last executing test programs: 1.282888772s ago: executing program 1 (id=1507): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2100000000000000, 0x80000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0xe, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x1c, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 1.282366532s ago: executing program 1 (id=1508): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='reclaim_retry_zone\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xf7, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd65e0ffff00122f00631177fbac141416e000030a44079f03b180006000000000845013f2325f1a392f050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff40000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x60}, 0x50) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x803}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r4) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random="ec9dafdd17be"}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x98}, [@ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x102}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000380)={'pim6reg\x00', @random="9bd6641e2afe"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) close(0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xb, 0x9, 0x0, 0x0, 0xdfcb}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc, 0x7}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.185009273s ago: executing program 2 (id=1513): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xe}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, 0x0) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000"], 0xffdd) 1.133016594s ago: executing program 0 (id=1515): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x14, 0xe, &(0x7f0000000c00)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0xffffffff, 0x1, 0x0, 0x3ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000061108a0000000000950000000002becb68c04f5bdad70000005294af14dddb1840e2a2833e850cf8e276d623981c5c4af4b91abb55402abd1d5d32dddb3dbf48a04e3b68fab78baa62ab8a1bd4a23238036ac931a2e7d2fab51aeca748a6ec"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0xb6, &(0x7f0000000080)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 1.099249514s ago: executing program 1 (id=1517): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETOFFLOAD(r0, 0x5421, 0x110e22fff5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.060332855s ago: executing program 0 (id=1520): close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x57, 0x10, &(0x7f0000000000), 0xffffffffffffffc9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000008c0)="69c5", 0x3ec0}], 0x1}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2dc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x74, 0x1, 0x0, 0x1, 0x0, 0x800000000000003, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x6, 0x4000000000}, 0x10429d, 0x0, 0x80000000, 0x0, 0x0, 0x77}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x40042408, r3) r5 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x1b) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) 1.060034804s ago: executing program 2 (id=1521): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000700)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)={'c', ' *:* ', 'r\x00'}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) 1.059700335s ago: executing program 1 (id=1522): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x10, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0xb, 0x3d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffc0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x2, 0x10001, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xd4, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x5}, @enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x9, 0x9c}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xf, 0x2}, {0xd, 0x2}, {0x9}, {0xd, 0x3}, {0x7, 0x1}, {0xa, 0x3}, {0xd, 0x3}]}, @datasec={0x1, 0x3, 0x0, 0xf, 0x1, [{0x2, 0x8, 0x8}, {0x5, 0xd2, 0x9}, {0x5, 0x6, 0x1}], "f0"}, @var={0x5, 0x0, 0x0, 0xe, 0x5}]}}, &(0x7f0000000a00)=""/126, 0xc2, 0x7e, 0x0, 0x4, 0x10000, @value}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r1}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r1}, 0x38) 1.059530124s ago: executing program 2 (id=1523): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x8442, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 1.059251284s ago: executing program 0 (id=1524): openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0xffffffffffffffff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x70182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x2, &(0x7f0000000500)=ANY=[@ANYBLOB="85200000154000008520"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.005491065s ago: executing program 0 (id=1525): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000005300000085000000080000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e107000000000000007cde9e8f4b9197701b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8f91633a8b9c70e804744dc081ac69cfea08e4e5a06f70c67a8f2888d6fd95f20202866918c3c3771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f439547b4dac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 931.198647ms ago: executing program 2 (id=1530): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="2f03", 0x2}], 0x1, 0x0, 0x0, 0x800}, 0x20004011) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180), 0x4) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x31, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) 821.092698ms ago: executing program 4 (id=1532): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a0300fef0ffffff79a400fe00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c850000007a000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 815.869688ms ago: executing program 4 (id=1533): ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8922, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(r0, 0x8910, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) 785.655379ms ago: executing program 4 (id=1534): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000002280)=ANY=[@ANYBLOB="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"/3594], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x3a, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d5003aff010000001400000500243209880bd320d98a61a90021e9bf", 0x0, 0x401, 0x44000000, 0xfffffffffffffe85, 0xa6, &(0x7f00000011c0)="59235bd7a9324ff307d87177332368fbdeefaa1544600ea1870645446c357de433206896637019b84d57c3de1ea07638e494dd701db1af6fc15db78cf79f5ab4bc7aee8553677ffe377a35b4afdb989fb7da1ff63956ffb796d51daf1c268b9f1a4a06583f8c03ec1671b151a8a495c1b006fa5f2f3a54a46aeee8005b178b9516d2b928984ccb942fa2278a2e33a0b619f2dd814fc91942e03c48fd9b7d19d9a6612b46805b267ef3132a724cbfcd1c715be67930e2ae2b9a2479c5a4b2fecd301a745a6fd67598a5e5ecc1e56e58159c47def7f9285acfedc980596377e6f9ee076fa094e5d8f838b718ed63ff8265a1dbc1549bed03e6b27b6fc2b8a07373506a1a41d5a71cbf0eaa24ec737b02a8a2d5114c3c4e5810a2c3eae3373fd341800cfb0fb35cefe04ca4da2b02a83c40126e23cdf3c817b530bbe7b431bc0b7d864e3e6dd1ab90259a8bd7ad7dd4c6366ea6da661fd016b394adcce5988fff85fbc832a927c97b89337e195f562cd284911eef1ee52e4ff033b33beedea7cf43c4d0cc0471fa91011e1e7e8733bf82c01346d6ecb49f1a84e92d063c81a7227d89be33f7273b87e29ae53a5f38dc94cf391fcb82c9432821ef1a0f6bbfe8f7d6574479a8f621e1d8f7d9bb20f3d8d469e6d232d7d7837ff12a224a65c604907e787baaf7c863ad48a5edecbe1470c20507a6ee5dee75e9ef84c71af5af800a9ce9787ebdee9e1c8189fbf66048d5c3757fb2b697ce68cfd316a7b25a385111e0cd2fddb81602e36e74c4f99b403cb304a4774e648054c0456c7869f9d97873ff80e2664c1265292941a9b767c7f40767cfccdbcaa156453d6a910fd5440f7a2bf8f4bb6d6d9fd443f2304617a684b6afa99c157dcf70e51fdb55fd0dbf5c6733841024599f8d1791a07c5dc3a4ccaf4d7c0ca3d101b2beba3a49d2378c9fe4fdb10babd95083a0c4db5a30c4490828d97efe807a13e587fbac1089843964facfd27d287262759384fe9b610f81048be430c1e8fe6327c0f2fd003021d20563ec0c7e39aec6718649c958da2e02cb3848c76924492678889c18bea02ed5ee080106e9838cbca9ad5f66c0434182225b13a236b342cf80562c10d4a3459aea17589b84904d3d2c2b", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd, 0x2}, 0x25) 729.22951ms ago: executing program 4 (id=1536): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[], 0xfdef) 726.43309ms ago: executing program 4 (id=1537): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x8010, 0x10000000000000c8, 0x9}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000801) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[], 0xfdef) 577.419761ms ago: executing program 3 (id=1540): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xffffffff, 0x4}, 0x0, 0x0, 0x1000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000009e00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r4, 0x0, 0x2123) ioctl$SIOCSIFHWADDR(r3, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @local}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 571.112372ms ago: executing program 3 (id=1541): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100020, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff6f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) 562.258032ms ago: executing program 4 (id=1542): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000680)=""/187, 0xbb}], 0x1}, 0x100) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1}, 0x4051) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x20008840) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) 461.223193ms ago: executing program 3 (id=1543): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x2d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) socketpair(0xa, 0x3, 0xff, &(0x7f0000000180)) 460.976743ms ago: executing program 3 (id=1544): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) 456.617123ms ago: executing program 3 (id=1545): bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 401.969434ms ago: executing program 3 (id=1546): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) 177.415998ms ago: executing program 1 (id=1547): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="10000000040000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r1}, 0xc) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000400000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pid(r5, &(0x7f0000000340), 0x12) 177.136038ms ago: executing program 0 (id=1548): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000380)}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0xfffffffd, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 125.645488ms ago: executing program 1 (id=1549): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x6, 0x23, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000080), 0x1003, r1}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x15, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) 94.583708ms ago: executing program 32 (id=1549): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x6, 0x23, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000080), 0x1003, r1}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x15, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) 92.614708ms ago: executing program 0 (id=1551): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 90.030429ms ago: executing program 33 (id=1551): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 49.393349ms ago: executing program 2 (id=1552): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x6, 0x3, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32], 0x48) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) 204.51µs ago: executing program 2 (id=1553): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000f000000150000000000000027000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x8e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 0s ago: executing program 34 (id=1553): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000f000000150000000000000027000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x8e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.109' (ED25519) to the list of known hosts. [ 24.881122][ T24] audit: type=1400 audit(1747536550.570:80): avc: denied { mounton } for pid=260 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.882357][ T260] cgroup: Unknown subsys name 'net' [ 24.903783][ T24] audit: type=1400 audit(1747536550.570:81): avc: denied { mount } for pid=260 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.931006][ T24] audit: type=1400 audit(1747536550.600:82): avc: denied { unmount } for pid=260 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.931239][ T260] cgroup: Unknown subsys name 'devices' [ 24.950764][ T24] audit: type=1400 audit(1747536550.600:83): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 25.124851][ T260] cgroup: Unknown subsys name 'hugetlb' [ 25.130454][ T260] cgroup: Unknown subsys name 'rlimit' [ 25.301362][ T24] audit: type=1400 audit(1747536550.990:84): avc: denied { setattr } for pid=260 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.324734][ T24] audit: type=1400 audit(1747536550.990:85): avc: denied { mounton } for pid=260 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.349512][ T24] audit: type=1400 audit(1747536550.990:86): avc: denied { mount } for pid=260 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.356053][ T262] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.381551][ T24] audit: type=1400 audit(1747536551.070:87): avc: denied { relabelto } for pid=262 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.407095][ T24] audit: type=1400 audit(1747536551.070:88): avc: denied { write } for pid=262 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.438624][ T24] audit: type=1400 audit(1747536551.130:89): avc: denied { read } for pid=260 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.464328][ T260] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.355043][ T268] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.362124][ T268] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.369739][ T268] device bridge_slave_0 entered promiscuous mode [ 26.377566][ T268] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.384688][ T268] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.392029][ T268] device bridge_slave_1 entered promiscuous mode [ 26.480611][ T271] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.487706][ T271] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.495175][ T271] device bridge_slave_0 entered promiscuous mode [ 26.504245][ T269] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.511277][ T269] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.518759][ T269] device bridge_slave_0 entered promiscuous mode [ 26.526952][ T271] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.534006][ T271] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.541371][ T271] device bridge_slave_1 entered promiscuous mode [ 26.555039][ T269] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.562083][ T269] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.569600][ T269] device bridge_slave_1 entered promiscuous mode [ 26.603202][ T270] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.610238][ T270] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.617632][ T270] device bridge_slave_0 entered promiscuous mode [ 26.636458][ T270] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.643522][ T270] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.650896][ T270] device bridge_slave_1 entered promiscuous mode [ 26.698929][ T273] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.705997][ T273] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.713475][ T273] device bridge_slave_0 entered promiscuous mode [ 26.720543][ T273] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.727602][ T273] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.735012][ T273] device bridge_slave_1 entered promiscuous mode [ 26.791993][ T268] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.799052][ T268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.806361][ T268] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.813389][ T268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.848982][ T270] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.856043][ T270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.863320][ T270] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.870331][ T270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.882414][ T269] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.889487][ T269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.896763][ T269] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.903795][ T269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.912846][ T271] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.919892][ T271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.927159][ T271] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.934206][ T271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.961919][ T273] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.968988][ T273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.976295][ T273] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.983332][ T273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.008383][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.016011][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.023811][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.030922][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.039046][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.046460][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.053657][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.060911][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.068421][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.075803][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.082932][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.097113][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.104550][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.111944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.120219][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.127263][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.149048][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.157415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.165657][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.172672][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.180530][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.188688][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.195718][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.203140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.211270][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.218309][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.225671][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.233838][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.240848][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.248250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.256193][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.264193][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.272347][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.279383][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.292318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.308660][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.316976][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.325213][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.332236][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.339744][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.348124][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.355212][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.379208][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.387540][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.394602][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.402187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.411152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.420873][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.427944][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.435482][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.443692][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.451604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.466935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.475013][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.500787][ T269] device veth0_vlan entered promiscuous mode [ 27.507298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.516152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.524726][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.532091][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.539546][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.547650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.555721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.563811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.571729][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.580224][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.588573][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.597068][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.605405][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.613428][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.621457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.629151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.638940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.647396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.658396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.666590][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.675395][ T273] device veth0_vlan entered promiscuous mode [ 27.685526][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.693031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.704711][ T270] device veth0_vlan entered promiscuous mode [ 27.716705][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.725329][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.734173][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.741960][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.750148][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.757743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.766551][ T268] device veth0_vlan entered promiscuous mode [ 27.775511][ T269] device veth1_macvtap entered promiscuous mode [ 27.784066][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.792260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.800609][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.808438][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.816941][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.827644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.837010][ T270] device veth1_macvtap entered promiscuous mode [ 27.847355][ T271] device veth0_vlan entered promiscuous mode [ 27.854108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.861753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.870020][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.878293][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.886628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.905345][ T273] device veth1_macvtap entered promiscuous mode [ 27.912382][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.919865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.927443][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.935756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.944648][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.952790][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.961155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.969526][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.977825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.986284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.995393][ T268] device veth1_macvtap entered promiscuous mode [ 28.012320][ T270] request_module fs-gadgetfs succeeded, but still no fs? [ 28.025484][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.033955][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.042251][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.057708][ T271] device veth1_macvtap entered promiscuous mode [ 28.065035][ T270] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 28.076673][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.086852][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.095528][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.104540][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.112253][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.120955][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.129914][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.138509][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.162722][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.173526][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.181956][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.191565][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.264155][ C1] hrtimer: interrupt took 27014 ns [ 28.548559][ T330] device syzkaller0 entered promiscuous mode [ 28.774025][ T345] cgroup: syz.4.14 (345) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.791290][ T345] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 29.275943][ T367] device pim6reg1 entered promiscuous mode [ 29.925944][ T392] device pim6reg1 entered promiscuous mode [ 30.180503][ T406] device wg2 entered promiscuous mode [ 30.438595][ T419] GPL: port 1(erspan0) entered blocking state [ 30.446878][ T419] GPL: port 1(erspan0) entered disabled state [ 30.465538][ T419] device erspan0 entered promiscuous mode [ 30.500851][ T425] GPL: port 1(erspan0) entered blocking state [ 30.506958][ T425] GPL: port 1(erspan0) entered forwarding state [ 30.566832][ T24] kauditd_printk_skb: 51 callbacks suppressed [ 30.566843][ T24] audit: type=1400 audit(1747536556.260:141): avc: denied { create } for pid=443 comm="syz.4.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 30.649004][ T24] audit: type=1400 audit(1747536556.300:142): avc: denied { ioctl } for pid=432 comm="syz.3.42" path="mnt:[4026532606]" dev="nsfs" ino=4026532606 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 30.710923][ T24] audit: type=1400 audit(1747536556.380:143): avc: denied { create } for pid=452 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 30.730220][ T24] audit: type=1400 audit(1747536556.380:144): avc: denied { create } for pid=452 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 30.749762][ T24] audit: type=1400 audit(1747536556.400:145): avc: denied { create } for pid=452 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.207323][ T489] C: renamed from bond_slave_0 [ 31.598608][ T512] device pim6reg1 entered promiscuous mode [ 31.734815][ T24] audit: type=1400 audit(1747536557.420:146): avc: denied { create } for pid=496 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 32.001927][ T24] audit: type=1400 audit(1747536557.690:147): avc: denied { create } for pid=527 comm="syz.4.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 32.096371][ T531] device wg2 entered promiscuous mode [ 32.217616][ T24] audit: type=1400 audit(1747536557.910:148): avc: denied { create } for pid=524 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.190216][ T556] tap0: tun_chr_ioctl cmd 1074025675 [ 33.228852][ T556] tap0: persist enabled [ 33.268843][ T554] device sit0 entered promiscuous mode [ 33.340892][ T560] tap0: tun_chr_ioctl cmd 1074025675 [ 33.369265][ T560] tap0: persist disabled [ 34.551184][ T600] device syzkaller0 entered promiscuous mode [ 35.860329][ T634] device syzkaller0 entered promiscuous mode [ 35.923291][ T642] 0: renamed from pim6reg1 [ 36.029268][ T640] device veth1_macvtap left promiscuous mode [ 36.036570][ T640] device macsec0 entered promiscuous mode [ 36.912782][ T700] device pim6reg1 entered promiscuous mode [ 36.944587][ T24] audit: type=1400 audit(1747536562.640:149): avc: denied { create } for pid=704 comm="syz.3.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 37.133559][ T24] audit: type=1400 audit(1747536562.820:150): avc: denied { create } for pid=711 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 37.433878][ T24] audit: type=1400 audit(1747536563.120:151): avc: denied { relabelfrom } for pid=737 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.489719][ T739] device syzkaller0 entered promiscuous mode [ 37.499152][ T24] audit: type=1400 audit(1747536563.120:152): avc: denied { relabelto } for pid=737 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.969114][ T24] audit: type=1400 audit(1747536563.660:153): avc: denied { create } for pid=773 comm="syz.4.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 38.948168][ T836] device macsec0 left promiscuous mode [ 38.956730][ T24] audit: type=1400 audit(1747536564.650:154): avc: denied { create } for pid=833 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 38.985188][ T834] device pim6reg1 entered promiscuous mode [ 39.318411][ T853] device pim6reg1 entered promiscuous mode [ 39.372866][ T24] audit: type=1400 audit(1747536565.060:155): avc: denied { create } for pid=868 comm="syz.3.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 39.710205][ T897] device syzkaller0 entered promiscuous mode [ 39.992225][ T24] audit: type=1400 audit(1747536565.680:156): avc: denied { write } for pid=900 comm="syz.1.172" name="cgroup.subtree_control" dev="cgroup2" ino=189 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 40.050525][ T24] audit: type=1400 audit(1747536565.710:157): avc: denied { open } for pid=900 comm="syz.1.172" path="" dev="cgroup2" ino=189 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 40.127879][ T908] device veth0_vlan left promiscuous mode [ 40.136486][ T908] device veth0_vlan entered promiscuous mode [ 40.153230][ T921] device wg2 left promiscuous mode [ 40.198703][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.209321][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.217239][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.302565][ T921] device wg2 entered promiscuous mode [ 40.310751][ T938] device pim6reg1 entered promiscuous mode [ 40.356306][ T927] device pim6reg1 entered promiscuous mode [ 40.480871][ T938] device veth0_vlan left promiscuous mode [ 40.487276][ T938] device veth0_vlan entered promiscuous mode [ 42.784324][ T1030] device pim6reg1 entered promiscuous mode [ 42.807768][ T1037] device sit0 entered promiscuous mode [ 43.074871][ T1058] device syzkaller0 entered promiscuous mode [ 43.174042][ T1061] device pim6reg1 entered promiscuous mode [ 43.191964][ T1061] device syzkaller0 entered promiscuous mode [ 43.426447][ T1071] device pim6reg1 entered promiscuous mode [ 43.636515][ T1081] device pim6reg1 entered promiscuous mode [ 43.665261][ T1084] device sit0 left promiscuous mode [ 44.016398][ T24] audit: type=1400 audit(1747536569.710:158): avc: denied { create } for pid=1107 comm="syz.3.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 44.217204][ T24] audit: type=1400 audit(1747536569.910:159): avc: denied { create } for pid=1113 comm="syz.4.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 44.255689][ T1115] device pim6reg1 entered promiscuous mode [ 44.444099][ T1148] device veth1_macvtap left promiscuous mode [ 44.450249][ T1148] device macsec0 entered promiscuous mode [ 44.654240][ T1144] device veth1_macvtap entered promiscuous mode [ 44.662455][ T1144] device macsec0 entered promiscuous mode [ 44.681409][ T1162] device pim6reg1 entered promiscuous mode [ 44.701285][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 44.931387][ T1182] device veth0_vlan left promiscuous mode [ 44.995029][ T1182] device veth0_vlan entered promiscuous mode [ 45.068367][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.099369][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.127633][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.760122][ T1202] device sit0 left promiscuous mode [ 45.943940][ T1202] device sit0 entered promiscuous mode [ 46.376077][ T24] audit: type=1400 audit(1747536572.060:160): avc: denied { create } for pid=1223 comm="syz.4.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 46.430570][ T24] audit: type=1400 audit(1747536572.120:161): avc: denied { create } for pid=1232 comm="syz.2.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 47.374982][ T1257] device syzkaller0 entered promiscuous mode [ 47.425382][ T1268] syz.2.268[1268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.425436][ T1268] syz.2.268[1268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.529533][ T1307] device syzkaller0 entered promiscuous mode [ 49.117486][ T24] audit: type=1400 audit(1747536574.810:162): avc: denied { create } for pid=1337 comm="syz.3.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 49.899297][ T1353] device sit0 entered promiscuous mode [ 50.521704][ T1371] device veth0_vlan left promiscuous mode [ 50.571913][ T1371] device veth0_vlan entered promiscuous mode [ 50.650396][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.661738][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.685006][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.914816][ T1399] device veth0_vlan left promiscuous mode [ 50.921165][ T1399] device veth0_vlan entered promiscuous mode [ 50.951541][ T24] audit: type=1400 audit(1747536576.640:163): avc: denied { ioctl } for pid=1404 comm="syz.0.308" path="socket:[19086]" dev="sockfs" ino=19086 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.696733][ T1527] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 54.704627][ T1571] ------------[ cut here ]------------ [ 54.713076][ T1571] trace type BPF program uses run-time allocation [ 54.719599][ T1571] WARNING: CPU: 0 PID: 1571 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x5d6/0x740 [ 54.743079][ T1571] Modules linked in: [ 54.747085][ T1571] CPU: 0 PID: 1571 Comm: syz.3.352 Not tainted 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 54.757234][ T1571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 54.803259][ T1571] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 54.810654][ T1571] Code: 85 e9 14 fe ff ff e8 59 f7 ef ff 31 c0 e9 15 fe ff ff e8 4d f7 ef ff c6 05 a3 9b 2c 05 01 48 c7 c7 00 6a 05 85 e8 ba 3d f8 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 54.893223][ T1571] RSP: 0018:ffffc90000f57468 EFLAGS: 00010246 [ 54.899336][ T1571] RAX: 03e6668648205000 RBX: 0000000000000001 RCX: ffff88812e8c13c0 [ 54.923090][ T1571] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 54.953863][ T1571] RBP: ffffc90000f574b0 R08: dffffc0000000000 R09: ffffed103ee04e8b [ 54.976590][ T1571] R10: ffffed103ee04e8b R11: 1ffff1103ee04e8a R12: ffff88811a0f4000 [ 54.999431][ T1571] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888111cb3000 [ 55.013165][ T1571] FS: 00007f53e17716c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 55.035065][ T1558] device syzkaller0 entered promiscuous mode [ 55.040000][ T1571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.056168][ T1571] CR2: 00007f3cf6e17f98 CR3: 0000000119dc1000 CR4: 00000000003506b0 [ 55.067087][ T1571] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.075134][ T1571] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 55.084667][ T1571] Call Trace: [ 55.088618][ T1571] ? __fdget+0x1a1/0x230 [ 55.091607][ T1584] device syzkaller0 entered promiscuous mode [ 55.092875][ T1571] resolve_pseudo_ldimm64+0x526/0x1020 [ 55.092896][ T1571] ? bpf_check+0xd720/0xd720 [ 55.109867][ T1571] ? kvmalloc_node+0x88/0x130 [ 55.114712][ T1571] bpf_check+0x8db4/0xd720 [ 55.119180][ T1571] ? bpf_get_btf_vmlinux+0x60/0x60 [ 55.126071][ T1571] ? 0xffffffffa002a000 [ 55.130265][ T1571] ? is_bpf_text_address+0x177/0x190 [ 55.135851][ T1571] ? selinux_bpf_prog_alloc+0x51/0x140 [ 55.141327][ T1571] ? __kernel_text_address+0xa0/0x100 [ 55.153358][ T1571] ? unwind_get_return_address+0x4d/0x90 [ 55.159413][ T1571] ? stack_trace_save+0xe0/0xe0 [ 55.164681][ T1571] ? arch_stack_walk+0xee/0x140 [ 55.172975][ T1571] ? stack_trace_save+0x98/0xe0 [ 55.178237][ T1571] ? stack_trace_snprint+0xf0/0xf0 [ 55.184564][ T1571] ? __kasan_slab_alloc+0x69/0xf0 [ 55.189748][ T1571] ? selinux_bpf_prog_alloc+0x51/0x140 [ 55.202566][ T1571] ? __kasan_kmalloc+0xec/0x110 [ 55.226653][ T1571] ? __kasan_kmalloc+0xda/0x110 [ 55.231537][ T1571] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 55.283877][ T1571] ? selinux_bpf_prog_alloc+0x51/0x140 [ 55.289374][ T1571] ? security_bpf_prog_alloc+0x62/0x90 [ 55.315951][ T1589] device syzkaller0 entered promiscuous mode [ 55.343550][ T1571] ? bpf_prog_load+0x949/0x1420 [ 55.348434][ T1571] ? __se_sys_bpf+0x442/0x680 [ 55.358597][ T1571] ? __x64_sys_bpf+0x7b/0x90 [ 55.383383][ T1571] ? do_syscall_64+0x31/0x40 [ 55.388073][ T1571] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.415301][ T1571] ? memset+0x35/0x40 [ 55.435479][ T1571] ? bpf_obj_name_cpy+0x193/0x1e0 [ 55.453155][ T1571] bpf_prog_load+0xf5a/0x1420 [ 55.485503][ T1571] ? map_freeze+0x320/0x320 [ 55.509241][ T1571] ? selinux_bpf+0xc7/0xf0 [ 55.524556][ T1571] ? security_bpf+0x82/0xa0 [ 55.529098][ T1571] __se_sys_bpf+0x442/0x680 [ 55.545697][ T1571] ? __x64_sys_bpf+0x90/0x90 [ 55.561456][ T1571] ? fpu__clear_all+0x20/0x20 [ 55.577596][ T1571] __x64_sys_bpf+0x7b/0x90 [ 55.587712][ T1571] do_syscall_64+0x31/0x40 [ 55.592385][ T1571] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.623942][ T1571] RIP: 0033:0x7f53e3129969 [ 55.628427][ T24] audit: type=1400 audit(1747536581.320:164): avc: denied { create } for pid=1607 comm="syz.4.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 55.653144][ T1571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.747299][ T1571] RSP: 002b:00007f53e1771038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.796779][ T1571] RAX: ffffffffffffffda RBX: 00007f53e3351080 RCX: 00007f53e3129969 [ 55.845936][ T1571] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 55.884304][ T1571] RBP: 00007f53e31abab1 R08: 0000000000000000 R09: 0000000000000000 [ 55.892308][ T1571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.972662][ T1571] R13: 0000000000000000 R14: 00007f53e3351080 R15: 00007fffb90d7178 [ 56.001015][ T1571] ---[ end trace ae24f93e5603d786 ]--- [ 56.063871][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.063942][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.116633][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.173211][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.223742][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.253994][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.294094][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.351175][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.396923][ T1648] device syzkaller0 entered promiscuous mode [ 56.443654][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.443724][ T1637] syz.4.371[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.094203][ T1663] device syzkaller0 entered promiscuous mode [ 59.437014][ T1751] device veth0_vlan left promiscuous mode [ 59.452077][ T1751] device veth0_vlan entered promiscuous mode [ 59.499870][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.531659][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.605030][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.063529][ T94] udevd[94]: worker [1018] terminated by signal 33 (Unknown signal 33) [ 60.118644][ T94] udevd[94]: worker [1018] failed while handling '/devices/virtual/block/loop0' [ 60.155206][ T1780] device pim6reg1 entered promiscuous mode [ 60.205412][ T94] udevd[94]: worker [290] terminated by signal 33 (Unknown signal 33) [ 60.234298][ T94] udevd[94]: worker [290] failed while handling '/devices/virtual/block/loop2' [ 60.299168][ T94] udevd[94]: worker [1014] terminated by signal 33 (Unknown signal 33) [ 60.309301][ T94] udevd[94]: worker [1014] failed while handling '/devices/virtual/block/loop3' [ 61.299908][ T1834] device syzkaller0 entered promiscuous mode [ 61.967160][ T1875] Q6\bY4: renamed from lo [ 62.004451][ T24] audit: type=1400 audit(1747536587.700:165): avc: denied { create } for pid=1872 comm="syz.1.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 62.028364][ T1873] device pim6reg1 entered promiscuous mode [ 63.423032][ T1936] device wg2 left promiscuous mode [ 63.521835][ T1936] device wg2 entered promiscuous mode [ 64.225279][ T1951] device pim6reg1 entered promiscuous mode [ 64.729810][ T1973] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 67.178464][ T24] audit: type=1400 audit(1747536592.870:166): avc: denied { create } for pid=2056 comm="syz.1.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 67.298334][ T2067] device syzkaller0 entered promiscuous mode [ 67.493406][ T2076] device wg2 entered promiscuous mode [ 67.625668][ T2099] device wg2 left promiscuous mode [ 67.700265][ T2099] device wg2 entered promiscuous mode [ 67.744601][ T24] audit: type=1400 audit(1747536593.440:167): avc: denied { create } for pid=2113 comm="syz.3.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 68.934662][ T2151] device syzkaller0 entered promiscuous mode [ 70.511843][ T2205] device pim6reg1 entered promiscuous mode [ 71.126190][ T2238] device syzkaller0 entered promiscuous mode [ 72.070592][ T2269] device syzkaller0 entered promiscuous mode [ 75.793754][ T2348] device wg2 left promiscuous mode [ 75.826713][ T2348] device wg2 entered promiscuous mode [ 76.130424][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.509794][ T2378] device sit0 left promiscuous mode [ 77.586742][ T2426] : renamed from pim6reg1 [ 77.823268][ T2441] tap0: tun_chr_ioctl cmd 1074025677 [ 77.829077][ T2441] tap0: linktype set to 825 [ 77.894164][ T2441] device veth1_macvtap left promiscuous mode [ 78.177526][ T24] audit: type=1400 audit(1747536603.870:168): avc: denied { create } for pid=2455 comm="syz.2.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 78.568979][ T2465] device syzkaller0 entered promiscuous mode [ 78.735308][ T2486] device wg2 left promiscuous mode [ 78.869171][ T2487] device wg2 entered promiscuous mode [ 79.389099][ T2532] device veth0_vlan left promiscuous mode [ 79.445869][ T2532] device veth0_vlan entered promiscuous mode [ 79.764229][ T2540] : renamed from vlan1 [ 80.077191][ T2551] device syzkaller0 entered promiscuous mode [ 80.200301][ T24] audit: type=1400 audit(1747536605.890:169): avc: denied { create } for pid=2564 comm="syz.1.638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 80.259211][ T2566] device pim6reg1 entered promiscuous mode [ 80.341100][ T2566] device wg2 left promiscuous mode [ 80.348882][ T2565] : renamed from vlan0 [ 81.833314][ T2662] device sit0 entered promiscuous mode [ 82.301479][ T2703] device wg2 left promiscuous mode [ 82.381658][ T2703] device wg2 entered promiscuous mode [ 82.416600][ T2714] device sit0 entered promiscuous mode [ 82.544952][ T2721] device lo entered promiscuous mode [ 82.644483][ T2725] device pim6reg1 entered promiscuous mode [ 82.794199][ T24] audit: type=1400 audit(1747536608.470:170): avc: denied { append } for pid=2729 comm="syz.1.689" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 83.529709][ T2760] device wg2 left promiscuous mode [ 83.604886][ T2766] device syzkaller0 entered promiscuous mode [ 83.898736][ T24] audit: type=1400 audit(1747536609.590:171): avc: denied { create } for pid=2767 comm="syz.1.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 84.231807][ T2802] bpf_get_probe_write_proto: 124 callbacks suppressed [ 84.231818][ T2802] syz.3.709[2802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.280324][ T2802] syz.3.709[2802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.330459][ T2804] device syzkaller0 left promiscuous mode [ 84.819225][ T94] udevd[94]: worker [1806] terminated by signal 33 (Unknown signal 33) [ 84.827783][ T94] udevd[94]: worker [1806] failed while handling '/devices/virtual/block/loop1' [ 84.959783][ T2836] device pim6reg1 entered promiscuous mode [ 86.588825][ T2915] device pim6reg1 entered promiscuous mode [ 88.165167][ T3010] : renamed from vlan0 [ 88.411875][ T3026] device wg2 left promiscuous mode [ 88.453028][ T3026] device wg2 entered promiscuous mode [ 88.535039][ T3034] sock: sock_set_timeout: `syz.1.773' (pid 3034) tries to set negative timeout [ 88.684870][ T3040] device syzkaller0 entered promiscuous mode [ 90.629648][ T24] audit: type=1400 audit(1747536616.320:172): avc: denied { create } for pid=3127 comm="syz.4.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.008503][ T3117] device syzkaller0 entered promiscuous mode [ 91.042003][ T3128] device sit0 left promiscuous mode [ 91.062605][ T3129] device sit0 entered promiscuous mode [ 91.537366][ T24] audit: type=1400 audit(1747536617.230:173): avc: denied { create } for pid=3153 comm="syz.2.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 91.776679][ T24] audit: type=1400 audit(1747536617.470:174): avc: denied { create } for pid=3157 comm="syz.4.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 92.210682][ T3182] device veth1_macvtap left promiscuous mode [ 92.855916][ T3201] device wg2 entered promiscuous mode [ 93.136128][ T3210] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.143489][ T3210] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.603023][ T24] audit: type=1400 audit(1747536619.290:175): avc: denied { create } for pid=3238 comm="syz.3.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 95.708139][ T3332] device sit0 left promiscuous mode [ 95.793106][ T24] audit: type=1400 audit(1747536621.480:176): avc: denied { create } for pid=3338 comm="syz.3.865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 96.200591][ T3356] device syzkaller0 entered promiscuous mode [ 96.465104][ T3370] tap0: tun_chr_ioctl cmd 1074025675 [ 96.491565][ T3370] tap0: persist enabled [ 96.515721][ T3374] tap0: tun_chr_ioctl cmd 1074025675 [ 96.547006][ T3374] tap0: persist disabled [ 97.416917][ T24] audit: type=1400 audit(1747536623.110:177): avc: denied { create } for pid=3406 comm="syz.0.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 98.351076][ T3499] @: renamed from bond_slave_0 [ 98.426484][ T3499] device sit0 left promiscuous mode [ 98.491279][ T3502] device sit0 entered promiscuous mode [ 99.868382][ T3564] device pim6reg1 entered promiscuous mode [ 100.272078][ T3594] device syzkaller0 entered promiscuous mode [ 100.363158][ T3581] device wg2 left promiscuous mode [ 100.564398][ T3606] syz.1.933 (3606) used obsolete PPPIOCDETACH ioctl [ 101.540506][ T3660] device pim6reg1 entered promiscuous mode [ 102.429436][ T3725] device syzkaller0 entered promiscuous mode [ 102.811047][ T3756] syz.0.975[3756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.811104][ T3756] syz.0.975[3756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.838250][ T3753] device syzkaller0 entered promiscuous mode [ 102.934950][ T3756] device veth0_vlan left promiscuous mode [ 102.948507][ T3756] device veth0_vlan entered promiscuous mode [ 102.984792][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.998268][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.014512][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.065119][ T3768] device syzkaller0 entered promiscuous mode [ 103.535833][ T3791] device syzkaller0 entered promiscuous mode [ 104.308826][ T3851] device sit0 left promiscuous mode [ 104.497133][ T3862] device sit0 entered promiscuous mode [ 107.077714][ T3970] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 107.494563][ T3989] device veth0_vlan left promiscuous mode [ 107.517425][ T3989] device veth0_vlan entered promiscuous mode [ 107.647137][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.677930][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.698004][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 107.730495][ T3988] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.739344][ T3988] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.914616][ T3990] device bridge_slave_1 left promiscuous mode [ 107.951934][ T3990] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.003732][ T3990] device bridge_slave_0 left promiscuous mode [ 108.059107][ T3990] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.442673][ T4025] device pim6reg1 entered promiscuous mode [ 108.855657][ T4051] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.864298][ T4051] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.973815][ T4051] device bridge_slave_1 left promiscuous mode [ 108.981702][ T4051] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.004122][ T4051] device bridge_slave_0 left promiscuous mode [ 109.014356][ T4051] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.344371][ T4056] : renamed from pim6reg1 [ 110.356074][ T4091] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.407899][ T4096] device bridge_slave_1 left promiscuous mode [ 110.433546][ T4096] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.472629][ T4096] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.815670][ T4121] device veth1_macvtap left promiscuous mode [ 110.946953][ T4121] device veth1_macvtap entered promiscuous mode [ 111.148609][ T4141] device macsec0 entered promiscuous mode [ 111.195662][ T4141] device veth1_to_bond entered promiscuous mode [ 111.271085][ T4154] device pim6reg1 entered promiscuous mode [ 115.079282][ T4379] sock: sock_set_timeout: `syz.0.1150' (pid 4379) tries to set negative timeout [ 116.856013][ T4483] device syzkaller0 entered promiscuous mode [ 117.567377][ T4539] device pim6reg1 entered promiscuous mode [ 118.675865][ T4610] device syzkaller0 entered promiscuous mode [ 118.768282][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.248934][ T4627] device macsec0 entered promiscuous mode [ 119.780946][ T4649] syz.3.1232[4649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.781032][ T4649] syz.3.1232[4649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.875658][ T4651] device syzkaller0 left promiscuous mode [ 120.344906][ T4680] device wg2 entered promiscuous mode [ 120.487367][ T4695] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 120.496577][ T4695] syzkaller0: linktype set to 1 [ 123.418275][ T4834] device syzkaller0 entered promiscuous mode [ 124.223302][ T4869] syz.4.1290[4869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.223366][ T4869] syz.4.1290[4869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.256627][ T4870] device syzkaller0 entered promiscuous mode [ 125.597271][ T4899] syz.2.1300[4899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.597363][ T4899] syz.2.1300[4899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.010879][ T4913] syz.2.1305[4913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.026748][ T4913] syz.2.1305[4913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.041213][ T4913] device veth0_vlan left promiscuous mode [ 126.059049][ T4913] device veth0_vlan entered promiscuous mode [ 126.067500][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.075998][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.175419][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 126.996750][ T4980] device pim6reg1 entered promiscuous mode [ 128.007144][ T5018] device syzkaller0 entered promiscuous mode [ 128.039681][ T5024] device pim6reg1 entered promiscuous mode [ 128.585333][ T5056] device wg2 entered promiscuous mode [ 131.349673][ T5129] device sit0 entered promiscuous mode [ 131.612039][ T5137] tun0: tun_chr_ioctl cmd 1074025692 [ 131.966687][ T5168] device sit0 entered promiscuous mode [ 133.050635][ T5250] syz.1.1395[5250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.050694][ T5250] syz.1.1395[5250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.050980][ T5249] syz.1.1395[5249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.314735][ T269] cgroup: fork rejected by pids controller in [ 137.336633][ T5433] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.350028][ T5433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.357371][ T5433] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.364412][ T5433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.419663][ T269] /syz0 [ 137.503826][ T5433] device bridge0 entered promiscuous mode [ 137.567461][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.782121][ T5448] device syzkaller0 entered promiscuous mode [ 137.907574][ T5456] tap0: tun_chr_ioctl cmd 1074025675 [ 137.918635][ T5456] tap0: persist enabled [ 138.008707][ T5455] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.073088][ T5455] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.110151][ T5455] device bridge_slave_0 entered promiscuous mode [ 138.141884][ T410] GPL: port 1(erspan0) entered disabled state [ 138.159284][ T410] device erspan0 left promiscuous mode [ 138.188654][ T410] GPL: port 1(erspan0) entered disabled state [ 138.220374][ T5455] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.243108][ T5455] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.250778][ T5455] device bridge_slave_1 entered promiscuous mode [ 138.316486][ T24] audit: type=1400 audit(1747536664.010:178): avc: denied { create } for pid=5480 comm="syz.4.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 138.344062][ T5467] device wg2 entered promiscuous mode [ 138.352839][ T5467] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 138.612217][ T24] audit: type=1400 audit(1747536664.300:179): avc: denied { create } for pid=5455 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.645195][ T410] device bridge_slave_1 left promiscuous mode [ 138.651392][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.742602][ T410] device bridge_slave_0 left promiscuous mode [ 138.773889][ T24] audit: type=1400 audit(1747536664.420:180): avc: denied { write } for pid=5455 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.825168][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.856985][ T410] device veth1_macvtap left promiscuous mode [ 138.885808][ T24] audit: type=1400 audit(1747536664.430:181): avc: denied { read } for pid=5455 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 139.173209][ T5503] device syzkaller0 left promiscuous mode [ 139.550132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.557766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.647768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.675533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.716373][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.723453][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.781748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.812286][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.842571][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.849670][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.931648][ T5513] device syzkaller0 entered promiscuous mode [ 139.942781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.961374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.987533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.011268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.032067][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.085266][ T5455] device veth0_vlan entered promiscuous mode [ 140.161757][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.177596][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.196336][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.212208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.276311][ T24] audit: type=1400 audit(1747536665.970:182): avc: denied { read } for pid=5521 comm="syz.2.1474" dev="nsfs" ino=4026532533 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.306278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.314243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.321969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.335824][ T24] audit: type=1400 audit(1747536665.970:183): avc: denied { open } for pid=5521 comm="syz.2.1474" path="net:[4026532533]" dev="nsfs" ino=4026532533 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.367529][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.385040][ T5455] device veth1_macvtap entered promiscuous mode [ 140.422069][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.442471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.474619][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.500643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.523366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.260342][ T5560] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.267632][ T5560] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.438104][ T5569] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 141.546476][ T5573] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 141.552305][ T5573] syzkaller0: persist disabled [ 141.818298][ T24] audit: type=1400 audit(1747536667.510:184): avc: denied { create } for pid=5584 comm="syz.4.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 142.085325][ T5611] device syzkaller0 entered promiscuous mode [ 142.378745][ T5649] device syzkaller0 entered promiscuous mode [ 142.626176][ T5671] device syzkaller0 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=6 req=1560 state=1 status=7 (errno 9: Bad file descriptor) [ 144.224188][ T410] device bridge_slave_1 left promiscuous mode [ 144.230410][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.238004][ T410] device bridge_slave_0 left promiscuous mode [ 144.244238][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.252608][ T410] device veth1_macvtap left promiscuous mode [ 144.258927][ T410] device veth0_vlan left promiscuous mode [ 146.383887][ T410] device bridge_slave_1 left promiscuous mode [ 146.390040][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.397732][ T410] device bridge_slave_0 left promiscuous mode [ 146.404175][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.412345][ T410] device veth1_macvtap left promiscuous mode