last executing test programs: 22.240847548s ago: executing program 0 (id=1884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 17.229176778s ago: executing program 0 (id=1884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 13.04927898s ago: executing program 0 (id=1884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 8.674031034s ago: executing program 0 (id=1884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 4.721354173s ago: executing program 2 (id=2343): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x400}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f00000000c0)={'veth1_to_bridge\x00', 0x200}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd6300000000002c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa"], 0xfdef) 4.399129176s ago: executing program 0 (id=1884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 2.484368235s ago: executing program 2 (id=2349): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYBLOB="375f29c4", @ANYBLOB="0000ffffffffe8fffffffffffffd2e"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r3, 0x0, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r4, 0x40047452, 0x2000000c) r5 = openat$cgroup_type(r1, &(0x7f0000000180), 0x2, 0x0) write$cgroup_type(r5, &(0x7f00000001c0), 0x9) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.484020225s ago: executing program 3 (id=2350): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r0}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 2.453215086s ago: executing program 3 (id=2352): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff04, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 2.368579277s ago: executing program 1 (id=2353): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/787], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0xe40, 0x2f, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 2.303362607s ago: executing program 3 (id=2354): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5301b683, 0xc8d}, 0x0, 0xc8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bf}, 0x0, 0x0, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 2.301109917s ago: executing program 3 (id=2355): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2fc) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x104, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000001800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000008000000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000c1ba2634286de38b5a16", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r7, 0x58, &(0x7f0000000340)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)}], 0x1, 0x0, 0x0, 0x17000000}, 0x0) 2.130213549s ago: executing program 1 (id=2356): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 2.108030909s ago: executing program 3 (id=2357): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000740), 0x20000000}, 0x20) 2.088866869s ago: executing program 4 (id=2358): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) ioctl$TUNSETOFFLOAD(r2, 0x40086602, 0x2000ff00) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd63f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0x2f, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x790f0b1d, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x401}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xa}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0x8, 0x7, 0x9, 0xdb5, 0xe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x24, &(0x7f0000000340)=""/36, 0x41100, 0x1, '\x00', 0x0, @fallback=0x24, r2, 0x8, &(0x7f0000000380)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x3, 0x80000001, 0xf}, 0x10, 0x0, r3, 0x0, &(0x7f0000000680)=[r4, r0], 0x0, 0x10, 0x4, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000780)=r6, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x95e3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0, r3}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.98930554s ago: executing program 1 (id=2359): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2fc) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x104, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000001800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000008000000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000c1ba2634286de38b5a16", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r7, 0x58, &(0x7f0000000340)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{0x0}], 0x1, 0x0, 0x0, 0x17000000}, 0x0) 1.787818252s ago: executing program 3 (id=2360): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x10}}], 0x88, 0x4000800}, 0xd0) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0xb, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r3, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffff9c, 0x0, 0x602400, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) 1.710883223s ago: executing program 1 (id=2361): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f00000003c0)="bf23620a99f19e647359024fb460127a3e89dea0145ea13127e02b4af8e3b64bdbfc9930ab0cadd114bf72a8f45bba63f040f6ec36aea00d3e2468b9e186834850311b359c3696784fae2303e0ce3c921748303251d602ead0522d067fcb91e2114356c9c1dd6bdcc2513d6e49314535e09ef90a9e1b4b29e43e16968c7f8ef79052421986aff81c73a6985522511eb7f4d3da8c312a91a13d5f6b8f0779431c52779bc3c12b13214a1fe15f17be18e68e327f", &(0x7f0000000480)=""/242, 0x4}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000080), 0x0}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400008f1ac4840001feff0800000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x41}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x10001, 0x9, 0x3, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='sched_switch\x00'}, 0x10) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x15, 0x12, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffe01, 0x0, 0x0, 0x0, 0x200}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe90}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}]}, &(0x7f0000000740)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000a40)=""/154, 0x40f00, 0xf, '\x00', 0x0, @fallback=0x10, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x1, 0xe, 0x5, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000d80)=[{0x5, 0x4, 0x2, 0xb}, {0x3, 0x3, 0xe, 0x7}, {0x5, 0x4, 0x0, 0xa}], 0x10, 0x2, @void, @value}, 0x94) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xff00}, {{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.380168436s ago: executing program 2 (id=2362): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000003000000080000000200000000000000", @ANYRES32, @ANYBLOB="129edfc100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYRES64=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x8000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x162, 0x0, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0x0, 0x90, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x50) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000004c0), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000001c0)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0xe6, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x43, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x226a0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xc}, 0x4502, 0xffffffffffffdfff, 0x0, 0x0, 0x800, 0xe38, 0xfffd, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_page_alloc\x00'}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.297430877s ago: executing program 2 (id=2363): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000540)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000882b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, 0x0, 0xffdd) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 1.258533458s ago: executing program 1 (id=2364): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x10}}], 0x88, 0x4000800}, 0xd0) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0xb, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r3, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffff9c, 0x0, 0x602400, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) 948.423771ms ago: executing program 4 (id=2365): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5301b683, 0xc8d}, 0x0, 0xc8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bf}, 0x0, 0x0, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 926.154451ms ago: executing program 4 (id=2366): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 679.459533ms ago: executing program 2 (id=2367): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2fc) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x104, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000001800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000008000000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000c1ba2634286de38b5a16", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r7, 0x58, &(0x7f0000000340)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)}], 0x1, 0x0, 0x0, 0x17000000}, 0x0) 514.014075ms ago: executing program 4 (id=2368): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r4, 0xe0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) recvmsg$unix(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000400000000000000c201bb0238f5f891b044976e6200001e0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0xfdef) 406.379846ms ago: executing program 2 (id=2369): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x6b, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x18) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x27, 0x4, 0x100, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000006c0)={&(0x7f0000000840), 0x6e, &(0x7f0000000b00)=[{&(0x7f00000005c0)=""/54, 0x36}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/68, 0x44}, {&(0x7f0000002a00)=""/4080, 0xff0}, {&(0x7f0000000bc0)=""/131, 0x83}, {&(0x7f0000003a00)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/62, 0x3e}], 0x7}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @const]}}, &(0x7f0000000240)=""/199, 0x3e, 0xc7, 0x1, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, 0x0, 0x20000001) recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x2000000, 0x0}, 0x10002) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000300), 0x800, r0}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 216.800118ms ago: executing program 4 (id=2370): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000740), 0x20000000}, 0x20) 97.796649ms ago: executing program 4 (id=2371): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8000000}, 0x0, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="c60ddaa57a068645ece0c72669f959d47d38", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) 18.51753ms ago: executing program 1 (id=2372): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (fail_nth: 1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000300000200"], 0x50) 0s ago: executing program 0 (id=1884): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x4001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) kernel console output (not intermixed with test programs): [ 6.396356][ T30] audit: type=1400 audit(1732123363.643:37): avc: denied { getattr } for pid=136 comm="dhcpcd" path="/run/dhcpcd/pid" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6.402717][ T30] audit: type=1400 audit(1732123363.643:38): avc: denied { sys_chroot } for pid=136 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 6.407012][ T30] audit: type=1400 audit(1732123363.643:39): avc: denied { setgid } for pid=136 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 8.902422][ T106] udevd (106) used greatest stack depth: 21296 bytes left [ 13.717635][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 13.717652][ T30] audit: type=1400 audit(1732123370.983:61): avc: denied { transition } for pid=224 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.725995][ T30] audit: type=1400 audit(1732123370.983:62): avc: denied { noatsecure } for pid=224 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.731830][ T30] audit: type=1400 audit(1732123370.993:63): avc: denied { write } for pid=224 comm="sh" path="pipe:[14048]" dev="pipefs" ino=14048 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.736284][ T30] audit: type=1400 audit(1732123370.993:64): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.751946][ T30] audit: type=1400 audit(1732123370.993:65): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.118' (ED25519) to the list of known hosts. [ 20.979990][ T30] audit: type=1400 audit(1732123378.253:66): avc: denied { integrity } for pid=278 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.003840][ T30] audit: type=1400 audit(1732123378.273:67): avc: denied { mounton } for pid=278 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.005211][ T278] cgroup: Unknown subsys name 'net' [ 21.026430][ T30] audit: type=1400 audit(1732123378.273:68): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.053499][ T30] audit: type=1400 audit(1732123378.303:69): avc: denied { unmount } for pid=278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.053684][ T278] cgroup: Unknown subsys name 'devices' [ 21.200206][ T278] cgroup: Unknown subsys name 'hugetlb' [ 21.205623][ T278] cgroup: Unknown subsys name 'rlimit' [ 21.376671][ T30] audit: type=1400 audit(1732123378.643:70): avc: denied { setattr } for pid=278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.399630][ T30] audit: type=1400 audit(1732123378.643:71): avc: denied { mounton } for pid=278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.412837][ T282] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.424491][ T30] audit: type=1400 audit(1732123378.643:72): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.456120][ T30] audit: type=1400 audit(1732123378.703:73): avc: denied { relabelto } for pid=282 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.464624][ T278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.481722][ T30] audit: type=1400 audit(1732123378.703:74): avc: denied { write } for pid=282 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.515488][ T30] audit: type=1400 audit(1732123378.723:75): avc: denied { read } for pid=278 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.044769][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.051766][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.059288][ T288] device bridge_slave_0 entered promiscuous mode [ 22.066965][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.074103][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.081393][ T288] device bridge_slave_1 entered promiscuous mode [ 22.151335][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.158846][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.166078][ T292] device bridge_slave_0 entered promiscuous mode [ 22.174111][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.181112][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.188378][ T292] device bridge_slave_1 entered promiscuous mode [ 22.268708][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.275551][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.282831][ T290] device bridge_slave_0 entered promiscuous mode [ 22.299508][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.306360][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.313694][ T290] device bridge_slave_1 entered promiscuous mode [ 22.339452][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.346305][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.353657][ T289] device bridge_slave_0 entered promiscuous mode [ 22.364325][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.371339][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.378665][ T291] device bridge_slave_0 entered promiscuous mode [ 22.388635][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.395490][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.402807][ T289] device bridge_slave_1 entered promiscuous mode [ 22.412771][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.419726][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.426808][ T291] device bridge_slave_1 entered promiscuous mode [ 22.513949][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.520937][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.528062][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.534899][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.596234][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.603201][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.610388][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.617156][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.645212][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.652088][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.659202][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.665956][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.696833][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.703973][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.711242][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.718683][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.725882][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.732944][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.741102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.748460][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.785195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.794079][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.801040][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.808521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.816464][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.823353][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.830571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.838404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.850960][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.872646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.880356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.902112][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.914019][ T288] device veth0_vlan entered promiscuous mode [ 22.923053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.931512][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.938379][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.945754][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.953933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.962017][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.968863][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.976040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.984250][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.991241][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.014946][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.022281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.029880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.039110][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.047090][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.054034][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.061295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.069602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.077502][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.084282][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.091551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.099530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.107251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.115218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.123155][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.131265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.139162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.147342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.155561][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.162414][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.170307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.186755][ T288] device veth1_macvtap entered promiscuous mode [ 23.197862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.205500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.212930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.221614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.230307][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.237146][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.244469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.252637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.260799][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.267624][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.274876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.282968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.291134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.299343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.307275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.314846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.322806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.330917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.338895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.346659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.369681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.377797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.386441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.396120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.404332][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.412473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.420450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.428731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.441561][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.449954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.463603][ T290] device veth0_vlan entered promiscuous mode [ 23.470047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.478672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.486559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.493960][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.518063][ T290] device veth1_macvtap entered promiscuous mode [ 23.535300][ T292] device veth0_vlan entered promiscuous mode [ 23.547455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.558897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.567189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.575955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.584437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.592915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.601331][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.609736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.617551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.635111][ T289] device veth0_vlan entered promiscuous mode [ 23.648635][ T292] device veth1_macvtap entered promiscuous mode [ 23.655401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.663583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.672045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.680444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.689088][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.697356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.705933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.713950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.722003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.730100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.738503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.746603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.758451][ T291] device veth0_vlan entered promiscuous mode [ 23.777755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.785353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.793100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.801386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.809046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.817296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.825918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.834639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.856604][ T289] device veth1_macvtap entered promiscuous mode [ 23.868922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.877407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.895186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.908922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.917068][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.930287][ T291] device veth1_macvtap entered promiscuous mode [ 23.942333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.966710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.975167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.984000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.992612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.107947][ C1] hrtimer: interrupt took 29259 ns [ 24.261851][ T332] device veth0_vlan left promiscuous mode [ 24.273233][ T332] device veth0_vlan entered promiscuous mode [ 24.304918][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.351328][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.367409][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.461767][ T346] syz.3.10[346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.461842][ T346] syz.3.10[346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.672529][ T352] syz.3.10[352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.808465][ T352] syz.3.10[352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.422497][ T376] syz.3.19[376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.435250][ T376] syz.3.19[376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.134447][ T391] syz.1.25[391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.384213][ T398] syz.1.25[398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.455402][ T391] syz.1.25[391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.470349][ T398] syz.1.25[398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.733127][ T404] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 26.806996][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 26.807013][ T30] audit: type=1400 audit(1732123384.073:116): avc: denied { create } for pid=403 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 30.258547][ T471] syz.0.48[471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.258625][ T471] syz.0.48[471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.318780][ T473] syz.2.49[473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.408888][ T473] syz.2.49[473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.539985][ T484] syz.2.49[484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.677433][ T484] syz.2.49[484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.802348][ T522] syz.3.63[522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.901750][ T525] syz.3.63[525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.078218][ T525] syz.3.63[525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.156164][ T522] syz.3.63[522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.421414][ T30] audit: type=1400 audit(1732123391.693:117): avc: denied { cpu } for pid=586 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.465973][ T30] audit: type=1400 audit(1732123391.733:118): avc: denied { create } for pid=586 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 34.500082][ T30] audit: type=1400 audit(1732123391.763:119): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 35.552399][ T617] bpf_get_probe_write_proto: 16 callbacks suppressed [ 35.552416][ T617] syz.2.93[617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.578794][ T617] syz.2.93[617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.685150][ T623] syz.1.95[623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.696351][ T623] syz.1.95[623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.708640][ T624] syz.2.93[624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.728165][ T624] syz.2.93[624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.766980][ T626] syz.1.96[626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.794404][ T626] syz.1.96[626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.846650][ T626] syz.1.96[626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.925097][ T626] syz.1.96[626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.952106][ T773] bpf_get_probe_write_proto: 4 callbacks suppressed [ 42.952127][ T773] syz.4.143[773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.058384][ T773] syz.4.143[773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.198545][ T773] syz.4.143[773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.272244][ T773] syz.4.143[773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.270415][ T829] syz.3.161[829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.283563][ T829] syz.3.161[829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.311706][ T827] ÿÿÿÿÿÿ: renamed from vlan1 [ 45.641973][ T847] syz.1.168[847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.642052][ T847] syz.1.168[847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.732100][ T845] device veth0_vlan left promiscuous mode [ 45.824475][ T845] device veth0_vlan entered promiscuous mode [ 45.886999][ T855] syz.1.168[855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.887076][ T855] syz.1.168[855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.907743][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.957828][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.006886][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 46.249221][ T854] device veth0_vlan left promiscuous mode [ 46.264596][ T854] device veth0_vlan entered promiscuous mode [ 46.878528][ T876] ÿÿÿÿÿÿ: renamed from vlan1 [ 47.378417][ T891] device veth0_vlan left promiscuous mode [ 47.398691][ T891] device veth0_vlan entered promiscuous mode [ 47.783228][ T905] device veth0_vlan left promiscuous mode [ 47.789998][ T905] device veth0_vlan entered promiscuous mode [ 48.049119][ T906] device veth0_vlan left promiscuous mode [ 48.058805][ T906] device veth0_vlan entered promiscuous mode [ 48.101002][ T915] syz.3.188[915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.101080][ T915] syz.3.188[915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.101811][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.131524][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.139013][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 48.496483][ T921] syz.4.189[921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.496566][ T921] syz.4.189[921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.568228][ T922] syz.4.189[922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.692756][ T922] syz.4.189[922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.990669][ T938] syz.0.194[938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.011243][ T938] syz.0.194[938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.418884][ T943] syz.0.196[943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.430540][ T943] syz.0.196[943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.911620][ T988] device veth0_vlan left promiscuous mode [ 52.042131][ T988] device veth0_vlan entered promiscuous mode [ 52.087323][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.100807][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.108371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 52.215562][ T996] device veth0_vlan left promiscuous mode [ 52.225769][ T996] device veth0_vlan entered promiscuous mode [ 53.201710][ T1035] device veth0_vlan left promiscuous mode [ 53.207561][ T1035] device veth0_vlan entered promiscuous mode [ 53.388651][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.417445][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.528283][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.785150][ T1050] ÿÿÿÿÿÿ: renamed from vlan1 [ 53.796541][ T1054] bpf_get_probe_write_proto: 12 callbacks suppressed [ 53.796555][ T1054] syz.3.231[1054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.883636][ T1054] syz.3.231[1054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.980382][ T1048] device veth0_vlan left promiscuous mode [ 53.999875][ T1048] device veth0_vlan entered promiscuous mode [ 54.014543][ T1060] syz.3.232[1060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.014662][ T1060] syz.3.232[1060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.083939][ T1061] syz.3.232[1061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.096802][ T1061] syz.3.232[1061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.505926][ T1119] syz.4.248[1119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.658304][ T1119] syz.4.248[1119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.468760][ T1148] syz.2.262[1148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.557116][ T1148] syz.2.262[1148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.117537][ T1206] device veth0_vlan left promiscuous mode [ 59.138602][ T1206] device veth0_vlan entered promiscuous mode [ 59.710214][ T1221] ÿÿÿÿÿÿ: renamed from vlan1 [ 63.139231][ T1271] bpf_get_probe_write_proto: 2 callbacks suppressed [ 63.139248][ T1271] syz.0.304[1271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.145732][ T1271] syz.0.304[1271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.998651][ T1324] syz.3.321[1324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.048108][ T1324] syz.3.321[1324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.174268][ T1324] syz.3.321[1324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.187793][ T1324] syz.3.321[1324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.215108][ T1361] device veth0_vlan left promiscuous mode [ 67.242423][ T1361] device veth0_vlan entered promiscuous mode [ 67.316678][ T1378] syz.3.339[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.316756][ T1378] syz.3.339[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.383356][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.406951][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.408182][ T1379] syz.3.339[1379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.414825][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 67.422500][ T1379] syz.3.339[1379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.543917][ T1385] device veth0_vlan left promiscuous mode [ 67.624561][ T1385] device veth0_vlan entered promiscuous mode [ 67.698769][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.725796][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.743308][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 68.610591][ T1426] ÿÿÿÿÿÿ: renamed from vlan1 [ 69.939536][ T1478] device veth0_vlan left promiscuous mode [ 70.044721][ T1478] device veth0_vlan entered promiscuous mode [ 70.079125][ T1485] syz.4.380[1485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.079202][ T1485] syz.4.380[1485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.404647][ T1497] device veth0_vlan left promiscuous mode [ 70.422036][ T1497] device veth0_vlan entered promiscuous mode [ 71.297256][ T1533] syz.3.397[1533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.297336][ T1533] syz.3.397[1533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.512101][ T1533] syz.3.397[1533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.533652][ T1533] syz.3.397[1533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.932176][ T1587] syz.0.417[1587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.960399][ T1587] syz.0.417[1587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.539233][ T1628] syz.4.432[1628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.638395][ T1628] syz.4.432[1628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.941292][ T1638] device veth0_vlan left promiscuous mode [ 74.989210][ T1638] device veth0_vlan entered promiscuous mode [ 75.029123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.045822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.061762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 75.185375][ T1650] FAULT_INJECTION: forcing a failure. [ 75.185375][ T1650] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 75.200330][ T1650] CPU: 0 PID: 1650 Comm: syz.3.440 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 75.209973][ T1650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 75.219884][ T1650] Call Trace: [ 75.223002][ T1650] [ 75.225773][ T1650] dump_stack_lvl+0x151/0x1c0 [ 75.230290][ T1650] ? io_uring_drop_tctx_refs+0x190/0x190 [ 75.235755][ T1650] ? __free_one_page+0xafc/0xc90 [ 75.240533][ T1650] dump_stack+0x15/0x20 [ 75.244521][ T1650] should_fail+0x3c6/0x510 [ 75.248775][ T1650] should_fail_usercopy+0x1a/0x20 [ 75.253631][ T1650] _copy_to_user+0x20/0x90 [ 75.257892][ T1650] simple_read_from_buffer+0xc7/0x150 [ 75.263105][ T1650] proc_fail_nth_read+0x1a3/0x210 [ 75.267954][ T1650] ? proc_fault_inject_write+0x390/0x390 [ 75.273417][ T1650] ? fsnotify_perm+0x269/0x5b0 [ 75.278034][ T1650] ? security_file_permission+0x86/0xb0 [ 75.283413][ T1650] ? proc_fault_inject_write+0x390/0x390 [ 75.288873][ T1650] vfs_read+0x27d/0xd40 [ 75.292871][ T1650] ? kernel_read+0x1f0/0x1f0 [ 75.297291][ T1650] ? __kasan_check_write+0x14/0x20 [ 75.302242][ T1650] ? mutex_lock+0xb6/0x1e0 [ 75.306502][ T1650] ? wait_for_completion_killable_timeout+0x10/0x10 [ 75.312917][ T1650] ? __fdget_pos+0x2e7/0x3a0 [ 75.317339][ T1650] ? ksys_read+0x77/0x2c0 [ 75.321512][ T1650] ksys_read+0x199/0x2c0 [ 75.325588][ T1650] ? vfs_write+0x1110/0x1110 [ 75.330009][ T1650] ? debug_smp_processor_id+0x17/0x20 [ 75.335216][ T1650] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 75.341121][ T1650] __x64_sys_read+0x7b/0x90 [ 75.345461][ T1650] x64_sys_call+0x28/0x9a0 [ 75.349807][ T1650] do_syscall_64+0x3b/0xb0 [ 75.354153][ T1650] ? clear_bhb_loop+0x35/0x90 [ 75.358668][ T1650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.364399][ T1650] RIP: 0033:0x7f44c168925c [ 75.368647][ T1650] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 75.388209][ T1650] RSP: 002b:00007f44bfd03030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 75.396452][ T1650] RAX: ffffffffffffffda RBX: 00007f44c1841fa0 RCX: 00007f44c168925c [ 75.404273][ T1650] RDX: 000000000000000f RSI: 00007f44bfd030a0 RDI: 0000000000000007 [ 75.412079][ T1650] RBP: 00007f44bfd03090 R08: 0000000000000000 R09: 0000000000000000 [ 75.419886][ T1650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.427699][ T1650] R13: 0000000000000000 R14: 00007f44c1841fa0 R15: 00007ffeb1f00d18 [ 75.435613][ T1650] [ 75.639096][ T1659] device veth0_vlan left promiscuous mode [ 75.673814][ T1659] device veth0_vlan entered promiscuous mode [ 75.723399][ T1666] bpf_get_probe_write_proto: 2 callbacks suppressed [ 75.723419][ T1666] syz.4.446[1666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.730573][ T1666] syz.4.446[1666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.378795][ T30] audit: type=1400 audit(1732123433.643:120): avc: denied { ioctl } for pid=1683 comm="syz.4.453" path="socket:[21636]" dev="sockfs" ino=21636 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 76.421180][ T1691] FAULT_INJECTION: forcing a failure. [ 76.421180][ T1691] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 76.505569][ T1691] CPU: 1 PID: 1691 Comm: syz.3.456 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 76.515216][ T1691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 76.525105][ T1691] Call Trace: [ 76.528229][ T1691] [ 76.531006][ T1691] dump_stack_lvl+0x151/0x1c0 [ 76.535520][ T1691] ? io_uring_drop_tctx_refs+0x190/0x190 [ 76.540993][ T1691] dump_stack+0x15/0x20 [ 76.544977][ T1691] should_fail+0x3c6/0x510 [ 76.549236][ T1691] should_fail_alloc_page+0x5a/0x80 [ 76.554266][ T1691] prepare_alloc_pages+0x15c/0x700 [ 76.559218][ T1691] ? __alloc_pages_bulk+0xe40/0xe40 [ 76.564252][ T1691] __alloc_pages+0x18c/0x8f0 [ 76.568674][ T1691] ? __x64_sys_bpf+0x7c/0x90 [ 76.573099][ T1691] ? prep_new_page+0x110/0x110 [ 76.577724][ T1691] __get_free_pages+0x10/0x30 [ 76.582217][ T1691] kasan_populate_vmalloc_pte+0x39/0x130 [ 76.587685][ T1691] ? __apply_to_page_range+0x8ca/0xbe0 [ 76.592978][ T1691] __apply_to_page_range+0x8dd/0xbe0 [ 76.598097][ T1691] ? kasan_populate_vmalloc+0x70/0x70 [ 76.603316][ T1691] ? kasan_populate_vmalloc+0x70/0x70 [ 76.608510][ T1691] apply_to_page_range+0x3b/0x50 [ 76.613301][ T1691] kasan_populate_vmalloc+0x65/0x70 [ 76.618329][ T1691] alloc_vmap_area+0x192f/0x1a80 [ 76.623102][ T1691] ? vm_map_ram+0xa90/0xa90 [ 76.627431][ T1691] ? kmem_cache_alloc_trace+0x115/0x210 [ 76.632814][ T1691] ? __get_vm_area_node+0x117/0x360 [ 76.637845][ T1691] __get_vm_area_node+0x158/0x360 [ 76.642711][ T1691] __vmalloc_node_range+0xe2/0x8d0 [ 76.647655][ T1691] ? sock_hash_alloc+0x2bf/0x560 [ 76.652432][ T1691] bpf_map_area_alloc+0xd9/0xf0 [ 76.657115][ T1691] ? sock_hash_alloc+0x2bf/0x560 [ 76.661891][ T1691] sock_hash_alloc+0x2bf/0x560 [ 76.666489][ T1691] map_create+0x411/0x2050 [ 76.670743][ T1691] __sys_bpf+0x296/0x760 [ 76.674820][ T1691] ? fput_many+0x160/0x1b0 [ 76.679075][ T1691] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 76.684286][ T1691] ? debug_smp_processor_id+0x17/0x20 [ 76.689583][ T1691] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 76.695487][ T1691] __x64_sys_bpf+0x7c/0x90 [ 76.699738][ T1691] x64_sys_call+0x87f/0x9a0 [ 76.704079][ T1691] do_syscall_64+0x3b/0xb0 [ 76.708331][ T1691] ? clear_bhb_loop+0x35/0x90 [ 76.712848][ T1691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.718572][ T1691] RIP: 0033:0x7f44c168a819 [ 76.722826][ T1691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.742274][ T1691] RSP: 002b:00007f44bfd03038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.750869][ T1691] RAX: ffffffffffffffda RBX: 00007f44c1841fa0 RCX: 00007f44c168a819 [ 76.758671][ T1691] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 0000000000000000 [ 76.766577][ T1691] RBP: 00007f44bfd03090 R08: 0000000000000000 R09: 0000000000000000 [ 76.774380][ T1691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.782192][ T1691] R13: 0000000000000001 R14: 00007f44c1841fa0 R15: 00007ffeb1f00d18 [ 76.790010][ T1691] [ 77.192731][ T1699] syz.3.458[1699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.192811][ T1699] syz.3.458[1699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.245633][ T30] audit: type=1400 audit(1732123434.513:121): avc: denied { ioctl } for pid=1702 comm="syz.4.462" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 78.326495][ T1736] syz.2.474[1736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.326581][ T1736] syz.2.474[1736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.350858][ T1739] syz.3.475[1739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.372528][ T1739] syz.3.475[1739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.833057][ T30] audit: type=1400 audit(1732123436.103:122): avc: denied { setopt } for pid=1746 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 79.020534][ T30] audit: type=1400 audit(1732123436.163:123): avc: denied { create } for pid=1746 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 80.363099][ T1805] device wg2 entered promiscuous mode [ 80.838503][ T1817] syz.3.505[1817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.838578][ T1817] syz.3.505[1817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.061891][ T1825] FAULT_INJECTION: forcing a failure. [ 81.061891][ T1825] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 81.091311][ T1825] CPU: 1 PID: 1825 Comm: syz.2.509 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 81.100962][ T1825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 81.110853][ T1825] Call Trace: [ 81.113977][ T1825] [ 81.116756][ T1825] dump_stack_lvl+0x151/0x1c0 [ 81.121268][ T1825] ? io_uring_drop_tctx_refs+0x190/0x190 [ 81.126736][ T1825] ? __kasan_check_write+0x14/0x20 [ 81.131686][ T1825] dump_stack+0x15/0x20 [ 81.135681][ T1825] should_fail+0x3c6/0x510 [ 81.139933][ T1825] should_fail_alloc_page+0x5a/0x80 [ 81.144963][ T1825] prepare_alloc_pages+0x15c/0x700 [ 81.149909][ T1825] ? __alloc_pages+0x8f0/0x8f0 [ 81.154510][ T1825] ? __alloc_pages_bulk+0xe40/0xe40 [ 81.159541][ T1825] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 81.165009][ T1825] __alloc_pages+0x18c/0x8f0 [ 81.169438][ T1825] ? prep_new_page+0x110/0x110 [ 81.174041][ T1825] ? pcpu_chunk_relocate+0x356/0x430 [ 81.179162][ T1825] pcpu_populate_chunk+0x18c/0xe30 [ 81.184106][ T1825] pcpu_alloc+0x984/0x13e0 [ 81.188365][ T1825] __alloc_percpu_gfp+0x27/0x30 [ 81.193046][ T1825] bpf_map_alloc_percpu+0xe6/0x160 [ 81.198078][ T1825] array_map_alloc+0x3a5/0x6d0 [ 81.202687][ T1825] map_create+0x411/0x2050 [ 81.206932][ T1825] __sys_bpf+0x296/0x760 [ 81.211009][ T1825] ? fput_many+0x160/0x1b0 [ 81.215266][ T1825] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 81.220472][ T1825] ? debug_smp_processor_id+0x17/0x20 [ 81.225676][ T1825] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 81.231579][ T1825] __x64_sys_bpf+0x7c/0x90 [ 81.235841][ T1825] x64_sys_call+0x87f/0x9a0 [ 81.240171][ T1825] do_syscall_64+0x3b/0xb0 [ 81.244427][ T1825] ? clear_bhb_loop+0x35/0x90 [ 81.248935][ T1825] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.254666][ T1825] RIP: 0033:0x7fcbf6597819 [ 81.258919][ T1825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.278364][ T1825] RSP: 002b:00007fcbf4c10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.286615][ T1825] RAX: ffffffffffffffda RBX: 00007fcbf674efa0 RCX: 00007fcbf6597819 [ 81.294418][ T1825] RDX: 0000000000000048 RSI: 0000000020000b00 RDI: 2000000000000000 [ 81.302230][ T1825] RBP: 00007fcbf4c10090 R08: 0000000000000000 R09: 0000000000000000 [ 81.310045][ T1825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 81.317854][ T1825] R13: 0000000000000000 R14: 00007fcbf674efa0 R15: 00007fff25826768 [ 81.325670][ T1825] [ 81.523514][ T1838] syz.2.512[1838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.523589][ T1838] syz.2.512[1838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.690237][ T1848] syz.4.517[1848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.710198][ T1848] syz.4.517[1848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.108760][ T1876] syz.0.528[1876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.120386][ T1876] syz.0.528[1876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.206827][ T1893] syz.0.534[1893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.218068][ T1893] syz.0.534[1893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.048040][ T1908] device veth0_vlan left promiscuous mode [ 83.102354][ T1908] device veth0_vlan entered promiscuous mode [ 83.197370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.208573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.216004][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 83.324363][ T1922] device veth0_vlan left promiscuous mode [ 83.338206][ T1922] device veth0_vlan entered promiscuous mode [ 83.361626][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.369883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.384371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 85.472182][ T1980] device veth0_vlan left promiscuous mode [ 85.484803][ T1980] device veth0_vlan entered promiscuous mode [ 85.517086][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.525488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.534056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 86.497177][ T2019] device veth0_vlan left promiscuous mode [ 86.512829][ T2019] device veth0_vlan entered promiscuous mode [ 86.549812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.567320][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.580655][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 86.861139][ T2043] bpf_get_probe_write_proto: 2 callbacks suppressed [ 86.861159][ T2043] syz.4.587[2043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.867653][ T2043] syz.4.587[2043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.624136][ T2074] device veth0_vlan left promiscuous mode [ 87.737457][ T2074] device veth0_vlan entered promiscuous mode [ 87.938708][ T2089] syz.4.603[2089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.938785][ T2089] syz.4.603[2089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.969295][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.151757][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.221352][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 92.873916][ T2179] syz.2.632[2179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.873991][ T2179] syz.2.632[2179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.161086][ T2221] syz.3.651[2221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.200300][ T2221] syz.3.651[2221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.218919][ T30] audit: type=1400 audit(1732123451.483:124): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 94.264588][ T30] audit: type=1400 audit(1732123451.483:125): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 94.518318][ T2239] syz.3.657[2239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.518394][ T2239] syz.3.657[2239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.701466][ T2277] syz.1.671[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.713150][ T2277] syz.1.671[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.096886][ T2294] syz.3.678[2294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.126980][ T2294] syz.3.678[2294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.910565][ T2365] FAULT_INJECTION: forcing a failure. [ 97.910565][ T2365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.054822][ T2365] CPU: 1 PID: 2365 Comm: syz.0.701 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 98.064468][ T2365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 98.074361][ T2365] Call Trace: [ 98.077483][ T2365] [ 98.080266][ T2365] dump_stack_lvl+0x151/0x1c0 [ 98.084775][ T2365] ? io_uring_drop_tctx_refs+0x190/0x190 [ 98.090247][ T2365] dump_stack+0x15/0x20 [ 98.094240][ T2365] should_fail+0x3c6/0x510 [ 98.098498][ T2365] should_fail_alloc_page+0x5a/0x80 [ 98.103526][ T2365] prepare_alloc_pages+0x15c/0x700 [ 98.108476][ T2365] ? __alloc_pages_bulk+0xe40/0xe40 [ 98.113509][ T2365] __alloc_pages+0x18c/0x8f0 [ 98.117935][ T2365] ? prep_new_page+0x110/0x110 [ 98.122528][ T2365] ? copy_page_from_iter+0x2c1/0x640 [ 98.127651][ T2365] ? copy_user_enhanced_fast_string+0xe/0x40 [ 98.133468][ T2365] pipe_write+0x551/0x1930 [ 98.137719][ T2365] ? pipe_read+0x1040/0x1040 [ 98.142143][ T2365] ? selinux_file_permission+0x450/0x570 [ 98.147610][ T2365] ? fsnotify_perm+0x6a/0x5b0 [ 98.152140][ T2365] ? iov_iter_init+0x53/0x190 [ 98.156641][ T2365] vfs_write+0xd5d/0x1110 [ 98.160804][ T2365] ? file_end_write+0x1c0/0x1c0 [ 98.165496][ T2365] ? __fdget_pos+0x209/0x3a0 [ 98.170002][ T2365] ? ksys_write+0x77/0x2c0 [ 98.174255][ T2365] ksys_write+0x199/0x2c0 [ 98.178426][ T2365] ? __ia32_sys_read+0x90/0x90 [ 98.183108][ T2365] ? debug_smp_processor_id+0x17/0x20 [ 98.188317][ T2365] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 98.194226][ T2365] __x64_sys_write+0x7b/0x90 [ 98.198648][ T2365] x64_sys_call+0x2f/0x9a0 [ 98.202900][ T2365] do_syscall_64+0x3b/0xb0 [ 98.207150][ T2365] ? clear_bhb_loop+0x35/0x90 [ 98.211665][ T2365] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.217389][ T2365] RIP: 0033:0x7f1611c91819 [ 98.221646][ T2365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.241085][ T2365] RSP: 002b:00007f161030a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 98.249329][ T2365] RAX: ffffffffffffffda RBX: 00007f1611e48fa0 RCX: 00007f1611c91819 [ 98.257143][ T2365] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 98.264953][ T2365] RBP: 00007f161030a090 R08: 0000000000000000 R09: 0000000000000000 [ 98.272773][ T2365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.280574][ T2365] R13: 0000000000000000 R14: 00007f1611e48fa0 R15: 00007ffcdb7904c8 [ 98.288393][ T2365] [ 98.550552][ T2394] bpf_get_probe_write_proto: 6 callbacks suppressed [ 98.550570][ T2394] syz.4.711[2394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.619582][ T2394] syz.4.711[2394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.133376][ T30] audit: type=1400 audit(1732123456.403:126): avc: denied { create } for pid=2410 comm="syz.2.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 100.303214][ T2462] syz.1.736[2462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.303290][ T2462] syz.1.736[2462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.511622][ T2501] syz.0.751[2501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.535361][ T2501] syz.0.751[2501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.558182][ T2504] syz.4.753[2504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.595300][ T2504] syz.4.753[2504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.400177][ T2560] device veth0_vlan left promiscuous mode [ 103.500783][ T2560] device veth0_vlan entered promiscuous mode [ 103.519106][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.527536][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.535380][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 103.596891][ T2565] device veth0_vlan left promiscuous mode [ 103.608805][ T2565] device veth0_vlan entered promiscuous mode [ 103.652886][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.661209][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.670594][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 103.869726][ T2574] syz.0.775[2574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.869791][ T2574] syz.0.775[2574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.365176][ T2594] syz.0.781[2594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.407162][ T2594] syz.0.781[2594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.485384][ T30] audit: type=1400 audit(1732123461.753:127): avc: denied { relabelfrom } for pid=2593 comm="syz.4.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 104.617049][ T2598] syz.1.784[2598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.617130][ T2598] syz.1.784[2598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.644482][ T30] audit: type=1400 audit(1732123461.753:128): avc: denied { relabelto } for pid=2593 comm="syz.4.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 105.431152][ T2622] device veth0_vlan left promiscuous mode [ 105.508875][ T2622] device veth0_vlan entered promiscuous mode [ 107.381572][ T2675] device veth0_vlan left promiscuous mode [ 107.415501][ T2675] device veth0_vlan entered promiscuous mode [ 107.546406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.574805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.619019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 107.885073][ T2688] syz.2.810[2688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.885151][ T2688] syz.2.810[2688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.869739][ T2865] syz.2.873[2865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.931862][ T2865] syz.2.873[2865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.482518][ T2904] syz.4.887[2904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.493897][ T2904] syz.4.887[2904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.264139][ T2945] syz.2.900[2945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.355525][ T2945] syz.2.900[2945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.136886][ T2979] syz.4.914[2979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.148201][ T2979] syz.4.914[2979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.276948][ T3075] syz.0.944[3075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.306465][ T3075] syz.0.944[3075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.800708][ T3093] device veth0_vlan left promiscuous mode [ 123.933730][ T3093] device veth0_vlan entered promiscuous mode [ 123.984420][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.001549][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.033994][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 124.470112][ T3118] syz.1.960[3118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.470189][ T3118] syz.1.960[3118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.905564][ T3127] syz.1.963[3127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.988721][ T3127] syz.1.963[3127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.162577][ T3136] device veth0_vlan left promiscuous mode [ 125.268237][ T3136] device veth0_vlan entered promiscuous mode [ 125.418250][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.434443][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.475771][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 126.190274][ T3166] syz.2.973[3166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.190353][ T3166] syz.2.973[3166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.488170][ T3212] device veth0_vlan left promiscuous mode [ 127.542768][ T3212] device veth0_vlan entered promiscuous mode [ 129.866446][ T3333] device veth0_vlan left promiscuous mode [ 129.886921][ T3333] device veth0_vlan entered promiscuous mode [ 129.939712][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.955148][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.966885][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 130.070914][ T3348] device veth0_vlan left promiscuous mode [ 130.080845][ T3348] device veth0_vlan entered promiscuous mode [ 130.113127][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.121178][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.128658][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 130.408607][ T3372] FAULT_INJECTION: forcing a failure. [ 130.408607][ T3372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 130.422666][ T3372] CPU: 1 PID: 3372 Comm: syz.4.1052 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 130.432394][ T3372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 130.442374][ T3372] Call Trace: [ 130.445494][ T3372] [ 130.448375][ T3372] dump_stack_lvl+0x151/0x1c0 [ 130.452877][ T3372] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.458338][ T3372] ? 0xffffffffa002aebc [ 130.462331][ T3372] ? is_bpf_text_address+0x172/0x190 [ 130.467454][ T3372] dump_stack+0x15/0x20 [ 130.471446][ T3372] should_fail+0x3c6/0x510 [ 130.475699][ T3372] should_fail_alloc_page+0x5a/0x80 [ 130.480735][ T3372] prepare_alloc_pages+0x15c/0x700 [ 130.485683][ T3372] ? __alloc_pages+0x8f0/0x8f0 [ 130.490283][ T3372] ? __alloc_pages_bulk+0xe40/0xe40 [ 130.495356][ T3372] __alloc_pages+0x18c/0x8f0 [ 130.499745][ T3372] ? prep_new_page+0x110/0x110 [ 130.504343][ T3372] ? pcpu_chunk_relocate+0x20a/0x430 [ 130.509473][ T3372] pcpu_populate_chunk+0x18c/0xe30 [ 130.514423][ T3372] pcpu_alloc+0x984/0x13e0 [ 130.518668][ T3372] __alloc_percpu_gfp+0x27/0x30 [ 130.523434][ T3372] bpf_map_alloc_percpu+0xe6/0x160 [ 130.528389][ T3372] array_map_alloc+0x3a5/0x6d0 [ 130.532982][ T3372] map_create+0x411/0x2050 [ 130.537235][ T3372] __sys_bpf+0x296/0x760 [ 130.541312][ T3372] ? fput_many+0x160/0x1b0 [ 130.545565][ T3372] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 130.550777][ T3372] ? debug_smp_processor_id+0x17/0x20 [ 130.555983][ T3372] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.561882][ T3372] __x64_sys_bpf+0x7c/0x90 [ 130.566227][ T3372] x64_sys_call+0x87f/0x9a0 [ 130.570564][ T3372] do_syscall_64+0x3b/0xb0 [ 130.574812][ T3372] ? clear_bhb_loop+0x35/0x90 [ 130.579682][ T3372] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.585407][ T3372] RIP: 0033:0x7f24f48ec819 [ 130.589658][ T3372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.609191][ T3372] RSP: 002b:00007f24f2f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 130.617432][ T3372] RAX: ffffffffffffffda RBX: 00007f24f4aa3fa0 RCX: 00007f24f48ec819 [ 130.625245][ T3372] RDX: 0000000000000048 RSI: 0000000020000b00 RDI: 2000000000000000 [ 130.633140][ T3372] RBP: 00007f24f2f65090 R08: 0000000000000000 R09: 0000000000000000 [ 130.640953][ T3372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.648758][ T3372] R13: 0000000000000000 R14: 00007f24f4aa3fa0 R15: 00007ffccf302178 [ 130.656578][ T3372] [ 131.003867][ T3385] device veth0_vlan left promiscuous mode [ 131.017037][ T3385] device veth0_vlan entered promiscuous mode [ 131.085437][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.095243][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.102771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 131.479000][ T3406] syz.4.1064[3406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.479081][ T3406] syz.4.1064[3406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.008827][ T3430] device veth0_vlan left promiscuous mode [ 132.037751][ T3430] device veth0_vlan entered promiscuous mode [ 132.107192][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.116277][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.124027][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 132.316800][ T3448] syz.4.1079[3448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.316877][ T3448] syz.4.1079[3448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.189417][ T3481] device veth0_vlan left promiscuous mode [ 133.206361][ T3481] device veth0_vlan entered promiscuous mode [ 133.233649][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.241953][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.249864][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 138.987207][ T3652] device veth0_vlan left promiscuous mode [ 138.997870][ T3652] device veth0_vlan entered promiscuous mode [ 139.034177][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.073849][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.129439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 141.034043][ T3723] device veth0_vlan left promiscuous mode [ 141.040454][ T3723] device veth0_vlan entered promiscuous mode [ 141.254267][ T3732] device veth0_vlan left promiscuous mode [ 141.327103][ T3732] device veth0_vlan entered promiscuous mode [ 145.241921][ T3873] device veth0_vlan left promiscuous mode [ 145.256308][ T3873] device veth0_vlan entered promiscuous mode [ 147.691285][ T3958] device veth0_vlan left promiscuous mode [ 147.764861][ T3958] device veth0_vlan entered promiscuous mode [ 147.849361][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.865275][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.907632][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 148.233834][ T3979] device veth0_vlan left promiscuous mode [ 148.259138][ T3979] device veth0_vlan entered promiscuous mode [ 148.311766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.321136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.379553][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 148.951772][ T4004] device veth0_vlan left promiscuous mode [ 148.980830][ T4004] device veth0_vlan entered promiscuous mode [ 149.005963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.015428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.039684][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 150.031684][ T30] audit: type=1400 audit(1732123507.303:129): avc: denied { create } for pid=4059 comm="syz.1.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 151.468717][ T4119] device veth0_vlan left promiscuous mode [ 151.480619][ T4119] device veth0_vlan entered promiscuous mode [ 151.556293][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.579533][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.652806][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 151.726333][ T4130] device veth0_vlan left promiscuous mode [ 151.753277][ T4130] device veth0_vlan entered promiscuous mode [ 151.908596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.921638][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.929477][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 154.802086][ T4244] device veth0_vlan left promiscuous mode [ 154.834354][ T4244] device veth0_vlan entered promiscuous mode [ 154.911058][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.968333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.040033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 155.924045][ T4301] device veth0_vlan left promiscuous mode [ 155.934247][ T4301] device veth0_vlan entered promiscuous mode [ 155.970747][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.979893][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.987378][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 156.750751][ T4336] device veth0_vlan left promiscuous mode [ 156.824749][ T4336] device veth0_vlan entered promiscuous mode [ 156.909474][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.931518][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.949756][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 158.215883][ T4390] device veth0_vlan left promiscuous mode [ 158.261336][ T4390] device veth0_vlan entered promiscuous mode [ 158.371929][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.410049][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.459257][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 160.800569][ T4475] device veth0_vlan left promiscuous mode [ 160.858053][ T4475] device veth0_vlan entered promiscuous mode [ 163.085701][ T4539] syz.2.1471[4539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.085779][ T4539] syz.2.1471[4539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.424538][ T4552] device veth0_vlan left promiscuous mode [ 163.536510][ T4552] device veth0_vlan entered promiscuous mode [ 163.630875][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.653535][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.725246][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 164.284763][ T4571] device veth0_vlan left promiscuous mode [ 164.296031][ T4571] device veth0_vlan entered promiscuous mode [ 164.344086][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.356509][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.372475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 164.506657][ T4579] syz.3.1485[4579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.506735][ T4579] syz.3.1485[4579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.212710][ T4595] device veth0_vlan left promiscuous mode [ 165.279235][ T4600] FAULT_INJECTION: forcing a failure. [ 165.279235][ T4600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 165.379016][ T4595] device veth0_vlan entered promiscuous mode [ 165.440168][ T4600] CPU: 1 PID: 4600 Comm: syz.1.1491 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 165.450021][ T4600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 165.459917][ T4600] Call Trace: [ 165.463033][ T4600] [ 165.465814][ T4600] dump_stack_lvl+0x151/0x1c0 [ 165.470329][ T4600] ? io_uring_drop_tctx_refs+0x190/0x190 [ 165.475795][ T4600] ? __kasan_check_write+0x14/0x20 [ 165.480741][ T4600] ? __alloc_skb+0x355/0x550 [ 165.485185][ T4600] dump_stack+0x15/0x20 [ 165.489255][ T4600] should_fail+0x3c6/0x510 [ 165.493501][ T4600] should_fail_usercopy+0x1a/0x20 [ 165.498375][ T4600] _copy_from_iter+0x22f/0xdc0 [ 165.502959][ T4600] ? copy_mc_pipe_to_iter+0x760/0x760 [ 165.508175][ T4600] ? __check_object_size+0x2ec/0x3d0 [ 165.513290][ T4600] skb_copy_datagram_from_iter+0x100/0x6d0 [ 165.518951][ T4600] unix_stream_sendmsg+0x78f/0x1060 [ 165.523969][ T4600] ? unix_show_fdinfo+0xa0/0xa0 [ 165.528659][ T4600] ? check_stack_object+0x114/0x130 [ 165.533692][ T4600] ? security_socket_sendmsg+0x82/0xb0 [ 165.539085][ T4600] ? unix_show_fdinfo+0xa0/0xa0 [ 165.543768][ T4600] ____sys_sendmsg+0x59e/0x8f0 [ 165.548366][ T4600] ? __sys_sendmsg_sock+0x40/0x40 [ 165.553227][ T4600] ? import_iovec+0xe5/0x120 [ 165.557651][ T4600] ___sys_sendmsg+0x252/0x2e0 [ 165.562164][ T4600] ? __sys_sendmsg+0x260/0x260 [ 165.566777][ T4600] ? __fdget+0x1bc/0x240 [ 165.570841][ T4600] __se_sys_sendmsg+0x19a/0x260 [ 165.575531][ T4600] ? __x64_sys_sendmsg+0x90/0x90 [ 165.580302][ T4600] ? ksys_write+0x260/0x2c0 [ 165.584646][ T4600] ? debug_smp_processor_id+0x17/0x20 [ 165.589854][ T4600] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 165.595753][ T4600] __x64_sys_sendmsg+0x7b/0x90 [ 165.600351][ T4600] x64_sys_call+0x16a/0x9a0 [ 165.604691][ T4600] do_syscall_64+0x3b/0xb0 [ 165.608945][ T4600] ? clear_bhb_loop+0x35/0x90 [ 165.613458][ T4600] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.619184][ T4600] RIP: 0033:0x7fb0fcb9f819 [ 165.623442][ T4600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.642885][ T4600] RSP: 002b:00007fb0fb218038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 165.651126][ T4600] RAX: ffffffffffffffda RBX: 00007fb0fcd56fa0 RCX: 00007fb0fcb9f819 [ 165.658940][ T4600] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000003 [ 165.666758][ T4600] RBP: 00007fb0fb218090 R08: 0000000000000000 R09: 0000000000000000 [ 165.674562][ T4600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.682375][ T4600] R13: 0000000000000000 R14: 00007fb0fcd56fa0 R15: 00007fff81831128 [ 165.690194][ T4600] [ 167.808560][ T4656] device syzkaller0 entered promiscuous mode [ 168.982822][ T30] audit: type=1400 audit(1732123526.253:130): avc: denied { ioctl } for pid=4700 comm="syz.4.1528" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 169.114000][ T30] audit: type=1400 audit(1732123526.283:131): avc: denied { create } for pid=4700 comm="syz.4.1528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 169.509230][ T4723] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.516315][ T4723] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.680233][ T4737] syz.2.1540[4737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.680313][ T4737] syz.2.1540[4737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.440406][ T4766] syz.0.1553[4766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.486986][ T4766] syz.0.1553[4766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.645694][ T4773] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.665243][ T4773] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.680370][ T4801] syz.0.1566[4801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.680450][ T4801] syz.0.1566[4801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.954998][ T4806] device veth0_vlan left promiscuous mode [ 171.982306][ T4806] device veth0_vlan entered promiscuous mode [ 172.049325][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.057638][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.065417][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 172.337512][ T4831] syz.4.1578[4831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.342262][ T4831] syz.4.1578[4831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.581841][ T4869] syz.4.1589[4869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.603097][ T30] audit: type=1400 audit(1732123530.873:132): avc: denied { create } for pid=4867 comm="syz.0.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 173.688728][ T4869] syz.4.1589[4869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.718114][ T4868] device veth1_macvtap left promiscuous mode [ 173.823982][ T30] audit: type=1400 audit(1732123531.093:133): avc: denied { create } for pid=4867 comm="syz.0.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 174.034276][ T4881] device syzkaller0 entered promiscuous mode [ 175.281474][ T4930] FAULT_INJECTION: forcing a failure. [ 175.281474][ T4930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.338212][ T4930] CPU: 0 PID: 4930 Comm: syz.4.1613 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 175.347947][ T4930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 175.357843][ T4930] Call Trace: [ 175.360966][ T4930] [ 175.363742][ T4930] dump_stack_lvl+0x151/0x1c0 [ 175.368265][ T4930] ? io_uring_drop_tctx_refs+0x190/0x190 [ 175.373730][ T4930] dump_stack+0x15/0x20 [ 175.377719][ T4930] should_fail+0x3c6/0x510 [ 175.381972][ T4930] should_fail_usercopy+0x1a/0x20 [ 175.386827][ T4930] strncpy_from_user+0x24/0x2d0 [ 175.391514][ T4930] ? fput_many+0x160/0x1b0 [ 175.395769][ T4930] bpf_raw_tracepoint_open+0x2d4/0x950 [ 175.401061][ T4930] ? do_send_sig_info+0xfb/0x230 [ 175.405865][ T4930] ? bpf_obj_get_info_by_fd+0x3ce0/0x3ce0 [ 175.411390][ T4930] ? group_send_sig_info+0x1ba/0x460 [ 175.416512][ T4930] ? __lock_task_sighand+0x100/0x100 [ 175.421648][ T4930] ? selinux_bpf+0xd2/0x100 [ 175.425974][ T4930] ? security_bpf+0x82/0xb0 [ 175.430319][ T4930] __sys_bpf+0x489/0x760 [ 175.434405][ T4930] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 175.439604][ T4930] ? debug_smp_processor_id+0x17/0x20 [ 175.444801][ T4930] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 175.450709][ T4930] __x64_sys_bpf+0x7c/0x90 [ 175.454958][ T4930] x64_sys_call+0x87f/0x9a0 [ 175.459299][ T4930] do_syscall_64+0x3b/0xb0 [ 175.463548][ T4930] ? clear_bhb_loop+0x35/0x90 [ 175.468064][ T4930] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 175.473790][ T4930] RIP: 0033:0x7f24f48ec819 [ 175.478058][ T4930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.497491][ T4930] RSP: 002b:00007f24f2f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 175.505732][ T4930] RAX: ffffffffffffffda RBX: 00007f24f4aa3fa0 RCX: 00007f24f48ec819 [ 175.513544][ T4930] RDX: 0000000000000010 RSI: 0000000020000bc0 RDI: 0000000000000011 [ 175.521353][ T4930] RBP: 00007f24f2f65090 R08: 0000000000000000 R09: 0000000000000000 [ 175.529166][ T4930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.536978][ T4930] R13: 0000000000000000 R14: 00007f24f4aa3fa0 R15: 00007ffccf302178 [ 175.544884][ T4930] [ 176.047499][ T4951] device veth0_vlan left promiscuous mode [ 176.088157][ T4951] device veth0_vlan entered promiscuous mode [ 176.738013][ T4970] device veth0_vlan left promiscuous mode [ 176.782251][ T4970] device veth0_vlan entered promiscuous mode [ 176.820991][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.847247][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.926427][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 178.082180][ T4997] device veth0_vlan left promiscuous mode [ 178.088225][ T4997] device veth0_vlan entered promiscuous mode [ 179.371769][ T5047] device veth0_vlan left promiscuous mode [ 179.391348][ T5047] device veth0_vlan entered promiscuous mode [ 180.135466][ T5080] bond_slave_1: mtu less than device minimum [ 180.390523][ T5091] FAULT_INJECTION: forcing a failure. [ 180.390523][ T5091] name failslab, interval 1, probability 0, space 0, times 1 [ 180.409618][ T5091] CPU: 1 PID: 5091 Comm: syz.2.1666 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 180.419408][ T5091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 180.429298][ T5091] Call Trace: [ 180.432421][ T5091] [ 180.435195][ T5091] dump_stack_lvl+0x151/0x1c0 [ 180.439705][ T5091] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 180.445346][ T5091] ? io_uring_drop_tctx_refs+0x190/0x190 [ 180.450816][ T5091] ? __wake_up_klogd+0xd5/0x110 [ 180.455499][ T5091] dump_stack+0x15/0x20 [ 180.459507][ T5091] should_fail+0x3c6/0x510 [ 180.463748][ T5091] __should_failslab+0xa4/0xe0 [ 180.468346][ T5091] should_failslab+0x9/0x20 [ 180.472685][ T5091] slab_pre_alloc_hook+0x37/0xd0 [ 180.477474][ T5091] __kmalloc+0x6d/0x270 [ 180.481457][ T5091] ? shmem_initxattrs+0xd2/0x200 [ 180.487019][ T5091] shmem_initxattrs+0xd2/0x200 [ 180.491607][ T5091] security_inode_init_security+0x252/0x390 [ 180.497334][ T5091] ? shmem_tmpfile+0x100/0x100 [ 180.501936][ T5091] ? security_dentry_create_files_as+0xc0/0xc0 [ 180.508017][ T5091] ? simple_acl_create+0x29e/0x2c0 [ 180.512971][ T5091] shmem_mknod+0xb8/0x1c0 [ 180.517134][ T5091] shmem_create+0x2c/0x40 [ 180.521298][ T5091] ? shmem_fallocate+0xed0/0xed0 [ 180.526076][ T5091] path_openat+0x13a8/0x2f40 [ 180.530599][ T5091] ? do_filp_open+0x460/0x460 [ 180.535105][ T5091] ? release_firmware_map_entry+0x190/0x190 [ 180.540834][ T5091] do_filp_open+0x21c/0x460 [ 180.545166][ T5091] ? vfs_tmpfile+0x2c0/0x2c0 [ 180.549599][ T5091] do_sys_openat2+0x13f/0x820 [ 180.554105][ T5091] ? ktime_get+0x12f/0x160 [ 180.558356][ T5091] ? lapic_next_event+0x5f/0x70 [ 180.563046][ T5091] ? do_sys_open+0x220/0x220 [ 180.567476][ T5091] __x64_sys_openat+0x243/0x290 [ 180.572247][ T5091] ? __ia32_sys_open+0x270/0x270 [ 180.577018][ T5091] ? debug_smp_processor_id+0x17/0x20 [ 180.582225][ T5091] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 180.588127][ T5091] x64_sys_call+0x6bf/0x9a0 [ 180.592485][ T5091] do_syscall_64+0x3b/0xb0 [ 180.596752][ T5091] ? clear_bhb_loop+0x35/0x90 [ 180.601235][ T5091] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 180.606962][ T5091] RIP: 0033:0x7fcbf6597819 [ 180.611219][ T5091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.630741][ T5091] RSP: 002b:00007fcbf4c10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 180.638986][ T5091] RAX: ffffffffffffffda RBX: 00007fcbf674efa0 RCX: 00007fcbf6597819 [ 180.646799][ T5091] RDX: 00000000000026e1 RSI: 0000000020000380 RDI: ffffffffffffff9c [ 180.654625][ T5091] RBP: 00007fcbf4c10090 R08: 0000000000000000 R09: 0000000000000000 [ 180.662420][ T5091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 180.670240][ T5091] R13: 0000000000000000 R14: 00007fcbf674efa0 R15: 00007fff25826768 [ 180.678053][ T5091] [ 180.752654][ T5103] Â: renamed from pim6reg1 [ 180.800796][ T5105] device syzkaller0 entered promiscuous mode [ 181.214000][ T5117] device veth0_vlan left promiscuous mode [ 181.282308][ T5117] device veth0_vlan entered promiscuous mode [ 182.686911][ T5161] device veth0_vlan left promiscuous mode [ 182.735550][ T5161] device veth0_vlan entered promiscuous mode [ 182.899214][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.925799][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.029410][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 183.671532][ T5185] FAULT_INJECTION: forcing a failure. [ 183.671532][ T5185] name failslab, interval 1, probability 0, space 0, times 0 [ 183.840776][ T5185] CPU: 0 PID: 5185 Comm: syz.0.1698 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 183.850510][ T5185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 183.860409][ T5185] Call Trace: [ 183.863539][ T5185] [ 183.866301][ T5185] dump_stack_lvl+0x151/0x1c0 [ 183.870816][ T5185] ? io_uring_drop_tctx_refs+0x190/0x190 [ 183.876325][ T5185] dump_stack+0x15/0x20 [ 183.880286][ T5185] should_fail+0x3c6/0x510 [ 183.884540][ T5185] __should_failslab+0xa4/0xe0 [ 183.889131][ T5185] should_failslab+0x9/0x20 [ 183.893471][ T5185] slab_pre_alloc_hook+0x37/0xd0 [ 183.898240][ T5185] __kmalloc+0x6d/0x270 [ 183.902234][ T5185] ? kvmalloc_node+0x1f0/0x4d0 [ 183.906832][ T5185] kvmalloc_node+0x1f0/0x4d0 [ 183.911265][ T5185] ? vm_mmap+0xb0/0xb0 [ 183.915168][ T5185] ? __kasan_check_write+0x14/0x20 [ 183.920113][ T5185] ? _copy_from_user+0x96/0xd0 [ 183.924712][ T5185] map_update_elem+0x55d/0x770 [ 183.929404][ T5185] __sys_bpf+0x405/0x760 [ 183.933487][ T5185] ? fput_many+0x160/0x1b0 [ 183.937730][ T5185] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 183.942942][ T5185] ? debug_smp_processor_id+0x17/0x20 [ 183.948146][ T5185] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 183.954055][ T5185] __x64_sys_bpf+0x7c/0x90 [ 183.958302][ T5185] x64_sys_call+0x87f/0x9a0 [ 183.962638][ T5185] do_syscall_64+0x3b/0xb0 [ 183.966894][ T5185] ? clear_bhb_loop+0x35/0x90 [ 183.971405][ T5185] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 183.977135][ T5185] RIP: 0033:0x7f1611c91819 [ 183.981397][ T5185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.001112][ T5185] RSP: 002b:00007f161030a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.009353][ T5185] RAX: ffffffffffffffda RBX: 00007f1611e48fa0 RCX: 00007f1611c91819 [ 184.017161][ T5185] RDX: 0000000000000020 RSI: 00000000200003c0 RDI: 0000000000000002 [ 184.024972][ T5185] RBP: 00007f161030a090 R08: 0000000000000000 R09: 0000000000000000 [ 184.032870][ T5185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.040696][ T5185] R13: 0000000000000000 R14: 00007f1611e48fa0 R15: 00007ffcdb7904c8 [ 184.048507][ T5185] [ 185.597962][ T5231] device veth0_vlan left promiscuous mode [ 185.628676][ T5231] device veth0_vlan entered promiscuous mode [ 185.650234][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.658670][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.666289][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 185.753896][ T5237] syzkaller0: refused to change device tx_queue_len [ 186.212800][ T5252] device veth0_vlan left promiscuous mode [ 186.253504][ T5252] device veth0_vlan entered promiscuous mode [ 186.450080][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.472926][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.525445][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 186.779790][ T5276] device pim6reg1 entered promiscuous mode [ 187.630285][ T5312] device veth0_vlan left promiscuous mode [ 187.636208][ T5312] device veth0_vlan entered promiscuous mode [ 187.728251][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.738613][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.748759][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 188.089417][ T5337] FAULT_INJECTION: forcing a failure. [ 188.089417][ T5337] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.240054][ T5337] CPU: 1 PID: 5337 Comm: syz.1.1746 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 188.249880][ T5337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 188.259774][ T5337] Call Trace: [ 188.262900][ T5337] [ 188.265675][ T5337] dump_stack_lvl+0x151/0x1c0 [ 188.270193][ T5337] ? io_uring_drop_tctx_refs+0x190/0x190 [ 188.275657][ T5337] ? __stack_depot_save+0x34/0x470 [ 188.280608][ T5337] dump_stack+0x15/0x20 [ 188.284614][ T5337] should_fail+0x3c6/0x510 [ 188.288852][ T5337] should_fail_alloc_page+0x5a/0x80 [ 188.293884][ T5337] prepare_alloc_pages+0x15c/0x700 [ 188.298832][ T5337] ? __alloc_pages+0x8f0/0x8f0 [ 188.303436][ T5337] ? __alloc_pages_bulk+0xe40/0xe40 [ 188.308467][ T5337] __alloc_pages+0x18c/0x8f0 [ 188.312896][ T5337] ? prep_new_page+0x110/0x110 [ 188.317593][ T5337] ? __kasan_kmalloc+0x9/0x10 [ 188.322097][ T5337] ? __kmalloc+0x13a/0x270 [ 188.326345][ T5337] ? __vmalloc_node_range+0x2d6/0x8d0 [ 188.331552][ T5337] __vmalloc_node_range+0x482/0x8d0 [ 188.336601][ T5337] bpf_map_area_alloc+0xd9/0xf0 [ 188.341275][ T5337] ? htab_map_alloc+0xbb2/0x1650 [ 188.346099][ T5337] htab_map_alloc+0xbb2/0x1650 [ 188.350650][ T5337] map_create+0x411/0x2050 [ 188.354900][ T5337] __sys_bpf+0x296/0x760 [ 188.358977][ T5337] ? fput_many+0x160/0x1b0 [ 188.363232][ T5337] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 188.368439][ T5337] ? debug_smp_processor_id+0x17/0x20 [ 188.373642][ T5337] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 188.379544][ T5337] __x64_sys_bpf+0x7c/0x90 [ 188.383802][ T5337] x64_sys_call+0x87f/0x9a0 [ 188.388136][ T5337] do_syscall_64+0x3b/0xb0 [ 188.392392][ T5337] ? clear_bhb_loop+0x35/0x90 [ 188.396904][ T5337] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 188.402641][ T5337] RIP: 0033:0x7fb0fcb9f819 [ 188.406892][ T5337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.426330][ T5337] RSP: 002b:00007fb0fb218038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.434613][ T5337] RAX: ffffffffffffffda RBX: 00007fb0fcd56fa0 RCX: 00007fb0fcb9f819 [ 188.442467][ T5337] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 188.450278][ T5337] RBP: 00007fb0fb218090 R08: 0000000000000000 R09: 0000000000000000 [ 188.458093][ T5337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 188.465902][ T5337] R13: 0000000000000000 R14: 00007fb0fcd56fa0 R15: 00007fff81831128 [ 188.473742][ T5337] [ 189.109023][ T5369] device veth0_vlan left promiscuous mode [ 189.126799][ T5369] device veth0_vlan entered promiscuous mode [ 189.164166][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.175682][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.184806][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 190.213190][ T5413] device veth0_vlan left promiscuous mode [ 190.251078][ T5413] device veth0_vlan entered promiscuous mode [ 190.553337][ T5421] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 190.593332][ T5421] device syzkaller0 entered promiscuous mode [ 192.493667][ T30] audit: type=1400 audit(1732123549.763:134): avc: denied { create } for pid=5498 comm="syz.4.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 192.887172][ T5516] device syzkaller0 entered promiscuous mode [ 193.314194][ T5539] device sit0 entered promiscuous mode [ 193.399095][ T5541] device syzkaller0 entered promiscuous mode [ 193.537990][ T30] audit: type=1400 audit(1732123550.813:135): avc: denied { create } for pid=5551 comm="syz.3.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 193.576695][ T30] audit: type=1400 audit(1732123550.833:136): avc: denied { create } for pid=5551 comm="syz.3.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 193.601408][ T30] audit: type=1400 audit(1732123550.833:137): avc: denied { write } for pid=5551 comm="syz.3.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 193.813508][ T5567] device macsec0 entered promiscuous mode [ 194.348220][ T5584] device sit0 entered promiscuous mode [ 194.787203][ T5595] device syzkaller0 entered promiscuous mode [ 194.824462][ T5598] device syzkaller0 entered promiscuous mode [ 196.007860][ C0] sched: RT throttling activated [ 197.620794][ T5638] device pim6reg1 entered promiscuous mode [ 197.724640][ T5632] device veth0_vlan left promiscuous mode [ 197.861360][ T5632] device veth0_vlan entered promiscuous mode [ 197.942611][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.952449][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.960189][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 198.439613][ T30] audit: type=1400 audit(1732123555.713:138): avc: denied { read } for pid=5659 comm="syz.3.1858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 198.661615][ T5666] FAULT_INJECTION: forcing a failure. [ 198.661615][ T5666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.749930][ T30] audit: type=1400 audit(1732123556.023:139): avc: denied { setopt } for pid=5664 comm="syz.2.1860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 198.778208][ T5666] CPU: 1 PID: 5666 Comm: syz.4.1859 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 198.787956][ T5666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 198.797936][ T5666] Call Trace: [ 198.801056][ T5666] [ 198.803838][ T5666] dump_stack_lvl+0x151/0x1c0 [ 198.808354][ T5666] ? io_uring_drop_tctx_refs+0x190/0x190 [ 198.813826][ T5666] ? __stack_depot_save+0x34/0x470 [ 198.818764][ T5666] dump_stack+0x15/0x20 [ 198.822754][ T5666] should_fail+0x3c6/0x510 [ 198.827011][ T5666] should_fail_alloc_page+0x5a/0x80 [ 198.832040][ T5666] prepare_alloc_pages+0x15c/0x700 [ 198.836989][ T5666] ? __alloc_pages_bulk+0xe40/0xe40 [ 198.842021][ T5666] __alloc_pages+0x18c/0x8f0 [ 198.846445][ T5666] ? prep_new_page+0x110/0x110 [ 198.851050][ T5666] ? __kasan_kmalloc+0x9/0x10 [ 198.855556][ T5666] ? __kmalloc+0x13a/0x270 [ 198.859811][ T5666] ? __vmalloc_node_range+0x2d6/0x8d0 [ 198.865020][ T5666] __vmalloc_node_range+0x482/0x8d0 [ 198.870057][ T5666] bpf_map_area_alloc+0xd9/0xf0 [ 198.874738][ T5666] ? htab_map_alloc+0xbb2/0x1650 [ 198.879516][ T5666] htab_map_alloc+0xbb2/0x1650 [ 198.884119][ T5666] map_create+0x411/0x2050 [ 198.888371][ T5666] __sys_bpf+0x296/0x760 [ 198.892444][ T5666] ? fput_many+0x160/0x1b0 [ 198.896699][ T5666] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 198.901908][ T5666] ? debug_smp_processor_id+0x17/0x20 [ 198.907111][ T5666] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 198.913019][ T5666] __x64_sys_bpf+0x7c/0x90 [ 198.917269][ T5666] x64_sys_call+0x87f/0x9a0 [ 198.921608][ T5666] do_syscall_64+0x3b/0xb0 [ 198.925860][ T5666] ? clear_bhb_loop+0x35/0x90 [ 198.930461][ T5666] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.936187][ T5666] RIP: 0033:0x7f24f48ec819 [ 198.940446][ T5666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.959881][ T5666] RSP: 002b:00007f24f2f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.968143][ T5666] RAX: ffffffffffffffda RBX: 00007f24f4aa3fa0 RCX: 00007f24f48ec819 [ 198.975952][ T5666] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 198.983758][ T5666] RBP: 00007f24f2f65090 R08: 0000000000000000 R09: 0000000000000000 [ 198.991560][ T5666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.999373][ T5666] R13: 0000000000000000 R14: 00007f24f4aa3fa0 R15: 00007ffccf302178 [ 199.007198][ T5666] [ 199.675422][ T5696] device veth0_vlan left promiscuous mode [ 199.732139][ T5696] device veth0_vlan entered promiscuous mode [ 199.768733][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.790177][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.818673][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 200.100907][ T5706] device bridge_slave_1 left promiscuous mode [ 200.157461][ T5706] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.174157][ T5706] device bridge_slave_0 left promiscuous mode [ 200.180352][ T5706] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.503989][ T290] syz-executor (290) used greatest stack depth: 20688 bytes left [ 201.044780][ T5738] FAULT_INJECTION: forcing a failure. [ 201.044780][ T5738] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.075422][ T5738] CPU: 1 PID: 5738 Comm: syz.2.1885 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 201.085162][ T5738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 201.095056][ T5738] Call Trace: [ 201.098178][ T5738] [ 201.100953][ T5738] dump_stack_lvl+0x151/0x1c0 [ 201.105468][ T5738] ? io_uring_drop_tctx_refs+0x190/0x190 [ 201.110935][ T5738] ? __stack_depot_save+0x34/0x470 [ 201.115884][ T5738] dump_stack+0x15/0x20 [ 201.119876][ T5738] should_fail+0x3c6/0x510 [ 201.124129][ T5738] should_fail_usercopy+0x1a/0x20 [ 201.128986][ T5738] _copy_from_user+0x20/0xd0 [ 201.133415][ T5738] iovec_from_user+0xc7/0x330 [ 201.137928][ T5738] __import_iovec+0x6d/0x420 [ 201.142353][ T5738] ? __ia32_sys_shutdown+0x70/0x70 [ 201.147304][ T5738] import_iovec+0xe5/0x120 [ 201.151678][ T5738] ___sys_sendmsg+0x215/0x2e0 [ 201.156190][ T5738] ? __sys_sendmsg+0x260/0x260 [ 201.160789][ T5738] ? __fdget+0x1bc/0x240 [ 201.164861][ T5738] __se_sys_sendmsg+0x19a/0x260 [ 201.169545][ T5738] ? __x64_sys_sendmsg+0x90/0x90 [ 201.174316][ T5738] ? ksys_write+0x260/0x2c0 [ 201.178667][ T5738] ? debug_smp_processor_id+0x17/0x20 [ 201.183866][ T5738] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 201.189766][ T5738] __x64_sys_sendmsg+0x7b/0x90 [ 201.194369][ T5738] x64_sys_call+0x16a/0x9a0 [ 201.198706][ T5738] do_syscall_64+0x3b/0xb0 [ 201.202960][ T5738] ? clear_bhb_loop+0x35/0x90 [ 201.207601][ T5738] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.213317][ T5738] RIP: 0033:0x7fcbf6597819 [ 201.217568][ T5738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.237178][ T5738] RSP: 002b:00007fcbf4c10038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.245423][ T5738] RAX: ffffffffffffffda RBX: 00007fcbf674efa0 RCX: 00007fcbf6597819 [ 201.253232][ T5738] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000007 [ 201.261058][ T5738] RBP: 00007fcbf4c10090 R08: 0000000000000000 R09: 0000000000000000 [ 201.268954][ T5738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.276754][ T5738] R13: 0000000000000000 R14: 00007fcbf674efa0 R15: 00007fff25826768 [ 201.284572][ T5738] [ 201.440629][ T4342] device veth0_vlan left promiscuous mode [ 201.682446][ T5739] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.714391][ T5739] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.721981][ T5739] device bridge_slave_0 entered promiscuous mode [ 201.730804][ T5739] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.737771][ T5739] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.745398][ T5739] device bridge_slave_1 entered promiscuous mode [ 201.925646][ T5771] device syzkaller0 entered promiscuous mode [ 201.940023][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.947437][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.976227][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.984709][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.993290][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.000228][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.007593][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.016244][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.024923][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.031825][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.059056][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.066705][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.075171][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.091906][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.103004][ T5739] device veth0_vlan entered promiscuous mode [ 202.110197][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.125841][ T5739] device veth1_macvtap entered promiscuous mode [ 202.139130][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.147816][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.155415][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.172754][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.181475][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.235323][ T30] audit: type=1400 audit(1732123559.503:140): avc: denied { mounton } for pid=5739 comm="syz-executor" path="/root/syzkaller.IktvLX/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 202.326317][ T30] audit: type=1400 audit(1732123559.533:141): avc: denied { mount } for pid=5739 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 202.348567][ T30] audit: type=1400 audit(1732123559.543:142): avc: denied { mounton } for pid=5739 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 203.131618][ T5791] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.180556][ T5791] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.196604][ T5791] device bridge_slave_0 entered promiscuous mode [ 203.250236][ T5791] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.323827][ T5791] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.373189][ T5791] device bridge_slave_1 entered promiscuous mode [ 204.257579][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.278657][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.348579][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.356870][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.365055][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.371943][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.380914][ T4342] device bridge_slave_1 left promiscuous mode [ 204.388734][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.396337][ T4342] device bridge_slave_0 left promiscuous mode [ 204.402779][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.426390][ T4342] device veth1_macvtap left promiscuous mode [ 204.432388][ T4342] device veth0_vlan left promiscuous mode [ 204.578207][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.593536][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.648320][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.694170][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.701097][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.793543][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.839138][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.886477][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.939929][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.012140][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.043493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.092535][ T5791] device veth0_vlan entered promiscuous mode [ 205.112348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.150756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.204973][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.252283][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.305872][ T5791] device veth1_macvtap entered promiscuous mode [ 205.404921][ T5853] device syzkaller0 entered promiscuous mode [ 205.440242][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.454956][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.463605][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.634479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.653222][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.679609][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.693624][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.373671][ T5880] ªªªªªª: renamed from vlan0 [ 206.519501][ T5887] device sit0 left promiscuous mode [ 206.641785][ T5887] device sit0 entered promiscuous mode [ 206.806386][ T5881] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.819850][ T5881] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.843572][ T5881] device bridge_slave_0 entered promiscuous mode [ 206.900471][ T5881] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.907342][ T5881] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.916532][ T5881] device bridge_slave_1 entered promiscuous mode [ 207.534710][ T4342] device bridge_slave_1 left promiscuous mode [ 207.545212][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.677126][ T4342] device bridge_slave_0 left promiscuous mode [ 207.789373][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.900798][ T4342] device veth1_macvtap left promiscuous mode [ 207.998079][ T4342] device veth0_vlan left promiscuous mode [ 208.309711][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.317643][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.331647][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.342227][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.350421][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.357512][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.379552][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.389974][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.398902][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.407008][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.414104][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.422551][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.430884][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.439164][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.447316][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.462733][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.471189][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.488682][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.496847][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.505886][ T5881] device veth0_vlan entered promiscuous mode [ 208.524311][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.535557][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.546068][ T5881] device veth1_macvtap entered promiscuous mode [ 208.556471][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.564882][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.587348][ T5955] device syzkaller0 entered promiscuous mode [ 208.597810][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.608957][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.637125][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.645811][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.412316][ T5967] FAULT_INJECTION: forcing a failure. [ 209.412316][ T5967] name failslab, interval 1, probability 0, space 0, times 0 [ 209.528592][ T5967] CPU: 0 PID: 5967 Comm: syz.4.1955 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 209.538325][ T5967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 209.548219][ T5967] Call Trace: [ 209.551378][ T5967] [ 209.554119][ T5967] dump_stack_lvl+0x151/0x1c0 [ 209.558634][ T5967] ? io_uring_drop_tctx_refs+0x190/0x190 [ 209.564102][ T5967] ? selinux_capable+0x2f1/0x430 [ 209.568877][ T5967] dump_stack+0x15/0x20 [ 209.572865][ T5967] should_fail+0x3c6/0x510 [ 209.577123][ T5967] __should_failslab+0xa4/0xe0 [ 209.581725][ T5967] should_failslab+0x9/0x20 [ 209.586061][ T5967] slab_pre_alloc_hook+0x37/0xd0 [ 209.590838][ T5967] kmem_cache_alloc_trace+0x48/0x210 [ 209.595958][ T5967] ? sock_hash_alloc+0x1a1/0x560 [ 209.600917][ T5967] sock_hash_alloc+0x1a1/0x560 [ 209.605517][ T5967] map_create+0x411/0x2050 [ 209.609774][ T5967] __sys_bpf+0x296/0x760 [ 209.613843][ T5967] ? fput_many+0x160/0x1b0 [ 209.618093][ T5967] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 209.623309][ T5967] ? debug_smp_processor_id+0x17/0x20 [ 209.628507][ T5967] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 209.634413][ T5967] __x64_sys_bpf+0x7c/0x90 [ 209.638663][ T5967] x64_sys_call+0x87f/0x9a0 [ 209.643088][ T5967] do_syscall_64+0x3b/0xb0 [ 209.647342][ T5967] ? clear_bhb_loop+0x35/0x90 [ 209.651857][ T5967] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 209.657582][ T5967] RIP: 0033:0x7f24f48ec819 [ 209.661837][ T5967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.681401][ T5967] RSP: 002b:00007f24f2f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.689645][ T5967] RAX: ffffffffffffffda RBX: 00007f24f4aa3fa0 RCX: 00007f24f48ec819 [ 209.697455][ T5967] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 0000000000000000 [ 209.705268][ T5967] RBP: 00007f24f2f65090 R08: 0000000000000000 R09: 0000000000000000 [ 209.713082][ T5967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.720898][ T5967] R13: 0000000000000001 R14: 00007f24f4aa3fa0 R15: 00007ffccf302178 [ 209.728708][ T5967] [ 209.800810][ T4342] device bridge_slave_1 left promiscuous mode [ 209.806783][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.824710][ T4342] device bridge_slave_0 left promiscuous mode [ 209.830828][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.841946][ T4342] device veth1_macvtap left promiscuous mode [ 209.847785][ T4342] device veth0_vlan left promiscuous mode [ 210.134376][ T5979] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.145125][ T5979] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.152815][ T5979] device bridge_slave_0 entered promiscuous mode [ 210.161578][ T5979] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.168575][ T5979] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.175908][ T5979] device bridge_slave_1 entered promiscuous mode [ 210.951164][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.960142][ T30] audit: type=1400 audit(1732123568.233:143): avc: denied { append } for pid=6014 comm="syz.2.1970" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 210.964294][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.001931][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.016322][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.074170][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.081081][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.098748][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.107215][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.116887][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.123773][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.131759][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.147734][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.157274][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.183931][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.254199][ T6029] device syzkaller0 entered promiscuous mode [ 211.272883][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.282149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.289871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.298845][ T5979] device veth0_vlan entered promiscuous mode [ 211.312449][ T5979] device veth1_macvtap entered promiscuous mode [ 211.338351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.347136][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.355618][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.444856][ T5979] syz-executor (5979) used greatest stack depth: 20152 bytes left [ 212.078819][ T4342] device bridge_slave_1 left promiscuous mode [ 212.084808][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.111290][ T4342] device bridge_slave_0 left promiscuous mode [ 212.127450][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.165042][ T4342] device veth1_macvtap left promiscuous mode [ 212.175076][ T4342] device veth0_vlan left promiscuous mode [ 212.534927][ T6049] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.582456][ T6049] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.640437][ T6049] device bridge_slave_0 entered promiscuous mode [ 212.660938][ T6067] FAULT_INJECTION: forcing a failure. [ 212.660938][ T6067] name failslab, interval 1, probability 0, space 0, times 0 [ 212.702731][ T6049] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.712428][ T6067] CPU: 1 PID: 6067 Comm: syz.4.1986 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 212.722156][ T6067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 212.732141][ T6067] Call Trace: [ 212.735261][ T6067] [ 212.738038][ T6067] dump_stack_lvl+0x151/0x1c0 [ 212.739915][ T6049] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.742552][ T6067] ? io_uring_drop_tctx_refs+0x190/0x190 [ 212.742581][ T6067] ? __x64_sys_ioctl+0x7b/0x90 [ 212.759479][ T6067] dump_stack+0x15/0x20 [ 212.763467][ T6067] should_fail+0x3c6/0x510 [ 212.767755][ T6067] __should_failslab+0xa4/0xe0 [ 212.772332][ T6067] should_failslab+0x9/0x20 [ 212.776666][ T6067] slab_pre_alloc_hook+0x37/0xd0 [ 212.781437][ T6067] kmem_cache_alloc_trace+0x48/0x210 [ 212.786555][ T6067] ? __hw_addr_add_ex+0x200/0x7d0 [ 212.789362][ T6049] device bridge_slave_1 entered promiscuous mode [ 212.791415][ T6067] __hw_addr_add_ex+0x200/0x7d0 [ 212.791449][ T6067] dev_addr_init+0x13f/0x220 [ 212.806693][ T6067] ? dev_addr_flush+0x230/0x230 [ 212.811469][ T6067] ? __kasan_check_write+0x14/0x20 [ 212.816416][ T6067] ? mutex_lock+0xb6/0x1e0 [ 212.820665][ T6067] alloc_netdev_mqs+0x119/0xc90 [ 212.825351][ T6067] ? file_end_write+0x1c0/0x1c0 [ 212.830045][ T6067] ? ppp_ccp_closed+0x2c0/0x2c0 [ 212.834725][ T6067] ppp_ioctl+0x585/0x19a0 [ 212.838899][ T6067] ? __mutex_lock_slowpath+0x10/0x10 [ 212.844017][ T6067] ? ppp_poll+0x250/0x250 [ 212.848183][ T6067] ? __fget_files+0x31e/0x380 [ 212.852694][ T6067] ? security_file_ioctl+0x84/0xb0 [ 212.857648][ T6067] ? ppp_poll+0x250/0x250 [ 212.861804][ T6067] __se_sys_ioctl+0x114/0x190 [ 212.866321][ T6067] __x64_sys_ioctl+0x7b/0x90 [ 212.870744][ T6067] x64_sys_call+0x98/0x9a0 [ 212.874999][ T6067] do_syscall_64+0x3b/0xb0 [ 212.879252][ T6067] ? clear_bhb_loop+0x35/0x90 [ 212.883762][ T6067] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 212.889492][ T6067] RIP: 0033:0x7f24f48ec819 [ 212.893745][ T6067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.913188][ T6067] RSP: 002b:00007f24f2f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 212.921433][ T6067] RAX: ffffffffffffffda RBX: 00007f24f4aa3fa0 RCX: 00007f24f48ec819 [ 212.929250][ T6067] RDX: 0000000020000010 RSI: 00000000c004743e RDI: 0000000000000004 [ 212.937056][ T6067] RBP: 00007f24f2f65090 R08: 0000000000000000 R09: 0000000000000000 [ 212.944872][ T6067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.952672][ T6067] R13: 0000000000000000 R14: 00007f24f4aa3fa0 R15: 00007ffccf302178 [ 212.960507][ T6067] [ 213.341999][ T6075] device pim6reg1 entered promiscuous mode [ 213.524732][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.536408][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.582260][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.593223][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.601487][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.608367][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.680096][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.691179][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.699919][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.708439][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.715319][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.722668][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.732174][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.740563][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.748861][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.941643][ T6049] device veth0_vlan entered promiscuous mode [ 214.013236][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.021638][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.030221][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.038319][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.046364][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.053796][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.094297][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.102804][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.112114][ T6049] device veth1_macvtap entered promiscuous mode [ 214.183837][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.191675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.200897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.209488][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.217712][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.198812][ T4342] device bridge_slave_1 left promiscuous mode [ 215.204787][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.212472][ T4342] device bridge_slave_0 left promiscuous mode [ 215.218547][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.226848][ T4342] device veth1_macvtap left promiscuous mode [ 215.233008][ T4342] device veth0_vlan left promiscuous mode [ 215.549235][ T6119] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.566370][ T6119] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.574027][ T6119] device bridge_slave_0 entered promiscuous mode [ 215.581149][ T6119] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.588215][ T6119] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.595552][ T6119] device bridge_slave_1 entered promiscuous mode [ 215.786512][ T30] audit: type=1400 audit(1732123573.053:144): avc: denied { create } for pid=6131 comm="syz.3.2005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 216.100686][ T6119] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.107588][ T6119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.114735][ T6119] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.121607][ T6119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.263129][ T30] audit: type=1400 audit(1732123573.533:145): avc: denied { create } for pid=6135 comm="syz.3.2006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 216.365683][ T6141] device syzkaller0 entered promiscuous mode [ 216.459529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.500639][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.536535][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.587924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.601438][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.610353][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.617224][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.655924][ T6119] device veth0_vlan entered promiscuous mode [ 216.665126][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.682121][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.690447][ T4342] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.697315][ T4342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.704887][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.713267][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.721485][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.729854][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.768650][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.815220][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.845673][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.891911][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.936557][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.980354][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.040282][ T6119] device veth1_macvtap entered promiscuous mode [ 217.061300][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.081472][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.098355][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.178601][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.202946][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.231815][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.253220][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.988941][ T4342] device bridge_slave_1 left promiscuous mode [ 217.994986][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.002521][ T4342] device bridge_slave_0 left promiscuous mode [ 218.008560][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.016205][ T4342] device veth1_macvtap left promiscuous mode [ 218.022072][ T4342] device veth0_vlan left promiscuous mode [ 218.293389][ T6169] device syzkaller0 entered promiscuous mode [ 218.577444][ T6171] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.652433][ T6171] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.763759][ T6171] device bridge_slave_0 entered promiscuous mode [ 218.840504][ T6171] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.939840][ T6171] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.986708][ T6171] device bridge_slave_1 entered promiscuous mode [ 219.028415][ T6199] FAULT_INJECTION: forcing a failure. [ 219.028415][ T6199] name failslab, interval 1, probability 0, space 0, times 0 [ 219.044225][ T6199] CPU: 1 PID: 6199 Comm: syz.2.2027 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 219.053960][ T6199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 219.063845][ T6199] Call Trace: [ 219.066966][ T6199] [ 219.069749][ T6199] dump_stack_lvl+0x151/0x1c0 [ 219.074260][ T6199] ? io_uring_drop_tctx_refs+0x190/0x190 [ 219.079736][ T6199] dump_stack+0x15/0x20 [ 219.083718][ T6199] should_fail+0x3c6/0x510 [ 219.087976][ T6199] __should_failslab+0xa4/0xe0 [ 219.092572][ T6199] ? __alloc_skb+0xbe/0x550 [ 219.096915][ T6199] should_failslab+0x9/0x20 [ 219.101251][ T6199] slab_pre_alloc_hook+0x37/0xd0 [ 219.106032][ T6199] ? __alloc_skb+0xbe/0x550 [ 219.110370][ T6199] kmem_cache_alloc+0x44/0x200 [ 219.114974][ T6199] __alloc_skb+0xbe/0x550 [ 219.119136][ T6199] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 219.124252][ T6199] rtmsg_ifinfo+0x78/0x120 [ 219.128503][ T6199] dev_close_many+0x2a6/0x530 [ 219.133020][ T6199] ? __dev_open+0x4e0/0x4e0 [ 219.137355][ T6199] ? mutex_unlock+0xb2/0x260 [ 219.141782][ T6199] ? __kasan_check_read+0x11/0x20 [ 219.146640][ T6199] unregister_netdevice_many+0x492/0x17c0 [ 219.152199][ T6199] ? __kasan_check_write+0x14/0x20 [ 219.157143][ T6199] ? synchronize_rcu+0x120/0x120 [ 219.161925][ T6199] ? alloc_netdev_mqs+0xc90/0xc90 [ 219.166776][ T6199] ? locks_remove_file+0x41a/0x1180 [ 219.171820][ T6199] ? __kasan_check_read+0x11/0x20 [ 219.176670][ T6199] unregister_netdevice_queue+0x2e6/0x350 [ 219.182231][ T6199] ? linkwatch_urgent_event+0x335/0x4d0 [ 219.187609][ T6199] ? list_netdevice+0x4c0/0x4c0 [ 219.192297][ T6199] __tun_detach+0xd14/0x1510 [ 219.196719][ T6199] ? wait_for_completion_killable_timeout+0x10/0x10 [ 219.203148][ T6199] ? tun_chr_open+0x530/0x530 [ 219.207654][ T6199] tun_chr_close+0x92/0x140 [ 219.212001][ T6199] __fput+0x228/0x8c0 [ 219.215814][ T6199] ____fput+0x15/0x20 [ 219.219631][ T6199] task_work_run+0x129/0x190 [ 219.224059][ T6199] exit_to_user_mode_loop+0xc4/0xe0 [ 219.229090][ T6199] exit_to_user_mode_prepare+0x5a/0xa0 [ 219.234385][ T6199] syscall_exit_to_user_mode+0x26/0x160 [ 219.239767][ T6199] do_syscall_64+0x47/0xb0 [ 219.244020][ T6199] ? clear_bhb_loop+0x35/0x90 [ 219.248532][ T6199] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.254274][ T6199] RIP: 0033:0x7fcbf6597819 [ 219.258520][ T6199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.277953][ T6199] RSP: 002b:00007fcbf4c10038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 219.286203][ T6199] RAX: 0000000000000000 RBX: 00007fcbf674efa0 RCX: 00007fcbf6597819 [ 219.294118][ T6199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 219.301916][ T6199] RBP: 00007fcbf4c10090 R08: 0000000000000000 R09: 0000000000000000 [ 219.309730][ T6199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.317541][ T6199] R13: 0000000000000000 R14: 00007fcbf674efa0 R15: 00007fff25826768 [ 219.325358][ T6199] [ 219.788918][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.799526][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.883715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.894492][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.909939][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.916839][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.924538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.934139][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.942615][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.949527][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.958005][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.965951][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.007268][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.016631][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.051038][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.067376][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.118716][ T6171] device veth0_vlan entered promiscuous mode [ 220.127174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.150095][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.202716][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.218243][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.232042][ T6171] device veth1_macvtap entered promiscuous mode [ 220.280399][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.340733][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.410858][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.530798][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.539169][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.568517][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.576740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.788928][ T4342] device bridge_slave_1 left promiscuous mode [ 221.794888][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.802337][ T4342] device bridge_slave_0 left promiscuous mode [ 221.808403][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.816248][ T4342] device veth1_macvtap left promiscuous mode [ 221.822120][ T4342] device veth0_vlan left promiscuous mode [ 222.325500][ T6256] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.367663][ T6256] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.375862][ T6256] device bridge_slave_0 entered promiscuous mode [ 222.426886][ T6256] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.547889][ T6256] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.610122][ T6256] device bridge_slave_1 entered promiscuous mode [ 223.437880][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.445720][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.475594][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.537619][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.568772][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.575675][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.668272][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.698311][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.718479][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.725358][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.785115][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.917964][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.929723][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.953051][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.961269][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.969871][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 223.979041][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.043570][ T6256] device veth0_vlan entered promiscuous mode [ 224.056736][ T6256] device veth1_macvtap entered promiscuous mode [ 224.073719][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.083922][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.092304][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.100628][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.108852][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.116366][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.124742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.133066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.141253][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.149613][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.156960][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.389089][ T6320] syz.1.2064[6320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.389169][ T6320] syz.1.2064[6320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.028852][ T4342] device bridge_slave_1 left promiscuous mode [ 225.046023][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.053479][ T4342] device bridge_slave_0 left promiscuous mode [ 225.059460][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.067337][ T4342] device veth1_macvtap left promiscuous mode [ 225.073250][ T4342] device veth0_vlan left promiscuous mode [ 226.004032][ T6344] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.074556][ T6344] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.146616][ T6344] device bridge_slave_0 entered promiscuous mode [ 226.204792][ T6344] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.214228][ T6344] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.222038][ T6344] device bridge_slave_1 entered promiscuous mode [ 226.340840][ T30] audit: type=1400 audit(1732123583.613:146): avc: denied { create } for pid=6367 comm="syz.2.2078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 226.371354][ T6369] syz.4.2076[6369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.371426][ T6369] syz.4.2076[6369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.688910][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.812104][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.871364][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.970317][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.081736][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.088637][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.288029][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.296306][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.443041][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.450105][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.531525][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.556390][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.588434][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.647315][ T6344] device veth0_vlan entered promiscuous mode [ 227.664432][ T30] audit: type=1400 audit(1732123584.933:147): avc: denied { create } for pid=6398 comm="syz.1.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 227.700252][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.714927][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.725256][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 227.733261][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.741517][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.758336][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.772860][ T6344] device veth1_macvtap entered promiscuous mode [ 227.823908][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 227.832775][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.841562][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.846073][ T6411] syz.4.2092[6411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.852634][ T6411] syz.4.2092[6411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.899710][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.919178][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.949045][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.957335][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.303494][ T4342] device bridge_slave_1 left promiscuous mode [ 229.311087][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.359020][ T4342] device bridge_slave_0 left promiscuous mode [ 229.365002][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.415063][ T4342] device veth1_macvtap left promiscuous mode [ 229.446482][ T4342] device veth0_vlan left promiscuous mode [ 229.757863][ T6434] device sit0 entered promiscuous mode [ 230.105448][ T6433] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.130452][ T6433] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.143317][ T6433] device bridge_slave_0 entered promiscuous mode [ 230.226764][ T6433] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.245852][ T6433] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.289779][ T6433] device bridge_slave_1 entered promiscuous mode [ 230.802948][ T6433] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.809979][ T6433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.817078][ T6433] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.823861][ T6433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.003684][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.018845][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.318076][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.325876][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.408450][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.456514][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.465766][ T4342] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.472776][ T4342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.480386][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.488769][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.502223][ T4342] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.509161][ T4342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.587425][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.649167][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.709736][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.768317][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.849616][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.892952][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.965879][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.985255][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.994299][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.007309][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.017653][ T6433] device veth0_vlan entered promiscuous mode [ 232.087622][ T6433] device veth1_macvtap entered promiscuous mode [ 232.115926][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.158278][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.206910][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.257555][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.285322][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.351600][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.396391][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.589126][ T45] device bridge_slave_1 left promiscuous mode [ 233.595238][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.602731][ T45] device bridge_slave_0 left promiscuous mode [ 233.608926][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.616657][ T45] device veth1_macvtap left promiscuous mode [ 233.622509][ T45] device veth0_vlan left promiscuous mode [ 233.737446][ T6499] device sit0 left promiscuous mode [ 234.266218][ T6508] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.279256][ T6508] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.286817][ T6508] device bridge_slave_0 entered promiscuous mode [ 234.311547][ T6508] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.332777][ T6508] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.376959][ T6508] device bridge_slave_1 entered promiscuous mode [ 235.083324][ T6508] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.090497][ T6508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.097592][ T6508] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.104647][ T6508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.167809][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.205351][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.283322][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.344184][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.404721][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.436805][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.463936][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.470845][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.575101][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.583623][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.601499][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.608414][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.658406][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.758344][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.809842][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.840375][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.850635][ T6553] device veth0_vlan left promiscuous mode [ 235.872944][ T6553] device veth0_vlan entered promiscuous mode [ 235.945649][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.965414][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.976640][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 235.984678][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.993023][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.011991][ T6508] device veth0_vlan entered promiscuous mode [ 236.022503][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.034965][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.046601][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.054290][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.084595][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 236.092872][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.104601][ T6508] device veth1_macvtap entered promiscuous mode [ 236.121936][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.129586][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.137757][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.172287][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.192075][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.429966][ T45] device bridge_slave_1 left promiscuous mode [ 237.435928][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.443370][ T45] device bridge_slave_0 left promiscuous mode [ 237.449371][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.456923][ T45] device veth1_macvtap left promiscuous mode [ 237.462830][ T45] device veth0_vlan left promiscuous mode [ 238.554894][ T6588] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.583269][ T6588] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.591302][ T6588] device bridge_slave_0 entered promiscuous mode [ 238.598365][ T6588] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.606872][ T6588] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.614846][ T6588] device bridge_slave_1 entered promiscuous mode [ 238.859784][ T6611] device syzkaller0 entered promiscuous mode [ 239.048749][ T6616] device sit0 left promiscuous mode [ 239.335396][ T6588] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.342404][ T6588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.588244][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.759447][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.777322][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.905441][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.918359][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.991979][ T4342] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.998898][ T4342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.045228][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.078299][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.112324][ T4342] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.119327][ T4342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.235945][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.244447][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.255678][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.265052][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.390387][ T6588] device veth0_vlan entered promiscuous mode [ 240.398951][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.407727][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.416253][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.425119][ T6644] syz.3.2165[6644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.425202][ T6644] syz.3.2165[6644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.430871][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.528807][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.538425][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.551460][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.566886][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.613007][ T6588] device veth1_macvtap entered promiscuous mode [ 240.624854][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.664491][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.708768][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.777652][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.815535][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.348608][ T45] device bridge_slave_1 left promiscuous mode [ 242.354627][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.362119][ T45] device bridge_slave_0 left promiscuous mode [ 242.368139][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.376189][ T45] device veth1_macvtap left promiscuous mode [ 242.382073][ T45] device veth0_vlan left promiscuous mode [ 242.914275][ T6677] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.951976][ T6677] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.992112][ T6677] device bridge_slave_0 entered promiscuous mode [ 243.000279][ T6677] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.007293][ T6677] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.014745][ T6677] device bridge_slave_1 entered promiscuous mode [ 243.177252][ T6677] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.184178][ T6677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.191277][ T6677] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.198143][ T6677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.376788][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.384454][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.393200][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.410191][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.419412][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.436241][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.477502][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.542145][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.602959][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.648454][ T6677] device veth0_vlan entered promiscuous mode [ 243.706417][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.753666][ T6677] device veth1_macvtap entered promiscuous mode [ 243.840199][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.864355][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.942255][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.003309][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.008817][ T45] device bridge_slave_1 left promiscuous mode [ 245.014764][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.022482][ T45] device bridge_slave_0 left promiscuous mode [ 245.028574][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.036257][ T45] device veth1_macvtap left promiscuous mode [ 245.042156][ T45] device veth0_vlan left promiscuous mode [ 246.419806][ T6732] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.426675][ T6732] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.441839][ T6732] device bridge_slave_0 entered promiscuous mode [ 246.451547][ T6732] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.532747][ T6732] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.553603][ T6732] device bridge_slave_1 entered promiscuous mode [ 246.872233][ T6732] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.879124][ T6732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.886217][ T6732] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.893028][ T6732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.062697][ T6773] device veth0_vlan left promiscuous mode [ 247.075158][ T6773] device veth0_vlan entered promiscuous mode [ 247.178405][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.192178][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.224907][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.262891][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.299652][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 247.416892][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.427490][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.498612][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.513576][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.531046][ T4342] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.538015][ T4342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.552034][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.577351][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.586519][ T4342] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.593420][ T4342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.687731][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.713585][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.751229][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.818555][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.859196][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.889572][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.901977][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.909874][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.940815][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.962363][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.002512][ T6732] device veth0_vlan entered promiscuous mode [ 248.017650][ T6732] device veth1_macvtap entered promiscuous mode [ 248.019420][ T30] audit: type=1400 audit(1732123605.293:148): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.083319][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.092069][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.102284][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.110537][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.119641][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.128290][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.136472][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.018839][ T45] device bridge_slave_1 left promiscuous mode [ 250.068262][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.136204][ T45] device bridge_slave_0 left promiscuous mode [ 250.166454][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.196823][ T45] device veth1_macvtap left promiscuous mode [ 250.217033][ T45] device veth0_vlan left promiscuous mode [ 250.657114][ T6845] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.704989][ T6845] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.717143][ T6845] device bridge_slave_0 entered promiscuous mode [ 250.789287][ T6845] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.865126][ T6845] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.946968][ T6845] device bridge_slave_1 entered promiscuous mode [ 252.160533][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.179503][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.244822][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.254783][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.263005][ T4342] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.269889][ T4342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.277417][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.289466][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.297582][ T4342] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.304477][ T4342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.377088][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.430282][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.438257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.446051][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.455665][ T6897] device pim6reg1 entered promiscuous mode [ 252.527968][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.542360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.605417][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.614211][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.624983][ T6911] syz.1.2249[6911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.625058][ T6911] syz.1.2249[6911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.637920][ T6845] device veth0_vlan entered promiscuous mode [ 252.672832][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.698707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.798254][ T6912] device pim6reg1 entered promiscuous mode [ 252.844066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.853960][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.914115][ T6845] device veth1_macvtap entered promiscuous mode [ 252.961572][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.988533][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.029101][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.111306][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.132910][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.618630][ T4342] device bridge_slave_1 left promiscuous mode [ 254.624561][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.631965][ T4342] device bridge_slave_0 left promiscuous mode [ 254.637986][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.645899][ T4342] device veth1_macvtap left promiscuous mode [ 254.651765][ T4342] device veth0_vlan left promiscuous mode [ 255.415828][ T6945] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.466079][ T6945] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.510917][ T6945] device bridge_slave_0 entered promiscuous mode [ 255.538055][ T6945] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.544913][ T6945] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.586725][ T6945] device bridge_slave_1 entered promiscuous mode [ 256.250868][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.286615][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.382802][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.443488][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.496956][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.503948][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.572086][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.618395][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.654580][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.661499][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.708074][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.751936][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.799959][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.905966][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.923956][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.982104][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.031619][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.094477][ T6945] device veth0_vlan entered promiscuous mode [ 257.129139][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.140986][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.151041][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.158835][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.175557][ T6945] device veth1_macvtap entered promiscuous mode [ 257.233278][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.244494][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.268544][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.278419][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.286550][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.295279][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.303900][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.351890][ T6989] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 257.395515][ T6989] device syzkaller0 entered promiscuous mode [ 258.588561][ T4342] device bridge_slave_1 left promiscuous mode [ 258.594598][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.601960][ T4342] device bridge_slave_0 left promiscuous mode [ 258.608032][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.615958][ T4342] device veth1_macvtap left promiscuous mode [ 258.621862][ T4342] device veth0_vlan left promiscuous mode [ 259.358032][ T7020] FAULT_INJECTION: forcing a failure. [ 259.358032][ T7020] name failslab, interval 1, probability 0, space 0, times 0 [ 259.371247][ T7020] CPU: 0 PID: 7020 Comm: syz.4.2289 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 259.380976][ T7020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 259.390865][ T7020] Call Trace: [ 259.393991][ T7020] [ 259.396765][ T7020] dump_stack_lvl+0x151/0x1c0 [ 259.401284][ T7020] ? io_uring_drop_tctx_refs+0x190/0x190 [ 259.406755][ T7020] dump_stack+0x15/0x20 [ 259.410741][ T7020] should_fail+0x3c6/0x510 [ 259.414993][ T7020] __should_failslab+0xa4/0xe0 [ 259.419594][ T7020] should_failslab+0x9/0x20 [ 259.423933][ T7020] slab_pre_alloc_hook+0x37/0xd0 [ 259.428705][ T7020] ? tipc_msg_create+0x4c/0x530 [ 259.433393][ T7020] __kmalloc_track_caller+0x6c/0x260 [ 259.438506][ T7020] ? tipc_msg_create+0x4c/0x530 [ 259.443197][ T7020] ? tipc_msg_create+0x4c/0x530 [ 259.447884][ T7020] __alloc_skb+0x10c/0x550 [ 259.452136][ T7020] tipc_msg_create+0x4c/0x530 [ 259.456655][ T7020] tipc_sk_send_ack+0x119/0x630 [ 259.461430][ T7020] ? tsk_advance_rx_queue+0x10a/0x260 [ 259.466632][ T7020] tipc_recvmsg+0xc88/0x13b0 [ 259.471062][ T7020] ? tipc_send_packet+0xa0/0xa0 [ 259.475751][ T7020] ? security_socket_recvmsg+0x87/0xb0 [ 259.481037][ T7020] ? tipc_send_packet+0xa0/0xa0 [ 259.485728][ T7020] ____sys_recvmsg+0x286/0x530 [ 259.490327][ T7020] ? __sys_recvmsg_sock+0x50/0x50 [ 259.495185][ T7020] ? import_iovec+0xe5/0x120 [ 259.499612][ T7020] ___sys_recvmsg+0x1ec/0x690 [ 259.504126][ T7020] ? __sys_recvmsg+0x260/0x260 [ 259.508734][ T7020] ? __fdget+0x1bc/0x240 [ 259.512803][ T7020] __x64_sys_recvmsg+0x1dc/0x2b0 [ 259.517576][ T7020] ? ___sys_recvmsg+0x690/0x690 [ 259.522263][ T7020] ? switch_fpu_return+0x15f/0x2e0 [ 259.527209][ T7020] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 259.532681][ T7020] x64_sys_call+0x171/0x9a0 [ 259.537019][ T7020] do_syscall_64+0x3b/0xb0 [ 259.541272][ T7020] ? clear_bhb_loop+0x35/0x90 [ 259.545782][ T7020] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 259.551512][ T7020] RIP: 0033:0x7f24f48ec819 [ 259.555764][ T7020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.575207][ T7020] RSP: 002b:00007f24f2f65038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 259.583451][ T7020] RAX: ffffffffffffffda RBX: 00007f24f4aa3fa0 RCX: 00007f24f48ec819 [ 259.591360][ T7020] RDX: 0000000000000000 RSI: 0000000020001380 RDI: 0000000000000004 [ 259.599180][ T7020] RBP: 00007f24f2f65090 R08: 0000000000000000 R09: 0000000000000000 [ 259.607066][ T7020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.614872][ T7020] R13: 0000000000000000 R14: 00007f24f4aa3fa0 R15: 00007ffccf302178 [ 259.622692][ T7020] [ 259.721916][ T7026] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.728977][ T7026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.737263][ T7026] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.744843][ T7026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.764198][ T7026] device bridge0 entered promiscuous mode [ 259.801020][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.110057][ T7022] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.147108][ T7022] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.174697][ T7022] device bridge_slave_0 entered promiscuous mode [ 260.206177][ T7022] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.213085][ T7022] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.220450][ T7022] device bridge_slave_1 entered promiscuous mode [ 260.631761][ T7022] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.638656][ T7022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.645745][ T7022] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.652563][ T7022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.716920][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.754286][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.818607][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.911112][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.978306][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.060490][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.067361][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.174918][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.191197][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.199433][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.206283][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.233511][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.241914][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.258737][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.283578][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.326056][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.365187][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.374162][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.382844][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.393189][ T7022] device veth0_vlan entered promiscuous mode [ 261.442461][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.452003][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.486525][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.516784][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.536697][ T7022] device veth1_macvtap entered promiscuous mode [ 261.562351][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.570408][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.579256][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.599547][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.617452][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.509047][ T45] device bridge_slave_1 left promiscuous mode [ 263.515097][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.522540][ T45] device bridge_slave_0 left promiscuous mode [ 263.528559][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.536385][ T45] device veth1_macvtap left promiscuous mode [ 263.542472][ T45] device veth0_vlan left promiscuous mode [ 264.083889][ T7118] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.099970][ T7118] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.107364][ T7118] device bridge_slave_0 entered promiscuous mode [ 264.123021][ T7118] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.167279][ T7118] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.231457][ T7118] device bridge_slave_1 entered promiscuous mode [ 264.814588][ T7118] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.821502][ T7118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.828603][ T7118] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.835491][ T7118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.063948][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.075033][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.095882][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.103582][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.157931][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.173301][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.181267][ T30] audit: type=1400 audit(1732123622.443:149): avc: denied { ioctl } for pid=7159 comm="syz.4.2336" path="socket:[46954]" dev="sockfs" ino=46954 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 265.213691][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.220593][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.230738][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.239303][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.247389][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.254284][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.261887][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.280745][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.335896][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.344550][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.363150][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.371756][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.382130][ T7118] device veth0_vlan entered promiscuous mode [ 265.388396][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.396392][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.419752][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.427052][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.470952][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.484263][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.519938][ T7118] device veth1_macvtap entered promiscuous mode [ 265.570201][ T7162] device sit0 left promiscuous mode [ 265.775768][ T7177] device sit0 entered promiscuous mode [ 265.998143][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.009202][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.018260][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.026874][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.037459][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.168864][ T45] device bridge_slave_1 left promiscuous mode [ 267.174809][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.182205][ T45] device bridge_slave_0 left promiscuous mode [ 267.188211][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.196067][ T45] device veth1_macvtap left promiscuous mode [ 267.201942][ T45] device veth0_vlan left promiscuous mode [ 268.306078][ T7217] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.352692][ T7217] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.393034][ T7217] device bridge_slave_0 entered promiscuous mode [ 268.420919][ T7217] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.431974][ T7217] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.444490][ T7217] device bridge_slave_1 entered promiscuous mode [ 269.378417][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.406909][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.512742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.577572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.585716][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.592588][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.601939][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.610323][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.620312][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.627186][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.645584][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.661935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.746985][ T7264] syz.4.2366[7264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.747073][ T7264] syz.4.2366[7264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.799358][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.818627][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.833575][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.841942][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.942008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.952519][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.024764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.036334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.078459][ T7217] device veth0_vlan entered promiscuous mode [ 270.265756][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.282130][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.302457][ T7217] device veth1_macvtap entered promiscuous mode [ 270.329960][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.337743][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.346149][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.402102][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.417263][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.678388][ T7283] FAULT_INJECTION: forcing a failure. [ 270.678388][ T7283] name failslab, interval 1, probability 0, space 0, times 0 [ 270.690906][ T7283] CPU: 1 PID: 7283 Comm: syz.1.2372 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 270.700629][ T7283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 270.710519][ T7283] Call Trace: [ 270.713641][ T7283] [ 270.716506][ T7283] dump_stack_lvl+0x151/0x1c0 [ 270.721023][ T7283] ? io_uring_drop_tctx_refs+0x190/0x190 [ 270.726489][ T7283] ? perf_swevent_hrtimer+0x4b8/0x560 [ 270.731701][ T7283] dump_stack+0x15/0x20 [ 270.735688][ T7283] should_fail+0x3c6/0x510 [ 270.739942][ T7283] __should_failslab+0xa4/0xe0 [ 270.744542][ T7283] ? __sigqueue_alloc+0x130/0x200 [ 270.749401][ T7283] should_failslab+0x9/0x20 [ 270.753746][ T7283] slab_pre_alloc_hook+0x37/0xd0 [ 270.758521][ T7283] ? __sigqueue_alloc+0x130/0x200 [ 270.763374][ T7283] kmem_cache_alloc+0x44/0x200 [ 270.767979][ T7283] __sigqueue_alloc+0x130/0x200 [ 270.772666][ T7283] __send_signal+0x1fd/0xcb0 [ 270.777094][ T7283] send_signal+0x43a/0x590 [ 270.781346][ T7283] force_sig_info_to_task+0x2fe/0x440 [ 270.786551][ T7283] force_sig+0x114/0x1d0 [ 270.790633][ T7283] ? send_sig+0x60/0x60 [ 270.794625][ T7283] ? hrtimer_interrupt+0x867/0xaa0 [ 270.799579][ T7283] exc_general_protection+0x11d/0x4b0 [ 270.804776][ T7283] ? kvm_sched_clock_read+0x18/0x40 [ 270.809894][ T7283] ? sched_clock+0x9/0x10 [ 270.814060][ T7283] ? sched_clock_cpu+0x18/0x3b0 [ 270.818754][ T7283] ? irqentry_exit_to_user_mode+0xe/0x10 [ 270.824216][ T7283] ? irqentry_exit+0x12/0x40 [ 270.828643][ T7283] asm_exc_general_protection+0x27/0x30 [ 270.834023][ T7283] RIP: 0033:0x7fb0fcb780b9 [ 270.838275][ T7283] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 270.857718][ T7283] RSP: 002b:00007fb0fb2177c8 EFLAGS: 00010283 [ 270.863619][ T7283] RAX: 0000000000000999 RBX: 00007fb0fb217d30 RCX: 00007fb0fcd1e160 [ 270.871433][ T7283] RDX: 9999999999999999 RSI: 00007fb0fcc1251c RDI: 9999999999999999 [ 270.879241][ T7283] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 270.887051][ T7283] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 270.894868][ T7283] R13: 00007fb0fb217eb0 R14: 9999999999999999 R15: 0000000000000000 [ 270.902684][ T7283] Connection to 10.128.0.118 closed by remote host. [ 272.887211][ T320] device bridge_slave_1 left promiscuous mode [ 272.893242][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.901053][ T320] device bridge_slave_0 left promiscuous mode [ 272.907008][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.915290][ T320] device bridge_slave_1 left promiscuous mode [ 272.921407][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.930448][ T320] device bridge_slave_0 left promiscuous mode [ 272.936443][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.944706][ T320] device veth1_macvtap left promiscuous mode [ 272.950834][ T320] device veth1_macvtap left promiscuous mode [ 272.956654][ T320] device veth0_vlan left promiscuous mode [ 273.424492][ T288] syz-executor (288) used greatest stack depth: 19840 bytes left [ 274.949327][ T320] device bridge_slave_1 left promiscuous mode [ 274.955270][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.962647][ T320] device bridge_slave_0 left promiscuous mode [ 274.968697][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.977104][ T320] device bridge_slave_1 left promiscuous mode [ 274.983232][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.990772][ T320] device bridge_slave_0 left promiscuous mode [ 274.996716][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.004888][ T320] device bridge_slave_1 left promiscuous mode [ 275.010940][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.018413][ T320] device bridge_slave_0 left promiscuous mode [ 275.024344][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.032766][ T320] device veth1_macvtap left promiscuous mode [ 275.039032][ T320] device veth1_macvtap left promiscuous mode [ 275.045206][ T320] device veth1_macvtap left promiscuous mode [ 275.051123][ T320] device veth0_vlan left promiscuous mode