last executing test programs: 3.08248567s ago: executing program 0 (id=1539): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000b1cebe3aac31776d27fdd73c0d657f164dec867a5bf7ab817c4b78f27507988bb8f762b978196e744f7e08a24f56029ef55544ccb30d8e45710f79777687857577c1bc946c7842cd384eca0d865593c0b2477292f915612cd6609b1bf88a3205609c46cd77e6b92555e1f99023d9fcd4b082398a3ce753db26753dc6dcf7db8bb7f5cc75a117d4755c77599a2e29e1969bafe5f28d6eac5030bd2c41d278980f8002d07dd0ba31b5f8a78aafbc70"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x9, 0xa249, 0xa6c, 0x100, 0xffffffffffffffff, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x50) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r0}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000100010007110"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37538e486dd0000000003"], 0xfe1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) 2.850528174s ago: executing program 0 (id=1541): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="1848000000ed000000000000feffffff85100000069314150c100000", @ANYRES32=r0, @ANYBLOB="00000000000000002408000001b000001800000066e90000000000000000000095000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x5}, 0x94) r1 = perf_event_open$cgroup(&(0x7f00000017c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x3, 0x0, 0x3, 0x7c64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000004}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xffff, [{0x0, 0x1, 0x2}]}]}}, 0x0, 0x3e}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.154305978s ago: executing program 4 (id=1547): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000bceb6ab30000000008000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005d00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x1002, &(0x7f0000002500)=""/4106, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x4a) 2.069918989s ago: executing program 4 (id=1548): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) 2.06839185s ago: executing program 2 (id=1549): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000040000000000000000000085000000500000008500000050000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0e00000004000000080000000200000000000000", @ANYRES32=r3, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000005000000000000000000000000285cfad10db5dccb5e7775941fcd3a87799bff48ea18743778ebedfbfbd79ee20baf198214934a"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r4, &(0x7f0000000080)="76f9", 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0100000042000000060000000800000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00efffffff00000000008daccae2fa6633f4a8ef00000000000000000000000011053a59463b249f4c850123aaf447cb6024fdab4039ecbceabe3ebc"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f00000005c0)=r2}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd0, &(0x7f0000000700)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='xprt_transmit\x00', r0, 0x0, 0x5}, 0x18) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1e00000006000000376500008100000044400000", @ANYRES32=r6, @ANYBLOB="020000000000faff000000000000000055000000005f895200a98da291cf7e2aed8e0b192757b3abd9550062c88762d5988b02b5996e79860ce00f83392636cf", @ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="050000000000000000000000000000000000000000000000000000002c5810d7ac11b122b61d1851be96dc3b399d08683e75207f9041b6b349e2ca0d6ee9821e6164ef048af5de804f01126c74181de0d5d9f77ce8b6dcd8ea3d8c6614bb302c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x108400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0xfffffe51) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r10}, 0x38) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000b40)=ANY=[@ANYRESOCT=r9, @ANYRES32, @ANYRES8=r5], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100000}, 0x94) 2.017295991s ago: executing program 4 (id=1550): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xa}, 0x8080, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="02000000040000000800000001000000800000000f71901c6457ae143ad8a4332b29dc605b7a8832720a01c3d1b3c05b1e9fde97cbadc9a851f91077c617d508b16148ef4bf2f29687476462f579493c28123ef92ba784da60ba3fc29d6b26b026f5c4ddeed6278ba6a0715e06aab9ac535315b8e09c811562d0fba8c819c85502174b8b68c373f0665910d9a26ba99925f4bd20cf174f4e6fae67cb3e278911d31b37e22ecd835bb6fbc5b1d45e9a86ad910fdebcfd415df61515343c9e7ff18e4e21593b67392f2c499796e3aa965ecdfded4e6940038108b070325d4c0c8dad7f22f97c119eede905dc5335275f8b1d26a7026668b06ea21f8b5bb2f07d2f63ce586d723d08", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2fe4a74041c1ce1c}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035090100000700009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="09000000ea532ea9776705", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) 1.171797658s ago: executing program 0 (id=1551): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000180000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) 1.143762868s ago: executing program 2 (id=1552): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x7}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000000)="613850650eaef4ebad130672dc683f776b91c4699a4d6c4a62ecb242c19848801af18258f82c61776042694b005178d86bca5c95f483f2c7c56be423372c679e40d66046bfd01b1a3b2f22fa084ed5ed7c3a7a0841dbaf1be789ade59277bef9d0850ed260d2199b1457d0da664e09f38263705b22ea06e66eabefd062173d673a196f41", &(0x7f00000000c0)=""/125, &(0x7f0000000140)="c378d9a64b7afdde220593cfdb1f8eb3821e011d9dda82958266629fad1982163ec02ea46cfef9a918e323b4ab8e4f6cadcaa79f96ed8e5719741f39861a5f60dab04c7e9fe24cdaf0e3bb640c1d424e0571aa86ab4faa5db9b1e2dd37c2e2dd0bf89a932e232890d756e2ac9193a85cc2165b2f1ed4b68c491a4e76aedf1bb6f3bf76389e5daee2676fdc8d53", &(0x7f0000000200)="52fde7b9134ef001e833b1a6f2f7094049637d58f9a89659189920e2451a79d649a01ef96cf4e81accd4d40d87df72670b5beaeb28c48d7e3ee66bcdd36a5968209117cc96a8edaa18d98d112c15cb736c577fd7b8184ac613f8a195d931a2158e721b08bb1d7d36be67eea785c93b329f99a41b3c1c3eb44a5e23b2edee1c951627aa7045e217490292df2ca37af8eab5210e83873088a22cc5eb439934fd2a662537bd9cb76418f7c019419e8a298fc27d8fc28197c42d64159e277c73972d472909ddd4cbbabf9415abf2a60ee9865e17e0a4029cf659", 0xa, r0, 0x4}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000000)="613850650eaef4ebad130672dc683f776b91c4699a4d6c4a62ecb242c19848801af18258f82c61776042694b005178d86bca5c95f483f2c7c56be423372c679e40d66046bfd01b1a3b2f22fa084ed5ed7c3a7a0841dbaf1be789ade59277bef9d0850ed260d2199b1457d0da664e09f38263705b22ea06e66eabefd062173d673a196f41", &(0x7f00000000c0)=""/125, &(0x7f0000000140)="c378d9a64b7afdde220593cfdb1f8eb3821e011d9dda82958266629fad1982163ec02ea46cfef9a918e323b4ab8e4f6cadcaa79f96ed8e5719741f39861a5f60dab04c7e9fe24cdaf0e3bb640c1d424e0571aa86ab4faa5db9b1e2dd37c2e2dd0bf89a932e232890d756e2ac9193a85cc2165b2f1ed4b68c491a4e76aedf1bb6f3bf76389e5daee2676fdc8d53", &(0x7f0000000200)="52fde7b9134ef001e833b1a6f2f7094049637d58f9a89659189920e2451a79d649a01ef96cf4e81accd4d40d87df72670b5beaeb28c48d7e3ee66bcdd36a5968209117cc96a8edaa18d98d112c15cb736c577fd7b8184ac613f8a195d931a2158e721b08bb1d7d36be67eea785c93b329f99a41b3c1c3eb44a5e23b2edee1c951627aa7045e217490292df2ca37af8eab5210e83873088a22cc5eb439934fd2a662537bd9cb76418f7c019419e8a298fc27d8fc28197c42d64159e277c73972d472909ddd4cbbabf9415abf2a60ee9865e17e0a4029cf659", 0xa, r0, 0x4}, 0x38) socketpair(0x2a, 0x4, 0x7, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000001b00)={&(0x7f0000000400), 0x6e, &(0x7f0000001a00)=[{&(0x7f0000000480)=""/138, 0x8a}, {&(0x7f0000000540)=""/62, 0x3e}, {&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/152, 0x98}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/112, 0x70}, {&(0x7f0000001780)=""/221, 0xdd}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/129, 0x81}], 0x9, &(0x7f0000001ac0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x44) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001d80)={0x6, 0xe, &(0x7f0000001b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000000}, [@map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @generic={0x2e, 0x8, 0x0, 0x9, 0x1cf4000}]}, &(0x7f0000001bc0)='GPL\x00', 0x7, 0x94, &(0x7f0000001c00)=""/148, 0x41100, 0xf090606f48d62854, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001cc0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001d00)={0x4, 0xf, 0x8, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001d40)=[r5], 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001e40)={@cgroup=r4, r6, 0x2f, 0x201c, 0x0, @value=r4}, 0x20) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001e40)={@cgroup=r4, r6, 0x2f, 0x201c, 0x0, @value=r4}, 0x20) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ec0)={r7, r4, 0x0, 0x5, &(0x7f0000001e80)='\'&.-\x00'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ec0)={r7, r4, 0x0, 0x5, &(0x7f0000001e80)='\'&.-\x00'}, 0x30) recvmsg$unix(r1, &(0x7f0000004100)={&(0x7f0000001f00)=@abs, 0x6e, &(0x7f0000004040)=[{&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/136, 0x88}, {&(0x7f0000003040)=""/4096, 0x1000}], 0x3, &(0x7f0000004080)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x40000020) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000043c0)={0x11, 0x20, &(0x7f0000004180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @exit, @ldst={0x0, 0xf93fac6f4c13065c, 0x0, 0xb, 0x4, 0x18, 0xffffffffffffffe5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x1, 0x1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}, @ldst={0x2, 0x0, 0x0, 0x7, 0x5, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000004280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f00000042c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000004300)={0x3, 0xe, 0xfd2, 0x100}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000004340)=[r14, 0xffffffffffffffff, r8], &(0x7f0000004380)=[{0x2, 0x2, 0x2, 0x7}, {0x4, 0x3, 0xa, 0xa}, {0x1, 0x5, 0xa, 0xc}], 0x10, 0x5}, 0x94) (async) r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000043c0)={0x11, 0x20, &(0x7f0000004180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @exit, @ldst={0x0, 0xf93fac6f4c13065c, 0x0, 0xb, 0x4, 0x18, 0xffffffffffffffe5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x1, 0x1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}, @ldst={0x2, 0x0, 0x0, 0x7, 0x5, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000004280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f00000042c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000004300)={0x3, 0xe, 0xfd2, 0x100}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000004340)=[r14, 0xffffffffffffffff, r8], &(0x7f0000004380)=[{0x2, 0x2, 0x2, 0x7}, {0x4, 0x3, 0xa, 0xa}, {0x1, 0x5, 0xa, 0xc}], 0x10, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004480)={&(0x7f0000004140)='mm_page_free\x00', r18, 0x0, 0x9}, 0x18) openat$cgroup_procs(r4, &(0x7f00000044c0)='tasks\x00', 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000004500)={[{0x2b, 'io'}]}, 0x4) (async) write$cgroup_subtree(r8, &(0x7f0000004500)={[{0x2b, 'io'}]}, 0x4) r19 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004540)={0x0, r9}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r19, 0xc008240a, &(0x7f0000004580)={0x1, 0x0, [0x0]}) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r19, 0xc008240a, &(0x7f0000004580)={0x1, 0x0, [0x0]}) syz_clone(0x8000400, &(0x7f00000045c0)="e9b773da716957f2000c45c7e817b68ce664fca2cfa0a1d53ca051f8400f0207a2fe524fdf8158808866ad79289ad2ac0e0ef937ed8b72e417ee804c8851e333729e57037803def9e52ff1d7a3651385e14441abc918f8f173ea24d689645213fc7cc31e37b6bc693aa332343b8199fbb5c34a9801122d6000d6", 0x7a, &(0x7f0000004640), &(0x7f0000004680), &(0x7f00000046c0)="0c8cd3dec57cf64d661d782206f73a428b6b4e4577d7b21173ac40e07a6529312e2fb30d49e6aab9783546c4c6590f9f0ac43c27b5bb88d992418309e65db5bedfe71d8e958cde9e") ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r16, 0x4008240b, &(0x7f0000004780)={0x3, 0x80, 0x4, 0x9, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000004740), 0x1}, 0x0, 0x1, 0x81, 0x6, 0x6, 0x3, 0x1, 0x0, 0x1, 0x0, 0x7}) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x7) (async) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004b00)={r6, 0xe0, &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000004800)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000004840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000048c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f0000004900)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000004940), &(0x7f0000004980), 0x8, 0x94, 0x8, 0x8, &(0x7f00000049c0)}}, 0x10) openat$cgroup_subtree(r10, &(0x7f0000004b40), 0x2, 0x0) (async) openat$cgroup_subtree(r10, &(0x7f0000004b40), 0x2, 0x0) perf_event_open(&(0x7f0000004b80)={0x1, 0x80, 0x1, 0x6, 0x1, 0x2, 0x0, 0x7, 0x404, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x6, @perf_config_ext={0x0, 0x4000000000000}, 0x19b00, 0x2, 0x4, 0x0, 0x80000001, 0x9, 0x800, 0x0, 0x8, 0x0, 0x7}, r12, 0x5, r13, 0x0) r22 = bpf$MAP_CREATE(0x0, &(0x7f0000004c00)=@base={0x12, 0x8, 0x7, 0x8, 0x400, 0x1, 0x10, '\x00', r20, r9, 0x1, 0x3, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000004dc0)={r22, &(0x7f0000004c80)="0b98229d672c39370b3eb9c777b4ba339431e12cf2c360195dd238b69b79791859a9a0534b9fae30b19d655906980223de961ca327ab53d044880388b5d055102a1ef240c411aae8898be831025fc197af4b5a8f24387f99ea18cf35ece67b2956f810fda7a733b686f9fa947ab065708db18c67d63c2acb2fef80142801af4318fc7d9c62dead264f9601cfe3aeb86ac2c22242ccfac5a6a72f5617e2d20685e644c20b8c68b19baca5e2b0354351f07874464bfdf789e66a486f22dd294af8a1cb7eeb84ca6c1350e3316ef762e05508a678a5ea4500c8e940dc78ef111509e8ce1c7aee5a4a98fdcd9544706ddf52", &(0x7f0000004d80)=""/51}, 0x20) perf_event_open(&(0x7f0000004e40)={0x4, 0x80, 0x6, 0x9, 0x4, 0x0, 0x0, 0x7fffffffffffffff, 0x2000, 0xf, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000004e00), 0xc}, 0x310180, 0x4f8a, 0x5, 0x8, 0x0, 0x3, 0x4, 0x0, 0x1, 0x0, 0x6}, r7, 0xffffffffffffffff, r14, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005180)={r17, 0xe0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000004ec0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000004f00)=[0x0, 0x0, 0x0], &(0x7f0000004f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f0000004f80)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000004fc0), &(0x7f0000005000), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000005040)}}, 0x10) mkdirat$cgroup(r15, &(0x7f00000051c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000005200)=0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005600)={r3, 0xe0, &(0x7f0000005500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000005340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa, &(0x7f0000005380)=[0x0, 0x0], &(0x7f00000053c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf6, &(0x7f0000005400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000005440), &(0x7f0000005480), 0x8, 0xf8, 0x8, 0x8, &(0x7f00000054c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005600)={r3, 0xe0, &(0x7f0000005500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000005340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa, &(0x7f0000005380)=[0x0, 0x0], &(0x7f00000053c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf6, &(0x7f0000005400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000005440), &(0x7f0000005480), 0x8, 0xf8, 0x8, 0x8, &(0x7f00000054c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000005740)=@bpf_lsm={0x1d, 0x3, &(0x7f0000005240)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}, @ldst={0x3, 0x1, 0x1, 0x5, 0x4, 0xffffffffffffff63}], &(0x7f0000005280)='GPL\x00', 0x8, 0x5d, &(0x7f00000052c0)=""/93, 0x41100, 0x2, '\x00', r23, 0x1b, r14, 0x8, &(0x7f0000005640)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000005680)={0x1, 0x0, 0x80000001, 0x1000}, 0x10, r21, 0x0, 0x0, &(0x7f0000005700)=[0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000005740)=@bpf_lsm={0x1d, 0x3, &(0x7f0000005240)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}, @ldst={0x3, 0x1, 0x1, 0x5, 0x4, 0xffffffffffffff63}], &(0x7f0000005280)='GPL\x00', 0x8, 0x5d, &(0x7f00000052c0)=""/93, 0x41100, 0x2, '\x00', r23, 0x1b, r14, 0x8, &(0x7f0000005640)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000005680)={0x1, 0x0, 0x80000001, 0x1000}, 0x10, r21, 0x0, 0x0, &(0x7f0000005700)=[0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) 1.123736688s ago: executing program 0 (id=1553): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.057323829s ago: executing program 0 (id=1555): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000004ef3a7f8df1383019f60dd6545acefb1a5db9818182850dd3e23cef289fad4cdf1c2227bb22d2ac9b27d166b65abdd625f36358b8f800fda1b2e2849f9377d91fb2ba97737089ee4751bed2d9eae6063b3481b819b0b25cb1d2cf1b26f246c96e65fc84a893102f506f399f0c2e6ce0f42dd21205a59e0eff197fce7a05cc40ab213f83152c04b4f0"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ca8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10003, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r5}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r5, 0x15, 0x0, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 965.486891ms ago: executing program 4 (id=1557): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001700)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb0100180000000885870000000000001202000000006161616100"/42], &(0x7f0000000700)=""/4096, 0x2a, 0x1000, 0x0, 0x401}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x846}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001880)={0x18, 0xf, &(0x7f0000000500)=@raw=[@exit, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @jmp={0x5, 0x1, 0x0, 0x2, 0xa, 0x18, 0xffffffffffffffff}, @alu={0x4, 0x0, 0xb, 0x4, 0x8, 0xfffffffffffffffc, 0x8}, @call={0x85, 0x0, 0x0, 0x1e}], &(0x7f00000005c0)='GPL\x00', 0xbf, 0x8b, &(0x7f0000000600)=""/139, 0x40f00, 0x48, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001740)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001780)={0x5, 0x10, 0x101, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001840)=[r3], 0x0, 0x10, 0xc}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8f45ae34fb00117df37538e486dd6317ce22000000"], 0xfdef) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r6, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000280)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7, r6}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000341200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r8, 0x0, 0xe, 0x0, &(0x7f0000000040)="f4b84de4115d64244a0e839e8971", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000001940)={'dvmrp1\x00'}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=@framed={{}, [@printk={@p, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x5}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}, {0x85, 0x0, 0x0, 0xb0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='percpu_alloc_percpu\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x12}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x6b, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x30, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 915.073702ms ago: executing program 2 (id=1558): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) r4 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0), 0x12) 820.558624ms ago: executing program 2 (id=1559): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0xfff}, 0x404c, 0xc8, 0x0, 0x0, 0x9, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) (async) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r3) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2, @ANYRES64=r4, @ANYRESDEC=r2, @ANYRES16=0x0, @ANYRESHEX=r0, @ANYBLOB="426e60b11a4f6a24cd8d6640c7940c3afdd3c144279ec3c4e0034a5d163966af794b36f1acf6958f3367"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) 749.866336ms ago: executing program 2 (id=1561): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) 745.989776ms ago: executing program 2 (id=1562): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0x1}, 0x8) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0x1, 0x0}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f00000004c0)={&(0x7f00000000c0), 0x6e, &(0x7f0000000440)=[{&(0x7f0000000140)=""/11, 0xb}, {&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000300)=""/248, 0xf8}], 0x4, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x40000040) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) recvmsg(r7, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000600)=r0, 0x4) 495.56378ms ago: executing program 1 (id=1565): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 464.290401ms ago: executing program 1 (id=1566): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b000000051f000094fec7ed631c5d4e02000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='3\b\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000020000000000000000f7ffffff00000000000000"], 0x50) close(r2) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 352.417983ms ago: executing program 1 (id=1567): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xa}, 0x8080, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, 0x0, &(0x7f0000000380)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2fe4a74041c1ce1c}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035090100000700009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="09000000ea532ea9776705", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) 351.764103ms ago: executing program 0 (id=1568): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0500000004000000080000000500"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a40000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@map=r0, 0x22, 0x0, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x17, 0x1a, &(0x7f0000000a80)=ANY=[@ANYBLOB="18000000905c000018110000a04b6ea5bc5c0000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018530000030000000000000000000000852000000100000075bbf8fffcffffff8520000002000000183800000100000000000000000000001845000004000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000500)='GPL\x00', 0x3, 0x15, &(0x7f0000000580)=""/21, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0x6, 0x8000, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[r0, r0], 0x0, 0x10, 0x223}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="1900002010000000", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r7, @ANYBLOB, @ANYRES64=r4], 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r0}, &(0x7f0000000d80), &(0x7f0000000dc0)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x118, 0x118, 0xa, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @ptr={0x3}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x9}}, @func={0x1, 0x0, 0x0, 0xc, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x4, 0x6368d27dc92b1554}, @union={0x4, 0xa, 0x0, 0x5, 0x0, 0x81, [{0xd, 0x5, 0x4}, {0x8, 0x1, 0x5}, {0xc, 0x0, 0xba6c}, {0x7, 0x0, 0x3}, {0x8, 0x5, 0xe}, {0xd, 0x1, 0x5}, {0xd, 0x1, 0x3}, {0x2, 0x2, 0x4}, {0x3, 0x4, 0x7}, {0xa, 0x0, 0x5}]}, @union={0x3, 0x4, 0x0, 0x5, 0x0, 0x8, [{0x9, 0x5, 0x4}, {0x9, 0x4, 0x8}, {0x10, 0x5, 0x2}, {0xa, 0x5, 0xddc}]}]}, {0x0, [0x0, 0x5f, 0x61, 0x61, 0x30, 0x0, 0x0, 0x5f]}}, &(0x7f0000000080)=""/55, 0x13a, 0x37, 0x0, 0x0, 0x10000, @value=r6}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x2000000000000339, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="6c2cc624d8bd5290c30427", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r10}, &(0x7f00000006c0), &(0x7f0000000700)=r9}, 0x20) sendmsg$inet(r8, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 315.761244ms ago: executing program 3 (id=1570): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) r4 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0), 0x12) 297.290675ms ago: executing program 3 (id=1571): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000900000000000000007110b8000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) (async) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x7, 0xc3, &(0x7f0000000a80)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, r0}, 0x94) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e030000000000f2ff020000000000000800000000000000000000000204000000000000000000000a02000000000000616100"], 0x0, 0x52}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x49, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x2, 0x0, 0x0, 0xf, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, r1, 0x2) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000900)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={&(0x7f0000000300)="dfad7d1981cbc8d9ae11d4f4b3e6460f56c422b802b198cc72607e9b82428f239da0a238e89c1bd15c68119f9e430e60818a55cf5ec194bde3797e1b326aab43b1fd41ad5d7dcb02d211598eea0b1de23cb3f2e246f772095e87ea7b39ce3343c382a651", 0x0, &(0x7f0000000200), 0x0, 0x3, r4, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0300000004000000041000000a00000000000000", @ANYRES32, @ANYBLOB="008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x3, 0xe, 0xfffffffc}, 0x10, 0x0, 0xffffffffffffffff, 0x1a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[], 0x0, 0x56}, 0x28) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) (async, rerun: 64) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) 221.584126ms ago: executing program 3 (id=1572): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/467], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffe1}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x5ed, 0x0}, 0x8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0xffffffffffffffff, 0xe, 0x8}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={&(0x7f0000000680)='./file0\x00', 0x0, 0x10, r2}, 0x18) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x6, 0x4, 0x599, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r7, 0x0, 0x1ba8847c99}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x8, 0x27, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6bd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f0000000200)='GPL\x00', 0x5, 0xc8, &(0x7f0000000880)=""/200, 0x41100, 0xa, '\x00', 0x0, @fallback=0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x401, 0x5}, 0x10, r4, r2, 0x1, &(0x7f0000000980)=[r1, r1, r1, r5, r1, r6, r7, r1], &(0x7f0000000a40)=[{0x4, 0x4, 0x2, 0x9901709288f8a52e}], 0x10, 0x6}, 0x94) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x5, 0x8, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e00)={&(0x7f0000001100)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000070000000d0000000000000100000000140053000e0000000000000a020000000d00000001000004010000000100000000000000610e00000a00000002000006040000400d000000ff0700000f0000006a0000000d0000000000000e0200000002000000002e5f002e000084c2abe4f9bbb29a94ee11d533277b36b77c56756106cf1b7f4c9b70066318627ae1afee94de3bd8b2e143ca6c5789d632040ed02784b2c52f3af8c80951c5692f889dcf9434d09a58c9603e01c238a853a17cb7aad9f7e4855c8d815220560adef514cded9f83490e1184dc6f9443c66431c22e"], &(0x7f0000000d40)=""/176, 0x7f, 0xb0, 0x0, 0x56f, 0x10000, @value=r3}, 0x28) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000f40)={{r8, 0xffffffffffffffff}, &(0x7f0000000ec0), &(0x7f0000000f00)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0x5, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40c}, [@call={0x85, 0x0, 0x0, 0xb2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000b80)='GPL\x00', 0x2, 0xe9, &(0x7f0000000bc0)=""/233, 0x41100, 0x40, '\x00', 0x0, @fallback=0x35, r9, 0x8, &(0x7f0000000e40)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000e80)={0x5, 0xd, 0xcba4, 0x1}, 0x10, r4, r2, 0x8, &(0x7f0000000f80)=[r6, r1, r10, r5], &(0x7f0000000fc0)=[{0x2, 0x1, 0x8, 0xc}, {0x1, 0x4, 0x2, 0x4}, {0x5, 0x2, 0x6}, {0x3, 0x1, 0x2, 0x6}, {0x0, 0x755a, 0x1}, {0x3, 0x3, 0x5, 0xa}, {0x2, 0x4, 0xa, 0x7}, {0x4, 0x4, 0x4, 0x7}], 0x10, 0x8001}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r13, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r13, &(0x7f0000000e00), &(0x7f0000000380)=""/75}, 0x20) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x0, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)='syzkaller\x00', 0x0, 0xd7, &(0x7f0000000340)=""/215, 0x41100, 0x4, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000080)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x1, 0x5, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000004c0)=[r12, r13, r14], &(0x7f0000000500)=[{0x1, 0x1, 0x10, 0x1}, {0x2, 0x5, 0xd}], 0x10, 0x9}, 0x94) 219.566206ms ago: executing program 1 (id=1573): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) 168.564617ms ago: executing program 3 (id=1574): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r0}, 0x18) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="02"], 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x1c, 0x0, 0x1}, {0x6, 0x4c, 0x7}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r0}, 0x18) (async) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) (async) close(r2) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="02"], 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) close(r6) (async) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x1c, 0x0, 0x1}, {0x6, 0x4c, 0x7}]}) (async) 165.930927ms ago: executing program 1 (id=1575): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000018000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) 137.328237ms ago: executing program 1 (id=1576): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x5, 0x6, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000008c0)={0xe0ce, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x8, 0xf, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x43c, 0x46, &(0x7f0000000380)=""/70, 0x41000, 0x40, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x4, 0xb, 0x4, 0x3ff}, 0x10, r5, r4, 0x0, 0x0, &(0x7f0000000900), 0x10, 0x7ff}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r4, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0), &(0x7f0000000800)=[0x0, 0x0], 0x0, 0x2d, 0x0, 0x0, 0x10, &(0x7f0000000a40), 0x0, 0x0, 0xfa, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', r6, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', r6, 0xffffffffffffffff, 0x5, 0x4, 0x2}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRESHEX=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r9}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 93.790729ms ago: executing program 3 (id=1577): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000400b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000000000c300000095f51fef21c8c1eceedb7d3556031b0446c839ecd1c5c4f082ed3409f83149e3b7bb6904ac966d0fc987a503f55a52b6000329c4cb2bb50f01d76b146b1c4a0174d690d6f311da519ce926763b7537b8474130341caf19a8b82ae0265430181c9c753dba08daa7fbab73f2e4cdd710e3c2606518545196f1efcf879470387aa7c2d0d51336e66504d776e875e4c8d4e642a5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x8c, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000005d000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008500000006000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f00000001c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2800000}, 0x2c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 81.225919ms ago: executing program 4 (id=1578): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0xec, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0xc2, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x8, 0x6, 0x5, 0x7, 0x12, 0x1, 0x4, '\x00', r0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0x1, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x5f, 0x30, 0x2e, 0x5f, 0x5f, 0x30, 0x2e, 0x5f]}}, &(0x7f00000005c0)=""/14, 0x2e, 0xe, 0x0, 0x6}, 0x28) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0xb, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000740)='GPL\x00', 0x2be0, 0x0, 0x0, 0x0, 0x1, '\x00', r0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, r1, 0x0, 0xa, &(0x7f00000007c0)=[r2, r2, r2, r2, r2, r2, r2, r2], &(0x7f0000000800)=[{0x3, 0x2, 0xf, 0x2}, {0x2, 0x4, 0xf, 0x9}, {0x4, 0x2, 0xa, 0xa}, {0x2, 0x1, 0x6, 0x7}, {0x1, 0x5, 0x6, 0xc}, {0x1, 0x5, 0x3}, {0x4, 0x2, 0x8, 0x6}, {0x4, 0x1, 0xe, 0xa}, {0x3, 0x4, 0x10, 0xc}, {0x4, 0x4, 0xf, 0x5}], 0x10, 0x8}, 0x94) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0x12, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xaf3f, 0x0, 0x0, 0x0, 0xf}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@generic={0x52, 0x3, 0x7, 0x3ff, 0x4}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000440)='syzkaller\x00', 0xfffffffd, 0xd2, &(0x7f0000000480)=""/210, 0x41100, 0x20, '\x00', r0, 0x0, r3, 0x8, &(0x7f0000000640)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x9, 0x9}, 0x10, 0x16755, r4, 0x6, &(0x7f0000000980), &(0x7f00000009c0)=[{0x1, 0x5, 0x7, 0x6}, {0x1, 0x3, 0x2, 0xa}, {0x0, 0x1, 0x9}, {0x2, 0x3, 0x10, 0x9}, {0x5, 0x4, 0x9, 0x6}, {0x4, 0x1, 0x4, 0x2}], 0x10, 0x101}, 0x94) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b00)=0xffffffffffffffff, 0x4) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xffffff80, '\x00', r0, r6, 0x2, 0x0, 0x1}, 0x50) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={0xffffffffffffffff, 0x9, 0x4}, 0xc) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x6, '\x00', 0x0, r6, 0x5, 0x3, 0x5}, 0x50) socketpair(0x1d, 0x2, 0x5, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = perf_event_open(&(0x7f0000000d00)={0x4, 0x80, 0x80, 0x0, 0x4, 0x89, 0x0, 0x740fde09, 0x81, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000cc0), 0xc}, 0x18120, 0x8, 0xf, 0x5, 0x4, 0x6, 0xbf6, 0x0, 0x6, 0x0, 0x18000000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r5) r13 = gettid() r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000f00)=r1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001140)={r6, 0x20, &(0x7f0000001100)={&(0x7f0000000fc0)=""/42, 0x2a, 0x0, &(0x7f0000001000)=""/194, 0xc2}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x12, 0x15, &(0x7f0000000d80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000e40)='syzkaller\x00', 0x4, 0x6d, &(0x7f0000000e80)=""/109, 0x41000, 0x2, '\x00', r0, @fallback=0x22, r14, 0x8, &(0x7f0000000f40)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000f80)={0x3, 0x3, 0x63, 0x3a31}, 0x10, r15, r5, 0x0, &(0x7f0000001180)=[r9], 0x0, 0x10, 0xf}, 0x94) r16 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r16, &(0x7f00000012c0)=r13, 0x12) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000001340)={0x4, &(0x7f0000001300)=[{0x60, 0x4, 0x5, 0x70c}, {0x9334, 0x17, 0xc, 0x9}, {0x7, 0x1, 0x6b, 0x3}, {0x1, 0x5, 0x0, 0x9}]}) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(r11, &(0x7f0000001680)={&(0x7f00000013c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000001400)="f3705329d89f3f0380a40d232991630baf05a886aa0877fe89c4676d747c4884e4dc91a8a22f85407a8431c1b0bbf9790d74c574d5feaf38878309b0eae0fc32efea58c68a8fbe1056c55eb02be9fc0d8e2f51cde3ea18188609413bf02c0d0fd06a20812e7c84676df672fcb4f1c854e2f3cf8fc31e4a0672c6ab00314a63913334638e954515cd8008b78239fe855288019cbaeeb8ab", 0x97}], 0x1, &(0x7f0000001500)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @local, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xae}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x3e, 0x1, 0x9, [{@rand_addr=0x64010101, 0x5}, {@remote, 0x9}]}, @generic={0x7, 0x3, "ab"}, @ra={0x94, 0x4}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffeffff}}, @ip_retopts={{0xb8, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xa6, [@loopback, @local, @empty]}, @ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0x2e, 0x3, [{0x1, 0xb, "baf2d29c7df4dea0c2"}, {0x2, 0x7, "350be9c888"}, {0x6, 0x10, "937437930711266cc948e3220628"}, {0x5, 0x6, "b08ad270"}]}, @generic={0x7, 0x10, "7aa350b6b67e385e05f06fbba99d"}, @end, @timestamp_prespec={0x44, 0x4c, 0x2d, 0x3, 0xf, [{@loopback, 0xc73}, {@remote, 0x9}, {@local, 0x5}, {@broadcast}, {@empty, 0x1}, {@empty, 0x1}, {@local, 0xf9}, {@empty, 0xffffff00}, {@empty, 0x4}]}]}}}], 0x180}, 0x41) bpf$PROG_LOAD(0x5, &(0x7f0000001880)={0x4, 0x16, &(0x7f00000016c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x0, 0x3, 0xa, 0x0, 0xffffffffffffffe0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @alu={0x4, 0x1, 0x9, 0x9, 0x1, 0x40, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001780)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x41100, 0x6c, '\x00', r0, @fallback=0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000017c0)={0x4, 0x3, 0x10001, 0x7}, 0x10, r1, 0xffffffffffffffff, 0x1, &(0x7f0000001800)=[r9], &(0x7f0000001840)=[{0x1, 0x2, 0xe, 0x7}], 0x10, 0xb}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001940)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001980)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r8, 0x58, &(0x7f00000019c0)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001c00)={r9, &(0x7f0000001a80)="392f162bdeb77d8a16e61fc2c7320bd53ec348d6c6e6a7187235109ccb69ae6209a520c10fe3991f18b42ce5635bd1b254f54af6538050bd15c8308793da12e6eeba5c9c5f2ea4ccf50bf5aaf5d44be43a679f3e90b7afe6", &(0x7f0000001b00)=""/244}, 0x20) r18 = openat$cgroup_ro(r17, &(0x7f0000001c40)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r18) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001cc0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0xf3, '\x00', 0x0, r14, 0x1, 0x2}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001d40)=@o_path={&(0x7f0000001c80)='./file0\x00', r19, 0x4000, r10}, 0x18) 672.001µs ago: executing program 4 (id=1579): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 3 (id=1580): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (fail_nth: 1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. [ 25.784760][ T28] audit: type=1400 audit(1757057846.993:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.786608][ T275] cgroup: Unknown subsys name 'net' [ 25.807469][ T28] audit: type=1400 audit(1757057846.993:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.834755][ T28] audit: type=1400 audit(1757057847.023:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.834961][ T275] cgroup: Unknown subsys name 'devices' [ 25.950882][ T275] cgroup: Unknown subsys name 'hugetlb' [ 25.956506][ T275] cgroup: Unknown subsys name 'rlimit' [ 26.091777][ T28] audit: type=1400 audit(1757057847.303:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.114970][ T28] audit: type=1400 audit(1757057847.303:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.135220][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.140010][ T28] audit: type=1400 audit(1757057847.303:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.171395][ T28] audit: type=1400 audit(1757057847.363:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.196817][ T28] audit: type=1400 audit(1757057847.363:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.208394][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.222419][ T28] audit: type=1400 audit(1757057847.413:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.256601][ T28] audit: type=1400 audit(1757057847.413:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.707626][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.714849][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.722437][ T283] device bridge_slave_0 entered promiscuous mode [ 27.730536][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.737591][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.745204][ T283] device bridge_slave_1 entered promiscuous mode [ 27.772613][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.779774][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.787187][ T284] device bridge_slave_0 entered promiscuous mode [ 27.814831][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.821941][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.829573][ T284] device bridge_slave_1 entered promiscuous mode [ 27.872465][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.879574][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.887064][ T287] device bridge_slave_0 entered promiscuous mode [ 27.894178][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.901250][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.908784][ T287] device bridge_slave_1 entered promiscuous mode [ 27.975668][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.982791][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.990535][ T285] device bridge_slave_0 entered promiscuous mode [ 27.997315][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.004601][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.012159][ T286] device bridge_slave_0 entered promiscuous mode [ 28.030431][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.037500][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.045031][ T285] device bridge_slave_1 entered promiscuous mode [ 28.051625][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.058782][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.066176][ T286] device bridge_slave_1 entered promiscuous mode [ 28.240261][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.247331][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.254656][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.261699][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.283635][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.290715][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.298008][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.305056][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.327125][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.334217][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.341523][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.348571][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.357799][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.364926][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.372232][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.379299][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.414032][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.421120][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.428461][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.435531][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.461243][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.468567][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.476290][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.483728][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.491381][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.498709][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.505914][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.513238][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.520474][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.527807][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.535684][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.543223][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.560072][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.567958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.576258][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.583323][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.591096][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.599569][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.606601][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.614106][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.622351][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.629405][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.659567][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.667237][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.674880][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.683470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.691893][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.698977][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.706437][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.714998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.723440][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.730509][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.737928][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.746089][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.754083][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.762282][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.770369][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.777936][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.785465][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.793920][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.802217][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.809290][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.816672][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.825084][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.833225][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.841302][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.850879][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.859339][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.867512][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.874580][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.892979][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.901391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.910469][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.918560][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.926946][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.935249][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.947766][ T284] device veth0_vlan entered promiscuous mode [ 28.960702][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.968858][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.976945][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.984709][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.992962][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.001378][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.009638][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.016667][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.033251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.042498][ T284] device veth1_macvtap entered promiscuous mode [ 29.062206][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.069843][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.077299][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.086004][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.094670][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.101742][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.109299][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.117618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.125917][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.132982][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.140441][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.148993][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.157327][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.165805][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.176864][ T287] device veth0_vlan entered promiscuous mode [ 29.185942][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.194008][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.202354][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.210036][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.235981][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.244273][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.252532][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.260992][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.270239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.278226][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.286281][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.294581][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.303147][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.311712][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.321977][ T283] device veth0_vlan entered promiscuous mode [ 29.332860][ T287] device veth1_macvtap entered promiscuous mode [ 29.343949][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.352286][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.360556][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.369089][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.376667][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.396827][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.405421][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.414112][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.422676][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.431301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.439751][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.448122][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.456588][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.473331][ T283] device veth1_macvtap entered promiscuous mode [ 29.491357][ T285] device veth0_vlan entered promiscuous mode [ 29.499100][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 29.506413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.515536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.523246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.531414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.541645][ T286] device veth0_vlan entered promiscuous mode [ 29.559985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.571187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.582986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.592879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.601568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.610444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.618054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.636569][ T285] device veth1_macvtap entered promiscuous mode [ 29.648874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.658596][ C0] hrtimer: interrupt took 24907 ns [ 29.691911][ T286] device veth1_macvtap entered promiscuous mode [ 29.739356][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.768187][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.818210][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.862538][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.897665][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.538584][ C1] sched: RT throttling activated [ 31.542379][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.556012][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.608999][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.617406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.699687][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.710522][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.843239][ T361] device syzkaller0 entered promiscuous mode [ 35.136428][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 35.136444][ T28] audit: type=1400 audit(1757057856.343:105): avc: denied { cpu } for pid=375 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.206530][ T378] device syzkaller0 entered promiscuous mode [ 35.421987][ T28] audit: type=1400 audit(1757057856.633:106): avc: denied { write } for pid=381 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.494822][ T28] audit: type=1400 audit(1757057856.703:107): avc: denied { setopt } for pid=383 comm="syz.2.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.626227][ T388] device syzkaller0 entered promiscuous mode [ 35.907952][ T28] audit: type=1400 audit(1757057857.113:108): avc: denied { write } for pid=394 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.551010][ T28] audit: type=1400 audit(1757057857.763:109): avc: denied { read } for pid=407 comm="syz.3.18" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.658858][ T28] audit: type=1400 audit(1757057857.763:110): avc: denied { open } for pid=407 comm="syz.3.18" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.726975][ T418] device syzkaller0 entered promiscuous mode [ 36.778822][ T28] audit: type=1400 audit(1757057857.783:111): avc: denied { ioctl } for pid=407 comm="syz.3.18" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.827593][ T28] audit: type=1400 audit(1757057857.823:112): avc: denied { write } for pid=407 comm="syz.3.18" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.879292][ T28] audit: type=1400 audit(1757057857.923:113): avc: denied { create } for pid=407 comm="syz.3.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.898801][ T423] device syzkaller0 entered promiscuous mode [ 37.086516][ T424] device syzkaller0 entered promiscuous mode [ 37.443763][ T437] device syzkaller0 entered promiscuous mode [ 37.866935][ T449] device syzkaller0 entered promiscuous mode [ 38.317931][ T458] device syzkaller0 entered promiscuous mode [ 38.933701][ T470] device syzkaller0 entered promiscuous mode [ 39.000612][ T28] audit: type=1400 audit(1757057860.213:114): avc: denied { create } for pid=466 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 39.343062][ T477] device wg2 entered promiscuous mode [ 39.746380][ T488] device syzkaller0 entered promiscuous mode [ 40.219349][ T508] device syzkaller0 entered promiscuous mode [ 40.273405][ T512] device syzkaller0 entered promiscuous mode [ 40.665443][ T519] device wg2 entered promiscuous mode [ 40.706047][ T521] device syzkaller0 entered promiscuous mode [ 40.844402][ T524] device syzkaller0 entered promiscuous mode [ 41.321373][ T541] device syzkaller0 entered promiscuous mode [ 41.928946][ T560] device syzkaller0 entered promiscuous mode [ 42.161379][ T568] device syzkaller0 entered promiscuous mode [ 42.537135][ T576] device syzkaller0 entered promiscuous mode [ 42.653996][ T580] device syzkaller0 entered promiscuous mode [ 42.982518][ T587] device syzkaller0 entered promiscuous mode [ 43.568953][ T599] device syzkaller0 entered promiscuous mode [ 43.878204][ T611] device syzkaller0 entered promiscuous mode [ 48.027938][ T635] device syzkaller0 entered promiscuous mode [ 48.503841][ T645] device syzkaller0 entered promiscuous mode [ 48.832734][ T658] device syzkaller0 entered promiscuous mode [ 48.854039][ T657] device syzkaller0 entered promiscuous mode [ 49.384729][ T672] device syzkaller0 entered promiscuous mode [ 49.781094][ T677] device syzkaller0 entered promiscuous mode [ 50.174310][ T700] device syzkaller0 entered promiscuous mode [ 50.415221][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 50.415238][ T28] audit: type=1400 audit(1757057871.623:116): avc: denied { read } for pid=705 comm="syz.3.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 50.599200][ T722] device syzkaller0 entered promiscuous mode [ 50.780549][ T726] device syzkaller0 entered promiscuous mode [ 51.603100][ T764] device syzkaller0 entered promiscuous mode [ 51.966790][ T777] device syzkaller0 entered promiscuous mode [ 52.478022][ T805] device pim6reg1 entered promiscuous mode [ 52.987128][ T28] audit: type=1400 audit(1757057874.193:117): avc: denied { relabelfrom } for pid=832 comm="syz.4.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 53.010721][ T28] audit: type=1400 audit(1757057874.193:118): avc: denied { relabelto } for pid=832 comm="syz.4.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 53.136618][ T845] device syzkaller0 entered promiscuous mode [ 53.753066][ T860] device syzkaller0 entered promiscuous mode [ 55.346243][ T921] device sit0 entered promiscuous mode [ 56.731073][ T934] device pim6reg1 entered promiscuous mode [ 57.098072][ T28] audit: type=1400 audit(1757057878.303:119): avc: denied { tracepoint } for pid=935 comm="syz.3.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 57.364007][ T940] device syzkaller0 entered promiscuous mode [ 57.929865][ T926] syz.4.156 (926) used greatest stack depth: 21984 bytes left [ 58.120582][ T28] audit: type=1400 audit(1757057879.333:120): avc: denied { create } for pid=982 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 58.138693][ T970] device syzkaller0 entered promiscuous mode [ 58.403482][ T994] device lo entered promiscuous mode [ 58.757741][ T1018] device syzkaller0 entered promiscuous mode [ 58.782805][ T1019] device syzkaller0 entered promiscuous mode [ 59.434412][ T1039] Driver unsupported XDP return value 0 on prog (id 309) dev N/A, expect packet loss! [ 59.994248][ T28] audit: type=1400 audit(1757057881.203:121): avc: denied { create } for pid=1060 comm="syz.3.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 60.448825][ T1090] device syzkaller0 entered promiscuous mode [ 60.493761][ T1095] device syzkaller0 entered promiscuous mode [ 61.152643][ T28] audit: type=1400 audit(1757057882.363:122): avc: denied { create } for pid=1104 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 61.994832][ T1145] device syzkaller0 entered promiscuous mode [ 62.961529][ T28] audit: type=1400 audit(1757057884.173:123): avc: denied { create } for pid=1173 comm="syz.4.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 63.049680][ T28] audit: type=1400 audit(1757057884.263:124): avc: denied { create } for pid=1173 comm="syz.4.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 64.294367][ T1215] tap0: tun_chr_ioctl cmd 21731 [ 64.446186][ T1223] device syzkaller0 entered promiscuous mode [ 64.942570][ T1247] syz.4.245[1247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.942648][ T1247] syz.4.245[1247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.978987][ T1247] syz.4.245[1247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.354978][ T1261] bridge0: port 3(veth1_macvtap) entered blocking state [ 65.380242][ T1261] bridge0: port 3(veth1_macvtap) entered disabled state [ 65.556695][ T28] audit: type=1400 audit(1757057886.763:125): avc: denied { create } for pid=1268 comm="syz.2.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 65.683899][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.826457][ T1289] device syzkaller0 entered promiscuous mode [ 66.248545][ T28] audit: type=1400 audit(1757057887.453:126): avc: denied { create } for pid=1330 comm="syz.2.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 66.328454][ T1334] device pim6reg1 entered promiscuous mode [ 66.830472][ T28] audit: type=1400 audit(1757057888.033:127): avc: denied { create } for pid=1340 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.156544][ T1400] device syzkaller0 entered promiscuous mode [ 68.232215][ T28] audit: type=1400 audit(1757057889.443:128): avc: denied { create } for pid=1406 comm="syz.2.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 68.441722][ T1410] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.450582][ T1410] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.615625][ T28] audit: type=1400 audit(1757057889.823:129): avc: denied { attach_queue } for pid=1409 comm="syz.2.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 68.640708][ T1410] device bridge_slave_1 left promiscuous mode [ 68.649972][ T1410] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.692466][ T1410] device bridge_slave_0 left promiscuous mode [ 68.701788][ T1410] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.068778][ T1427] device veth1_macvtap left promiscuous mode [ 69.127725][ T1427] device macsec0 entered promiscuous mode [ 69.270144][ T1430] device syzkaller0 entered promiscuous mode [ 69.724874][ T1448] device pim6reg1 entered promiscuous mode [ 70.068871][ T28] audit: type=1400 audit(1757057891.273:130): avc: denied { create } for pid=1454 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 70.682207][ T1482] device wg2 entered promiscuous mode [ 71.230769][ T1495] syz.2.319[1495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.230865][ T1495] syz.2.319[1495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.339380][ T28] audit: type=1400 audit(1757057892.533:131): avc: denied { ioctl } for pid=1491 comm="syz.4.317" path="pid:[4026532378]" dev="nsfs" ino=4026532378 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.274043][ T1526] device syzkaller0 entered promiscuous mode [ 74.150557][ T1575] device pim6reg1 entered promiscuous mode [ 74.278467][ T1588] device syzkaller0 entered promiscuous mode [ 74.930565][ T1610] device veth1_macvtap left promiscuous mode [ 74.992159][ T1612] device veth1_macvtap entered promiscuous mode [ 74.999159][ T1612] device macsec0 entered promiscuous mode [ 75.294653][ T1621] bond_slave_1: mtu less than device minimum [ 75.518537][ T1632] device wg2 left promiscuous mode [ 75.685205][ T1632] device wg2 entered promiscuous mode [ 76.874970][ T1654] device syzkaller0 entered promiscuous mode [ 77.208495][ T1670] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.218308][ T1670] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.244985][ T1672] device pim6reg1 entered promiscuous mode [ 77.275419][ T1671] device syzkaller0 entered promiscuous mode [ 77.423780][ T1679] device bridge_slave_1 left promiscuous mode [ 77.463956][ T1679] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.488443][ T1679] device bridge_slave_0 left promiscuous mode [ 77.495032][ T1679] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.594762][ T1684] device pim6reg1 entered promiscuous mode [ 77.892896][ T1689] device syzkaller0 entered promiscuous mode [ 77.928172][ T1690] device lo entered promiscuous mode [ 78.780957][ T1729] device macsec0 left promiscuous mode [ 78.898106][ T1729] device veth1_macvtap entered promiscuous mode [ 78.935616][ T1729] device macsec0 entered promiscuous mode [ 78.984204][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 79.590277][ T1739] device wg2 left promiscuous mode [ 79.648953][ T1739] device wg2 entered promiscuous mode [ 79.899592][ T28] audit: type=1400 audit(1757057901.113:132): avc: denied { create } for pid=1749 comm="syz.3.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 80.799375][ T1762] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.806736][ T1762] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.941959][ T1765] device bridge_slave_1 left promiscuous mode [ 80.955250][ T1765] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.963782][ T1765] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.179803][ T1773] device syzkaller0 entered promiscuous mode [ 81.539472][ T1776] device syzkaller0 entered promiscuous mode [ 81.785839][ T1787] device wg2 entered promiscuous mode [ 81.914296][ T1795] device syzkaller0 entered promiscuous mode [ 82.886277][ T1846] device wg2 entered promiscuous mode [ 83.374835][ T1866] device syzkaller0 entered promiscuous mode [ 83.777631][ T1874] device veth1_macvtap left promiscuous mode [ 83.791089][ T1874] device macsec0 left promiscuous mode [ 83.855686][ T1876] device syzkaller0 entered promiscuous mode [ 83.864428][ T1874] device wg2 left promiscuous mode [ 84.133893][ T1883] device veth1_macvtap left promiscuous mode [ 84.184220][ T1871] device wg2 entered promiscuous mode [ 84.191166][ T1888] device veth1_macvtap entered promiscuous mode [ 84.197550][ T1888] device macsec0 entered promiscuous mode [ 84.204191][ T1889] batadv0: tun_chr_ioctl cmd 1074025677 [ 84.216039][ T1889] batadv0: linktype set to 769 [ 84.334158][ T1903] device syzkaller0 entered promiscuous mode [ 85.265069][ T1946] device veth1_macvtap left promiscuous mode [ 85.289506][ T1946] device macsec0 left promiscuous mode [ 85.347533][ T1945] device veth1_macvtap left promiscuous mode [ 85.425331][ T1949] device wg2 left promiscuous mode [ 85.450647][ T1950] device veth1_macvtap entered promiscuous mode [ 85.458450][ T1950] device macsec0 entered promiscuous mode [ 85.465726][ T1951] device wg2 entered promiscuous mode [ 86.146278][ T1977] device pim6reg1 entered promiscuous mode [ 86.375612][ T28] audit: type=1400 audit(1757057907.583:133): avc: denied { create } for pid=1990 comm="syz.4.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 86.595044][ T2000] device veth1_macvtap left promiscuous mode [ 86.705956][ T2000] device veth1_macvtap entered promiscuous mode [ 86.716672][ T2000] device macsec0 entered promiscuous mode [ 87.185297][ T2029] device pim6reg1 entered promiscuous mode [ 87.319358][ T2014] device veth1_macvtap left promiscuous mode [ 87.338727][ T2014] device macsec0 left promiscuous mode [ 87.376745][ T2014] device wg2 left promiscuous mode [ 87.496923][ T28] audit: type=1400 audit(1757057908.703:134): avc: denied { create } for pid=2045 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 87.534497][ T2014] device wg2 entered promiscuous mode [ 87.803468][ T2055] device veth1_macvtap left promiscuous mode [ 87.820618][ T2055] device macsec0 left promiscuous mode [ 87.896434][ T2060] device veth1_macvtap entered promiscuous mode [ 87.922262][ T2060] device macsec0 entered promiscuous mode [ 88.105348][ T2073] device pim6reg1 entered promiscuous mode [ 88.170995][ T2082] device veth1_macvtap left promiscuous mode [ 88.205041][ T2082] device macsec0 left promiscuous mode [ 88.266341][ T2086] device veth1_macvtap entered promiscuous mode [ 88.280250][ T2086] device macsec0 entered promiscuous mode [ 88.297296][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 88.749019][ T2113] device veth1_macvtap left promiscuous mode [ 88.785805][ T2113] device macsec0 left promiscuous mode [ 88.845205][ T2116] device veth1_macvtap entered promiscuous mode [ 88.872552][ T2116] device macsec0 entered promiscuous mode [ 89.362934][ T2122] tap0: tun_chr_ioctl cmd 1074025677 [ 89.378437][ T2122] tap0: linktype set to 825 [ 89.472462][ T2133] device pim6reg1 entered promiscuous mode [ 89.871507][ T2152] device syzkaller0 entered promiscuous mode [ 91.122855][ T2184] device veth1_macvtap entered promiscuous mode [ 91.162566][ T2184] device macsec0 entered promiscuous mode [ 91.223557][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.315953][ T2197] device syzkaller0 entered promiscuous mode [ 91.388192][ T2200] device syzkaller0 entered promiscuous mode [ 92.253526][ T2221] device veth1_macvtap entered promiscuous mode [ 92.274958][ T2221] device macsec0 entered promiscuous mode [ 92.319141][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.512351][ T28] audit: type=1400 audit(1757057913.723:135): avc: denied { create } for pid=2234 comm="syz.3.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 92.541179][ T2235] device wg2 left promiscuous mode [ 92.664876][ T2235] device wg2 entered promiscuous mode [ 93.228740][ T2246] device veth1_macvtap entered promiscuous mode [ 93.276995][ T2246] device macsec0 entered promiscuous mode [ 93.289116][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.465946][ T2263] device syzkaller0 entered promiscuous mode [ 95.267502][ T2339] device syzkaller0 entered promiscuous mode [ 96.328710][ T2377] device wg2 left promiscuous mode [ 96.389324][ T2378] device wg2 entered promiscuous mode [ 96.418333][ T2383] device pim6reg1 entered promiscuous mode [ 98.313711][ T2422] device syzkaller0 entered promiscuous mode [ 98.404393][ T28] audit: type=1400 audit(1757057919.613:136): avc: denied { create } for pid=2436 comm="syz.3.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 98.694648][ T2441] device veth1_macvtap left promiscuous mode [ 98.702460][ T2441] device macsec0 left promiscuous mode [ 98.723544][ T2445] device veth1_macvtap entered promiscuous mode [ 98.780287][ T2445] device macsec0 entered promiscuous mode [ 100.233619][ T2479] device sit0 entered promiscuous mode [ 100.991045][ T2488] device veth1_macvtap left promiscuous mode [ 101.029024][ T2488] device macsec0 left promiscuous mode [ 101.094999][ T2487] device veth1_macvtap entered promiscuous mode [ 101.209202][ T2487] device macsec0 entered promiscuous mode [ 101.310338][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.536916][ T2507] device syzkaller0 entered promiscuous mode [ 102.378276][ T2521] device veth0_vlan left promiscuous mode [ 102.402050][ T2521] device veth0_vlan entered promiscuous mode [ 103.845688][ T2559] device syzkaller0 entered promiscuous mode [ 104.945476][ T2614] device gre0 entered promiscuous mode [ 106.292453][ T2660] device syzkaller0 entered promiscuous mode [ 108.669498][ T2748] device syzkaller0 entered promiscuous mode [ 110.842030][ T2813] device syzkaller0 entered promiscuous mode [ 111.252948][ T2825] device veth1_macvtap left promiscuous mode [ 111.259839][ T2825] device macsec0 left promiscuous mode [ 111.302248][ T2831] device veth1_macvtap entered promiscuous mode [ 111.308643][ T2831] device macsec0 entered promiscuous mode [ 112.410809][ T2864] device veth0_vlan left promiscuous mode [ 112.467060][ T2864] device veth0_vlan entered promiscuous mode [ 112.710844][ T2875] device veth1_macvtap left promiscuous mode [ 112.734619][ T2875] device macsec0 left promiscuous mode [ 112.757484][ T2871] device veth1_macvtap entered promiscuous mode [ 112.809019][ T2871] device macsec0 entered promiscuous mode [ 112.966905][ T2882] device syzkaller0 entered promiscuous mode [ 114.057455][ T2921] device veth1_macvtap left promiscuous mode [ 114.096252][ T2921] device macsec0 left promiscuous mode [ 114.195487][ T2926] device veth1_macvtap entered promiscuous mode [ 114.209190][ T2926] device macsec0 entered promiscuous mode [ 114.878863][ T2953] device syzkaller0 entered promiscuous mode [ 117.129328][ T2984] device veth1_macvtap left promiscuous mode [ 117.152375][ T2984] device macsec0 left promiscuous mode [ 117.202460][ T2985] device veth1_macvtap entered promiscuous mode [ 117.261332][ T2985] device macsec0 entered promiscuous mode [ 117.281527][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 117.387242][ T2990] device bridge0 entered promiscuous mode [ 117.984447][ T3022] device syzkaller0 entered promiscuous mode [ 118.156054][ T3027] device veth1_macvtap left promiscuous mode [ 118.163950][ T3027] device macsec0 left promiscuous mode [ 118.213925][ T3030] device veth1_macvtap entered promiscuous mode [ 118.238029][ T3030] device macsec0 entered promiscuous mode [ 118.586136][ T28] audit: type=1400 audit(1757057939.793:137): avc: denied { create } for pid=3033 comm="syz.0.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 118.648037][ T3041] device veth1_macvtap left promiscuous mode [ 118.674929][ T3041] device macsec0 left promiscuous mode [ 118.916518][ T3051] device veth1_macvtap left promiscuous mode [ 118.931414][ T3051] device macsec0 left promiscuous mode [ 119.047852][ T3051] device veth1_macvtap entered promiscuous mode [ 119.060729][ T3051] device macsec0 entered promiscuous mode [ 119.995279][ T3085] device syzkaller0 entered promiscuous mode [ 120.084455][ T3088] device veth1_macvtap left promiscuous mode [ 120.091858][ T3088] device macsec0 left promiscuous mode [ 120.372370][ T3088] device veth1_macvtap entered promiscuous mode [ 120.393569][ T3088] device macsec0 entered promiscuous mode [ 120.740965][ T3110] syz.3.772 (3110) used obsolete PPPIOCDETACH ioctl [ 120.789787][ T3114] device veth0_vlan left promiscuous mode [ 120.821323][ T3114] device veth0_vlan entered promiscuous mode [ 120.890648][ T3125] device veth1_macvtap left promiscuous mode [ 120.897012][ T3125] device macsec0 left promiscuous mode [ 121.008654][ T3128] device veth1_macvtap entered promiscuous mode [ 121.122219][ T3128] device macsec0 entered promiscuous mode [ 121.221217][ T3134] device veth1_macvtap left promiscuous mode [ 121.227429][ T3134] device macsec0 left promiscuous mode [ 121.294669][ T3136] device veth1_macvtap left promiscuous mode [ 121.349028][ T3136] device macsec0 left promiscuous mode [ 121.440720][ T3134] device veth1_macvtap entered promiscuous mode [ 121.459954][ T3134] device macsec0 entered promiscuous mode [ 121.595529][ T3139] device veth1_macvtap entered promiscuous mode [ 121.609028][ T3139] device macsec0 entered promiscuous mode [ 121.750181][ T3152] device syzkaller0 entered promiscuous mode [ 122.024733][ T3185] syz.4.796[3185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.063401][ T3186] device veth1_macvtap left promiscuous mode [ 122.127842][ T3186] device macsec0 left promiscuous mode [ 122.151814][ T3190] device veth1_macvtap left promiscuous mode [ 122.159676][ T3190] device macsec0 left promiscuous mode [ 122.181045][ T3191] device veth1_macvtap entered promiscuous mode [ 122.238389][ T3191] device macsec0 entered promiscuous mode [ 122.340708][ T3190] device veth1_macvtap entered promiscuous mode [ 122.359949][ T3190] device macsec0 entered promiscuous mode [ 123.008169][ T3204] device syzkaller0 entered promiscuous mode [ 123.726788][ T3238] device veth1_macvtap left promiscuous mode [ 123.737090][ T3238] device macsec0 left promiscuous mode [ 123.849112][ T3239] device veth1_macvtap entered promiscuous mode [ 123.870329][ T3239] device macsec0 entered promiscuous mode [ 124.009198][ T3243] device sit0 entered promiscuous mode [ 128.598102][ T3290] device syzkaller0 entered promiscuous mode [ 129.317327][ T3310] device veth1_macvtap left promiscuous mode [ 129.334424][ T3310] device macsec0 left promiscuous mode [ 129.368921][ T3313] device sit0 left promiscuous mode [ 129.393613][ T3310] device veth1_macvtap entered promiscuous mode [ 129.407401][ T3310] device macsec0 entered promiscuous mode [ 129.447774][ T3316] device sit0 left promiscuous mode [ 129.475906][ T3313] device sit0 entered promiscuous mode [ 129.588427][ T3317] device sit0 entered promiscuous mode [ 130.019721][ T3352] device syzkaller0 entered promiscuous mode [ 130.285760][ T3360] device sit0 entered promiscuous mode [ 130.609888][ T3364] device wg2 left promiscuous mode [ 130.693717][ T3364] device wg2 entered promiscuous mode [ 131.112283][ T3396] IPv6: ÿÿÿÿ: Disabled Multicast RS [ 131.886677][ T3419] device syzkaller0 entered promiscuous mode [ 132.168692][ T3427] device veth1_macvtap left promiscuous mode [ 132.199032][ T3427] device macsec0 left promiscuous mode [ 132.207258][ T3424] device veth1_macvtap entered promiscuous mode [ 132.237056][ T3424] device macsec0 entered promiscuous mode [ 132.550023][ T3442] device sit0 entered promiscuous mode [ 132.851911][ T3450] device syzkaller0 entered promiscuous mode [ 133.178258][ T3471] device veth1_macvtap left promiscuous mode [ 133.184672][ T3471] device macsec0 left promiscuous mode [ 133.203751][ T3474] device veth1_macvtap entered promiscuous mode [ 133.235289][ T3474] device macsec0 entered promiscuous mode [ 133.498515][ T3479] device syzkaller0 entered promiscuous mode [ 134.913523][ T3509] device syzkaller0 entered promiscuous mode [ 135.718792][ T3521] FAULT_INJECTION: forcing a failure. [ 135.718792][ T3521] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 135.737177][ T3521] CPU: 0 PID: 3521 Comm: syz.3.892 Not tainted syzkaller #0 [ 135.744536][ T3521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 135.754658][ T3521] Call Trace: [ 135.757970][ T3521] [ 135.760921][ T3521] __dump_stack+0x21/0x24 [ 135.765297][ T3521] dump_stack_lvl+0xee/0x150 [ 135.769929][ T3521] ? __cfi_dump_stack_lvl+0x8/0x8 [ 135.774992][ T3521] ? memcpy+0x56/0x70 [ 135.779001][ T3521] dump_stack+0x15/0x24 [ 135.783181][ T3521] should_fail_ex+0x3d4/0x520 [ 135.787894][ T3521] should_fail+0xb/0x10 [ 135.792084][ T3521] should_fail_usercopy+0x1a/0x20 [ 135.797140][ T3521] strncpy_from_user+0x24/0x2d0 [ 135.802035][ T3521] bpf_prog_load+0x1bb/0x15a0 [ 135.806794][ T3521] ? map_freeze+0x390/0x390 [ 135.811335][ T3521] ? selinux_bpf+0xc7/0xf0 [ 135.815782][ T3521] ? security_bpf+0x93/0xb0 [ 135.820330][ T3521] __sys_bpf+0x504/0x780 [ 135.824615][ T3521] ? bpf_link_show_fdinfo+0x320/0x320 [ 135.830033][ T3521] ? __cfi_ksys_write+0x10/0x10 [ 135.834929][ T3521] ? debug_smp_processor_id+0x17/0x20 [ 135.840347][ T3521] __x64_sys_bpf+0x7c/0x90 [ 135.844808][ T3521] x64_sys_call+0x488/0x9a0 [ 135.849349][ T3521] do_syscall_64+0x4c/0xa0 [ 135.853842][ T3521] ? clear_bhb_loop+0x30/0x80 [ 135.858564][ T3521] ? clear_bhb_loop+0x30/0x80 [ 135.863281][ T3521] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 135.869206][ T3521] RIP: 0033:0x7f0bb298ebe9 [ 135.873664][ T3521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.893317][ T3521] RSP: 002b:00007f0bb13f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 135.901778][ T3521] RAX: ffffffffffffffda RBX: 00007f0bb2bc5fa0 RCX: 00007f0bb298ebe9 [ 135.909783][ T3521] RDX: 0000000000000080 RSI: 00002000000001c0 RDI: 0000000000000005 [ 135.917792][ T3521] RBP: 00007f0bb13f7090 R08: 0000000000000000 R09: 0000000000000000 [ 135.925775][ T3521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.933841][ T3521] R13: 00007f0bb2bc6038 R14: 00007f0bb2bc5fa0 R15: 00007fff9d805e58 [ 135.941835][ T3521] [ 135.947825][ T3518] device veth1_macvtap left promiscuous mode [ 135.961537][ T3518] device macsec0 left promiscuous mode [ 135.993468][ T3519] device veth1_macvtap entered promiscuous mode [ 136.016936][ T3519] device macsec0 entered promiscuous mode [ 136.068056][ T3530] device syzkaller0 entered promiscuous mode [ 136.178633][ T28] audit: type=1400 audit(1757057957.383:138): avc: denied { create } for pid=3538 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 136.614226][ T3556] device syzkaller0 entered promiscuous mode [ 137.070161][ T3575] FAULT_INJECTION: forcing a failure. [ 137.070161][ T3575] name failslab, interval 1, probability 0, space 0, times 1 [ 137.100277][ T3575] CPU: 1 PID: 3575 Comm: syz.0.910 Not tainted syzkaller #0 [ 137.107629][ T3575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.117712][ T3575] Call Trace: [ 137.121008][ T3575] [ 137.123955][ T3575] __dump_stack+0x21/0x24 [ 137.128307][ T3575] dump_stack_lvl+0xee/0x150 [ 137.132926][ T3575] ? __cfi_dump_stack_lvl+0x8/0x8 [ 137.137981][ T3575] ? avc_has_perm+0x158/0x240 [ 137.142687][ T3575] dump_stack+0x15/0x24 [ 137.146869][ T3575] should_fail_ex+0x3d4/0x520 [ 137.151576][ T3575] __should_failslab+0xac/0xf0 [ 137.156392][ T3575] ? __get_vm_area_node+0x12c/0x360 [ 137.161619][ T3575] should_failslab+0x9/0x20 [ 137.166149][ T3575] __kmem_cache_alloc_node+0x3d/0x2c0 [ 137.171543][ T3575] ? __get_vm_area_node+0x12c/0x360 [ 137.176767][ T3575] kmalloc_node_trace+0x26/0xb0 [ 137.181646][ T3575] __get_vm_area_node+0x12c/0x360 [ 137.186694][ T3575] __vmalloc_node_range+0x326/0x13d0 [ 137.191996][ T3575] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.197653][ T3575] ? arch_stack_walk+0xfc/0x150 [ 137.202525][ T3575] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 137.208254][ T3575] ? stack_trace_save+0x98/0xe0 [ 137.213117][ T3575] ? __cfi___vmalloc_node_range+0x10/0x10 [ 137.218837][ T3575] ? __cfi_selinux_capable+0x10/0x10 [ 137.224134][ T3575] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.229696][ T3575] __vmalloc+0x79/0x90 [ 137.233769][ T3575] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.239319][ T3575] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.244706][ T3575] bpf_prog_alloc+0x22/0x1c0 [ 137.249304][ T3575] bpf_prog_load+0x7c6/0x15a0 [ 137.253987][ T3575] ? map_freeze+0x390/0x390 [ 137.258495][ T3575] ? selinux_bpf+0xc7/0xf0 [ 137.262911][ T3575] ? security_bpf+0x93/0xb0 [ 137.267415][ T3575] __sys_bpf+0x504/0x780 [ 137.271659][ T3575] ? bpf_link_show_fdinfo+0x320/0x320 [ 137.277034][ T3575] ? __cfi_ksys_write+0x10/0x10 [ 137.281893][ T3575] ? do_user_addr_fault+0x9ac/0x1050 [ 137.287185][ T3575] ? debug_smp_processor_id+0x17/0x20 [ 137.292569][ T3575] __x64_sys_bpf+0x7c/0x90 [ 137.296997][ T3575] x64_sys_call+0x488/0x9a0 [ 137.301511][ T3575] do_syscall_64+0x4c/0xa0 [ 137.305928][ T3575] ? clear_bhb_loop+0x30/0x80 [ 137.310612][ T3575] ? clear_bhb_loop+0x30/0x80 [ 137.315297][ T3575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.321193][ T3575] RIP: 0033:0x7f88f8b8ebe9 [ 137.325609][ T3575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.345227][ T3575] RSP: 002b:00007f88f75f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.353655][ T3575] RAX: ffffffffffffffda RBX: 00007f88f8dc5fa0 RCX: 00007f88f8b8ebe9 [ 137.361634][ T3575] RDX: 0000000000000080 RSI: 00002000000001c0 RDI: 0000000000000005 [ 137.369607][ T3575] RBP: 00007f88f75f7090 R08: 0000000000000000 R09: 0000000000000000 [ 137.377583][ T3575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.385556][ T3575] R13: 00007f88f8dc6038 R14: 00007f88f8dc5fa0 R15: 00007ffc8f1dc6c8 [ 137.393541][ T3575] [ 137.401454][ T3575] syz.0.910: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 137.444516][ T3575] CPU: 0 PID: 3575 Comm: syz.0.910 Not tainted syzkaller #0 [ 137.451956][ T3575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.462040][ T3575] Call Trace: [ 137.465352][ T3575] [ 137.468315][ T3575] __dump_stack+0x21/0x24 [ 137.472668][ T3575] dump_stack_lvl+0xee/0x150 [ 137.477344][ T3575] ? __cfi_dump_stack_lvl+0x8/0x8 [ 137.482416][ T3575] ? pr_cont_kernfs_name+0x133/0x160 [ 137.487743][ T3575] dump_stack+0x15/0x24 [ 137.491927][ T3575] warn_alloc+0x1b0/0x1d0 [ 137.496300][ T3575] ? should_failslab+0x9/0x20 [ 137.501020][ T3575] ? __cfi_warn_alloc+0x10/0x10 [ 137.505903][ T3575] ? kmalloc_node_trace+0x3d/0xb0 [ 137.510964][ T3575] ? __get_vm_area_node+0x353/0x360 [ 137.516205][ T3575] __vmalloc_node_range+0x34b/0x13d0 [ 137.521522][ T3575] ? arch_stack_walk+0xfc/0x150 [ 137.526406][ T3575] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 137.532161][ T3575] ? stack_trace_save+0x98/0xe0 [ 137.537039][ T3575] ? __cfi___vmalloc_node_range+0x10/0x10 [ 137.542772][ T3575] ? __cfi_selinux_capable+0x10/0x10 [ 137.548078][ T3575] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.553638][ T3575] __vmalloc+0x79/0x90 [ 137.557717][ T3575] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.563272][ T3575] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 137.568662][ T3575] bpf_prog_alloc+0x22/0x1c0 [ 137.573257][ T3575] bpf_prog_load+0x7c6/0x15a0 [ 137.577945][ T3575] ? map_freeze+0x390/0x390 [ 137.582455][ T3575] ? selinux_bpf+0xc7/0xf0 [ 137.586870][ T3575] ? security_bpf+0x93/0xb0 [ 137.591380][ T3575] __sys_bpf+0x504/0x780 [ 137.595623][ T3575] ? bpf_link_show_fdinfo+0x320/0x320 [ 137.601002][ T3575] ? __cfi_ksys_write+0x10/0x10 [ 137.605866][ T3575] ? do_user_addr_fault+0x9ac/0x1050 [ 137.611158][ T3575] ? debug_smp_processor_id+0x17/0x20 [ 137.616539][ T3575] __x64_sys_bpf+0x7c/0x90 [ 137.620962][ T3575] x64_sys_call+0x488/0x9a0 [ 137.625473][ T3575] do_syscall_64+0x4c/0xa0 [ 137.629885][ T3575] ? clear_bhb_loop+0x30/0x80 [ 137.634570][ T3575] ? clear_bhb_loop+0x30/0x80 [ 137.639249][ T3575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.645150][ T3575] RIP: 0033:0x7f88f8b8ebe9 [ 137.649565][ T3575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.669190][ T3575] RSP: 002b:00007f88f75f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.677606][ T3575] RAX: ffffffffffffffda RBX: 00007f88f8dc5fa0 RCX: 00007f88f8b8ebe9 [ 137.685578][ T3575] RDX: 0000000000000080 RSI: 00002000000001c0 RDI: 0000000000000005 [ 137.693553][ T3575] RBP: 00007f88f75f7090 R08: 0000000000000000 R09: 0000000000000000 [ 137.701529][ T3575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.709501][ T3575] R13: 00007f88f8dc6038 R14: 00007f88f8dc5fa0 R15: 00007ffc8f1dc6c8 [ 137.717482][ T3575] [ 137.830324][ T3578] device veth1_macvtap left promiscuous mode [ 137.848098][ T3578] device macsec0 left promiscuous mode [ 137.893525][ T3588] device veth1_macvtap entered promiscuous mode [ 137.924019][ T3588] device macsec0 entered promiscuous mode [ 138.003474][ T3575] Mem-Info: [ 138.006738][ T3575] active_anon:9551 inactive_anon:0 isolated_anon:0 [ 138.006738][ T3575] active_file:21941 inactive_file:2236 isolated_file:0 [ 138.006738][ T3575] unevictable:0 dirty:243 writeback:0 [ 138.006738][ T3575] slab_reclaimable:7313 slab_unreclaimable:73955 [ 138.006738][ T3575] mapped:29234 shmem:165 pagetables:688 [ 138.006738][ T3575] sec_pagetables:0 bounce:0 [ 138.006738][ T3575] kernel_misc_reclaimable:0 [ 138.006738][ T3575] free:1521047 free_pcp:7793 free_cma:0 [ 138.069299][ T3575] Node 0 active_anon:34204kB inactive_anon:0kB active_file:87764kB inactive_file:8944kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:116932kB dirty:972kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5480kB pagetables:2804kB sec_pagetables:0kB all_unreclaimable? no [ 138.155780][ T3575] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974204kB mlocked:0kB bounce:0kB free_pcp:5672kB local_pcp:60kB free_cma:0kB [ 138.184390][ T3575] lowmem_reserve[]: 0 3932 3932 3932 [ 138.218906][ T3575] Normal free:3134404kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:26804kB inactive_anon:0kB active_file:87764kB inactive_file:8944kB unevictable:0kB writepending:972kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:18864kB local_pcp:3804kB free_cma:0kB [ 138.251296][ T3575] lowmem_reserve[]: 0 0 0 0 [ 138.286352][ T3575] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 138.313642][ T3597] device syzkaller0 entered promiscuous mode [ 138.319954][ T3575] Normal: 2185*4kB (UME) 1730*8kB (UME) 1181*16kB (UME) 957*32kB (UME) 797*64kB (UME) 321*128kB (UME) 206*256kB (UME) 86*512kB (UME) 38*1024kB (UME) 11*2048kB (UME) 685*4096kB (UM) = 3128164kB [ 138.353310][ T3575] 24340 total pagecache pages [ 138.358116][ T3575] 0 pages in swap cache [ 138.362796][ T3575] Free swap = 124996kB [ 138.367130][ T3575] Total swap = 124996kB [ 138.371629][ T3575] 2097051 pages RAM [ 138.375542][ T3575] 0 pages HighMem/MovableOnly [ 138.380567][ T3575] 346836 pages reserved [ 138.384807][ T3575] 0 pages cma reserved [ 138.858917][ T3626] device syzkaller0 entered promiscuous mode [ 139.924843][ T3680] device syzkaller0 entered promiscuous mode [ 140.102914][ T3678] tap0: tun_chr_ioctl cmd 2147767521 [ 140.114049][ T3685] device pim6reg1 entered promiscuous mode [ 140.126210][ T28] audit: type=1400 audit(1757057961.333:139): avc: denied { create } for pid=3687 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 140.285931][ T3698] device syzkaller0 entered promiscuous mode [ 140.306211][ T3700] tap0: tun_chr_ioctl cmd 2147767520 [ 141.804968][ T3728] device syzkaller0 entered promiscuous mode [ 141.902733][ T3729] device veth1_macvtap entered promiscuous mode [ 141.913122][ T3729] device macsec0 entered promiscuous mode [ 142.080035][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.154678][ T3742] device wg2 left promiscuous mode [ 142.254372][ T3748] device veth1_to_bond entered promiscuous mode [ 142.775929][ T3756] device veth1_macvtap left promiscuous mode [ 142.801129][ T3756] device macsec0 left promiscuous mode [ 142.834341][ T3758] device veth1_macvtap entered promiscuous mode [ 142.848953][ T3758] device macsec0 entered promiscuous mode [ 143.095002][ T3761] device syzkaller0 entered promiscuous mode [ 143.697304][ T3782] device pim6reg1 entered promiscuous mode [ 143.844307][ T3794] device wg2 left promiscuous mode [ 143.945305][ T3797] device wg2 entered promiscuous mode [ 144.219772][ T3805] device wg2 left promiscuous mode [ 144.333578][ T3816] device veth1_macvtap left promiscuous mode [ 144.342216][ T3816] device macsec0 left promiscuous mode [ 144.389166][ T3825] device veth1_macvtap entered promiscuous mode [ 144.395607][ T3825] device macsec0 entered promiscuous mode [ 144.867566][ T3839] device syzkaller0 entered promiscuous mode [ 147.537851][ T3904] device syzkaller0 entered promiscuous mode [ 147.615313][ T3901] device veth1_macvtap left promiscuous mode [ 147.625841][ T3901] device macsec0 left promiscuous mode [ 147.679602][ T3907] device veth1_macvtap entered promiscuous mode [ 147.689228][ T3907] device macsec0 entered promiscuous mode [ 148.001689][ T3912] device veth1_macvtap left promiscuous mode [ 148.008912][ T3912] device macsec0 left promiscuous mode [ 148.063032][ T3913] device veth1_macvtap entered promiscuous mode [ 148.069574][ T3913] device macsec0 entered promiscuous mode [ 151.357713][ T3944] device veth1_macvtap left promiscuous mode [ 151.365014][ T3944] device macsec0 left promiscuous mode [ 151.422500][ T3944] device veth1_macvtap entered promiscuous mode [ 151.431102][ T3944] device macsec0 entered promiscuous mode [ 151.662624][ T3952] device syzkaller0 entered promiscuous mode [ 151.989538][ T3956] device veth1_macvtap left promiscuous mode [ 152.025704][ T3956] device macsec0 left promiscuous mode [ 152.062986][ T3965] device veth1_macvtap entered promiscuous mode [ 152.073777][ T3965] device macsec0 entered promiscuous mode [ 152.890680][ T3999] device veth1_macvtap left promiscuous mode [ 152.897128][ T3999] device macsec0 left promiscuous mode [ 152.954103][ T4001] device veth1_macvtap entered promiscuous mode [ 152.979297][ T4001] device macsec0 entered promiscuous mode [ 153.335449][ T4007] device veth1_macvtap left promiscuous mode [ 153.393326][ T4007] device macsec0 left promiscuous mode [ 153.466962][ T4010] device veth1_macvtap entered promiscuous mode [ 153.475843][ T4010] device macsec0 entered promiscuous mode [ 153.922695][ T4015] device veth1_macvtap left promiscuous mode [ 153.938909][ T4015] device macsec0 left promiscuous mode [ 153.999301][ T4017] device veth1_macvtap entered promiscuous mode [ 154.015842][ T4017] device macsec0 entered promiscuous mode [ 154.171927][ T4022] device syzkaller0 entered promiscuous mode [ 154.452189][ T28] audit: type=1400 audit(1757057975.663:140): avc: denied { create } for pid=4027 comm="syz.4.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 154.915342][ T4041] device syzkaller0 entered promiscuous mode [ 155.567796][ T4062] device veth1_macvtap left promiscuous mode [ 155.578650][ T4062] device macsec0 left promiscuous mode [ 155.636921][ T4066] device veth1_macvtap entered promiscuous mode [ 155.676358][ T4066] device macsec0 entered promiscuous mode [ 156.736352][ T4104] bond_slave_1: mtu less than device minimum [ 156.928309][ T4105] device syzkaller0 entered promiscuous mode [ 157.347465][ T4110] device veth1_macvtap left promiscuous mode [ 157.366727][ T4110] device macsec0 left promiscuous mode [ 157.440355][ T4112] device veth1_macvtap entered promiscuous mode [ 157.488626][ T4112] device macsec0 entered promiscuous mode [ 157.507927][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.532945][ T4116] device veth1_macvtap left promiscuous mode [ 157.570891][ T4116] device macsec0 left promiscuous mode [ 157.651926][ T4122] device veth1_macvtap entered promiscuous mode [ 157.677803][ T4122] device macsec0 entered promiscuous mode [ 157.812534][ T4127] device sit0 left promiscuous mode [ 158.182663][ T4131] device sit0 entered promiscuous mode [ 158.567607][ T4161] device veth0_vlan left promiscuous mode [ 158.591091][ T4161] device veth0_vlan entered promiscuous mode [ 158.604123][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.619459][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.655659][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.733126][ T4173] device syzkaller0 entered promiscuous mode [ 160.282629][ T4237] device syzkaller0 entered promiscuous mode [ 160.820446][ T4261] device veth1_macvtap left promiscuous mode [ 160.827137][ T4261] device macsec0 left promiscuous mode [ 161.752091][ T28] audit: type=1400 audit(1757057982.963:141): avc: denied { create } for pid=4312 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 161.864734][ T28] audit: type=1400 audit(1757057982.973:142): avc: denied { create } for pid=4312 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 161.905405][ T28] audit: type=1400 audit(1757057983.113:143): avc: denied { read } for pid=4316 comm="syz.1.1120" dev="nsfs" ino=4026532379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 161.942077][ T28] audit: type=1400 audit(1757057983.113:144): avc: denied { open } for pid=4316 comm="syz.1.1120" path="pid:[4026532379]" dev="nsfs" ino=4026532379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 162.398886][ T4321] device veth1_macvtap left promiscuous mode [ 162.407269][ T4321] device macsec0 left promiscuous mode [ 162.948917][ T4341] device pim6reg1 entered promiscuous mode [ 162.984104][ T4344] device wg2 entered promiscuous mode [ 163.028973][ T28] audit: type=1400 audit(1757057984.243:145): avc: denied { create } for pid=4345 comm="syz.2.1131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 163.660552][ T4390] device pim6reg1 entered promiscuous mode [ 165.225063][ T4444] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.232340][ T4444] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.289196][ T4444] device bridge0 left promiscuous mode [ 165.585963][ T4460] device syzkaller0 entered promiscuous mode [ 165.912008][ T4471] device veth1_macvtap left promiscuous mode [ 165.918350][ T4471] device macsec0 left promiscuous mode [ 165.982204][ T4475] device veth1_macvtap entered promiscuous mode [ 165.988671][ T4475] device macsec0 entered promiscuous mode [ 167.352246][ T4524] device veth1_macvtap left promiscuous mode [ 167.378880][ T4524] device macsec0 left promiscuous mode [ 167.411202][ T4531] device veth1_macvtap entered promiscuous mode [ 167.431867][ T4531] device macsec0 entered promiscuous mode [ 167.781338][ T4535] device syzkaller0 entered promiscuous mode [ 168.042533][ T4554] device veth0_vlan left promiscuous mode [ 168.052335][ T4554] device veth0_vlan entered promiscuous mode [ 168.088847][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.103883][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.116613][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.694714][ T4567] device veth1_macvtap entered promiscuous mode [ 168.701870][ T4567] device macsec0 entered promiscuous mode [ 168.722448][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.877004][ T4594] device syzkaller0 entered promiscuous mode [ 170.864750][ T4607] device syzkaller0 entered promiscuous mode [ 171.360145][ T4621] device wg2 left promiscuous mode [ 171.372172][ T4619] device veth1_macvtap left promiscuous mode [ 171.385115][ T4619] device macsec0 left promiscuous mode [ 171.444194][ T4629] device veth1_macvtap entered promiscuous mode [ 171.511854][ T4629] device macsec0 entered promiscuous mode [ 171.581215][ T4632] device veth0_vlan left promiscuous mode [ 171.615486][ T4632] device veth0_vlan entered promiscuous mode [ 171.697450][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.719627][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.760409][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.900721][ T4643] device syzkaller0 entered promiscuous mode [ 172.122127][ T4647] device veth0_vlan left promiscuous mode [ 172.166945][ T4647] device veth0_vlan entered promiscuous mode [ 172.223813][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.233868][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.242281][ T2533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.049901][ T4680] device syzkaller0 entered promiscuous mode [ 173.094066][ T4681] device syzkaller0 entered promiscuous mode [ 173.661296][ T4687] device veth1_macvtap entered promiscuous mode [ 173.667729][ T4687] device macsec0 entered promiscuous mode [ 173.676166][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.048903][ T4701] device veth0_vlan left promiscuous mode [ 174.084385][ T4701] device veth0_vlan entered promiscuous mode [ 174.787531][ T4709] device syzkaller0 entered promiscuous mode [ 175.083478][ T4723] device syzkaller0 entered promiscuous mode [ 175.294133][ T4732] device veth1_macvtap left promiscuous mode [ 175.300721][ T4732] device macsec0 left promiscuous mode [ 175.326390][ T4732] device veth1_macvtap entered promiscuous mode [ 175.333616][ T4732] device macsec0 entered promiscuous mode [ 176.333901][ T4772] device veth1_macvtap left promiscuous mode [ 176.358336][ T4772] device macsec0 left promiscuous mode [ 176.418282][ T4772] device veth1_macvtap entered promiscuous mode [ 176.426365][ T4772] device macsec0 entered promiscuous mode [ 176.812548][ T4811] device pim6reg1 entered promiscuous mode [ 176.827455][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.856131][ T4813] device syzkaller0 entered promiscuous mode [ 177.404076][ T4826] device veth1_macvtap left promiscuous mode [ 177.410576][ T4826] device macsec0 left promiscuous mode [ 177.446229][ T4826] device veth1_macvtap entered promiscuous mode [ 177.466017][ T4826] device macsec0 entered promiscuous mode [ 177.468506][ T28] audit: type=1400 audit(1757057998.673:146): avc: denied { create } for pid=4828 comm="syz.2.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 178.520421][ T28] audit: type=1400 audit(1757057999.733:147): avc: denied { create } for pid=4868 comm="syz.1.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 178.844545][ T4879] device syzkaller0 entered promiscuous mode [ 178.894049][ T4878] device veth1_macvtap left promiscuous mode [ 178.948840][ T4878] device macsec0 left promiscuous mode [ 179.069052][ T4881] device veth1_macvtap entered promiscuous mode [ 179.108675][ T4881] device macsec0 entered promiscuous mode [ 179.311993][ T4889] device sit0 left promiscuous mode [ 179.378751][ T4888] device sit0 entered promiscuous mode [ 179.778476][ T4933] device veth1_macvtap left promiscuous mode [ 179.805028][ T4933] device macsec0 left promiscuous mode [ 179.840526][ T4933] device veth1_macvtap entered promiscuous mode [ 179.851838][ T4933] device macsec0 entered promiscuous mode [ 179.869325][ T4946] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 179.875004][ T4946] dvmrp1: linktype set to 0 [ 179.944488][ T4944] device syzkaller0 entered promiscuous mode [ 179.972796][ T4946] dvmrp1: tun_chr_ioctl cmd 2147767517 [ 180.131788][ T4951] device pim6reg1 entered promiscuous mode [ 180.388221][ T4956] device syzkaller0 entered promiscuous mode [ 180.852644][ T4986] device veth1_macvtap left promiscuous mode [ 180.859011][ T4986] device macsec0 left promiscuous mode [ 180.898166][ T4986] device veth1_macvtap entered promiscuous mode [ 180.967021][ T4986] device macsec0 entered promiscuous mode [ 182.357417][ T5040] device syzkaller0 entered promiscuous mode [ 182.700691][ T5043] device veth1_macvtap left promiscuous mode [ 182.707100][ T5043] device macsec0 left promiscuous mode [ 182.732557][ T5047] device veth1_macvtap entered promiscuous mode [ 182.739779][ T5047] device macsec0 entered promiscuous mode [ 183.139357][ T5093] device sit0 left promiscuous mode [ 183.872968][ T5133] device syzkaller0 entered promiscuous mode [ 184.126513][ T5136] device veth1_macvtap left promiscuous mode [ 184.175313][ T5136] device macsec0 left promiscuous mode [ 184.281888][ T5136] device veth1_macvtap entered promiscuous mode [ 184.312215][ T5136] device macsec0 entered promiscuous mode [ 184.576999][ T5155] bond_slave_1: mtu less than device minimum [ 185.301413][ T5192] device veth1_macvtap left promiscuous mode [ 185.318728][ T5192] device macsec0 left promiscuous mode [ 185.376640][ T5196] device veth1_macvtap entered promiscuous mode [ 185.410751][ T5196] device macsec0 entered promiscuous mode [ 185.690370][ T5215] syz.1.1370[5215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.690484][ T5215] syz.1.1370[5215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.460754][ T5248] device veth1_macvtap left promiscuous mode [ 186.500684][ T5248] device macsec0 left promiscuous mode [ 186.586575][ T5248] device veth1_macvtap entered promiscuous mode [ 186.594135][ T5248] device macsec0 entered promiscuous mode [ 186.841669][ T5265] device syzkaller0 entered promiscuous mode [ 187.367071][ T5303] device veth1_macvtap left promiscuous mode [ 187.380987][ T5303] device macsec0 left promiscuous mode [ 187.418145][ T5303] device veth1_macvtap entered promiscuous mode [ 187.427027][ T5303] device macsec0 entered promiscuous mode [ 187.933942][ T5344] device veth1_macvtap left promiscuous mode [ 187.951264][ T5344] device macsec0 left promiscuous mode [ 188.001156][ T5347] device veth1_macvtap entered promiscuous mode [ 188.025903][ T5347] device macsec0 entered promiscuous mode [ 188.304518][ T5353] device syzkaller0 entered promiscuous mode [ 188.868926][ T5378] device syzkaller0 entered promiscuous mode [ 188.885809][ T5391] device veth1_macvtap left promiscuous mode [ 188.892483][ T5391] device macsec0 left promiscuous mode [ 188.968742][ T5395] device veth1_macvtap entered promiscuous mode [ 188.975096][ T5395] device macsec0 entered promiscuous mode [ 189.667784][ T5443] device veth1_macvtap left promiscuous mode [ 189.675285][ T5443] device macsec0 left promiscuous mode [ 189.763523][ T5453] device veth1_macvtap entered promiscuous mode [ 189.869736][ T5453] device macsec0 entered promiscuous mode [ 189.901874][ T5455] bond_slave_1: mtu less than device minimum [ 190.095260][ T5470] device pim6reg1 entered promiscuous mode [ 191.071808][ T5517] device syzkaller0 entered promiscuous mode [ 191.103971][ T5514] device veth1_macvtap left promiscuous mode [ 191.119123][ T5514] device macsec0 left promiscuous mode [ 191.257128][ T5519] device veth1_macvtap entered promiscuous mode [ 191.274296][ T5519] device macsec0 entered promiscuous mode [ 192.203759][ T5578] device veth1_macvtap left promiscuous mode [ 192.219075][ T5578] device macsec0 left promiscuous mode [ 192.348254][ T5585] device veth1_macvtap entered promiscuous mode [ 192.405229][ T5585] device macsec0 entered promiscuous mode [ 192.839431][ T5602] device syzkaller0 entered promiscuous mode [ 193.237349][ T5619] device veth1_macvtap left promiscuous mode [ 193.245858][ T5619] device macsec0 left promiscuous mode [ 193.280087][ T5625] device veth1_macvtap entered promiscuous mode [ 193.286625][ T5625] device macsec0 entered promiscuous mode [ 194.167058][ T5678] device veth1_macvtap left promiscuous mode [ 194.202062][ T5678] device macsec0 left promiscuous mode [ 194.281440][ T5680] bond_slave_1: mtu less than device minimum [ 194.294938][ T5678] device veth1_macvtap entered promiscuous mode [ 194.397011][ T5678] device macsec0 entered promiscuous mode [ 194.538740][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.647186][ T5693] device syzkaller0 entered promiscuous mode [ 194.685148][ T5695] device pim6reg1 entered promiscuous mode [ 195.281900][ T5722] device veth0_vlan left promiscuous mode [ 195.356121][ T5722] device veth0_vlan entered promiscuous mode [ 195.457576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.494586][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.529078][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.551420][ T5732] device veth1_macvtap left promiscuous mode [ 195.558017][ T5732] device macsec0 left promiscuous mode [ 195.592236][ T5738] device veth1_macvtap entered promiscuous mode [ 195.599249][ T5738] device macsec0 entered promiscuous mode [ 195.611340][ T5734] device vcan0 entered promiscuous mode [ 195.624068][ T5734] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 196.332197][ T5748] device syzkaller0 entered promiscuous mode [ 196.688326][ T5763] device syzkaller0 entered promiscuous mode [ 196.878996][ T5765] device sit0 left promiscuous mode [ 196.929568][ T5767] device sit0 entered promiscuous mode [ 197.022370][ T5772] device sit0 left promiscuous mode [ 197.180556][ T5781] device veth1_macvtap left promiscuous mode [ 197.187047][ T5781] device macsec0 left promiscuous mode [ 197.256335][ T5782] device veth1_macvtap entered promiscuous mode [ 197.280310][ T5782] device macsec0 entered promiscuous mode [ 198.787470][ T5821] device syzkaller0 entered promiscuous mode [ 199.521411][ T5890] FAULT_INJECTION: forcing a failure. [ 199.521411][ T5890] name failslab, interval 1, probability 0, space 0, times 0 [ 199.534062][ T5890] CPU: 1 PID: 5890 Comm: syz.3.1580 Not tainted syzkaller #0 [ 199.541472][ T5890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 199.551563][ T5890] Call Trace: [ 199.554859][ T5890] [ 199.557888][ T5890] __dump_stack+0x21/0x24 [ 199.562222][ T5890] dump_stack_lvl+0xee/0x150 [ 199.566855][ T5890] ? __cfi_dump_stack_lvl+0x8/0x8 [ 199.571895][ T5890] ? _parse_integer+0x2a/0x40 [ 199.576580][ T5890] dump_stack+0x15/0x24 [ 199.580761][ T5890] should_fail_ex+0x3d4/0x520 [ 199.585451][ T5890] ? __sigqueue_alloc+0x13f/0x210 [ 199.590484][ T5890] __should_failslab+0xac/0xf0 [ 199.595255][ T5890] should_failslab+0x9/0x20 [ 199.599760][ T5890] kmem_cache_alloc+0x3b/0x330 [ 199.604531][ T5890] __sigqueue_alloc+0x13f/0x210 [ 199.609389][ T5890] __send_signal_locked+0x19d/0xb70 [ 199.614589][ T5890] ? __kasan_check_write+0x14/0x20 [ 199.619711][ T5890] ? __task_pid_nr_ns+0x1dd/0x280 [ 199.624828][ T5890] send_signal_locked+0x422/0x580 [ 199.629865][ T5890] force_sig_info_to_task+0x31c/0x3f0 [ 199.635246][ T5890] force_sig+0xb7/0x100 [ 199.639493][ T5890] ? __cfi_force_sig+0x10/0x10 [ 199.644271][ T5890] ? __kasan_check_write+0x14/0x20 [ 199.649398][ T5890] ? cond_local_irq_disable+0x40/0x40 [ 199.654774][ T5890] gp_user_force_sig_segv+0xc2/0x1f0 [ 199.660068][ T5890] ? __cfi_ksys_write+0x10/0x10 [ 199.664928][ T5890] exc_general_protection+0xb9/0x1e0 [ 199.670218][ T5890] ? debug_smp_processor_id+0x17/0x20 [ 199.675602][ T5890] ? do_syscall_64+0x58/0xa0 [ 199.680192][ T5890] asm_exc_general_protection+0x27/0x30 [ 199.685748][ T5890] RIP: 0033:0x7f0bb2967739 [ 199.690167][ T5890] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 199.709777][ T5890] RSP: 002b:00007f0bb13f67c8 EFLAGS: 00010283 [ 199.715859][ T5890] RAX: 0000000000000999 RBX: 00007f0bb13f6d30 RCX: 00007f0bb2b88120 [ 199.723830][ T5890] RDX: 9999999999999999 RSI: 00007f0bb2a11b31 RDI: 9999999999999999 [ 199.731803][ T5890] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 199.739778][ T5890] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 199.747865][ T5890] R13: 00007f0bb13f6eb0 R14: 9999999999999999 R15: 0000000000000000 [ 199.755845][ T5890] [ 200.157857][ T283] syz-executor (283) used greatest stack depth: 21792 bytes left [ 200.700177][ T415] device bridge_slave_1 left promiscuous mode [ 200.706318][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.713943][ T415] device bridge_slave_0 left promiscuous mode [ 200.720175][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.728356][ T415] device veth1_macvtap left promiscuous mode [ 200.734449][ T415] device veth0_vlan left promiscuous mode [ 200.740607][ T415] device veth1_macvtap left promiscuous mode [ 201.860351][ T415] device bridge_slave_1 left promiscuous mode [ 201.866488][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.874029][ T415] device bridge_slave_0 left promiscuous mode [ 201.880218][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.888611][ T415] device veth1_macvtap left promiscuous mode [ 201.894643][ T415] device veth0_vlan left promiscuous mode [ 201.900807][ T415] device veth1_macvtap left promiscuous mode [ 201.907071][ T415] device veth1_macvtap left promiscuous mode