.154120][T12719] device veth0_vlan entered promiscuous mode [ 257.259406][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.301106][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.308744][ T1400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.594014][T12765] device sit0 left promiscuous mode [ 257.699660][T12758] device pim6reg1 entered promiscuous mode [ 257.720992][T12770] device sit0 entered promiscuous mode [ 257.921352][T12776] device pim6reg1 entered promiscuous mode [ 258.385365][T12824] device veth1_macvtap left promiscuous mode [ 259.666028][T12941] device sit0 left promiscuous mode [ 259.791366][T12943] device sit0 entered promiscuous mode [ 260.227950][T12972] device veth1_macvtap left promiscuous mode [ 260.248179][T12972] device macsec0 entered promiscuous mode [ 260.634923][T13039] Ÿë: port 1(veth0_to_team) entered blocking state [ 260.645758][T13039] Ÿë: port 1(veth0_to_team) entered disabled state [ 260.819805][T13050] syz.2.3516[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.825038][T13050] syz.2.3516[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.329821][T13075] device syzkaller0 entered promiscuous mode [ 261.362656][T13073] device sit0 entered promiscuous mode [ 261.776800][T13118] device sit0 left promiscuous mode [ 262.355172][T13162] device sit0 left promiscuous mode [ 262.888138][T13189] device wg2 entered promiscuous mode [ 263.006382][T13198] device sit0 entered promiscuous mode [ 263.914782][T13220] device pim6reg1 entered promiscuous mode [ 264.035422][T13233] device syzkaller0 entered promiscuous mode [ 264.462903][T13241] device syzkaller0 entered promiscuous mode [ 264.493195][T13248] device syzkaller0 left promiscuous mode [ 264.875474][T13284] device sit0 entered promiscuous mode [ 265.010250][T13291] ªªªªªª: renamed from vlan0 [ 265.993717][T13343] device wg2 left promiscuous mode [ 266.466503][T13351] device syzkaller0 entered promiscuous mode [ 266.742533][T13372] device pim6reg1 entered promiscuous mode [ 266.980804][T13386] device pim6reg1 entered promiscuous mode [ 267.753588][T13414] device syzkaller0 entered promiscuous mode [ 267.837969][T13427] syz.0.3631[13427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.838024][T13427] syz.0.3631[13427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.296105][T13450] device syzkaller0 entered promiscuous mode [ 268.938192][T13502] device pim6reg1 entered promiscuous mode [ 269.848366][T13536] GPL: port 1(vlan0) entered blocking state [ 269.870325][T13536] GPL: port 1(vlan0) entered disabled state [ 269.878979][T13536] device vlan0 entered promiscuous mode [ 270.172354][T13559] @ÿ: renamed from bond_slave_0 [ 270.429358][T13576] device syzkaller0 entered promiscuous mode [ 271.031588][T13602] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 271.120096][T13606] device syzkaller0 entered promiscuous mode [ 271.185554][T13606] syz.2.3681[13606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.185636][T13606] syz.2.3681[13606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.397146][T13618] device wg2 entered promiscuous mode [ 271.672979][T13662] device macsec0 entered promiscuous mode [ 272.493012][T13695] device sit0 entered promiscuous mode [ 272.623174][T13736] device veth0_vlan left promiscuous mode [ 272.629158][T13736] device veth0_vlan entered promiscuous mode [ 272.651811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.663726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.672187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.314464][T13799] device syzkaller0 entered promiscuous mode [ 273.844934][T13838] device syzkaller0 entered promiscuous mode