last executing test programs: 5.743258668s ago: executing program 2 (id=2987): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62005000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc2a00e9bfde908990817b364e51afe9c8dab05b16a6437211f9f0570759f1cae63487ff68fffffffffffe8e3932e2b75a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba7541189070000f50c000000d8e5b1dc91c5499be2097784a94b6cc2d272ac751d8bce5db4862c1b2eab7007ceea158dbc329bab5f8450147b2b9629fdd6cdb5507d3a76dbaf6f93d161caa513f8aa41f795507856ea0015166c56ea0103220ed5a66834be086ef206a8606b04fc8462cbbe8233f381b4eefbdbdac708c1f4959cb6c008397006da8e243ec9fb19f3fab2b0f46d73a9f2d7c674cdbe4d7f76f5fbd05043e81f435fccf5063a93aa9b4c7f68670594"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000, 0x0, 0xe00}, 0x28) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="0000ffffffffa000903626e43925", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.994804032s ago: executing program 1 (id=3002): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000026000000850000002a00000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000640)="d9b9547ed3c0021a6fd6a67ab922", 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000700000000000009209500000000000000f7315374ce569ec55869bfbcfa7c4e8f52e6288f2fbc43a3af3c6b881320c24423492f2fc14c9de730f42434dfa11c77edc1f06776d8"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003\x00\x00\x00'], 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x3, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="1b6f520fc7f2405b680bc62b51a7a95c36949376775f5eebcf5ca4d342e566ced087e2626a90c94991a07249658a4e3760cdb2a596351d5e88e1016dad8a7d84bf037bb0df"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r6, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000bc0), 0x0, 0x8e, &(0x7f0000000bc0)=[{}, {}, {}, {}, {}], 0xf, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xbf, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000880)={0x9}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1d000000050000ff0900000001040800040200000a7efeeab7ab1db09f519d77f039e904a7ab19642991a81e263b9f52fc31d56d1a5571a4839c81bed91dbce04b02b5bd97ee0af301000000dc6dac917c468d725d0ca21224", @ANYRES32=r3, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000040000000500"/28], 0x50) 2.847811164s ago: executing program 1 (id=3004): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="19000000040000000400000005000000000000996e36d09401eac8e5ae6689574cb92ff4968722efa8e7c6a1f58a41d62a945e80174a689cbd723ed5c020d5e543bedc2dc145c33e139d6239e5d747ff7afd3959f2f3773239b1e4551d84520b9cfa72c54e84b2df404fb3662de901d145f0122468cc75d19a3917f221a8716e4044fbba78ba0242d8e0fc6b760351cc448cb0636564c06714183192fb89192c55a6cca96ee12210bc168506ee806897dfcd98889bedb0f0bfdc3b80074a1a26ce6fb7d3f8f00b7ed43fc2260a1febabee5384c976fb1abf6c10abe2552888", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x47, 0x1, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8e9, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x2d, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES64=r2], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) syz_clone(0x2000000, &(0x7f0000000b40)="15c94db915f99fa6b0f04f223a5bcf5a231505", 0x13, &(0x7f0000000b80), &(0x7f0000000c00), &(0x7f0000000c40)="98bdd859245d43ae077c0d3eb9f3cf0067cc084dfb6406de5b03012dd252ca27d8fe364dbaf597c7dabbce39b989") bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) sendmsg$inet(r6, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{}, 0x0, &(0x7f0000000a80)=r10}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1}, 0x48) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r11}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x14, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r13}, 0x10) 2.845896294s ago: executing program 2 (id=3005): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) perf_event_open(0x0, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100), 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x11, 0x4, 0x4, 0x5}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9f950400008b4a2bc91e85d25f6f1128530000000000000034000008340000000c0000000400000002000084fdf7ffff0a00000002000000000000000500000002000000040000000000000000000001050000001c000000006100302e615d5f61006100"], 0x0, 0x58}, 0x28) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x13, &(0x7f0000000200)=@raw=[@alu={0x4, 0x1, 0x2, 0x1, 0x3, 0x2, 0x10}, @exit, @generic={0x4, 0xc, 0x6, 0x2bf0, 0x4}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x3}, @alu={0x7, 0x0, 0x3, 0x3, 0x2, 0xc, 0xfffffffffffffffc}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @generic={0x5, 0xd, 0x1, 0x4c7f, 0x5}], &(0x7f0000000100)='GPL\x00', 0x7, 0x92, &(0x7f00000003c0)=""/146, 0x41000, 0x1, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000340)={0x4, 0x7}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x4, 0x1, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000004c0), &(0x7f0000000540)=[{0x4, 0x4, 0x2, 0xb}, {0x2, 0x3, 0xa, 0x4}, {0x0, 0x3, 0x5, 0x9}, {0x0, 0x1, 0x3b8, 0x6}, {0x0, 0x1, 0x10, 0x2}], 0x10, 0xfffffffc}, 0x94) 2.02508937s ago: executing program 0 (id=3007): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x9, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x3, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240), 0xb}, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe50}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="2d706964202d6d650af53126b428b79e6b202b637075202b6672a1fa42dd4a0e7737e476000006795000000000ed975f636c73202d626c6b696f202b68756765746c62d6a200"], 0x43) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000091c59abbcf17f37508b605ce4ae48288e7f8cef98f38b43d699ca2fbd0aa8279bc80ffbfecb1ef8127fe9c16c481fb34a2f2d400711dc89ede317172c5473b4f15a1251759f792db25cfe590e4ae110d2fad7bfa973591cd14d23f4e98f2234d3929d9a152e7ba22e9b5dc7cb8d2f90eba56fd708f5c5e0572f19a5"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="c55404000000f310000000000000000018150000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r8}, 0x38) 1.866623313s ago: executing program 0 (id=3008): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f00000002c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_type(r4, 0x0, 0x2, 0x0) write$cgroup_type(r5, 0x0, 0x0) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz1\x00', 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0), 0xfffffffffffffeea) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000440)='rxrpc_recvmsg\x00', r3, 0x0, 0x102}, 0x18) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000500)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x1, 0x2}}, 0x10, 0x0}, 0x4000001) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="06000000040000000600000000060000000000", @ANYRES32], 0x48) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_team\x00', 0x2000}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40d00, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x28, 0x80000, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r9, &(0x7f0000000100)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd6372ce22667f2b00dbf6e97158cf474fec87891f6d76745b686158bbcfe8875afdef00010000000029"], 0x66) 1.866111463s ago: executing program 1 (id=3009): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000c00)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)='5', 0x1}], 0x1}, 0x4040005) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.761081145s ago: executing program 2 (id=3010): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{r0}, &(0x7f0000000640), &(0x7f00000007c0)='%+9llu \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1b42, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2d84c184ffffb9"], 0xffdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r4}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0xb) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) gettid() syz_clone(0xc2002011, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) 1.585062549s ago: executing program 0 (id=3011): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xe115, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0x7, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.408470262s ago: executing program 1 (id=3012): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800"/20, @ANYRES32, @ANYBLOB='\x00'/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000082000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x88b5}, 0x10100, 0x0, 0x0, 0x2, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xafffffff00000002, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r2) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc7, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x76, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e000000040000008166426a0d00000020020000", @ANYRES32=0x1, @ANYBLOB="8100"/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="0300000002000100010000000700"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000b40)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYBLOB='&\x00\x00\x00\x00\x00\x00'], 0x10) (async) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x1, 0x0, 0x103, 0x10020, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb2f8, 0x6}, 0x100002, 0x9, 0xfffffffc, 0x8, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x18) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r9, 0x40047451, &(0x7f0000000180)) (async) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r11}, 0x10) 1.407859472s ago: executing program 4 (id=2974): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) (async) 1.323210624s ago: executing program 2 (id=3013): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) close(0xffffffffffffffff) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000005c0), &(0x7f00000008c0)='%-010d \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5], 0x18}, 0x8810) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41000, 0x46, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdffffffc}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r11}, 0x10) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) 1.322673534s ago: executing program 3 (id=2939): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20102, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2867}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.246696885s ago: executing program 0 (id=3014): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x10}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4, [{0x0, 0x2}]}]}}, 0x0, 0x4a}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000007f5531ef7803cc7eec12b93e08e4d13d4b33c5241552c747204bb8d308c778a27ab0ac980a82f5e79f3b4bb687ff6969a47f8e0b92148617c8c6a5070b8be77333d58a1d1f2a3721aaadb4c5593b89fdcbb3fcd0dfa97acd8320dcc0c16764db97764773d0d7adc39b0a75288f23f29fcf49091cd4780f23a4b6a43549bddb82fedc53ad9dc37e148bc1449c7a48bfb0b75fe9e53c7d085c06352c28"], 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x9536}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x12104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0xc8, 0x8, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x4) recvmsg$unix(r6, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 1.244891706s ago: executing program 4 (id=2974): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) (async) 1.144899628s ago: executing program 1 (id=3015): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000e40)=ANY=[@ANYRESOCT=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=@base={0x2, 0x4, 0x7f, 0x8, 0x0, 0x1}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0d00000023000000040000000200000040000000", @ANYRES32=r6], 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(0x3) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000003000000850000007b000000951b000000000000"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYRES8=r8, @ANYRES32=r8, @ANYRESHEX=r4], &(0x7f0000000240)='GPL\x00', 0xeb25, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r9}, 0x10) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r7, &(0x7f0000000680), 0x0}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)=@nfc, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000540)=""/160, 0xa0}, {&(0x7f0000000880)=""/143, 0x8f}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000940)=""/177, 0xb1}, {&(0x7f0000000600)=""/109, 0x6d}, {&(0x7f0000000b00)=""/109, 0x6d}, {&(0x7f0000000740)=""/59, 0x3b}, {&(0x7f0000000b80)=""/249, 0xf9}, {&(0x7f0000000c80)=""/240, 0xf0}], 0x9}, 0x2000) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f0000000340)="093ca70d1afdec598b1fda19f8f5ef7352ab3164e3549f4d8a00541b4f3c8d90bf2b08df2067afd9db097111302d0ee9e0ab22a5ef26869b13dfc7f92ebd39b42d7b5a8b7bb322c7ff34f9d1afee23e0678bbbe57b57496dcb61ac751bd2c765ec4d153c0a683bcb28206f50ad46cbed4255043369a721396375bc5f1a7c8c1b84ce3f6d3d0a7e031c799f205f07624d48e9b6050cf63a5435807aa297c775faeef6e7a2b1fd718c2f63a6e12232f539c8028504fb3cc0fe8b3aee824c0f92901faca3", &(0x7f0000000200)=""/90, 0x4}, 0x20) (async) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.142708507s ago: executing program 3 (id=2939): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20102, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2867}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 988.52105ms ago: executing program 2 (id=3016): close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="00000000000000001ddbab00cbfc4e6a5c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="00000000000000001ddbab00cbfc4e6a5c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYRES64=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r3, 0x0, 0x1ba8847c99}, 0x38) 984.08429ms ago: executing program 4 (id=2974): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) (async) 804.652454ms ago: executing program 3 (id=2939): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20102, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2867}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 639.958617ms ago: executing program 4 (id=2974): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) (async) 568.100898ms ago: executing program 0 (id=3017): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r1], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11c03a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200"], 0x0, 0x7ff}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x94) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) 555.794429ms ago: executing program 3 (id=2939): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20102, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2867}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 446.041091ms ago: executing program 1 (id=3018): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000c00)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)='5', 0x1}], 0x1}, 0x4040005) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 444.968621ms ago: executing program 4 (id=2974): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) (async) 301.541924ms ago: executing program 2 (id=3019): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000028c0), 0x20a40, 0x0) close(r5) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 298.456364ms ago: executing program 3 (id=2939): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20102, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2867}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 144.637567ms ago: executing program 0 (id=3020): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x9, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x3, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240), 0xb}, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb261a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4d8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c952197b0a508c0e16fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe50}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="2d706964202d6d650af53126b428b79e6b202b637075202b6672a1fa42dd4a0e7737e476000006795000000000ed975f636c73202d626c6b696f202b68756765746c62d6a200"], 0x43) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000091c59abbcf17f37508b605ce4ae48288e7f8cef98f38b43d699ca2fbd0aa8279bc80ffbfecb1ef8127fe9c16c481fb34a2f2d400711dc89ede317172c5473b4f15a1251759f792db25cfe590e4ae110d2fad7bfa973591cd14d23f4e98f2234d3929d9a152e7ba22e9b5dc7cb8d2f90eba56fd708f5c5e0572f19a5"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="c55404000000f310000000000000000018150000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r8}, 0x38) 143.486507ms ago: executing program 4 (id=2974): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000008c0), 0xeb3, r0}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x5, 0x40010, r0, 0x86d0, '\x00', r1, r6, 0x2, 0x5, 0x5, 0xf}, 0x50) (async) 0s ago: executing program 3 (id=2939): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20102, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2867}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): (bridge_slave_1) entered forwarding state [ 23.508789][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.515832][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.563245][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.570407][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.577695][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.584722][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.607576][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.614646][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.621963][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.629017][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.638795][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.645874][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.653130][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.660180][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.683473][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.691848][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.699236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.707088][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.714273][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.722116][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.729382][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.736581][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.743742][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.750960][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.758144][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.767346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.774771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.799971][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.808892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.817103][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.824133][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.831568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.839741][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.846780][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.854069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.862212][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.869241][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.876576][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.884677][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.891709][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.899205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.907179][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.920189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.939238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.947555][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.954608][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.962360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.970641][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.977702][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.985071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.993044][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.011359][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.019725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.028047][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.035092][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.042583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.051095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.059332][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.066383][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.092578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.101051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.109229][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.117360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.125338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.133443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.141595][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.149652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.157892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.165956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.174195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.183086][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.191489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.199885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.217616][ T282] device veth0_vlan entered promiscuous mode [ 24.229562][ T284] device veth0_vlan entered promiscuous mode [ 24.236880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.244880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.252295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.260529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.267992][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.275321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.283732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.291970][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.299001][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.306638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.314916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.323334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.331711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.339989][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.347029][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.354397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.362458][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.370549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.378486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.386652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.394063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.401585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.409227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.417933][ T283] device veth0_vlan entered promiscuous mode [ 24.426857][ T281] device veth0_vlan entered promiscuous mode [ 24.441477][ T284] device veth1_macvtap entered promiscuous mode [ 24.449104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.457613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.465553][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.473660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.482305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.490245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.498341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.506338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.513735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.528409][ T282] device veth1_macvtap entered promiscuous mode [ 24.542577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.550929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.559293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.567589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.575930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.584174][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.592620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.600899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.609385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.618977][ T283] device veth1_macvtap entered promiscuous mode [ 24.626642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.634282][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.642489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.659770][ T281] device veth1_macvtap entered promiscuous mode [ 24.667126][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 24.672028][ T285] device veth0_vlan entered promiscuous mode [ 24.682996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.691198][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.698679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.706243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.713805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.722149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.752393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.770249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.779862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.788326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.797151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.805665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.814249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.822802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.842304][ T285] device veth1_macvtap entered promiscuous mode [ 24.863141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.875186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.884473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.935387][ C0] hrtimer: interrupt took 23218 ns [ 24.936853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.949361][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.958605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.968719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.649983][ T371] device syzkaller0 entered promiscuous mode [ 31.182774][ T499] Â: renamed from pim6reg1 [ 31.809448][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 31.809463][ T30] audit: type=1400 audit(1758761934.083:117): avc: denied { create } for pid=522 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 31.934322][ T524] device wg2 entered promiscuous mode [ 31.974959][ T30] audit: type=1400 audit(1758761934.243:118): avc: denied { read } for pid=521 comm="syz.1.57" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.025714][ T30] audit: type=1400 audit(1758761934.243:119): avc: denied { append } for pid=528 comm="syz.4.59" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.060294][ T30] audit: type=1400 audit(1758761934.243:120): avc: denied { open } for pid=528 comm="syz.4.59" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.167971][ T30] audit: type=1400 audit(1758761934.283:121): avc: denied { ioctl } for pid=521 comm="syz.1.57" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.527724][ T548] device syzkaller0 entered promiscuous mode [ 32.675905][ T558] device pim6reg1 entered promiscuous mode [ 32.698395][ T566] device pimreg0 entered promiscuous mode [ 33.995616][ T614] device pimreg0 entered promiscuous mode [ 34.602617][ T636] device pim6reg1 entered promiscuous mode [ 35.195064][ T664] device pimreg0 entered promiscuous mode [ 35.200872][ T30] audit: type=1400 audit(1758761937.473:122): avc: denied { create } for pid=658 comm="syz.3.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 35.627741][ T693] device veth0_vlan left promiscuous mode [ 35.652055][ T693] device veth0_vlan entered promiscuous mode [ 35.743901][ T30] audit: type=1400 audit(1758761938.013:123): avc: denied { create } for pid=683 comm="syz.2.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 36.052878][ T30] audit: type=1400 audit(1758761938.323:124): avc: denied { create } for pid=708 comm="syz.4.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 37.669404][ T30] audit: type=1400 audit(1758761939.943:125): avc: denied { tracepoint } for pid=769 comm="syz.3.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.167988][ T30] audit: type=1400 audit(1758761940.443:126): avc: denied { write } for pid=815 comm="syz.3.146" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.310876][ T30] audit: type=1400 audit(1758761940.583:127): avc: denied { setattr } for pid=820 comm="syz.1.147" path="pipe:[14834]" dev="pipefs" ino=14834 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 38.336014][ T821] device veth0_vlan left promiscuous mode [ 38.359477][ T821] device veth0_vlan entered promiscuous mode [ 38.375818][ T30] audit: type=1400 audit(1758761940.643:128): avc: denied { create } for pid=825 comm="syz.4.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 38.648870][ T839] device sit0 entered promiscuous mode [ 39.193772][ T882] ref_ctr_offset mismatch. inode: 0xda offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 39.407132][ T886] GPL: port 1(erspan0) entered blocking state [ 39.414241][ T886] GPL: port 1(erspan0) entered disabled state [ 39.428645][ T886] device erspan0 entered promiscuous mode [ 39.744515][ T888] GPL: port 1(erspan0) entered blocking state [ 39.750689][ T888] GPL: port 1(erspan0) entered forwarding state [ 40.659061][ T893] device sit0 entered promiscuous mode [ 41.918557][ T969] bond_slave_1: mtu less than device minimum [ 42.176007][ T969] device syzkaller0 entered promiscuous mode [ 43.897759][ T30] audit: type=1400 audit(1758761946.173:129): avc: denied { create } for pid=1010 comm="syz.3.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 44.316926][ T1026] device syzkaller0 entered promiscuous mode [ 44.367803][ T1029] device pim6reg1 entered promiscuous mode [ 45.006965][ T30] audit: type=1400 audit(1758761947.283:130): avc: denied { create } for pid=1068 comm="syz.4.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 45.087053][ T1072] device sit0 left promiscuous mode [ 45.116181][ T1072] device sit0 entered promiscuous mode [ 45.181415][ T1078] device syzkaller0 entered promiscuous mode [ 45.200781][ T1086] device wg2 entered promiscuous mode [ 45.450252][ T1081] device veth0_vlan left promiscuous mode [ 45.510790][ T1081] device veth0_vlan entered promiscuous mode [ 45.526591][ T1081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.542523][ T1091] device veth0_vlan left promiscuous mode [ 45.561839][ T1091] device veth0_vlan entered promiscuous mode [ 45.650965][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.706949][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.748065][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.778589][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.799159][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.818861][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.839368][ T1096] ip6_vti0: mtu greater than device maximum [ 45.971609][ T1107] device pim6reg1 entered promiscuous mode [ 46.031436][ T30] audit: type=1400 audit(1758761948.303:131): avc: denied { ioctl } for pid=1122 comm="syz.2.243" path="cgroup:[4026532554]" dev="nsfs" ino=4026532554 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.237918][ T1125] device syzkaller0 entered promiscuous mode [ 46.681537][ T1153] syz.1.251[1153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.681644][ T1153] syz.1.251[1153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.850708][ T1155] device syzkaller0 entered promiscuous mode [ 47.054718][ T30] audit: type=1400 audit(1758761949.323:132): avc: denied { create } for pid=1169 comm="syz.3.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 47.158289][ T1167] device pim6reg1 entered promiscuous mode [ 48.189142][ T1225] device syzkaller0 entered promiscuous mode [ 48.729388][ T1241] device sit0 entered promiscuous mode [ 48.821377][ T30] audit: type=1400 audit(1758761951.093:133): avc: denied { ioctl } for pid=1249 comm="syz.4.279" path="socket:[18339]" dev="sockfs" ino=18339 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.056103][ T1255] device syzkaller0 entered promiscuous mode [ 49.114609][ T101] udevd[101]: worker [332] terminated by signal 33 (Unknown signal 33) [ 49.169599][ T101] udevd[101]: worker [332] failed while handling '/devices/virtual/block/loop1' [ 49.470374][ T1280] device syzkaller0 entered promiscuous mode [ 50.200425][ T1319] device syzkaller0 entered promiscuous mode [ 50.331301][ T1336] device veth0_vlan left promiscuous mode [ 50.339311][ T1336] device veth0_vlan entered promiscuous mode [ 50.435113][ T1348] device syzkaller0 entered promiscuous mode [ 50.735342][ T30] audit: type=1400 audit(1758761953.003:134): avc: denied { create } for pid=1356 comm="syz.3.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 50.936368][ T1373] syz.3.313 uses obsolete (PF_INET,SOCK_PACKET) [ 51.048091][ T30] audit: type=1400 audit(1758761953.323:135): avc: denied { create } for pid=1385 comm="syz.0.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 51.084152][ T1386] device veth0_vlan left promiscuous mode [ 51.115853][ T1386] device veth0_vlan entered promiscuous mode [ 51.244922][ T1391] device syzkaller0 entered promiscuous mode [ 51.300742][ T1407] device syzkaller0 entered promiscuous mode [ 53.052805][ T1461] device syzkaller0 entered promiscuous mode [ 53.671281][ T30] audit: type=1400 audit(1758761955.943:136): avc: denied { create } for pid=1499 comm="syz.3.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 54.771494][ T1523] device syzkaller0 entered promiscuous mode [ 55.470732][ T1547] device syzkaller0 entered promiscuous mode [ 55.796119][ T1571] syz.3.373 (1571) used obsolete PPPIOCDETACH ioctl [ 56.503211][ T1609] device sit0 entered promiscuous mode [ 56.529036][ T1607] device syzkaller0 entered promiscuous mode [ 57.162641][ T1650] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 57.198014][ T1650] syzkaller0: persist disabled [ 57.469480][ T1669] ip6_vti0: mtu greater than device maximum [ 57.883865][ T1689] device syzkaller0 entered promiscuous mode [ 58.210693][ T1697] device sit0 left promiscuous mode [ 58.255231][ T1698] device sit0 entered promiscuous mode [ 58.738886][ T1721] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.748501][ T1721] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.894860][ T1741] device syzkaller0 entered promiscuous mode [ 58.919131][ T1745] device pim6reg1 entered promiscuous mode [ 59.867526][ T1786] device syzkaller0 entered promiscuous mode [ 61.735361][ C1] sched: RT throttling activated [ 63.129653][ T1825] device syzkaller0 entered promiscuous mode [ 63.550532][ T1903] device syzkaller0 entered promiscuous mode [ 65.017559][ T1957] device syzkaller0 entered promiscuous mode [ 65.204940][ T1970] device sit0 left promiscuous mode [ 65.416292][ T1984] ------------[ cut here ]------------ [ 65.421963][ T1984] trace type BPF program uses run-time allocation [ 65.428495][ T1984] WARNING: CPU: 1 PID: 1984 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 65.439392][ T1984] Modules linked in: [ 65.443315][ T1984] CPU: 1 PID: 1984 Comm: syz.1.503 Not tainted syzkaller #0 [ 65.450865][ T1984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 65.461555][ T1984] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 65.468636][ T1984] Code: ee ff 48 c7 c6 60 ed 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 c6 4c ee ff c6 05 14 93 6b 05 01 48 c7 c7 c0 e9 47 85 e8 33 2b 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 65.495186][ T1984] RSP: 0018:ffffc90000cb7428 EFLAGS: 00010246 [ 65.501552][ T1984] RAX: 08d5d32fcafbb500 RBX: 0000000000000001 RCX: 0000000000080000 [ 65.517713][ T1984] RDX: ffffc9000135b000 RSI: 0000000000002e20 RDI: 0000000000002e21 [ 65.529187][ T1984] RBP: ffffc90000cb7470 R08: dffffc0000000000 R09: fffff52000196dd1 [ 65.540564][ T1984] R10: fffff52000196dd1 R11: 1ffff92000196dd0 R12: ffff88811f8d4000 [ 65.548866][ T1984] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810ae1e800 [ 65.557489][ T1984] FS: 00007fa53cc1c6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 65.583042][ T1984] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.602561][ T1984] CR2: 0000000000000000 CR3: 000000010aa09000 CR4: 00000000003506b0 [ 65.610808][ T1984] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.618896][ T1984] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 65.627643][ T1984] Call Trace: [ 65.630981][ T1984] [ 65.633926][ T1984] resolve_pseudo_ldimm64+0x685/0x11d0 [ 65.668370][ T1984] ? check_attach_btf_id+0xde0/0xde0 [ 65.673715][ T1984] ? __mark_reg_known+0x1b0/0x1b0 [ 65.679199][ T1984] ? security_capable+0x87/0xb0 [ 65.684135][ T1984] bpf_check+0x2c25/0xf280 [ 65.693459][ T1984] ? 0xffffffffa0002000 [ 65.699380][ T30] audit: type=1400 audit(1758761967.973:137): avc: denied { create } for pid=1999 comm="syz.2.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 65.731696][ T1984] ? is_bpf_text_address+0x177/0x190 [ 65.743229][ T1984] ? bpf_get_btf_vmlinux+0x60/0x60 [ 65.748708][ T1984] ? unwind_get_return_address+0x4d/0x90 [ 65.754525][ T1984] ? stack_trace_save+0xe0/0xe0 [ 65.761833][ T1984] ? arch_stack_walk+0xee/0x140 [ 65.766975][ T1984] ? stack_trace_save+0x98/0xe0 [ 65.801609][ T2004] device syzkaller0 entered promiscuous mode [ 65.816817][ T1984] ? __stack_depot_save+0x34/0x480 [ 65.821976][ T1984] ? __kasan_slab_alloc+0x69/0xf0 [ 65.891990][ T1984] ? _find_next_bit+0x1fa/0x200 [ 65.931231][ T1984] ? __kasan_kmalloc+0xec/0x110 [ 65.995435][ T1984] ? __kasan_kmalloc+0xda/0x110 [ 66.000364][ T1984] ? kmem_cache_alloc_trace+0x119/0x270 [ 66.013328][ T1984] ? selinux_bpf_prog_alloc+0x51/0x140 [ 66.024654][ T1984] ? security_bpf_prog_alloc+0x62/0x90 [ 66.035393][ T1984] ? bpf_prog_load+0x97c/0x1550 [ 66.040577][ T1984] ? __sys_bpf+0x4c3/0x730 [ 66.045057][ T1984] ? __x64_sys_bpf+0x7c/0x90 [ 66.055938][ T1984] ? x64_sys_call+0x4b9/0x9a0 [ 66.069918][ T1984] ? do_syscall_64+0x4c/0xa0 [ 66.074652][ T1984] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.081030][ T1984] ? check_stack_object+0x81/0x140 [ 66.086456][ T1984] ? memset+0x35/0x40 [ 66.092205][ T1984] ? bpf_obj_name_cpy+0x193/0x1e0 [ 66.107650][ T1984] bpf_prog_load+0x1042/0x1550 [ 66.128566][ T1984] ? __anon_inode_getfd+0x34b/0x3b0 [ 66.135341][ T1984] ? map_freeze+0x360/0x360 [ 66.141364][ T1984] ? selinux_bpf+0xc7/0xf0 [ 66.231665][ T1984] ? security_bpf+0x82/0xa0 [ 66.254795][ T1984] __sys_bpf+0x4c3/0x730 [ 66.275446][ T1984] ? bpf_link_show_fdinfo+0x310/0x310 [ 66.283662][ T1984] ? __kasan_check_write+0x14/0x20 [ 66.289014][ T1984] ? switch_fpu_return+0x15d/0x2c0 [ 66.294194][ T1984] __x64_sys_bpf+0x7c/0x90 [ 66.298753][ T1984] x64_sys_call+0x4b9/0x9a0 [ 66.303388][ T1984] do_syscall_64+0x4c/0xa0 [ 66.314437][ T1984] ? clear_bhb_loop+0x50/0xa0 [ 66.319235][ T1984] ? clear_bhb_loop+0x50/0xa0 [ 66.323993][ T1984] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.332089][ T1984] RIP: 0033:0x7fa53e1b3ec9 [ 66.338128][ T1984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.361694][ T1984] RSP: 002b:00007fa53cc1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.380299][ T1984] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b3ec9 [ 66.392561][ T1984] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 66.402230][ T1984] RBP: 00007fa53e236f91 R08: 0000000000000000 R09: 0000000000000000 [ 66.465639][ T1984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 66.524417][ T1984] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 66.596416][ T1984] [ 66.599484][ T1984] ---[ end trace 2190def7c2752f53 ]--- [ 66.715009][ T2052] device syzkaller0 entered promiscuous mode [ 68.294298][ T2117] device syzkaller0 entered promiscuous mode [ 68.475671][ T2135] -1: renamed from syzkaller0 [ 69.518287][ T30] audit: type=1400 audit(1758761971.793:138): avc: denied { create } for pid=2166 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 69.655189][ T2179] device syzkaller0 entered promiscuous mode [ 70.337587][ T30] audit: type=1400 audit(1758761972.603:139): avc: denied { create } for pid=2197 comm="syz.0.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 71.092931][ T2231] device syzkaller0 entered promiscuous mode [ 71.396720][ T2252] device veth0_vlan left promiscuous mode [ 71.442103][ T2252] device veth0_vlan entered promiscuous mode [ 71.580390][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.596563][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.624403][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.075754][ T2267] syzkaller0: create flow: hash 3748489859 index 0 [ 72.081023][ T2264] device syzkaller0 entered promiscuous mode [ 72.184556][ T1670] syzkaller0: tun_net_xmit 48 [ 72.376652][ T2263] syzkaller0 (unregistered): delete flow: hash 3748489859 index 0 [ 72.510514][ T2278] device syzkaller0 entered promiscuous mode [ 72.921123][ T2289] device syzkaller0 entered promiscuous mode [ 73.491978][ T2327] device wg2 entered promiscuous mode [ 73.814748][ T2346] device sit0 left promiscuous mode [ 73.939656][ T2349] device sit0 entered promiscuous mode [ 74.111664][ T2344] ip6_vti0: mtu greater than device maximum [ 74.377344][ T2353] device syzkaller0 entered promiscuous mode [ 75.106287][ T2362] device pim6reg1 entered promiscuous mode [ 75.155550][ T30] audit: type=1400 audit(1758761977.413:140): avc: denied { create } for pid=2373 comm="syz.3.621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 75.952748][ T2406] device syzkaller0 entered promiscuous mode [ 76.004250][ T2406] Ÿë: port 1(syz_tun) entered blocking state [ 76.010903][ T2406] Ÿë: port 1(syz_tun) entered disabled state [ 76.026104][ T2406] device syz_tun entered promiscuous mode [ 76.246033][ T2428] device syzkaller0 entered promiscuous mode [ 76.534355][ T2457] device pim6reg1 entered promiscuous mode [ 76.679039][ T2464] device pim6reg1 entered promiscuous mode [ 76.719768][ T30] audit: type=1400 audit(1758761978.993:141): avc: denied { create } for pid=2477 comm="syz.4.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 76.830784][ T2483] device pim6reg1 entered promiscuous mode [ 76.889445][ T2489] device syzkaller0 entered promiscuous mode [ 77.555025][ T2519] device sit0 left promiscuous mode [ 78.042251][ T2557] device syzkaller0 entered promiscuous mode [ 78.613980][ T2576] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 78.646172][ T2589] device wg2 left promiscuous mode [ 78.657785][ T2590] device wg2 entered promiscuous mode [ 78.918987][ T2612] device syzkaller0 entered promiscuous mode [ 79.083171][ T2615] ÿ: renamed from bond_slave_0 [ 79.188905][ T2621] device wg2 left promiscuous mode [ 79.262070][ T2627] device wg2 entered promiscuous mode [ 79.550749][ T2649] device veth1_macvtap left promiscuous mode [ 79.632391][ T2652] device syzkaller0 entered promiscuous mode [ 80.680046][ T2708] device syzkaller0 entered promiscuous mode [ 80.893788][ T2722] device sit0 entered promiscuous mode [ 81.048879][ T2739] tap0: tun_chr_ioctl cmd 35092 [ 81.258236][ T2747] device wg2 entered promiscuous mode [ 81.327456][ T2753] device sit0 left promiscuous mode [ 81.372699][ T2753] device sit0 entered promiscuous mode [ 81.514991][ T2760] device syzkaller0 entered promiscuous mode [ 82.508605][ T2798] device syzkaller0 entered promiscuous mode [ 82.913105][ T2823] device pim6reg1 entered promiscuous mode [ 83.224854][ T2847] bond_slave_1: mtu less than device minimum [ 83.331617][ T2861] device syzkaller0 entered promiscuous mode [ 84.518432][ T30] audit: type=1400 audit(1758761986.793:142): avc: denied { create } for pid=2896 comm="syz.3.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 84.659378][ T2895] device syzkaller0 entered promiscuous mode [ 86.184436][ T2914] GPL: port 1(veth1_macvtap) entered blocking state [ 86.226888][ T2914] GPL: port 1(veth1_macvtap) entered disabled state [ 86.319374][ T2916] device syzkaller0 entered promiscuous mode [ 86.784744][ T30] audit: type=1400 audit(1758761989.053:143): avc: denied { create } for pid=2928 comm="syz.1.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 87.486242][ T2942] device syzkaller0 entered promiscuous mode [ 87.750306][ T2953] device syzkaller0 entered promiscuous mode [ 88.060328][ T2964] device syzkaller0 entered promiscuous mode [ 88.094530][ T2965] device syzkaller0 entered promiscuous mode [ 88.478941][ T2971] device syzkaller0 entered promiscuous mode [ 88.498988][ T2975] device syzkaller0 entered promiscuous mode [ 88.858669][ T2982] device syzkaller0 entered promiscuous mode [ 89.368118][ T3005] device syzkaller0 entered promiscuous mode [ 89.796209][ T3021] device syzkaller0 entered promiscuous mode [ 89.829058][ T3023] device syzkaller0 entered promiscuous mode [ 90.113345][ T3029] device syzkaller0 entered promiscuous mode [ 90.284875][ T3036] device syzkaller0 entered promiscuous mode [ 91.172917][ T3082] device syzkaller0 entered promiscuous mode [ 92.353646][ T30] audit: type=1400 audit(1758761994.623:144): avc: denied { create } for pid=3135 comm="syz.1.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 92.895175][ T3147] device syzkaller0 entered promiscuous mode [ 93.285770][ T3162] device syzkaller0 entered promiscuous mode [ 93.649356][ T3172] device syzkaller0 entered promiscuous mode [ 93.675979][ T3173] device syzkaller0 entered promiscuous mode [ 94.261558][ T30] audit: type=1400 audit(1758761996.533:145): avc: denied { create } for pid=3205 comm="syz.0.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 94.653548][ T3218] device syzkaller0 entered promiscuous mode [ 95.128222][ T3233] device syzkaller0 entered promiscuous mode [ 95.533679][ T3241] device syzkaller0 entered promiscuous mode [ 95.555249][ T3242] device syzkaller0 entered promiscuous mode [ 95.577983][ T3249] device sit0 left promiscuous mode [ 96.005007][ T3253] device sit0 entered promiscuous mode [ 96.171648][ T3268] device syzkaller0 entered promiscuous mode [ 96.549121][ T3281] device syzkaller0 entered promiscuous mode [ 96.555733][ T3285] ip6_vti0: mtu greater than device maximum [ 96.718310][ T3287] device syzkaller0 entered promiscuous mode [ 97.572321][ T3301] device sit0 left promiscuous mode [ 97.756868][ T3307] device syzkaller0 entered promiscuous mode [ 97.830234][ T3303] device veth1_to_team entered promiscuous mode [ 97.991447][ T3311] device syzkaller0 entered promiscuous mode [ 98.476486][ T3329] device syzkaller0 entered promiscuous mode [ 98.748528][ T3335] device syzkaller0 entered promiscuous mode [ 99.111909][ T3338] device syzkaller0 entered promiscuous mode [ 99.726534][ T3348] device syzkaller0 entered promiscuous mode [ 100.119737][ T3356] device syzkaller0 entered promiscuous mode [ 100.721350][ T3372] device syzkaller0 entered promiscuous mode [ 100.774764][ T3375] device syzkaller0 entered promiscuous mode [ 101.154356][ T3385] device syzkaller0 entered promiscuous mode [ 101.351723][ T3394] device syzkaller0 entered promiscuous mode [ 101.990796][ T3410] device syzkaller0 entered promiscuous mode [ 102.863988][ T3430] device syzkaller0 entered promiscuous mode [ 103.551338][ T3442] device veth0_vlan left promiscuous mode [ 103.565945][ T3442] device veth0_vlan entered promiscuous mode [ 103.643993][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.652406][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.660050][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.808725][ T3451] device syzkaller0 entered promiscuous mode [ 104.267147][ T3461] device syzkaller0 entered promiscuous mode [ 104.422925][ T3462] device syzkaller0 entered promiscuous mode [ 104.474023][ T3464] device syzkaller0 entered promiscuous mode [ 104.809004][ T3474] device syzkaller0 entered promiscuous mode [ 105.156116][ T3484] device veth0_vlan left promiscuous mode [ 105.162921][ T3484] device veth0_vlan entered promiscuous mode [ 105.203976][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.212580][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.224176][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.505099][ T3496] device syzkaller0 entered promiscuous mode [ 106.965865][ T3505] device syzkaller0 entered promiscuous mode [ 107.780733][ T3518] device syzkaller0 entered promiscuous mode [ 108.510495][ T3521] device syzkaller0 entered promiscuous mode [ 108.924815][ T3530] device syzkaller0 entered promiscuous mode [ 110.245017][ T3545] device syzkaller0 entered promiscuous mode [ 110.273242][ T3547] device syzkaller0 entered promiscuous mode [ 110.882461][ T3561] device pimreg0 entered promiscuous mode [ 111.475601][ T3588] device syzkaller0 entered promiscuous mode [ 112.001036][ T3595] device syzkaller0 entered promiscuous mode [ 112.130735][ T3598] device syzkaller0 entered promiscuous mode [ 112.776499][ T3624] syz.1.1013[3624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.776572][ T3624] syz.1.1013[3624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.201128][ T3636] device syzkaller0 entered promiscuous mode [ 113.530800][ T3642] device syzkaller0 entered promiscuous mode [ 116.817894][ T3676] device syzkaller0 entered promiscuous mode [ 117.038900][ T3690] device syzkaller0 entered promiscuous mode [ 119.142359][ T3701] device syzkaller0 entered promiscuous mode [ 119.517071][ T3730] device syzkaller0 entered promiscuous mode [ 119.739491][ T30] audit: type=1400 audit(1758762022.013:146): avc: denied { create } for pid=3734 comm="syz.0.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 120.028075][ T3743] device syzkaller0 entered promiscuous mode [ 120.284687][ T30] audit: type=1400 audit(1758762022.553:147): avc: denied { read } for pid=3755 comm="syz.1.1056" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 120.310917][ T3754] Q±6ã`Ò˜: renamed from lo [ 120.335672][ T30] audit: type=1400 audit(1758762022.583:148): avc: denied { open } for pid=3755 comm="syz.1.1056" path="uts:[4026532289]" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 120.473597][ T3781] device syzkaller0 entered promiscuous mode [ 121.007932][ T3785] syz.2.1062 (3785) used greatest stack depth: 21704 bytes left [ 121.434212][ T3824] device syzkaller0 entered promiscuous mode [ 121.671428][ T3842] device syzkaller0 entered promiscuous mode [ 122.133124][ T3853] device syzkaller0 entered promiscuous mode [ 122.422049][ T3870] device syzkaller0 entered promiscuous mode [ 123.233126][ T3903] cgroup: fork rejected by pids controller in /syz2 [ 123.354578][ T3918] device syzkaller0 entered promiscuous mode [ 123.579016][ T3927] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.586206][ T3927] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.613900][ T3928] device bridge_slave_1 left promiscuous mode [ 123.625091][ T3928] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.666282][ T3928] device bridge_slave_0 left promiscuous mode [ 123.672536][ T3928] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.437202][ T3948] device syzkaller0 entered promiscuous mode [ 124.470779][ T3946] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.486628][ T3946] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.501719][ T3946] device bridge_slave_0 entered promiscuous mode [ 124.564912][ T3946] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.572108][ T3946] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.579632][ T3946] device bridge_slave_1 entered promiscuous mode [ 124.823447][ T30] audit: type=1400 audit(1758762027.093:149): avc: denied { create } for pid=3946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 124.906571][ T3955] bond_slave_1: mtu less than device minimum [ 124.918596][ T30] audit: type=1400 audit(1758762027.193:150): avc: denied { ioctl } for pid=3953 comm="syz.4.1116" path="pid:[4026532462]" dev="nsfs" ino=4026532462 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.945811][ T30] audit: type=1400 audit(1758762027.223:151): avc: denied { write } for pid=3946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 124.978550][ T30] audit: type=1400 audit(1758762027.223:152): avc: denied { read } for pid=3946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 125.097031][ T3946] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.104221][ T3946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.111532][ T3946] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.118579][ T3946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.299549][ T3979] device syzkaller0 entered promiscuous mode [ 125.306192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.313810][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.335682][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.479117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.487444][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.494464][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.546518][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.555091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.564114][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.571225][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.579447][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.587676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.595711][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.603784][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.612142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.620718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.678208][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.692472][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.745308][ T449] device bridge_slave_1 left promiscuous mode [ 125.751603][ T449] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.766417][ T3988] ref_ctr_offset mismatch. inode: 0x444 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 125.778152][ T449] device bridge_slave_0 left promiscuous mode [ 125.784398][ T3989] ref_ctr_offset mismatch. inode: 0x444 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 125.817388][ T449] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.846604][ T449] device veth1_macvtap left promiscuous mode [ 125.967581][ T3946] device veth0_vlan entered promiscuous mode [ 125.974477][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.985707][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.078173][ T3998] device syzkaller0 entered promiscuous mode [ 126.128461][ T520] syzkaller0: tun_net_xmit 70 [ 126.196410][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.205107][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.215286][ T3946] device veth1_macvtap entered promiscuous mode [ 126.228469][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.236433][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.244714][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.299028][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.314748][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.444483][ T4010] device veth0_vlan left promiscuous mode [ 126.475594][ T4010] device veth0_vlan entered promiscuous mode [ 126.811254][ T4025] device syzkaller0 entered promiscuous mode [ 126.873515][ T4031] device pim6reg1 entered promiscuous mode [ 127.655461][ T4056] device sit0 entered promiscuous mode [ 127.915799][ T4059] device veth1_macvtap left promiscuous mode [ 128.533603][ T4084] device veth0_vlan left promiscuous mode [ 128.550626][ T4084] device veth0_vlan entered promiscuous mode [ 128.696236][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.715925][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.723882][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.811529][ T4098] device syzkaller0 entered promiscuous mode [ 129.279868][ T4114] device sit0 entered promiscuous mode [ 129.613470][ T4129] device veth0_vlan left promiscuous mode [ 129.626271][ T4129] device veth0_vlan entered promiscuous mode [ 129.755882][ T30] audit: type=1400 audit(1758762032.033:153): avc: denied { create } for pid=4136 comm="syz.3.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 129.784930][ T4135] device syzkaller0 entered promiscuous mode [ 129.833367][ T30] audit: type=1400 audit(1758762032.103:154): avc: denied { create } for pid=4136 comm="syz.3.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 130.127887][ T4155] device syzkaller0 entered promiscuous mode [ 130.717590][ T4177] device sit0 left promiscuous mode [ 130.874088][ T4186] device sit0 entered promiscuous mode [ 131.129862][ T4209] device syzkaller0 entered promiscuous mode [ 131.579134][ T4222] device sit0 left promiscuous mode [ 131.861664][ T4262] syz.1.1200[4262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.861739][ T4262] syz.1.1200[4262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.888867][ T4268] syz.2.1201[4268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.936833][ T4268] syz.2.1201[4268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.954877][ T4269] syz.2.1201[4269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.974196][ T4268] syz.2.1201[4268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.145970][ T4272] device veth1_macvtap left promiscuous mode [ 132.498789][ T4288] device sit0 left promiscuous mode [ 132.774652][ T4291] device sit0 entered promiscuous mode [ 132.899862][ T4294] device veth0_vlan left promiscuous mode [ 132.918350][ T4294] device veth0_vlan entered promiscuous mode [ 133.355498][ T4314] device pim6reg1 entered promiscuous mode [ 133.593049][ T4331] device syzkaller0 entered promiscuous mode [ 135.198168][ T4379] device syzkaller0 entered promiscuous mode [ 135.288312][ T4382] device syzkaller0 entered promiscuous mode [ 135.460609][ T4387] device syzkaller0 entered promiscuous mode [ 136.110685][ T4396] device veth0_vlan left promiscuous mode [ 136.272153][ T4396] device veth0_vlan entered promiscuous mode [ 136.321806][ T4424] syz.1.1240[4424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.321879][ T4424] syz.1.1240[4424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.482972][ T4431] device syzkaller0 entered promiscuous mode [ 136.962938][ T4445] device syzkaller0 entered promiscuous mode [ 138.295012][ T4515] device syzkaller0 entered promiscuous mode [ 138.974714][ T4525] device syzkaller0 entered promiscuous mode [ 140.029201][ T4548] device sit0 left promiscuous mode [ 140.188563][ T4555] device sit0 entered promiscuous mode [ 141.437434][ T4582] device syzkaller0 entered promiscuous mode [ 141.996841][ T4614] device syzkaller0 left promiscuous mode [ 142.110103][ T4617] device sit0 left promiscuous mode [ 142.171669][ T4617] device sit0 entered promiscuous mode [ 143.506115][ T4623] device syzkaller0 entered promiscuous mode [ 143.716757][ T4642] device syzkaller0 entered promiscuous mode [ 143.987498][ T4657] device pim6reg1 entered promiscuous mode [ 144.283169][ T4661] device veth1_macvtap left promiscuous mode [ 144.675503][ T4666] device veth1_macvtap entered promiscuous mode [ 144.728853][ T4666] device macsec0 entered promiscuous mode [ 144.745576][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.840187][ T4681] device sit0 left promiscuous mode [ 144.937893][ T4681] device sit0 entered promiscuous mode [ 145.840256][ T4702] device syzkaller0 entered promiscuous mode [ 147.314452][ T4724] bond_slave_1: mtu less than device minimum [ 147.706766][ T4733] device wg2 left promiscuous mode [ 147.762061][ T4733] device wg2 entered promiscuous mode [ 147.842976][ T4739] device pim6reg1 entered promiscuous mode [ 147.924137][ T4743] device syzkaller0 entered promiscuous mode [ 149.100101][ T4783] device syzkaller0 entered promiscuous mode [ 150.179435][ T4824] device wg2 left promiscuous mode [ 150.194026][ T4824] device wg2 entered promiscuous mode [ 152.672149][ T4875] device pim6reg1 entered promiscuous mode [ 153.115043][ T4894] device syzkaller0 entered promiscuous mode [ 154.223333][ T4922] device pim6reg1 entered promiscuous mode [ 156.169530][ T4979] device syzkaller0 entered promiscuous mode [ 156.473685][ T4980] device syzkaller0 entered promiscuous mode [ 158.953786][ T5014] device veth0_vlan left promiscuous mode [ 159.000666][ T5014] device veth0_vlan entered promiscuous mode [ 159.671086][ T5077] device syzkaller0 entered promiscuous mode [ 163.885779][ T5119] device sit0 left promiscuous mode [ 164.122798][ T5124] device sit0 entered promiscuous mode [ 164.648616][ T5147] device syzkaller0 entered promiscuous mode [ 164.860917][ T5152] device syzkaller0 entered promiscuous mode [ 165.685718][ T5194] Â: renamed from pim6reg1 [ 165.893258][ T5207] device syzkaller0 entered promiscuous mode [ 166.277558][ T5216] Â: renamed from pim6reg1 [ 166.592935][ T30] audit: type=1400 audit(1758762068.863:155): avc: denied { create } for pid=5237 comm="syz.4.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 166.902806][ T5248] device syzkaller0 entered promiscuous mode [ 167.821227][ T30] audit: type=1400 audit(1758762070.093:156): avc: denied { create } for pid=5290 comm="syz.3.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 169.111180][ T5343] device syzkaller0 entered promiscuous mode [ 169.462851][ T5354] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.470113][ T5354] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.263064][ T5400] device syzkaller0 entered promiscuous mode [ 170.523154][ T5412] GPL: port 1(erspan0) entered blocking state [ 170.530030][ T5412] GPL: port 1(erspan0) entered disabled state [ 170.536998][ T5412] device erspan0 entered promiscuous mode [ 170.547542][ T5407] GPL: port 1(erspan0) entered blocking state [ 170.553821][ T5407] GPL: port 1(erspan0) entered forwarding state [ 170.563487][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 170.677118][ T5431] device syzkaller0 entered promiscuous mode [ 170.830605][ T5438] device syzkaller0 entered promiscuous mode [ 170.890002][ T5440] device veth0_vlan left promiscuous mode [ 170.902309][ T5440] device veth0_vlan entered promiscuous mode [ 170.964293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.977965][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.987325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.207860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 171.305895][ T5472] device syzkaller0 entered promiscuous mode [ 171.855175][ T5505] device syzkaller0 entered promiscuous mode [ 173.958140][ T5527] device syzkaller0 entered promiscuous mode [ 174.377445][ T5543] device syzkaller0 entered promiscuous mode [ 174.764686][ T5574] device syzkaller0 entered promiscuous mode [ 176.811082][ T5582] device pim6reg1 entered promiscuous mode [ 176.835854][ T5586] device syzkaller0 entered promiscuous mode [ 177.180919][ T5615] device syzkaller0 entered promiscuous mode [ 177.253913][ T5613] device syzkaller0 entered promiscuous mode [ 178.379787][ T5638] device syzkaller0 entered promiscuous mode [ 179.502736][ T5655] device syzkaller0 entered promiscuous mode [ 180.174922][ T5670] device syzkaller0 entered promiscuous mode [ 182.942136][ T30] audit: type=1400 audit(1758762085.213:157): avc: denied { create } for pid=5733 comm="syz.3.1622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 185.317793][ T5797] device veth0_vlan left promiscuous mode [ 185.332609][ T5797] device veth0_vlan entered promiscuous mode [ 185.488967][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.500197][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.536240][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.847366][ T5829] bond_slave_1: mtu less than device minimum [ 187.086731][ T5873] device sit0 entered promiscuous mode [ 189.754945][ T5989] device veth0_vlan left promiscuous mode [ 189.821529][ T5989] device veth0_vlan entered promiscuous mode [ 189.880985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.959936][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.018002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.076566][ T6013] device sit0 entered promiscuous mode [ 195.736813][ T6232] FAULT_INJECTION: forcing a failure. [ 195.736813][ T6232] name failslab, interval 1, probability 0, space 0, times 1 [ 195.845507][ T6232] CPU: 1 PID: 6232 Comm: syz.0.1770 Tainted: G W syzkaller #0 [ 195.854338][ T6232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 195.864422][ T6232] Call Trace: [ 195.867721][ T6232] [ 195.870671][ T6232] __dump_stack+0x21/0x30 [ 195.875027][ T6232] dump_stack_lvl+0xee/0x150 [ 195.879638][ T6232] ? show_regs_print_info+0x20/0x20 [ 195.884861][ T6232] ? __kasan_slab_alloc+0xcf/0xf0 [ 195.889916][ T6232] ? slab_post_alloc_hook+0x4f/0x2b0 [ 195.895238][ T6232] dump_stack+0x15/0x20 [ 195.899415][ T6232] should_fail+0x3c1/0x510 [ 195.903854][ T6232] __should_failslab+0xa4/0xe0 [ 195.908637][ T6232] should_failslab+0x9/0x20 [ 195.913156][ T6232] slab_pre_alloc_hook+0x3b/0xe0 [ 195.918112][ T6232] ? __alloc_skb+0xe0/0x740 [ 195.922638][ T6232] kmem_cache_alloc+0x44/0x260 [ 195.927435][ T6232] __alloc_skb+0xe0/0x740 [ 195.931782][ T6232] alloc_skb_with_frags+0xa8/0x620 [ 195.936912][ T6232] ? memcpy+0x56/0x70 [ 195.940917][ T6232] ? avc_has_perm_noaudit+0x2f4/0x460 [ 195.946313][ T6232] sock_alloc_send_pskb+0x853/0x980 [ 195.951534][ T6232] ? sock_kzfree_s+0x60/0x60 [ 195.956144][ T6232] ? avc_has_perm+0x158/0x240 [ 195.960835][ T6232] ? ___sys_sendmsg+0x1b9/0x260 [ 195.965706][ T6232] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 195.971969][ T6232] unix_stream_sendmsg+0x41b/0xc80 [ 195.977106][ T6232] ? unix_show_fdinfo+0xa0/0xa0 [ 195.981988][ T6232] ? security_socket_sendmsg+0x82/0xa0 [ 195.987478][ T6232] ? unix_show_fdinfo+0xa0/0xa0 [ 195.992467][ T6232] ____sys_sendmsg+0x5a2/0x8c0 [ 195.997266][ T6232] ? __sys_sendmsg_sock+0x40/0x40 [ 196.002319][ T6232] ? import_iovec+0x7c/0xb0 [ 196.006845][ T6232] ___sys_sendmsg+0x1f0/0x260 [ 196.011542][ T6232] ? __sys_sendmsg+0x250/0x250 [ 196.016344][ T6232] ? __fdget+0x1a1/0x230 [ 196.020607][ T6232] __x64_sys_sendmsg+0x1e2/0x2a0 [ 196.025563][ T6232] ? ___sys_sendmsg+0x260/0x260 [ 196.030442][ T6232] ? ksys_write+0x1eb/0x240 [ 196.034965][ T6232] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 196.041073][ T6232] x64_sys_call+0x4b/0x9a0 [ 196.045525][ T6232] do_syscall_64+0x4c/0xa0 [ 196.049983][ T6232] ? clear_bhb_loop+0x50/0xa0 [ 196.054699][ T6232] ? clear_bhb_loop+0x50/0xa0 [ 196.059417][ T6232] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 196.065347][ T6232] RIP: 0033:0x7fb5ea83bec9 [ 196.069797][ T6232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.089433][ T6232] RSP: 002b:00007fb5e92a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 196.097890][ T6232] RAX: ffffffffffffffda RBX: 00007fb5eaa92fa0 RCX: 00007fb5ea83bec9 [ 196.105901][ T6232] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 196.113901][ T6232] RBP: 00007fb5e92a4090 R08: 0000000000000000 R09: 0000000000000000 [ 196.121899][ T6232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.129891][ T6232] R13: 00007fb5eaa93038 R14: 00007fb5eaa92fa0 R15: 00007ffd09dc2ac8 [ 196.137893][ T6232] [ 197.755770][ T6315] FAULT_INJECTION: forcing a failure. [ 197.755770][ T6315] name failslab, interval 1, probability 0, space 0, times 0 [ 197.838411][ T6315] CPU: 1 PID: 6315 Comm: syz.1.1794 Tainted: G W syzkaller #0 [ 197.847393][ T6315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 197.857513][ T6315] Call Trace: [ 197.860818][ T6315] [ 197.863771][ T6315] __dump_stack+0x21/0x30 [ 197.868135][ T6315] dump_stack_lvl+0xee/0x150 [ 197.872764][ T6315] ? show_regs_print_info+0x20/0x20 [ 197.878004][ T6315] dump_stack+0x15/0x20 [ 197.882191][ T6315] should_fail+0x3c1/0x510 [ 197.886645][ T6315] ? alloc_skb_with_frags+0xa8/0x620 [ 197.891965][ T6315] __should_failslab+0xa4/0xe0 [ 197.896757][ T6315] should_failslab+0x9/0x20 [ 197.901289][ T6315] slab_pre_alloc_hook+0x3b/0xe0 [ 197.906250][ T6315] ? alloc_skb_with_frags+0xa8/0x620 [ 197.911564][ T6315] ? alloc_skb_with_frags+0xa8/0x620 [ 197.916882][ T6315] __kmalloc_track_caller+0x6c/0x2c0 [ 197.922198][ T6315] ? alloc_skb_with_frags+0xa8/0x620 [ 197.927515][ T6315] ? alloc_skb_with_frags+0xa8/0x620 [ 197.932931][ T6315] __alloc_skb+0x21a/0x740 [ 197.937387][ T6315] alloc_skb_with_frags+0xa8/0x620 [ 197.942527][ T6315] ? memcpy+0x56/0x70 [ 197.946539][ T6315] ? avc_has_perm_noaudit+0x2f4/0x460 [ 197.951937][ T6315] sock_alloc_send_pskb+0x853/0x980 [ 197.957176][ T6315] ? sock_kzfree_s+0x60/0x60 [ 197.961797][ T6315] ? avc_has_perm+0x158/0x240 [ 197.966513][ T6315] ? ___sys_sendmsg+0x1b9/0x260 [ 197.971402][ T6315] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 197.977678][ T6315] unix_stream_sendmsg+0x41b/0xc80 [ 197.982826][ T6315] ? unix_show_fdinfo+0xa0/0xa0 [ 197.987707][ T6315] ? security_socket_sendmsg+0x82/0xa0 [ 197.993192][ T6315] ? unix_show_fdinfo+0xa0/0xa0 [ 197.998069][ T6315] ____sys_sendmsg+0x5a2/0x8c0 [ 198.002874][ T6315] ? __sys_sendmsg_sock+0x40/0x40 [ 198.007931][ T6315] ? import_iovec+0x7c/0xb0 [ 198.012466][ T6315] ___sys_sendmsg+0x1f0/0x260 [ 198.017182][ T6315] ? __sys_sendmsg+0x250/0x250 [ 198.021995][ T6315] ? __fdget+0x1a1/0x230 [ 198.026277][ T6315] __x64_sys_sendmsg+0x1e2/0x2a0 [ 198.031258][ T6315] ? ___sys_sendmsg+0x260/0x260 [ 198.036134][ T6315] ? ksys_write+0x1eb/0x240 [ 198.040665][ T6315] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.046771][ T6315] x64_sys_call+0x4b/0x9a0 [ 198.051213][ T6315] do_syscall_64+0x4c/0xa0 [ 198.055652][ T6315] ? clear_bhb_loop+0x50/0xa0 [ 198.060356][ T6315] ? clear_bhb_loop+0x50/0xa0 [ 198.065076][ T6315] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.071026][ T6315] RIP: 0033:0x7fa53e1b3ec9 [ 198.075464][ T6315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.095095][ T6315] RSP: 002b:00007fa53cc1c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.103537][ T6315] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b3ec9 [ 198.111540][ T6315] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 198.119552][ T6315] RBP: 00007fa53cc1c090 R08: 0000000000000000 R09: 0000000000000000 [ 198.127555][ T6315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.135552][ T6315] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 198.143556][ T6315] [ 198.207695][ T30] audit: type=1400 audit(1758762100.483:158): avc: denied { create } for pid=6325 comm="syz.3.1798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 198.846158][ T6372] FAULT_INJECTION: forcing a failure. [ 198.846158][ T6372] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 198.892978][ T6372] CPU: 0 PID: 6372 Comm: syz.3.1812 Tainted: G W syzkaller #0 [ 198.901817][ T6372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 198.911900][ T6372] Call Trace: [ 198.915207][ T6372] [ 198.918158][ T6372] __dump_stack+0x21/0x30 [ 198.922524][ T6372] dump_stack_lvl+0xee/0x150 [ 198.927165][ T6372] ? show_regs_print_info+0x20/0x20 [ 198.932401][ T6372] dump_stack+0x15/0x20 [ 198.936596][ T6372] should_fail+0x3c1/0x510 [ 198.941041][ T6372] should_fail_usercopy+0x1a/0x20 [ 198.946093][ T6372] _copy_from_iter+0x21a/0x1050 [ 198.950976][ T6372] ? __kasan_check_write+0x14/0x20 [ 198.956114][ T6372] ? skb_set_owner_w+0x24d/0x370 [ 198.961069][ T6372] ? copy_mc_pipe_to_iter+0x770/0x770 [ 198.966577][ T6372] ? check_stack_object+0x81/0x140 [ 198.971716][ T6372] ? __check_object_size+0x2f4/0x3c0 [ 198.977013][ T6372] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 198.982746][ T6372] ? skb_put+0x10e/0x1f0 [ 198.986999][ T6372] unix_stream_sendmsg+0x66b/0xc80 [ 198.992126][ T6372] ? unix_show_fdinfo+0xa0/0xa0 [ 198.996985][ T6372] ? security_socket_sendmsg+0x82/0xa0 [ 199.002446][ T6372] ? unix_show_fdinfo+0xa0/0xa0 [ 199.007302][ T6372] ____sys_sendmsg+0x5a2/0x8c0 [ 199.012077][ T6372] ? __sys_sendmsg_sock+0x40/0x40 [ 199.017112][ T6372] ? import_iovec+0x7c/0xb0 [ 199.021619][ T6372] ___sys_sendmsg+0x1f0/0x260 [ 199.026303][ T6372] ? __sys_sendmsg+0x250/0x250 [ 199.031080][ T6372] ? __fdget+0x1a1/0x230 [ 199.035334][ T6372] __x64_sys_sendmsg+0x1e2/0x2a0 [ 199.040283][ T6372] ? ___sys_sendmsg+0x260/0x260 [ 199.045142][ T6372] ? ksys_write+0x1eb/0x240 [ 199.049660][ T6372] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 199.055737][ T6372] x64_sys_call+0x4b/0x9a0 [ 199.060157][ T6372] do_syscall_64+0x4c/0xa0 [ 199.064591][ T6372] ? clear_bhb_loop+0x50/0xa0 [ 199.069276][ T6372] ? clear_bhb_loop+0x50/0xa0 [ 199.073963][ T6372] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.079865][ T6372] RIP: 0033:0x7ff3d75bbec9 [ 199.084289][ T6372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.103903][ T6372] RSP: 002b:00007ff3d6024038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.112319][ T6372] RAX: ffffffffffffffda RBX: 00007ff3d7812fa0 RCX: 00007ff3d75bbec9 [ 199.120491][ T6372] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 199.128483][ T6372] RBP: 00007ff3d6024090 R08: 0000000000000000 R09: 0000000000000000 [ 199.136467][ T6372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.144452][ T6372] R13: 00007ff3d7813038 R14: 00007ff3d7812fa0 R15: 00007ffd87dc9ce8 [ 199.152432][ T6372] [ 200.806830][ T6406] FAULT_INJECTION: forcing a failure. [ 200.806830][ T6406] name failslab, interval 1, probability 0, space 0, times 0 [ 200.865630][ T6406] CPU: 0 PID: 6406 Comm: syz.0.1823 Tainted: G W syzkaller #0 [ 200.874461][ T6406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 200.884544][ T6406] Call Trace: [ 200.887864][ T6406] [ 200.890806][ T6406] __dump_stack+0x21/0x30 [ 200.895163][ T6406] dump_stack_lvl+0xee/0x150 [ 200.899780][ T6406] ? show_regs_print_info+0x20/0x20 [ 200.905006][ T6406] ? __kasan_kmalloc+0xec/0x110 [ 200.909969][ T6406] ? __kmalloc_track_caller+0x13c/0x2c0 [ 200.915559][ T6406] dump_stack+0x15/0x20 [ 200.919755][ T6406] should_fail+0x3c1/0x510 [ 200.924206][ T6406] __should_failslab+0xa4/0xe0 [ 200.929007][ T6406] should_failslab+0x9/0x20 [ 200.933539][ T6406] slab_pre_alloc_hook+0x3b/0xe0 [ 200.938504][ T6406] ? __alloc_skb+0xe0/0x740 [ 200.943034][ T6406] kmem_cache_alloc+0x44/0x260 [ 200.947809][ T6406] __alloc_skb+0xe0/0x740 [ 200.952154][ T6406] alloc_skb_with_frags+0xa8/0x620 [ 200.957273][ T6406] sock_alloc_send_pskb+0x853/0x980 [ 200.962481][ T6406] ? sock_kzfree_s+0x60/0x60 [ 200.967081][ T6406] ? copy_mc_pipe_to_iter+0x770/0x770 [ 200.972482][ T6406] sock_alloc_send_skb+0x32/0x40 [ 200.977449][ T6406] queue_oob+0xd8/0x800 [ 200.981703][ T6406] ? __kasan_check_write+0x14/0x20 [ 200.986831][ T6406] ? scm_stat_add+0xb0/0xb0 [ 200.991954][ T6406] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 200.997850][ T6406] ? skb_queue_tail+0xcb/0xf0 [ 201.002546][ T6406] unix_stream_sendmsg+0xb59/0xc80 [ 201.007687][ T6406] ? unix_show_fdinfo+0xa0/0xa0 [ 201.012549][ T6406] ? security_socket_sendmsg+0x82/0xa0 [ 201.018018][ T6406] ? unix_show_fdinfo+0xa0/0xa0 [ 201.022880][ T6406] ____sys_sendmsg+0x5a2/0x8c0 [ 201.027672][ T6406] ? __sys_sendmsg_sock+0x40/0x40 [ 201.032713][ T6406] ? import_iovec+0x7c/0xb0 [ 201.037225][ T6406] ___sys_sendmsg+0x1f0/0x260 [ 201.041914][ T6406] ? __sys_sendmsg+0x250/0x250 [ 201.046688][ T6406] ? __fdget+0x1a1/0x230 [ 201.050936][ T6406] __x64_sys_sendmsg+0x1e2/0x2a0 [ 201.055875][ T6406] ? ___sys_sendmsg+0x260/0x260 [ 201.060734][ T6406] ? ksys_write+0x1eb/0x240 [ 201.065244][ T6406] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 201.071314][ T6406] x64_sys_call+0x4b/0x9a0 [ 201.075733][ T6406] do_syscall_64+0x4c/0xa0 [ 201.080156][ T6406] ? clear_bhb_loop+0x50/0xa0 [ 201.084836][ T6406] ? clear_bhb_loop+0x50/0xa0 [ 201.089515][ T6406] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.095413][ T6406] RIP: 0033:0x7fb5ea83bec9 [ 201.099971][ T6406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.119590][ T6406] RSP: 002b:00007fb5e92a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.128021][ T6406] RAX: ffffffffffffffda RBX: 00007fb5eaa92fa0 RCX: 00007fb5ea83bec9 [ 201.136104][ T6406] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 201.144079][ T6406] RBP: 00007fb5e92a4090 R08: 0000000000000000 R09: 0000000000000000 [ 201.152053][ T6406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.160030][ T6406] R13: 00007fb5eaa93038 R14: 00007fb5eaa92fa0 R15: 00007ffd09dc2ac8 [ 201.168012][ T6406] [ 201.827891][ T6432] syz.3.1834[6432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.827961][ T6432] syz.3.1834[6432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.101105][ T6465] FAULT_INJECTION: forcing a failure. [ 203.101105][ T6465] name failslab, interval 1, probability 0, space 0, times 0 [ 203.154830][ T6465] CPU: 0 PID: 6465 Comm: syz.1.1841 Tainted: G W syzkaller #0 [ 203.163651][ T6465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 203.173717][ T6465] Call Trace: [ 203.176999][ T6465] [ 203.179940][ T6465] __dump_stack+0x21/0x30 [ 203.184298][ T6465] dump_stack_lvl+0xee/0x150 [ 203.188893][ T6465] ? show_regs_print_info+0x20/0x20 [ 203.194104][ T6465] dump_stack+0x15/0x20 [ 203.198261][ T6465] should_fail+0x3c1/0x510 [ 203.202678][ T6465] ? alloc_skb_with_frags+0xa8/0x620 [ 203.207965][ T6465] __should_failslab+0xa4/0xe0 [ 203.212746][ T6465] should_failslab+0x9/0x20 [ 203.217250][ T6465] slab_pre_alloc_hook+0x3b/0xe0 [ 203.222201][ T6465] ? alloc_skb_with_frags+0xa8/0x620 [ 203.227484][ T6465] ? alloc_skb_with_frags+0xa8/0x620 [ 203.232767][ T6465] __kmalloc_track_caller+0x6c/0x2c0 [ 203.238060][ T6465] ? alloc_skb_with_frags+0xa8/0x620 [ 203.243356][ T6465] ? alloc_skb_with_frags+0xa8/0x620 [ 203.248651][ T6465] __alloc_skb+0x21a/0x740 [ 203.253099][ T6465] alloc_skb_with_frags+0xa8/0x620 [ 203.258218][ T6465] sock_alloc_send_pskb+0x853/0x980 [ 203.263424][ T6465] ? sock_kzfree_s+0x60/0x60 [ 203.268019][ T6465] ? copy_mc_pipe_to_iter+0x770/0x770 [ 203.273407][ T6465] sock_alloc_send_skb+0x32/0x40 [ 203.278358][ T6465] queue_oob+0xd8/0x800 [ 203.282601][ T6465] ? __kasan_check_write+0x14/0x20 [ 203.287716][ T6465] ? scm_stat_add+0xb0/0xb0 [ 203.292227][ T6465] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 203.298048][ T6465] ? skb_queue_tail+0xcb/0xf0 [ 203.302735][ T6465] unix_stream_sendmsg+0xb59/0xc80 [ 203.307852][ T6465] ? unix_show_fdinfo+0xa0/0xa0 [ 203.312706][ T6465] ? security_socket_sendmsg+0x82/0xa0 [ 203.318165][ T6465] ? unix_show_fdinfo+0xa0/0xa0 [ 203.323020][ T6465] ____sys_sendmsg+0x5a2/0x8c0 [ 203.327791][ T6465] ? __sys_sendmsg_sock+0x40/0x40 [ 203.332822][ T6465] ? import_iovec+0x7c/0xb0 [ 203.337330][ T6465] ___sys_sendmsg+0x1f0/0x260 [ 203.342014][ T6465] ? __sys_sendmsg+0x250/0x250 [ 203.346887][ T6465] ? __fdget+0x1a1/0x230 [ 203.351134][ T6465] __x64_sys_sendmsg+0x1e2/0x2a0 [ 203.356075][ T6465] ? ___sys_sendmsg+0x260/0x260 [ 203.360940][ T6465] ? ksys_write+0x1eb/0x240 [ 203.365445][ T6465] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 203.371604][ T6465] x64_sys_call+0x4b/0x9a0 [ 203.376024][ T6465] do_syscall_64+0x4c/0xa0 [ 203.380447][ T6465] ? clear_bhb_loop+0x50/0xa0 [ 203.385132][ T6465] ? clear_bhb_loop+0x50/0xa0 [ 203.389815][ T6465] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 203.395715][ T6465] RIP: 0033:0x7fa53e1b3ec9 [ 203.400133][ T6465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.419756][ T6465] RSP: 002b:00007fa53cc1c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.428261][ T6465] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b3ec9 [ 203.436239][ T6465] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 203.444240][ T6465] RBP: 00007fa53cc1c090 R08: 0000000000000000 R09: 0000000000000000 [ 203.452218][ T6465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.460189][ T6465] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 203.468176][ T6465] [ 203.983663][ T6515] FAULT_INJECTION: forcing a failure. [ 203.983663][ T6515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.037895][ T6515] CPU: 1 PID: 6515 Comm: syz.2.1859 Tainted: G W syzkaller #0 [ 204.046723][ T6515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 204.056807][ T6515] Call Trace: [ 204.060106][ T6515] [ 204.063053][ T6515] __dump_stack+0x21/0x30 [ 204.067406][ T6515] dump_stack_lvl+0xee/0x150 [ 204.072024][ T6515] ? show_regs_print_info+0x20/0x20 [ 204.077254][ T6515] ? __alloc_skb+0x463/0x740 [ 204.081874][ T6515] dump_stack+0x15/0x20 [ 204.086057][ T6515] should_fail+0x3c1/0x510 [ 204.090496][ T6515] should_fail_usercopy+0x1a/0x20 [ 204.095538][ T6515] _copy_from_iter+0x21a/0x1050 [ 204.100414][ T6515] ? sock_alloc_send_pskb+0x871/0x980 [ 204.106178][ T6515] ? copy_mc_pipe_to_iter+0x770/0x770 [ 204.111591][ T6515] ? check_stack_object+0x81/0x140 [ 204.116745][ T6515] ? __check_object_size+0x2f4/0x3c0 [ 204.122071][ T6515] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 204.127809][ T6515] ? copy_mc_pipe_to_iter+0x770/0x770 [ 204.133203][ T6515] ? skb_put+0x10e/0x1f0 [ 204.137476][ T6515] queue_oob+0x31f/0x800 [ 204.141737][ T6515] ? scm_stat_add+0xb0/0xb0 [ 204.146280][ T6515] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 204.152104][ T6515] ? skb_queue_tail+0xcb/0xf0 [ 204.156800][ T6515] unix_stream_sendmsg+0xb59/0xc80 [ 204.161935][ T6515] ? unix_show_fdinfo+0xa0/0xa0 [ 204.166799][ T6515] ? security_socket_sendmsg+0x82/0xa0 [ 204.172274][ T6515] ? unix_show_fdinfo+0xa0/0xa0 [ 204.177138][ T6515] ____sys_sendmsg+0x5a2/0x8c0 [ 204.181927][ T6515] ? __sys_sendmsg_sock+0x40/0x40 [ 204.186971][ T6515] ? import_iovec+0x7c/0xb0 [ 204.191490][ T6515] ___sys_sendmsg+0x1f0/0x260 [ 204.196189][ T6515] ? __sys_sendmsg+0x250/0x250 [ 204.200987][ T6515] ? __fdget+0x1a1/0x230 [ 204.205246][ T6515] __x64_sys_sendmsg+0x1e2/0x2a0 [ 204.210203][ T6515] ? ___sys_sendmsg+0x260/0x260 [ 204.215069][ T6515] ? ksys_write+0x1eb/0x240 [ 204.219610][ T6515] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 204.225695][ T6515] x64_sys_call+0x4b/0x9a0 [ 204.230132][ T6515] do_syscall_64+0x4c/0xa0 [ 204.234571][ T6515] ? clear_bhb_loop+0x50/0xa0 [ 204.239283][ T6515] ? clear_bhb_loop+0x50/0xa0 [ 204.243985][ T6515] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.249909][ T6515] RIP: 0033:0x7fa99ab89ec9 [ 204.254336][ T6515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.273960][ T6515] RSP: 002b:00007fa9995f2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 204.282396][ T6515] RAX: ffffffffffffffda RBX: 00007fa99ade0fa0 RCX: 00007fa99ab89ec9 [ 204.290383][ T6515] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 204.298367][ T6515] RBP: 00007fa9995f2090 R08: 0000000000000000 R09: 0000000000000000 [ 204.306352][ T6515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.314336][ T6515] R13: 00007fa99ade1038 R14: 00007fa99ade0fa0 R15: 00007ffe390364a8 [ 204.322340][ T6515] [ 204.993713][ T6557] FAULT_INJECTION: forcing a failure. [ 204.993713][ T6557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.060991][ T6557] CPU: 1 PID: 6557 Comm: syz.1.1871 Tainted: G W syzkaller #0 [ 205.069909][ T6557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 205.079966][ T6557] Call Trace: [ 205.083247][ T6557] [ 205.086177][ T6557] __dump_stack+0x21/0x30 [ 205.090512][ T6557] dump_stack_lvl+0xee/0x150 [ 205.095108][ T6557] ? show_regs_print_info+0x20/0x20 [ 205.100313][ T6557] dump_stack+0x15/0x20 [ 205.104472][ T6557] should_fail+0x3c1/0x510 [ 205.108895][ T6557] should_fail_usercopy+0x1a/0x20 [ 205.113918][ T6557] _copy_to_user+0x20/0x90 [ 205.118361][ T6557] simple_read_from_buffer+0xe9/0x160 [ 205.123735][ T6557] proc_fail_nth_read+0x19a/0x210 [ 205.128767][ T6557] ? proc_fault_inject_write+0x2f0/0x2f0 [ 205.134508][ T6557] ? security_file_permission+0x83/0xa0 [ 205.140079][ T6557] ? proc_fault_inject_write+0x2f0/0x2f0 [ 205.145719][ T6557] vfs_read+0x282/0xbe0 [ 205.150063][ T6557] ? kernel_read+0x1f0/0x1f0 [ 205.154667][ T6557] ? __kasan_check_write+0x14/0x20 [ 205.159792][ T6557] ? mutex_lock+0x95/0x1a0 [ 205.164215][ T6557] ? wait_for_completion_killable_timeout+0x10/0x10 [ 205.170805][ T6557] ? __fget_files+0x2c4/0x320 [ 205.175495][ T6557] ? __fdget_pos+0x2d2/0x380 [ 205.180084][ T6557] ? ksys_read+0x71/0x240 [ 205.184419][ T6557] ksys_read+0x140/0x240 [ 205.188666][ T6557] ? vfs_write+0xf70/0xf70 [ 205.193080][ T6557] ? debug_smp_processor_id+0x17/0x20 [ 205.198454][ T6557] __x64_sys_read+0x7b/0x90 [ 205.202955][ T6557] x64_sys_call+0x96d/0x9a0 [ 205.207457][ T6557] do_syscall_64+0x4c/0xa0 [ 205.211875][ T6557] ? clear_bhb_loop+0x50/0xa0 [ 205.216552][ T6557] ? clear_bhb_loop+0x50/0xa0 [ 205.221234][ T6557] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.227136][ T6557] RIP: 0033:0x7fa53e1b28dc [ 205.231551][ T6557] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 205.251157][ T6557] RSP: 002b:00007fa53cc1c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 205.259577][ T6557] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b28dc [ 205.267559][ T6557] RDX: 000000000000000f RSI: 00007fa53cc1c0a0 RDI: 0000000000000007 [ 205.275539][ T6557] RBP: 00007fa53cc1c090 R08: 0000000000000000 R09: 0000000000000000 [ 205.283515][ T6557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.291511][ T6557] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 205.299496][ T6557] [ 205.634291][ T6588] syz.0.1881[6588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.634387][ T6588] syz.0.1881[6588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.855619][ T6596] device veth0_vlan left promiscuous mode [ 205.965700][ T6596] device veth0_vlan entered promiscuous mode [ 206.072275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.087843][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.096398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.571849][ T30] audit: type=1400 audit(1758762111.843:159): avc: denied { associate } for pid=6699 comm="syz.0.1906" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 211.681142][ T6743] device veth0_vlan left promiscuous mode [ 211.721044][ T6743] device veth0_vlan entered promiscuous mode [ 211.782343][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.822342][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.836019][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.254931][ T6820] device veth0_vlan left promiscuous mode [ 213.273949][ T6820] device veth0_vlan entered promiscuous mode [ 213.352919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.376048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.383761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.723132][ T30] audit: type=1400 audit(1758762115.993:160): avc: denied { write } for pid=6843 comm="syz.1.1950" name="cgroup.subtree_control" dev="cgroup2" ino=423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 213.797637][ T30] audit: type=1400 audit(1758762115.993:161): avc: denied { open } for pid=6843 comm="syz.1.1950" path="" dev="cgroup2" ino=423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 213.841185][ T30] audit: type=1400 audit(1758762115.993:162): avc: denied { ioctl } for pid=6843 comm="syz.1.1950" path="" dev="cgroup2" ino=423 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 213.989878][ T6868] syz.3.1959[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.989962][ T6868] syz.3.1959[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.261092][ T6904] FAULT_INJECTION: forcing a failure. [ 214.261092][ T6904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.285649][ T6904] CPU: 1 PID: 6904 Comm: syz.3.1969 Tainted: G W syzkaller #0 [ 214.294449][ T6904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 214.304525][ T6904] Call Trace: [ 214.307818][ T6904] [ 214.310770][ T6904] __dump_stack+0x21/0x30 [ 214.315123][ T6904] dump_stack_lvl+0xee/0x150 [ 214.319742][ T6904] ? show_regs_print_info+0x20/0x20 [ 214.324960][ T6904] ? __activate_page+0xd40/0xd40 [ 214.329921][ T6904] dump_stack+0x15/0x20 [ 214.334092][ T6904] should_fail+0x3c1/0x510 [ 214.338551][ T6904] should_fail_usercopy+0x1a/0x20 [ 214.343595][ T6904] copy_page_from_iter_atomic+0x3fb/0x1350 [ 214.349426][ T6904] ? pipe_zero+0x370/0x370 [ 214.353962][ T6904] generic_perform_write+0x307/0x670 [ 214.359265][ T6904] ? grab_cache_page_write_begin+0xb0/0xb0 [ 214.365087][ T6904] ? file_remove_privs+0x590/0x590 [ 214.370212][ T6904] ? rwsem_write_trylock+0x130/0x300 [ 214.375528][ T6904] ? clear_nonspinnable+0x60/0x60 [ 214.380568][ T6904] ? avc_policy_seqno+0x1b/0x70 [ 214.385437][ T6904] __generic_file_write_iter+0x268/0x480 [ 214.391191][ T6904] generic_file_write_iter+0xa9/0x1d0 [ 214.396581][ T6904] vfs_write+0x802/0xf70 [ 214.400955][ T6904] ? file_end_write+0x1b0/0x1b0 [ 214.405820][ T6904] ? wait_for_completion_killable_timeout+0x10/0x10 [ 214.412522][ T6904] ? __fget_files+0x2c4/0x320 [ 214.417223][ T6904] ? __fdget_pos+0x2d2/0x380 [ 214.421847][ T6904] ? ksys_write+0x71/0x240 [ 214.426400][ T6904] ksys_write+0x140/0x240 [ 214.430759][ T6904] ? __ia32_sys_read+0x90/0x90 [ 214.435549][ T6904] ? debug_smp_processor_id+0x17/0x20 [ 214.440942][ T6904] __x64_sys_write+0x7b/0x90 [ 214.445548][ T6904] x64_sys_call+0x8ef/0x9a0 [ 214.450073][ T6904] do_syscall_64+0x4c/0xa0 [ 214.454505][ T6904] ? clear_bhb_loop+0x50/0xa0 [ 214.459218][ T6904] ? clear_bhb_loop+0x50/0xa0 [ 214.463933][ T6904] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.469856][ T6904] RIP: 0033:0x7ff3d75bbec9 [ 214.474289][ T6904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.493910][ T6904] RSP: 002b:00007ff3d6024038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.502348][ T6904] RAX: ffffffffffffffda RBX: 00007ff3d7812fa0 RCX: 00007ff3d75bbec9 [ 214.510336][ T6904] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 214.518448][ T6904] RBP: 00007ff3d6024090 R08: 0000000000000000 R09: 0000000000000000 [ 214.526435][ T6904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.534427][ T6904] R13: 00007ff3d7813038 R14: 00007ff3d7812fa0 R15: 00007ffd87dc9ce8 [ 214.542425][ T6904] [ 214.605759][ T6905] device syzkaller0 left promiscuous mode [ 215.112083][ T6946] FAULT_INJECTION: forcing a failure. [ 215.112083][ T6946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.125229][ T6946] CPU: 0 PID: 6946 Comm: syz.4.1982 Tainted: G W syzkaller #0 [ 215.134029][ T6946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 215.144138][ T6946] Call Trace: [ 215.147455][ T6946] [ 215.150414][ T6946] __dump_stack+0x21/0x30 [ 215.154782][ T6946] dump_stack_lvl+0xee/0x150 [ 215.159413][ T6946] ? show_regs_print_info+0x20/0x20 [ 215.164745][ T6946] ? __activate_page+0xd40/0xd40 [ 215.169719][ T6946] dump_stack+0x15/0x20 [ 215.173923][ T6946] should_fail+0x3c1/0x510 [ 215.178382][ T6946] should_fail_usercopy+0x1a/0x20 [ 215.183437][ T6946] copy_page_from_iter_atomic+0x3fb/0x1350 [ 215.189283][ T6946] ? pipe_zero+0x370/0x370 [ 215.193733][ T6946] generic_perform_write+0x307/0x670 [ 215.199037][ T6946] ? grab_cache_page_write_begin+0xb0/0xb0 [ 215.204873][ T6946] ? file_remove_privs+0x590/0x590 [ 215.209997][ T6946] ? rwsem_write_trylock+0x130/0x300 [ 215.215293][ T6946] ? clear_nonspinnable+0x60/0x60 [ 215.220332][ T6946] ? avc_policy_seqno+0x1b/0x70 [ 215.225192][ T6946] __generic_file_write_iter+0x268/0x480 [ 215.230835][ T6946] generic_file_write_iter+0xa9/0x1d0 [ 215.236219][ T6946] vfs_write+0x802/0xf70 [ 215.240473][ T6946] ? file_end_write+0x1b0/0x1b0 [ 215.245331][ T6946] ? wait_for_completion_killable_timeout+0x10/0x10 [ 215.251929][ T6946] ? __fget_files+0x2c4/0x320 [ 215.256611][ T6946] ? __fdget_pos+0x2d2/0x380 [ 215.261229][ T6946] ? ksys_write+0x71/0x240 [ 215.265655][ T6946] ksys_write+0x140/0x240 [ 215.269989][ T6946] ? __ia32_sys_read+0x90/0x90 [ 215.274761][ T6946] ? debug_smp_processor_id+0x17/0x20 [ 215.280145][ T6946] __x64_sys_write+0x7b/0x90 [ 215.284739][ T6946] x64_sys_call+0x8ef/0x9a0 [ 215.289250][ T6946] do_syscall_64+0x4c/0xa0 [ 215.293670][ T6946] ? clear_bhb_loop+0x50/0xa0 [ 215.298357][ T6946] ? clear_bhb_loop+0x50/0xa0 [ 215.303168][ T6946] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.309076][ T6946] RIP: 0033:0x7f5b2d911ec9 [ 215.313499][ T6946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.333116][ T6946] RSP: 002b:00007f5b2c37a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 215.341545][ T6946] RAX: ffffffffffffffda RBX: 00007f5b2db68fa0 RCX: 00007f5b2d911ec9 [ 215.349524][ T6946] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 215.357501][ T6946] RBP: 00007f5b2c37a090 R08: 0000000000000000 R09: 0000000000000000 [ 215.365473][ T6946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.373446][ T6946] R13: 00007f5b2db69038 R14: 00007f5b2db68fa0 R15: 00007ffc8a4ae748 [ 215.381434][ T6946] [ 216.083731][ T6996] FAULT_INJECTION: forcing a failure. [ 216.083731][ T6996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.096873][ T6996] CPU: 1 PID: 6996 Comm: syz.3.1999 Tainted: G W syzkaller #0 [ 216.105664][ T6996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 216.115748][ T6996] Call Trace: [ 216.119050][ T6996] [ 216.122013][ T6996] __dump_stack+0x21/0x30 [ 216.126368][ T6996] dump_stack_lvl+0xee/0x150 [ 216.130970][ T6996] ? show_regs_print_info+0x20/0x20 [ 216.136433][ T6996] ? __activate_page+0xd40/0xd40 [ 216.141396][ T6996] dump_stack+0x15/0x20 [ 216.145560][ T6996] should_fail+0x3c1/0x510 [ 216.149983][ T6996] should_fail_usercopy+0x1a/0x20 [ 216.155020][ T6996] copy_page_from_iter_atomic+0x3fb/0x1350 [ 216.160847][ T6996] ? pipe_zero+0x370/0x370 [ 216.165279][ T6996] generic_perform_write+0x307/0x670 [ 216.170576][ T6996] ? grab_cache_page_write_begin+0xb0/0xb0 [ 216.176392][ T6996] ? file_remove_privs+0x590/0x590 [ 216.181508][ T6996] ? rwsem_write_trylock+0x130/0x300 [ 216.186796][ T6996] ? clear_nonspinnable+0x60/0x60 [ 216.191823][ T6996] ? avc_policy_seqno+0x1b/0x70 [ 216.196681][ T6996] __generic_file_write_iter+0x268/0x480 [ 216.202324][ T6996] generic_file_write_iter+0xa9/0x1d0 [ 216.207706][ T6996] vfs_write+0x802/0xf70 [ 216.211959][ T6996] ? file_end_write+0x1b0/0x1b0 [ 216.216812][ T6996] ? wait_for_completion_killable_timeout+0x10/0x10 [ 216.223409][ T6996] ? __fget_files+0x2c4/0x320 [ 216.228097][ T6996] ? __fdget_pos+0x2d2/0x380 [ 216.232689][ T6996] ? ksys_write+0x71/0x240 [ 216.237129][ T6996] ksys_write+0x140/0x240 [ 216.241465][ T6996] ? __ia32_sys_read+0x90/0x90 [ 216.246229][ T6996] ? debug_smp_processor_id+0x17/0x20 [ 216.251617][ T6996] __x64_sys_write+0x7b/0x90 [ 216.256208][ T6996] x64_sys_call+0x8ef/0x9a0 [ 216.260716][ T6996] do_syscall_64+0x4c/0xa0 [ 216.265225][ T6996] ? clear_bhb_loop+0x50/0xa0 [ 216.269916][ T6996] ? clear_bhb_loop+0x50/0xa0 [ 216.274607][ T6996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 216.280507][ T6996] RIP: 0033:0x7ff3d75bbec9 [ 216.284926][ T6996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.304533][ T6996] RSP: 002b:00007ff3d6024038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 216.312948][ T6996] RAX: ffffffffffffffda RBX: 00007ff3d7812fa0 RCX: 00007ff3d75bbec9 [ 216.320922][ T6996] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 216.328897][ T6996] RBP: 00007ff3d6024090 R08: 0000000000000000 R09: 0000000000000000 [ 216.336877][ T6996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.344850][ T6996] R13: 00007ff3d7813038 R14: 00007ff3d7812fa0 R15: 00007ffd87dc9ce8 [ 216.352833][ T6996] [ 216.569778][ T7000] @ÿ: renamed from bond_slave_0 [ 216.898205][ T7021] device sit0 left promiscuous mode [ 217.037402][ T7024] device sit0 entered promiscuous mode [ 217.222435][ T7038] FAULT_INJECTION: forcing a failure. [ 217.222435][ T7038] name failslab, interval 1, probability 0, space 0, times 0 [ 217.235090][ T7038] CPU: 1 PID: 7038 Comm: syz.2.2014 Tainted: G W syzkaller #0 [ 217.243885][ T7038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 217.253970][ T7038] Call Trace: [ 217.257279][ T7038] [ 217.260234][ T7038] __dump_stack+0x21/0x30 [ 217.264598][ T7038] dump_stack_lvl+0xee/0x150 [ 217.269219][ T7038] ? show_regs_print_info+0x20/0x20 [ 217.274451][ T7038] ? __alloc_pages+0x18f/0x440 [ 217.279248][ T7038] dump_stack+0x15/0x20 [ 217.283434][ T7038] should_fail+0x3c1/0x510 [ 217.287876][ T7038] __should_failslab+0xa4/0xe0 [ 217.292667][ T7038] should_failslab+0x9/0x20 [ 217.297194][ T7038] slab_pre_alloc_hook+0x3b/0xe0 [ 217.302157][ T7038] ? xas_create+0x569/0x1580 [ 217.306772][ T7038] kmem_cache_alloc+0x44/0x260 [ 217.311565][ T7038] xas_create+0x569/0x1580 [ 217.316010][ T7038] ? cgroup_rstat_updated+0xf5/0x370 [ 217.321496][ T7038] xas_create_range+0x211/0x720 [ 217.326380][ T7038] shmem_add_to_page_cache+0x739/0xc30 [ 217.331873][ T7038] ? put_page+0xb0/0xb0 [ 217.336066][ T7038] ? __kernel_text_address+0xa0/0x100 [ 217.341465][ T7038] shmem_getpage_gfp+0x1164/0x2310 [ 217.346613][ T7038] shmem_write_begin+0xce/0x1b0 [ 217.351490][ T7038] generic_perform_write+0x2ad/0x670 [ 217.356853][ T7038] ? grab_cache_page_write_begin+0xb0/0xb0 [ 217.362717][ T7038] ? file_remove_privs+0x590/0x590 [ 217.367853][ T7038] ? rwsem_write_trylock+0x130/0x300 [ 217.373170][ T7038] ? clear_nonspinnable+0x60/0x60 [ 217.378249][ T7038] ? avc_policy_seqno+0x1b/0x70 [ 217.383126][ T7038] __generic_file_write_iter+0x268/0x480 [ 217.388766][ T7038] generic_file_write_iter+0xa9/0x1d0 [ 217.394159][ T7038] vfs_write+0x802/0xf70 [ 217.398416][ T7038] ? file_end_write+0x1b0/0x1b0 [ 217.403281][ T7038] ? wait_for_completion_killable_timeout+0x10/0x10 [ 217.409882][ T7038] ? __fget_files+0x2c4/0x320 [ 217.414582][ T7038] ? __fdget_pos+0x2d2/0x380 [ 217.419193][ T7038] ? ksys_write+0x71/0x240 [ 217.423622][ T7038] ksys_write+0x140/0x240 [ 217.427972][ T7038] ? __ia32_sys_read+0x90/0x90 [ 217.432751][ T7038] ? debug_smp_processor_id+0x17/0x20 [ 217.438143][ T7038] __x64_sys_write+0x7b/0x90 [ 217.442744][ T7038] x64_sys_call+0x8ef/0x9a0 [ 217.447264][ T7038] do_syscall_64+0x4c/0xa0 [ 217.451694][ T7038] ? clear_bhb_loop+0x50/0xa0 [ 217.456390][ T7038] ? clear_bhb_loop+0x50/0xa0 [ 217.461080][ T7038] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.466992][ T7038] RIP: 0033:0x7fa99ab89ec9 [ 217.471423][ T7038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.491041][ T7038] RSP: 002b:00007fa9995f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 217.499474][ T7038] RAX: ffffffffffffffda RBX: 00007fa99ade0fa0 RCX: 00007fa99ab89ec9 [ 217.507463][ T7038] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 217.515448][ T7038] RBP: 00007fa9995f2090 R08: 0000000000000000 R09: 0000000000000000 [ 217.523429][ T7038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.531414][ T7038] R13: 00007fa99ade1038 R14: 00007fa99ade0fa0 R15: 00007ffe390364a8 [ 217.539407][ T7038] [ 217.903994][ T7078] FAULT_INJECTION: forcing a failure. [ 217.903994][ T7078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.917234][ T7078] CPU: 0 PID: 7078 Comm: syz.4.2027 Tainted: G W syzkaller #0 [ 217.926030][ T7078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 217.936154][ T7078] Call Trace: [ 217.939461][ T7078] [ 217.942408][ T7078] __dump_stack+0x21/0x30 [ 217.946761][ T7078] dump_stack_lvl+0xee/0x150 [ 217.951388][ T7078] ? show_regs_print_info+0x20/0x20 [ 217.956625][ T7078] ? __activate_page+0xd40/0xd40 [ 217.961570][ T7078] dump_stack+0x15/0x20 [ 217.965728][ T7078] should_fail+0x3c1/0x510 [ 217.970150][ T7078] should_fail_usercopy+0x1a/0x20 [ 217.975173][ T7078] copy_page_from_iter_atomic+0x3fb/0x1350 [ 217.981006][ T7078] ? pipe_zero+0x370/0x370 [ 217.985464][ T7078] generic_perform_write+0x307/0x670 [ 217.990782][ T7078] ? grab_cache_page_write_begin+0xb0/0xb0 [ 217.996607][ T7078] ? file_remove_privs+0x590/0x590 [ 218.001741][ T7078] ? rwsem_write_trylock+0x130/0x300 [ 218.007058][ T7078] ? clear_nonspinnable+0x60/0x60 [ 218.012103][ T7078] ? avc_policy_seqno+0x1b/0x70 [ 218.016990][ T7078] __generic_file_write_iter+0x268/0x480 [ 218.022646][ T7078] generic_file_write_iter+0xa9/0x1d0 [ 218.028035][ T7078] vfs_write+0x802/0xf70 [ 218.032301][ T7078] ? file_end_write+0x1b0/0x1b0 [ 218.037176][ T7078] ? wait_for_completion_killable_timeout+0x10/0x10 [ 218.043793][ T7078] ? __fget_files+0x2c4/0x320 [ 218.048492][ T7078] ? __fdget_pos+0x2d2/0x380 [ 218.053106][ T7078] ? ksys_write+0x71/0x240 [ 218.057546][ T7078] ksys_write+0x140/0x240 [ 218.061909][ T7078] ? __ia32_sys_read+0x90/0x90 [ 218.066701][ T7078] ? debug_smp_processor_id+0x17/0x20 [ 218.072102][ T7078] __x64_sys_write+0x7b/0x90 [ 218.076717][ T7078] x64_sys_call+0x8ef/0x9a0 [ 218.081238][ T7078] do_syscall_64+0x4c/0xa0 [ 218.085667][ T7078] ? clear_bhb_loop+0x50/0xa0 [ 218.090360][ T7078] ? clear_bhb_loop+0x50/0xa0 [ 218.095235][ T7078] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.101198][ T7078] RIP: 0033:0x7f5b2d911ec9 [ 218.105725][ T7078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.125471][ T7078] RSP: 002b:00007f5b2c37a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.133921][ T7078] RAX: ffffffffffffffda RBX: 00007f5b2db68fa0 RCX: 00007f5b2d911ec9 [ 218.142054][ T7078] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 218.150154][ T7078] RBP: 00007f5b2c37a090 R08: 0000000000000000 R09: 0000000000000000 [ 218.158154][ T7078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.166438][ T7078] R13: 00007f5b2db69038 R14: 00007f5b2db68fa0 R15: 00007ffc8a4ae748 [ 218.174449][ T7078] [ 218.270874][ T7087] device sit0 left promiscuous mode [ 218.571260][ T7111] syz.0.2039[7111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.571384][ T7111] syz.0.2039[7111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.596360][ T7116] FAULT_INJECTION: forcing a failure. [ 218.596360][ T7116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 218.620893][ T7116] CPU: 1 PID: 7116 Comm: syz.2.2040 Tainted: G W syzkaller #0 [ 218.629678][ T7116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 218.639739][ T7116] Call Trace: [ 218.643026][ T7116] [ 218.645957][ T7116] __dump_stack+0x21/0x30 [ 218.650292][ T7116] dump_stack_lvl+0xee/0x150 [ 218.654885][ T7116] ? show_regs_print_info+0x20/0x20 [ 218.660089][ T7116] ? __activate_page+0xd40/0xd40 [ 218.665058][ T7116] dump_stack+0x15/0x20 [ 218.669225][ T7116] should_fail+0x3c1/0x510 [ 218.673648][ T7116] should_fail_usercopy+0x1a/0x20 [ 218.678671][ T7116] copy_page_from_iter_atomic+0x3fb/0x1350 [ 218.684579][ T7116] ? pipe_zero+0x370/0x370 [ 218.689003][ T7116] generic_perform_write+0x307/0x670 [ 218.694291][ T7116] ? grab_cache_page_write_begin+0xb0/0xb0 [ 218.700098][ T7116] ? file_remove_privs+0x590/0x590 [ 218.705215][ T7116] ? rwsem_write_trylock+0x130/0x300 [ 218.710591][ T7116] ? clear_nonspinnable+0x60/0x60 [ 218.715617][ T7116] ? avc_policy_seqno+0x1b/0x70 [ 218.720476][ T7116] __generic_file_write_iter+0x268/0x480 [ 218.726120][ T7116] generic_file_write_iter+0xa9/0x1d0 [ 218.731584][ T7116] vfs_write+0x802/0xf70 [ 218.735833][ T7116] ? file_end_write+0x1b0/0x1b0 [ 218.740685][ T7116] ? wait_for_completion_killable_timeout+0x10/0x10 [ 218.747277][ T7116] ? __fget_files+0x2c4/0x320 [ 218.751959][ T7116] ? __fdget_pos+0x2d2/0x380 [ 218.756582][ T7116] ? ksys_write+0x71/0x240 [ 218.761003][ T7116] ksys_write+0x140/0x240 [ 218.765368][ T7116] ? __ia32_sys_read+0x90/0x90 [ 218.770138][ T7116] ? debug_smp_processor_id+0x17/0x20 [ 218.775634][ T7116] __x64_sys_write+0x7b/0x90 [ 218.780232][ T7116] x64_sys_call+0x8ef/0x9a0 [ 218.784766][ T7116] do_syscall_64+0x4c/0xa0 [ 218.789186][ T7116] ? clear_bhb_loop+0x50/0xa0 [ 218.793868][ T7116] ? clear_bhb_loop+0x50/0xa0 [ 218.798552][ T7116] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.804448][ T7116] RIP: 0033:0x7fa99ab89ec9 [ 218.808865][ T7116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.828478][ T7116] RSP: 002b:00007fa9995f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.836893][ T7116] RAX: ffffffffffffffda RBX: 00007fa99ade0fa0 RCX: 00007fa99ab89ec9 [ 218.844867][ T7116] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 218.852840][ T7116] RBP: 00007fa9995f2090 R08: 0000000000000000 R09: 0000000000000000 [ 218.860817][ T7116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.868793][ T7116] R13: 00007fa99ade1038 R14: 00007fa99ade0fa0 R15: 00007ffe390364a8 [ 218.876780][ T7116] [ 220.223037][ T7164] FAULT_INJECTION: forcing a failure. [ 220.223037][ T7164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.236433][ T7164] CPU: 1 PID: 7164 Comm: syz.4.2056 Tainted: G W syzkaller #0 [ 220.245235][ T7164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 220.255316][ T7164] Call Trace: [ 220.258613][ T7164] [ 220.261557][ T7164] __dump_stack+0x21/0x30 [ 220.265914][ T7164] dump_stack_lvl+0xee/0x150 [ 220.270526][ T7164] ? show_regs_print_info+0x20/0x20 [ 220.275765][ T7164] ? __activate_page+0xd40/0xd40 [ 220.280727][ T7164] dump_stack+0x15/0x20 [ 220.284914][ T7164] should_fail+0x3c1/0x510 [ 220.289353][ T7164] should_fail_usercopy+0x1a/0x20 [ 220.294400][ T7164] copy_page_from_iter_atomic+0x3fb/0x1350 [ 220.300238][ T7164] ? pipe_zero+0x370/0x370 [ 220.304688][ T7164] generic_perform_write+0x307/0x670 [ 220.310008][ T7164] ? grab_cache_page_write_begin+0xb0/0xb0 [ 220.315840][ T7164] ? file_remove_privs+0x590/0x590 [ 220.320974][ T7164] ? rwsem_write_trylock+0x130/0x300 [ 220.326282][ T7164] ? clear_nonspinnable+0x60/0x60 [ 220.331325][ T7164] ? avc_policy_seqno+0x1b/0x70 [ 220.336198][ T7164] __generic_file_write_iter+0x268/0x480 [ 220.341856][ T7164] generic_file_write_iter+0xa9/0x1d0 [ 220.347253][ T7164] vfs_write+0x802/0xf70 [ 220.351519][ T7164] ? file_end_write+0x1b0/0x1b0 [ 220.356396][ T7164] ? wait_for_completion_killable_timeout+0x10/0x10 [ 220.363008][ T7164] ? __fget_files+0x2c4/0x320 [ 220.367710][ T7164] ? __fdget_pos+0x2d2/0x380 [ 220.372334][ T7164] ? ksys_write+0x71/0x240 [ 220.376782][ T7164] ksys_write+0x140/0x240 [ 220.381136][ T7164] ? __ia32_sys_read+0x90/0x90 [ 220.385959][ T7164] ? debug_smp_processor_id+0x17/0x20 [ 220.391358][ T7164] __x64_sys_write+0x7b/0x90 [ 220.395969][ T7164] x64_sys_call+0x8ef/0x9a0 [ 220.400500][ T7164] do_syscall_64+0x4c/0xa0 [ 220.404939][ T7164] ? clear_bhb_loop+0x50/0xa0 [ 220.409647][ T7164] ? clear_bhb_loop+0x50/0xa0 [ 220.414357][ T7164] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 220.420282][ T7164] RIP: 0033:0x7f5b2d911ec9 [ 220.424723][ T7164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.444362][ T7164] RSP: 002b:00007f5b2c37a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 220.452804][ T7164] RAX: ffffffffffffffda RBX: 00007f5b2db68fa0 RCX: 00007f5b2d911ec9 [ 220.460802][ T7164] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 220.468800][ T7164] RBP: 00007f5b2c37a090 R08: 0000000000000000 R09: 0000000000000000 [ 220.476798][ T7164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.484793][ T7164] R13: 00007f5b2db69038 R14: 00007f5b2db68fa0 R15: 00007ffc8a4ae748 [ 220.492792][ T7164] [ 220.995530][ T7192] device syzkaller0 entered promiscuous mode [ 221.609278][ T7209] syz.4.2069[7209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.609360][ T7209] syz.4.2069[7209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.794668][ T7211] FAULT_INJECTION: forcing a failure. [ 221.794668][ T7211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 221.819161][ T7211] CPU: 0 PID: 7211 Comm: syz.0.2070 Tainted: G W syzkaller #0 [ 221.827952][ T7211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 221.838034][ T7211] Call Trace: [ 221.841337][ T7211] [ 221.844288][ T7211] __dump_stack+0x21/0x30 [ 221.848649][ T7211] dump_stack_lvl+0xee/0x150 [ 221.853269][ T7211] ? show_regs_print_info+0x20/0x20 [ 221.858495][ T7211] ? __activate_page+0xd40/0xd40 [ 221.863477][ T7211] dump_stack+0x15/0x20 [ 221.867657][ T7211] should_fail+0x3c1/0x510 [ 221.872084][ T7211] should_fail_usercopy+0x1a/0x20 [ 221.877108][ T7211] copy_page_from_iter_atomic+0x3fb/0x1350 [ 221.882920][ T7211] ? pipe_zero+0x370/0x370 [ 221.887339][ T7211] generic_perform_write+0x307/0x670 [ 221.892634][ T7211] ? grab_cache_page_write_begin+0xb0/0xb0 [ 221.898569][ T7211] ? file_remove_privs+0x590/0x590 [ 221.903690][ T7211] ? rwsem_write_trylock+0x130/0x300 [ 221.908982][ T7211] ? bpf_get_current_uid_gid+0xa7/0xf0 [ 221.914446][ T7211] ? clear_nonspinnable+0x60/0x60 [ 221.919472][ T7211] ? avc_policy_seqno+0x1b/0x70 [ 221.924324][ T7211] __generic_file_write_iter+0x268/0x480 [ 221.929960][ T7211] generic_file_write_iter+0xa9/0x1d0 [ 221.935335][ T7211] vfs_write+0x802/0xf70 [ 221.939595][ T7211] ? file_end_write+0x1b0/0x1b0 [ 221.944449][ T7211] ? wait_for_completion_killable_timeout+0x10/0x10 [ 221.951040][ T7211] ? __fget_files+0x2c4/0x320 [ 221.955724][ T7211] ? __fdget_pos+0x2d2/0x380 [ 221.960325][ T7211] ? ksys_write+0x71/0x240 [ 221.964760][ T7211] ksys_write+0x140/0x240 [ 221.969100][ T7211] ? __ia32_sys_read+0x90/0x90 [ 221.973872][ T7211] ? debug_smp_processor_id+0x17/0x20 [ 221.979252][ T7211] __x64_sys_write+0x7b/0x90 [ 221.983848][ T7211] x64_sys_call+0x8ef/0x9a0 [ 221.988361][ T7211] do_syscall_64+0x4c/0xa0 [ 221.992780][ T7211] ? clear_bhb_loop+0x50/0xa0 [ 221.997462][ T7211] ? clear_bhb_loop+0x50/0xa0 [ 222.002147][ T7211] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 222.008043][ T7211] RIP: 0033:0x7fb5ea83bec9 [ 222.012462][ T7211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.032070][ T7211] RSP: 002b:00007fb5e92a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 222.040483][ T7211] RAX: ffffffffffffffda RBX: 00007fb5eaa92fa0 RCX: 00007fb5ea83bec9 [ 222.048581][ T7211] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 222.056649][ T7211] RBP: 00007fb5e92a4090 R08: 0000000000000000 R09: 0000000000000000 [ 222.064632][ T7211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.072616][ T7211] R13: 00007fb5eaa93038 R14: 00007fb5eaa92fa0 R15: 00007ffd09dc2ac8 [ 222.080624][ T7211] [ 223.435699][ T7254] FAULT_INJECTION: forcing a failure. [ 223.435699][ T7254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.448838][ T7254] CPU: 1 PID: 7254 Comm: syz.2.2084 Tainted: G W syzkaller #0 [ 223.457627][ T7254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 223.467693][ T7254] Call Trace: [ 223.470992][ T7254] [ 223.473950][ T7254] __dump_stack+0x21/0x30 [ 223.478306][ T7254] dump_stack_lvl+0xee/0x150 [ 223.482939][ T7254] ? show_regs_print_info+0x20/0x20 [ 223.488159][ T7254] ? __activate_page+0xd40/0xd40 [ 223.493114][ T7254] dump_stack+0x15/0x20 [ 223.497288][ T7254] should_fail+0x3c1/0x510 [ 223.501727][ T7254] should_fail_usercopy+0x1a/0x20 [ 223.506772][ T7254] copy_page_from_iter_atomic+0x3fb/0x1350 [ 223.512603][ T7254] ? pipe_zero+0x370/0x370 [ 223.517049][ T7254] generic_perform_write+0x307/0x670 [ 223.522362][ T7254] ? grab_cache_page_write_begin+0xb0/0xb0 [ 223.528191][ T7254] ? file_remove_privs+0x590/0x590 [ 223.533415][ T7254] ? rwsem_write_trylock+0x130/0x300 [ 223.538745][ T7254] ? clear_nonspinnable+0x60/0x60 [ 223.543791][ T7254] ? avc_policy_seqno+0x1b/0x70 [ 223.548670][ T7254] __generic_file_write_iter+0x268/0x480 [ 223.554337][ T7254] generic_file_write_iter+0xa9/0x1d0 [ 223.559733][ T7254] vfs_write+0x802/0xf70 [ 223.564010][ T7254] ? file_end_write+0x1b0/0x1b0 [ 223.568884][ T7254] ? wait_for_completion_killable_timeout+0x10/0x10 [ 223.575495][ T7254] ? __fget_files+0x2c4/0x320 [ 223.580203][ T7254] ? __fdget_pos+0x2d2/0x380 [ 223.584820][ T7254] ? ksys_write+0x71/0x240 [ 223.589264][ T7254] ksys_write+0x140/0x240 [ 223.593613][ T7254] ? __ia32_sys_read+0x90/0x90 [ 223.598403][ T7254] ? debug_smp_processor_id+0x17/0x20 [ 223.603808][ T7254] __x64_sys_write+0x7b/0x90 [ 223.608423][ T7254] x64_sys_call+0x8ef/0x9a0 [ 223.612948][ T7254] do_syscall_64+0x4c/0xa0 [ 223.617387][ T7254] ? clear_bhb_loop+0x50/0xa0 [ 223.622070][ T7254] ? clear_bhb_loop+0x50/0xa0 [ 223.626757][ T7254] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.632656][ T7254] RIP: 0033:0x7fa99ab89ec9 [ 223.637069][ T7254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.656674][ T7254] RSP: 002b:00007fa9995f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 223.665089][ T7254] RAX: ffffffffffffffda RBX: 00007fa99ade0fa0 RCX: 00007fa99ab89ec9 [ 223.673058][ T7254] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 223.681047][ T7254] RBP: 00007fa9995f2090 R08: 0000000000000000 R09: 0000000000000000 [ 223.689023][ T7254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.697069][ T7254] R13: 00007fa99ade1038 R14: 00007fa99ade0fa0 R15: 00007ffe390364a8 [ 223.705051][ T7254] [ 229.514723][ T7450] syz.0.2147[7450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.516377][ T7450] syz.0.2147[7450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.696329][ T7516] syz.1.2166[7516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.772289][ T7522] device veth0_vlan left promiscuous mode [ 230.793279][ T7522] device veth0_vlan entered promiscuous mode [ 230.799160][ T7516] syz.1.2166[7516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.806629][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.836393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.844243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.896744][ T7620] bond_slave_1: mtu less than device minimum [ 234.556665][ T7652] device syzkaller0 left promiscuous mode [ 242.056980][ T7840] device syzkaller0 entered promiscuous mode [ 242.067836][ T30] audit: type=1400 audit(1758762144.343:163): avc: denied { create } for pid=7838 comm="syz.3.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 245.948629][ T7863] device veth0_vlan left promiscuous mode [ 246.013923][ T7863] device veth0_vlan entered promiscuous mode [ 246.055138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.063792][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.077606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.117679][ T7888] bond_slave_1: mtu less than device minimum [ 246.230715][ T30] audit: type=1400 audit(1758762148.503:164): avc: denied { create } for pid=7895 comm="syz.4.2285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 246.372546][ T7904] device sit0 left promiscuous mode [ 248.051430][ T7962] device syzkaller0 left promiscuous mode [ 250.313448][ T8038] device syzkaller0 entered promiscuous mode [ 250.776357][ T8049] device sit0 left promiscuous mode [ 250.819208][ T30] audit: type=1400 audit(1758762153.093:165): avc: denied { create } for pid=8062 comm="syz.2.2338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 255.215556][ T8260] syz.4.2393[8260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.215663][ T8260] syz.4.2393[8260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.685956][ T8361] device sit0 entered promiscuous mode [ 261.772874][ T8419] device veth0_vlan left promiscuous mode [ 261.806799][ T8419] device veth0_vlan entered promiscuous mode [ 261.939132][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.957248][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.998090][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.625185][ T8454] device sit0 left promiscuous mode [ 262.835736][ T8455] device sit0 entered promiscuous mode [ 265.887793][ T8608] GPL: port 1(erspan0) entered blocking state [ 265.894132][ T8608] GPL: port 1(erspan0) entered disabled state [ 265.923558][ T8608] device erspan0 entered promiscuous mode [ 265.935526][ T8608] GPL: port 1(erspan0) entered blocking state [ 265.942217][ T8608] GPL: port 1(erspan0) entered forwarding state [ 271.020203][ T8821] device sit0 left promiscuous mode [ 271.165955][ T8830] device sit0 entered promiscuous mode [ 274.697477][ T9029] device sit0 entered promiscuous mode [ 274.985897][ T9038] device sit0 left promiscuous mode [ 275.158262][ T9042] device sit0 entered promiscuous mode [ 275.962935][ T9107] device sit0 entered promiscuous mode [ 276.530904][ T9155] syz.1.2669[9155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.530981][ T9155] syz.1.2669[9155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.381657][ T9274] device wg2 left promiscuous mode [ 279.458682][ T9275] device wg2 entered promiscuous mode [ 280.744781][ T9344] device sit0 left promiscuous mode [ 280.907444][ T9360] device veth0_vlan left promiscuous mode [ 280.925499][ T9360] device veth0_vlan entered promiscuous mode [ 280.962624][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.996103][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.046538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.744451][ T30] audit: type=1400 audit(1758762185.013:166): avc: denied { create } for pid=9421 comm="syz.3.2749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 282.816861][ T9432] device sit0 left promiscuous mode [ 282.919743][ T9432] device sit0 entered promiscuous mode [ 283.095337][ T9451] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.102603][ T9451] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.156571][ T9451] device bridge_slave_1 left promiscuous mode [ 283.178170][ T9451] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.253774][ T9451] device bridge_slave_0 left promiscuous mode [ 283.270227][ T9451] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.403379][ T9463] device veth1_macvtap entered promiscuous mode [ 283.412659][ T9463] device macsec0 entered promiscuous mode [ 283.447615][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.254427][ T9663] syz.3.2825[9663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.254507][ T9663] syz.3.2825[9663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.337590][ T9665] device wg2 entered promiscuous mode [ 291.788621][ T9676] device veth0_vlan left promiscuous mode [ 291.795335][ T9676] device veth0_vlan entered promiscuous mode [ 292.526080][ T30] audit: type=1400 audit(1758762194.793:167): avc: denied { setattr } for pid=9712 comm="syz.4.2839" path=2F6E65742F74756E202864656C6574656429 dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 292.976440][ T9720] device bridge_slave_1 left promiscuous mode [ 292.982729][ T9720] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.046964][ T9720] device bridge_slave_0 left promiscuous mode [ 293.061390][ T9720] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.320245][ T9746] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 295.352202][ T9807] device sit0 left promiscuous mode [ 295.388398][ T9807] device sit0 entered promiscuous mode [ 297.471131][ T9875] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.480663][ T9875] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.801400][ T9902] device syzkaller0 left promiscuous mode [ 301.056853][ T9996] device syzkaller0 entered promiscuous mode [ 301.896820][T10024] device wg2 left promiscuous mode [ 302.498168][ T30] audit: type=1400 audit(1758762204.773:168): avc: denied { mounton } for pid=10057 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 302.616482][T10062] FAULT_INJECTION: forcing a failure. [ 302.616482][T10062] name failslab, interval 1, probability 0, space 0, times 0 [ 302.629463][T10062] CPU: 1 PID: 10062 Comm: syz.1.2945 Tainted: G W syzkaller #0 [ 302.638459][T10062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 302.648705][T10062] Call Trace: [ 302.652053][T10062] [ 302.655120][T10062] __dump_stack+0x21/0x30 [ 302.659499][T10062] dump_stack_lvl+0xee/0x150 [ 302.664253][T10062] ? show_regs_print_info+0x20/0x20 [ 302.669501][T10062] ? avc_has_perm_noaudit+0x2f4/0x460 [ 302.674932][T10062] dump_stack+0x15/0x20 [ 302.679137][T10062] should_fail+0x3c1/0x510 [ 302.683669][T10062] __should_failslab+0xa4/0xe0 [ 302.688482][T10062] should_failslab+0x9/0x20 [ 302.693154][T10062] slab_pre_alloc_hook+0x3b/0xe0 [ 302.698214][T10062] ? __alloc_skb+0xe0/0x740 [ 302.702767][T10062] kmem_cache_alloc+0x44/0x260 [ 302.707577][T10062] __alloc_skb+0xe0/0x740 [ 302.711956][T10062] alloc_skb_with_frags+0xa8/0x620 [ 302.717126][T10062] sock_alloc_send_pskb+0x853/0x980 [ 302.722379][T10062] ? is_bpf_text_address+0x177/0x190 [ 302.727700][T10062] ? __kernel_text_address+0xa0/0x100 [ 302.733134][T10062] ? sock_kzfree_s+0x60/0x60 [ 302.737773][T10062] ? stack_trace_save+0x98/0xe0 [ 302.742667][T10062] tun_get_user+0x4e6/0x33c0 [ 302.747305][T10062] ? __kasan_unpoison_object_data+0x20/0x20 [ 302.753274][T10062] ? kmem_cache_free+0x100/0x320 [ 302.758382][T10062] ? __x64_sys_openat+0x136/0x160 [ 302.763477][T10062] ? x64_sys_call+0x219/0x9a0 [ 302.768209][T10062] ? tun_do_read+0x1c40/0x1c40 [ 302.773039][T10062] ? kstrtouint_from_user+0x1a0/0x200 [ 302.778471][T10062] ? kstrtol_from_user+0x260/0x260 [ 302.783617][T10062] ? putname+0x111/0x160 [ 302.787889][T10062] ? avc_policy_seqno+0x1b/0x70 [ 302.792776][T10062] ? selinux_file_permission+0x2aa/0x510 [ 302.798462][T10062] tun_chr_write_iter+0x1eb/0x2e0 [ 302.803526][T10062] vfs_write+0x802/0xf70 [ 302.807796][T10062] ? file_end_write+0x1b0/0x1b0 [ 302.812708][T10062] ? __fget_files+0x2c4/0x320 [ 302.817440][T10062] ? __fdget_pos+0x1f7/0x380 [ 302.822062][T10062] ? ksys_write+0x71/0x240 [ 302.826508][T10062] ksys_write+0x140/0x240 [ 302.830873][T10062] ? __ia32_sys_read+0x90/0x90 [ 302.835681][T10062] ? debug_smp_processor_id+0x17/0x20 [ 302.841086][T10062] __x64_sys_write+0x7b/0x90 [ 302.845731][T10062] x64_sys_call+0x8ef/0x9a0 [ 302.850341][T10062] do_syscall_64+0x4c/0xa0 [ 302.854810][T10062] ? clear_bhb_loop+0x50/0xa0 [ 302.859527][T10062] ? clear_bhb_loop+0x50/0xa0 [ 302.864341][T10062] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 302.870274][T10062] RIP: 0033:0x7fa53e1b3ec9 [ 302.874730][T10062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.894504][T10062] RSP: 002b:00007fa53cc1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 302.903154][T10062] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b3ec9 [ 302.911154][T10062] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 302.919309][T10062] RBP: 00007fa53cc1c090 R08: 0000000000000000 R09: 0000000000000000 [ 302.927326][T10062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.935363][T10062] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 302.943401][T10062] [ 304.013245][T10106] FAULT_INJECTION: forcing a failure. [ 304.013245][T10106] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 304.053486][T10106] CPU: 0 PID: 10106 Comm: syz.1.2955 Tainted: G W syzkaller #0 [ 304.062415][T10106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 304.072586][T10106] Call Trace: [ 304.075901][T10106] [ 304.078848][T10106] __dump_stack+0x21/0x30 [ 304.083203][T10106] dump_stack_lvl+0xee/0x150 [ 304.087822][T10106] ? show_regs_print_info+0x20/0x20 [ 304.093050][T10106] ? stack_trace_save+0x98/0xe0 [ 304.097940][T10106] dump_stack+0x15/0x20 [ 304.102126][T10106] should_fail+0x3c1/0x510 [ 304.106571][T10106] should_fail_alloc_page+0x55/0x80 [ 304.111802][T10106] prepare_alloc_pages+0x156/0x600 [ 304.116951][T10106] ? __alloc_pages_bulk+0xab0/0xab0 [ 304.122184][T10106] __alloc_pages+0x10a/0x440 [ 304.126889][T10106] ? prep_new_page+0x110/0x110 [ 304.131790][T10106] kmalloc_order+0x4c/0x160 [ 304.136334][T10106] ? alloc_skb_with_frags+0xa8/0x620 [ 304.141652][T10106] kmalloc_order_trace+0x18/0xb0 [ 304.146732][T10106] __kmalloc_track_caller+0x198/0x2c0 [ 304.152162][T10106] ? kmem_cache_alloc+0xf7/0x260 [ 304.157131][T10106] ? alloc_skb_with_frags+0xa8/0x620 [ 304.162486][T10106] __alloc_skb+0x21a/0x740 [ 304.166935][T10106] alloc_skb_with_frags+0xa8/0x620 [ 304.172120][T10106] sock_alloc_send_pskb+0x853/0x980 [ 304.177347][T10106] ? is_bpf_text_address+0x177/0x190 [ 304.182667][T10106] ? __kernel_text_address+0xa0/0x100 [ 304.188101][T10106] ? sock_kzfree_s+0x60/0x60 [ 304.192722][T10106] ? stack_trace_save+0x98/0xe0 [ 304.197611][T10106] tun_get_user+0x4e6/0x33c0 [ 304.202229][T10106] ? __kasan_unpoison_object_data+0x20/0x20 [ 304.208147][T10106] ? kmem_cache_free+0x100/0x320 [ 304.213108][T10106] ? __x64_sys_openat+0x136/0x160 [ 304.218168][T10106] ? x64_sys_call+0x219/0x9a0 [ 304.222888][T10106] ? tun_do_read+0x1c40/0x1c40 [ 304.227678][T10106] ? kstrtouint_from_user+0x1a0/0x200 [ 304.233087][T10106] ? kstrtol_from_user+0x260/0x260 [ 304.238237][T10106] ? putname+0x111/0x160 [ 304.242552][T10106] ? avc_policy_seqno+0x1b/0x70 [ 304.247439][T10106] ? selinux_file_permission+0x2aa/0x510 [ 304.253101][T10106] tun_chr_write_iter+0x1eb/0x2e0 [ 304.258157][T10106] vfs_write+0x802/0xf70 [ 304.262437][T10106] ? file_end_write+0x1b0/0x1b0 [ 304.267312][T10106] ? __fget_files+0x2c4/0x320 [ 304.272013][T10106] ? __fdget_pos+0x1f7/0x380 [ 304.276731][T10106] ? ksys_write+0x71/0x240 [ 304.281189][T10106] ksys_write+0x140/0x240 [ 304.285545][T10106] ? __ia32_sys_read+0x90/0x90 [ 304.290341][T10106] ? debug_smp_processor_id+0x17/0x20 [ 304.295750][T10106] __x64_sys_write+0x7b/0x90 [ 304.300365][T10106] x64_sys_call+0x8ef/0x9a0 [ 304.304893][T10106] do_syscall_64+0x4c/0xa0 [ 304.309333][T10106] ? clear_bhb_loop+0x50/0xa0 [ 304.314014][T10106] ? clear_bhb_loop+0x50/0xa0 [ 304.318696][T10106] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.324614][T10106] RIP: 0033:0x7fa53e1b3ec9 [ 304.329043][T10106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.348652][T10106] RSP: 002b:00007fa53cc1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 304.357070][T10106] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b3ec9 [ 304.365068][T10106] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 304.373134][T10106] RBP: 00007fa53cc1c090 R08: 0000000000000000 R09: 0000000000000000 [ 304.381130][T10106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.389128][T10106] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 304.397130][T10106] [ 304.786929][ T449] device bridge_slave_1 left promiscuous mode [ 304.795379][ T449] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.819217][ T449] device bridge_slave_0 left promiscuous mode [ 304.826630][ T449] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.847297][ T449] device veth1_macvtap left promiscuous mode [ 306.117197][T10164] device wg2 left promiscuous mode [ 306.124780][T10162] FAULT_INJECTION: forcing a failure. [ 306.124780][T10162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.151139][T10162] CPU: 0 PID: 10162 Comm: syz.1.2971 Tainted: G W syzkaller #0 [ 306.160046][T10162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 306.170125][T10162] Call Trace: [ 306.173420][T10162] [ 306.176371][T10162] __dump_stack+0x21/0x30 [ 306.180731][T10162] dump_stack_lvl+0xee/0x150 [ 306.185349][T10162] ? show_regs_print_info+0x20/0x20 [ 306.190579][T10162] dump_stack+0x15/0x20 [ 306.194788][T10162] should_fail+0x3c1/0x510 [ 306.199237][T10162] should_fail_usercopy+0x1a/0x20 [ 306.204308][T10162] _copy_from_iter+0x21a/0x1050 [ 306.209165][T10162] ? __kasan_check_write+0x14/0x20 [ 306.214277][T10162] ? skb_set_owner_w+0x24d/0x370 [ 306.219225][T10162] ? copy_mc_pipe_to_iter+0x770/0x770 [ 306.224644][T10162] ? __kernel_text_address+0xa0/0x100 [ 306.230037][T10162] ? check_stack_object+0x81/0x140 [ 306.235152][T10162] ? __kasan_check_read+0x11/0x20 [ 306.240179][T10162] ? __check_object_size+0x2f4/0x3c0 [ 306.245464][T10162] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 306.251199][T10162] ? skb_put+0x10e/0x1f0 [ 306.255460][T10162] tun_get_user+0xc3c/0x33c0 [ 306.260048][T10162] ? __kasan_unpoison_object_data+0x20/0x20 [ 306.265948][T10162] ? kmem_cache_free+0x100/0x320 [ 306.270928][T10162] ? __x64_sys_openat+0x136/0x160 [ 306.275954][T10162] ? x64_sys_call+0x219/0x9a0 [ 306.280638][T10162] ? tun_do_read+0x1c40/0x1c40 [ 306.285410][T10162] ? kstrtouint_from_user+0x1a0/0x200 [ 306.290800][T10162] ? kstrtol_from_user+0x260/0x260 [ 306.295927][T10162] ? putname+0x111/0x160 [ 306.300171][T10162] ? avc_policy_seqno+0x1b/0x70 [ 306.305114][T10162] ? selinux_file_permission+0x2aa/0x510 [ 306.310749][T10162] tun_chr_write_iter+0x1eb/0x2e0 [ 306.315781][T10162] vfs_write+0x802/0xf70 [ 306.320046][T10162] ? file_end_write+0x1b0/0x1b0 [ 306.324896][T10162] ? __fget_files+0x2c4/0x320 [ 306.329577][T10162] ? __fdget_pos+0x1f7/0x380 [ 306.334177][T10162] ? ksys_write+0x71/0x240 [ 306.338594][T10162] ksys_write+0x140/0x240 [ 306.343048][T10162] ? __ia32_sys_read+0x90/0x90 [ 306.347835][T10162] ? debug_smp_processor_id+0x17/0x20 [ 306.353220][T10162] __x64_sys_write+0x7b/0x90 [ 306.357831][T10162] x64_sys_call+0x8ef/0x9a0 [ 306.362338][T10162] do_syscall_64+0x4c/0xa0 [ 306.366761][T10162] ? clear_bhb_loop+0x50/0xa0 [ 306.371443][T10162] ? clear_bhb_loop+0x50/0xa0 [ 306.376123][T10162] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 306.382017][T10162] RIP: 0033:0x7fa53e1b3ec9 [ 306.386437][T10162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.406042][T10162] RSP: 002b:00007fa53cc1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 306.414458][T10162] RAX: ffffffffffffffda RBX: 00007fa53e40afa0 RCX: 00007fa53e1b3ec9 [ 306.422432][T10162] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 306.430408][T10162] RBP: 00007fa53cc1c090 R08: 0000000000000000 R09: 0000000000000000 [ 306.438381][T10162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.446375][T10162] R13: 00007fa53e40b038 R14: 00007fa53e40afa0 R15: 00007ffdb2881458 [ 306.454361][T10162] [ 306.700887][T10187] device sit0 left promiscuous mode [ 306.751631][T10193] syz.2.2978[10193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.751716][T10193] syz.2.2978[10193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.847223][T10187] device sit0 entered promiscuous mode [ 308.180385][T10237] device wg2 left promiscuous mode [ 308.409066][ T449] GPL: port 1(erspan0) entered disabled state [ 308.427632][ T449] GPL: port 1(erspan0) entered disabled state [ 308.738624][ T449] device veth1_macvtap left promiscuous mode [ 309.076328][T10264] device veth0_vlan left promiscuous mode [ 309.091122][T10264] device veth0_vlan entered promiscuous mode [ 309.161195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.171175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.184011][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.208347][T10299] syz.2.3005[10299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.208424][T10299] syz.2.3005[10299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.746280][T10370] device syzkaller0 left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=2939 state=3 status=67 (errno 32: Broken pipe) [ 313.041830][ T30] audit: type=1400 audit(1758762215.313:169): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14828]" dev="pipefs" ino=14828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 313.147760][ T281] device syz_tun left promiscuous mode [ 313.153312][ T281] Ÿë: port 1(syz_tun) entered disabled state [ 313.245538][ T281] syz-executor (281) used greatest stack depth: 21312 bytes left [ 315.066727][ T449] GPL: port 1(erspan0) entered disabled state [ 315.073473][ T449] GPL: port 1(erspan0) entered disabled state [ 315.080985][ T449] device erspan0 left promiscuous mode [ 315.086553][ T449] GPL: port 1(erspan0) entered disabled state [ 315.094354][ T449] device erspan0 left promiscuous mode [ 315.099876][ T449] GPL: port 1(erspan0) entered disabled state [ 315.468174][ T449] device bridge_slave_1 left promiscuous mode [ 315.474328][ T449] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.481801][ T449] device bridge_slave_0 left promiscuous mode [ 315.487959][ T449] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.496822][ T449] device veth0_vlan left promiscuous mode [ 315.502716][ T449] device veth1_macvtap left promiscuous mode