last executing test programs: 10.84729442s ago: executing program 2 (id=2893): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x882, 0x0) 8.81718429s ago: executing program 2 (id=2893): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x882, 0x0) 7.048497214s ago: executing program 0 (id=3033): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='console\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x90a4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x9, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}, {0x0, 0x2}]}, @fwd={0x7}, @restrict={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e, 0x61, 0x2e]}}, 0x0, 0x5d}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 7.046959884s ago: executing program 3 (id=3035): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000004dd73c7dfee0c6dbc59fb"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000d068", @ANYRES32=0x0, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB='\x00'/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x6, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00'}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x4, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r7}, 0x38) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000005000000000400000b00000001000000", @ANYRES32, @ANYBLOB="0000000000000009e93e9824deeef98e0fffb8113306ffe7717faacd8703d51bf495daa82ff0118df8df88ec8e85ceb5a5424caada4cf442e9cbc558fe2edb734fd45e188d22339600015e1d9e4d388295a116fc2aff78d249f8f403571bae4a235d259633d8a5aaca07cf03388dc31f4e94bb03fee6010001fc39e6e3576372e88a04f99c6a7bade6ffb70824ca99d8542e20b37cf857ce10689c0eef32d2da6fb557ef0f3864dd3de21375ce6aa1774631a39d49e4b23afe", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup=r0, 0x1e, 0x1, 0x800, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0]}, 0x40) 7.044730014s ago: executing program 4 (id=3036): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000005000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) close(r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@typedef={0x6, 0x0, 0x0, 0x8, 0x2}, @typedef={0x7, 0x0, 0x0, 0x8, 0x3}, @fwd={0x7}]}, {0x0, [0x0, 0x30, 0x0, 0x30, 0x5f, 0x5f, 0x61]}}, 0x0, 0x45}, 0x28) getpid() 6.983487895s ago: executing program 0 (id=3037): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0xfffffd18, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x9, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xbd, &(0x7f000000cf3d)=""/189}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6, 0x10, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x80200, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = syz_clone(0x4080, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000007c0)=r3, 0x12) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x97, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) syz_clone(0x10080000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.73715465s ago: executing program 2 (id=2893): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x882, 0x0) 4.869377936s ago: executing program 0 (id=3040): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ffef2d1fb0b7cc00000000000085000000010000000000000000001f6c95d0c92d048a0225300e60d81bdcfbfdf7a3be105101097cbaf3a9a7c49a051d7e32ef18c06274e9488848b1a7c9839b1e1de519a0ae4b5786a588d6f35efdff7ba4f1bb8c088ce26a11ed3c5c76bb9d7ce1dd36cdd5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x7, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1801d590a0190c3169101a30ad2ae923fd9d61cc23bdd2d53002d8ae1e556f6fcae7cf119daf850e7fe6e2e4c85166efb36160fb33be761d9a169998d4e62526000000000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_bp={&(0x7f00000005c0), 0x3}, 0x0, 0x5, 0x0, 0x0, 0x2, 0x10000003}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x9, 0xd, 0x7, 0x0, 0x400, 0x7a5d4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x2, @perf_config_ext={0xffffffbfffffffff, 0x11}, 0x2, 0x101000, 0x6bbcd0f1, 0x8, 0x2, 0x5, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 4.868921736s ago: executing program 1 (id=3041): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000004000000450000008814"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000340)=r0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r7) ioctl$TUNGETVNETHDRSZ(r7, 0x800454d7, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000002e60c358656bf369633770a1c04999af08c133e97d30be9457edc7f6655080049b369b5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r11, &(0x7f0000000780), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0x20a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) 4.868557996s ago: executing program 3 (id=3042): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x7, 0x4, 0x100, 0x5f4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000640)={0x0, 0x0, 0x0, 0xfffffeca, 0x0, 0x5e}, 0x20044084) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x8, r3}, 0x18) sendmsg$tipc(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) sendmsg$inet(r3, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x48000) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x48000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x18) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x3, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x80}, @func], &(0x7f00000003c0)='GPL\x00', 0xe, 0x1000, &(0x7f0000000a00)=""/4096, 0x41100, 0x3, '\x00', r0, 0x0, r13, 0x8, &(0x7f0000000440)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x3, 0x5}, 0x10, 0x2781c, r13, 0x7, &(0x7f00000004c0)=[r4], &(0x7f0000000500)=[{0x0, 0x2, 0x3}, {0x3, 0x2, 0x80d, 0x6}, {0x5, 0x3, 0x9, 0x5}, {0x4, 0x4, 0x9, 0xa}, {0x1, 0x3, 0xc, 0x1}, {0x3, 0x3, 0xc, 0x6}, {0x4, 0x1, 0x4, 0x5}], 0x10, 0x5}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x9, &(0x7f0000000180)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r14}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.868021646s ago: executing program 4 (id=3043): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0xc8, 0x0, 0x0, 0x1, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000700000000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="0000000000000000010000000200"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1f, 0xff, 0xfffffffd, 0x5, 0x28004, 0xffffffffffffffff, 0x0, '\x00', 0x0, r7, 0x4, 0x2, 0x0, 0x0, @value=r7}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r9}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110e22fff6) close(r10) 4.563961622s ago: executing program 4 (id=3044): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f04}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x1, 0x7fe2, 0x1, 0x12}, 0x50) close(0x3) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x230}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x54ca20abe44a4565, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000018000018c739ee22e933c0ce5bf01882075200200009000000000014d50100000476fcfe8e00004562450040"], &(0x7f0000000580)=""/250, 0x39, 0xfa, 0x1}, 0x28) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="090000000800000004000000094000", @ANYRES32=0x0], 0x48) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r5, 0xffffffffffffffff}, &(0x7f0000000040), 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xf, 0x5, 0x10000, 0x200, 0x22156febc61be598, r7, 0x6, '\x00', r8, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x50) close(r6) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'macsec0\x00', @random="2305f39a6997"}) 4.509128173s ago: executing program 1 (id=3045): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb", 0x1}], 0x1, 0x0, 0x0, 0x84}, 0x0) (async, rerun: 64) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) (rerun: 64) close(0xffffffffffffffff) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000010001004900000001", @ANYRESHEX=r1, @ANYBLOB="519ecbc84f7a7033f77b01447d6b1755ca59340a46eb197d74a6fc2712fc545cc5012405d4796d85d7851438f8f4cebac86690f3ce34008cd298debe4425e9c3150d647c8a661b4f377b72ab53139e2d7d84e8e5fcdefcf215051e174188f284bd154db8ae64e4f469980b72d1769541cba1ef2ac5eb289b4fdaf20d0fe92af5725bacc7f552eadee376f002dc98d54a25a694312787a3944e282dec1bfc7ab70b8693923933b124c567bf5b208ed3ccc1b0425e954f3e44065a60ad8c89d1f6d1890b8ad73a9719e5a0c0355cde03a3dc53d7351ab5525542edd8"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00eaff05000001020004000c000000000000177e6120278b55b0bd972c929120438800f79343ea17fa1b4e20bb", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{r4}, &(0x7f0000000740), &(0x7f0000000780)='%pI4 \x00'}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000800000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async, rerun: 64) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xc802b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x149fe477, 0x3, 0x0, 0x0, 0xffffdffe, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB="00160000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffe1, &(0x7f0000000340)=ANY=[@ANYRES32=r6, @ANYRESHEX=r4], 0x128}, 0x0) recvmsg$unix(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x94) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8946, &(0x7f0000000080)) (async, rerun: 64) sendmsg$unix(r8, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) (rerun: 64) 4.486914724s ago: executing program 2 (id=2893): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x882, 0x0) 2.559638801s ago: executing program 0 (id=3046): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'wlan0\x00', 0x1000}) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x496, 0x8, 0xfffffffffffffe45, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32=0x1, @ANYBLOB="ffffffff00"/20, @ANYRES32=r7, @ANYRES32, @ANYBLOB="0000000000000000984809ac189a1f1700"/28], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x72, &(0x7f0000000a80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000b00), &(0x7f0000000b40), 0x8, 0x23, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@bloom_filter={0x1e, 0x4, 0x7, 0x7f, 0x0, r2, 0xcaf02830, '\x00', r8, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0xa}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x20, 0x21, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd79f, 0x0, 0x0, 0x0, 0xd9f}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit, @generic={0x2, 0x8, 0x0, 0x6, 0x9}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0xfff, 0xce, &(0x7f00000007c0)=""/206, 0x41100, 0x10, '\x00', r7, @fallback=0x8, r2, 0x8, &(0x7f0000000240)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0xb, 0x5, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0x1, r6, r2, r2], 0x0, 0x10, 0x2}, 0x94) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1c0000000700000009000000ffffffff80c00000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="04000000030000000400"/20, @ANYRES32, @ANYBLOB="00b949abc5151e7eb2000000"], 0x50) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r11, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="0b000000070000000100010008000000010000e7d70ae610766bf7f49d7d3e06818061", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) 2.559254981s ago: executing program 1 (id=3047): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_int(r6, &(0x7f0000000100)=0x1, 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYRES8=0x0, @ANYRES64=r0, @ANYRES32=0x0], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x25, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r7, 0x5, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.558951761s ago: executing program 3 (id=3048): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061102c00000000001c0000001a0000009580000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 2.558284571s ago: executing program 4 (id=3049): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x108001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, &(0x7f0000000180)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 2.475875733s ago: executing program 3 (id=3050): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000048aa005e850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000200), &(0x7f0000000340)=r3}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r2, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)='%pB \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r4, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff92, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.474278813s ago: executing program 4 (id=3051): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000004000000ff290000000000003b8c00009b4970881daa1f703da9745cebcccafc0218d2f94e7f5eb5885aa094424d4f9956bb8ede425d65fdda3087dcde802c6b11e5b4ad343030f5e953", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ffef2d1fb0b7cc00000000000085000000010000000000000000001f6c95d0c92d048a0225300e60d81bdcfbfdf7a3be105101097cbaf3a9a7c49a051d7e32ef18c06274e9488848b1a7c9839b1e1de519a0ae4b5786a588d6f35efdff7ba4f1bb8c088ce26a11ed3c5c76bb9d7ce1dd36cd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="000000000100"/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000840), 0x4) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(0x0, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) 2.464501113s ago: executing program 1 (id=3052): bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x1}, 0xc10, 0x5}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x28, 0x6, 0x0, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000009951ce2b5b2acc4949a3c30986998453351e4be7f9c40a17838f2c1b7f664bf47046569df59bcf3e95a694de738487f61be096eb090eff3b43f316526d7183914aa742c121f1d0570c4fd1f9701b8f110a"], 0x0, 0x5ddef87d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 2.356701045s ago: executing program 2 (id=2893): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x882, 0x0) 163.563268ms ago: executing program 0 (id=3053): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000f8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdbe30d0b2b4f1a0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@struct={0x7, 0x4, 0x0, 0x4, 0x1, 0x4, [{0x1, 0x5, 0x355a}, {0x1, 0x1, 0x5}, {0x7, 0x4, 0x471b}, {0xc, 0x2, 0x200}]}]}, {0x0, [0x5f, 0x5f, 0x30, 0x30, 0x5f, 0x0, 0x0, 0x2e]}}, &(0x7f0000002340)=""/4096, 0x5e, 0x1000, 0x0, 0xf1, 0x10000}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@generic={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x80108906, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="050000000100000009000000ae00000000000000b00c8bc33d67f3fe6346aca462e42389923d7b40eff4f7e891ed96ded264c3eb504ded96122273a6ea5ce3c2dc946a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x5, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x400000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) recvmsg$unix(r5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xff, 0x7f}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r8}, @generic={0x79, 0x0, 0x0, 0x18}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 162.205438ms ago: executing program 1 (id=3054): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 161.042167ms ago: executing program 3 (id=3055): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x2}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r5, r2, 0x0, r3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r6}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x39}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) 160.475978ms ago: executing program 4 (id=3056): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0)=r5, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$tipc(r6, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)="74d304d5c4", 0x5, 0x4000000}, 0x2000c041) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) r9 = openat$ppp(0xffffffffffffff9c, 0x0, 0x1, 0x0) close(r8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_type(r9, 0x0, 0x0) 116.774909ms ago: executing program 1 (id=3057): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, 0x0, &(0x7f00000007c0)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 43.84519ms ago: executing program 3 (id=3058): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000300)=ANY=[@ANYRESOCT=r1, @ANYBLOB='\x00'/19, @ANYRESHEX=r2, @ANYBLOB], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004feffffffffffffff000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffda) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r5}, 0x10) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000640)="b9ff0300100d690b98caa58cd2906c", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYRESDEC], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa92e}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x4, 0x10}, 0xc) 6.481671ms ago: executing program 2 (id=2893): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000000040000090000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x882, 0x0) 0s ago: executing program 0 (id=3059): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) kernel console output (not intermixed with test programs): vior in the future. [ 26.896190][ T438] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.896539][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.913793][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.924009][ T361] device veth0_vlan entered promiscuous mode [ 26.931919][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.957550][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.972385][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.979827][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.990231][ T361] device veth1_macvtap entered promiscuous mode [ 27.016025][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.032312][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.049099][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 27.049110][ T24] audit: type=1400 audit(1757490677.030:118): avc: denied { write } for pid=448 comm="syz.1.43" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.091965][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.112235][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.152615][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.160940][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.218901][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.240736][ T7] device bridge_slave_1 left promiscuous mode [ 27.248000][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.268703][ T7] device bridge_slave_0 left promiscuous mode [ 27.285568][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.306929][ T7] device veth1_macvtap left promiscuous mode [ 27.329836][ T7] device veth0_vlan left promiscuous mode [ 27.448547][ T464] syz.1.47[464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.448642][ T464] syz.1.47[464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.511243][ T463] syz.1.47[463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.541145][ T463] syz.1.47[463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.649157][ T467] device syzkaller0 entered promiscuous mode [ 27.752388][ T24] audit: type=1400 audit(1757490677.730:119): avc: denied { write } for pid=470 comm="syz.4.50" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 27.870770][ T24] audit: type=1400 audit(1757490677.760:120): avc: denied { open } for pid=470 comm="syz.4.50" path="" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.209590][ T489] device pim6reg1 entered promiscuous mode [ 28.624765][ T24] audit: type=1400 audit(1757490678.610:121): avc: denied { create } for pid=502 comm="syz.4.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 29.040613][ T511] syz.4.61[511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.040684][ T511] syz.4.61[511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.091948][ T512] syz.4.61[512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.142151][ T512] syz.4.61[512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.194497][ T24] audit: type=1400 audit(1757490680.180:122): avc: denied { setopt } for pid=530 comm="syz.3.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.395790][ T24] audit: type=1400 audit(1757490680.380:123): avc: denied { create } for pid=533 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 30.566682][ T24] audit: type=1400 audit(1757490680.540:124): avc: denied { create } for pid=533 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 30.639498][ T548] syz.4.72[548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.639586][ T548] syz.4.72[548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.702252][ T546] syz.4.72[546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.770466][ T550] device pim6reg1 entered promiscuous mode [ 30.790852][ T546] syz.4.72[546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.983442][ T563] device wg2 entered promiscuous mode [ 31.653395][ T583] device macsec0 entered promiscuous mode [ 31.823898][ T587] syz.2.85[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.823967][ T587] syz.2.85[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.876203][ T587] syz.2.85[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.916090][ T587] syz.2.85[587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.057279][ T24] audit: type=1400 audit(1757490682.040:125): avc: denied { create } for pid=599 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.201604][ T24] audit: type=1400 audit(1757490682.180:126): avc: denied { create } for pid=607 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 32.300247][ T614] syz.1.94[614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.300297][ T614] syz.1.94[614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.976846][ T24] audit: type=1400 audit(1757490682.960:127): avc: denied { ioctl } for pid=650 comm="syz.4.106" path="socket:[16604]" dev="sockfs" ino=16604 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.335757][ T724] device sit0 entered promiscuous mode [ 35.078584][ T24] audit: type=1400 audit(1757490685.060:128): avc: denied { tracepoint } for pid=764 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.521103][ T849] device syzkaller0 entered promiscuous mode [ 37.552682][ T852] device wg2 left promiscuous mode [ 37.612459][ T24] audit: type=1400 audit(1757490687.590:129): avc: denied { create } for pid=851 comm="syz.4.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 37.632292][ T857] device wg2 entered promiscuous mode [ 37.692503][ T24] audit: type=1400 audit(1757490687.680:130): avc: denied { create } for pid=863 comm="syz.3.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 38.222878][ T896] device pim6reg1 entered promiscuous mode [ 39.361127][ T940] device syzkaller0 entered promiscuous mode [ 39.416109][ T24] audit: type=1400 audit(1757490689.400:131): avc: denied { ioctl } for pid=943 comm="syz.3.193" path="mnt:[4026532441]" dev="nsfs" ino=4026532441 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.462932][ T24] audit: type=1400 audit(1757490689.450:132): avc: denied { create } for pid=945 comm="syz.2.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 39.986785][ T24] audit: type=1400 audit(1757490689.960:133): avc: denied { create } for pid=968 comm="syz.4.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 40.160531][ T977] device wg2 left promiscuous mode [ 40.173792][ T977] bpf_get_probe_write_proto: 12 callbacks suppressed [ 40.173801][ T977] syz.4.205[977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.183063][ T977] syz.4.205[977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.460312][ T993] device veth0_vlan left promiscuous mode [ 40.527266][ T993] device veth0_vlan entered promiscuous mode [ 40.829307][ T1003] device syzkaller0 entered promiscuous mode [ 41.054116][ T1024] device syzkaller0 entered promiscuous mode [ 41.716669][ T1055] device veth0_vlan left promiscuous mode [ 41.753925][ T1055] device veth0_vlan entered promiscuous mode [ 41.899095][ T1066] device veth0_vlan left promiscuous mode [ 41.907961][ T1066] device veth0_vlan entered promiscuous mode [ 41.925252][ T24] audit: type=1400 audit(1757490691.910:134): avc: denied { relabelfrom } for pid=1054 comm="syz.4.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 42.036232][ T24] audit: type=1400 audit(1757490691.910:135): avc: denied { relabelto } for pid=1054 comm="syz.4.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 42.199191][ T1101] syz.2.241[1101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.199275][ T1101] syz.2.241[1101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.269823][ T1109] syz.2.241[1109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.281671][ T1109] syz.2.241[1109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.342809][ T24] audit: type=1400 audit(1757490692.330:136): avc: denied { create } for pid=1113 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 42.730429][ T1150] syz.0.256[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.730497][ T1150] syz.0.256[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.832848][ T1159] syz.0.256[1159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.963525][ T1159] syz.0.256[1159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.576433][ T24] audit: type=1400 audit(1757490693.560:137): avc: denied { create } for pid=1183 comm="syz.4.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 43.742044][ T1192] device veth0_vlan left promiscuous mode [ 43.791718][ T1192] device veth0_vlan entered promiscuous mode [ 44.012860][ T1213] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 44.149857][ T1235] syz.1.282 uses obsolete (PF_INET,SOCK_PACKET) [ 44.464911][ T1250] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.472958][ T1250] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.822413][ T24] audit: type=1400 audit(1757490694.810:138): avc: denied { attach_queue } for pid=1268 comm="syz.2.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 45.072474][ T1293] FAULT_INJECTION: forcing a failure. [ 45.072474][ T1293] name failslab, interval 1, probability 0, space 0, times 1 [ 45.086037][ T1293] CPU: 0 PID: 1293 Comm: syz.2.300 Not tainted syzkaller #0 [ 45.093328][ T1293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 45.103462][ T1293] Call Trace: [ 45.106743][ T1293] __dump_stack+0x21/0x24 [ 45.111073][ T1293] dump_stack_lvl+0x169/0x1d8 [ 45.115760][ T1293] ? show_regs_print_info+0x18/0x18 [ 45.120939][ T1293] dump_stack+0x15/0x1c [ 45.125081][ T1293] should_fail+0x3c1/0x510 [ 45.129494][ T1293] ? selinux_perf_event_alloc+0x51/0x140 [ 45.135119][ T1293] __should_failslab+0xa4/0xe0 [ 45.139872][ T1293] should_failslab+0x9/0x20 [ 45.144368][ T1293] kmem_cache_alloc_trace+0x3a/0x2e0 [ 45.149645][ T1293] selinux_perf_event_alloc+0x51/0x140 [ 45.155093][ T1293] security_perf_event_alloc+0x62/0x90 [ 45.160542][ T1293] perf_event_alloc+0x1495/0x1990 [ 45.165560][ T1293] __se_sys_perf_event_open+0x6f7/0x1b10 [ 45.171182][ T1293] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 45.176802][ T1293] ? __bpf_trace_sys_enter+0x62/0x70 [ 45.182078][ T1293] __x64_sys_perf_event_open+0xbf/0xd0 [ 45.187533][ T1293] do_syscall_64+0x31/0x40 [ 45.191938][ T1293] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.197818][ T1293] RIP: 0033:0x7fec9755bba9 [ 45.202243][ T1293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.221835][ T1293] RSP: 002b:00007fec95fc4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 45.230240][ T1293] RAX: ffffffffffffffda RBX: 00007fec977a2fa0 RCX: 00007fec9755bba9 [ 45.238199][ T1293] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 45.246152][ T1293] RBP: 00007fec95fc4090 R08: 0000000000000000 R09: 0000000000000000 [ 45.254109][ T1293] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 45.262072][ T1293] R13: 00007fec977a3038 R14: 00007fec977a2fa0 R15: 00007ffc54ab9378 [ 45.866433][ T1331] syz.4.311 (1331) used obsolete PPPIOCDETACH ioctl [ 46.052975][ T1344] FAULT_INJECTION: forcing a failure. [ 46.052975][ T1344] name failslab, interval 1, probability 0, space 0, times 0 [ 46.075554][ T1344] CPU: 1 PID: 1344 Comm: syz.2.315 Not tainted syzkaller #0 [ 46.083057][ T1344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 46.093117][ T1344] Call Trace: [ 46.096411][ T1344] __dump_stack+0x21/0x24 [ 46.100736][ T1344] dump_stack_lvl+0x169/0x1d8 [ 46.105414][ T1344] ? show_regs_print_info+0x18/0x18 [ 46.110621][ T1344] dump_stack+0x15/0x1c [ 46.114782][ T1344] should_fail+0x3c1/0x510 [ 46.119204][ T1344] ? alloc_perf_context+0x59/0x2e0 [ 46.124312][ T1344] __should_failslab+0xa4/0xe0 [ 46.129079][ T1344] should_failslab+0x9/0x20 [ 46.133590][ T1344] kmem_cache_alloc_trace+0x3a/0x2e0 [ 46.138876][ T1344] alloc_perf_context+0x59/0x2e0 [ 46.143813][ T1344] find_get_context+0x34c/0x9e0 [ 46.148679][ T1344] __se_sys_perf_event_open+0x8b9/0x1b10 [ 46.154323][ T1344] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 46.159969][ T1344] ? fpu__clear_all+0x20/0x20 [ 46.164650][ T1344] __x64_sys_perf_event_open+0xbf/0xd0 [ 46.170119][ T1344] do_syscall_64+0x31/0x40 [ 46.174535][ T1344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.180424][ T1344] RIP: 0033:0x7fec9755bba9 [ 46.184838][ T1344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.204444][ T1344] RSP: 002b:00007fec95fc4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 46.212856][ T1344] RAX: ffffffffffffffda RBX: 00007fec977a2fa0 RCX: 00007fec9755bba9 [ 46.220824][ T1344] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 46.228790][ T1344] RBP: 00007fec95fc4090 R08: 0000000000000000 R09: 0000000000000000 [ 46.236753][ T1344] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 46.244717][ T1344] R13: 00007fec977a3038 R14: 00007fec977a2fa0 R15: 00007ffc54ab9378 [ 46.363777][ T1353] device sit0 left promiscuous mode [ 46.437714][ T1360] bpf_get_probe_write_proto: 16 callbacks suppressed [ 46.437723][ T1360] syz.3.322[1360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.452174][ T1360] syz.3.322[1360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.529731][ T1360] syz.3.322[1360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.582641][ T1357] device sit0 entered promiscuous mode [ 46.601234][ T1360] syz.3.322[1360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.723647][ T1377] FAULT_INJECTION: forcing a failure. [ 46.723647][ T1377] name failslab, interval 1, probability 0, space 0, times 0 [ 46.794692][ T1377] CPU: 0 PID: 1377 Comm: syz.4.327 Not tainted syzkaller #0 [ 46.802017][ T1377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 46.812083][ T1377] Call Trace: [ 46.815397][ T1377] __dump_stack+0x21/0x24 [ 46.819712][ T1377] dump_stack_lvl+0x169/0x1d8 [ 46.824384][ T1377] ? show_regs_print_info+0x18/0x18 [ 46.829578][ T1377] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 46.835194][ T1377] dump_stack+0x15/0x1c [ 46.839336][ T1377] should_fail+0x3c1/0x510 [ 46.843731][ T1377] ? __d_alloc+0x2d/0x6a0 [ 46.848045][ T1377] __should_failslab+0xa4/0xe0 [ 46.852787][ T1377] should_failslab+0x9/0x20 [ 46.857269][ T1377] kmem_cache_alloc+0x3d/0x2e0 [ 46.862018][ T1377] __d_alloc+0x2d/0x6a0 [ 46.866157][ T1377] d_alloc_pseudo+0x1d/0x70 [ 46.870643][ T1377] alloc_file_pseudo+0xc8/0x1f0 [ 46.875477][ T1377] ? alloc_empty_file_noaccount+0x80/0x80 [ 46.881181][ T1377] ? __kasan_check_write+0x14/0x20 [ 46.886279][ T1377] anon_inode_getfile+0xa6/0x180 [ 46.891211][ T1377] __se_sys_perf_event_open+0xb6e/0x1b10 [ 46.896832][ T1377] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 46.902448][ T1377] ? __bpf_trace_sys_enter+0x62/0x70 [ 46.907714][ T1377] __x64_sys_perf_event_open+0xbf/0xd0 [ 46.913151][ T1377] do_syscall_64+0x31/0x40 [ 46.917662][ T1377] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.923549][ T1377] RIP: 0033:0x7f6bd2703ba9 [ 46.927941][ T1377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.947528][ T1377] RSP: 002b:00007f6bd116c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 46.955960][ T1377] RAX: ffffffffffffffda RBX: 00007f6bd294afa0 RCX: 00007f6bd2703ba9 [ 46.963916][ T1377] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 46.971876][ T1377] RBP: 00007f6bd116c090 R08: 0000000000000000 R09: 0000000000000000 [ 46.979833][ T1377] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 46.987783][ T1377] R13: 00007f6bd294b038 R14: 00007f6bd294afa0 R15: 00007fffe280e1f8 [ 47.262467][ T1392] syz.0.333[1392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.262544][ T1392] syz.0.333[1392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.395199][ T1392] syz.0.333[1392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.608346][ T1392] syz.0.333[1392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.850486][ T1409] syz.0.338[1409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.922845][ T1409] syz.0.338[1409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.971128][ T24] audit: type=1400 audit(1757490697.950:139): avc: denied { append } for pid=1408 comm="syz.0.338" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 48.398362][ T24] audit: type=1400 audit(1757490698.380:140): avc: denied { create } for pid=1448 comm="syz.2.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 49.266417][ T1475] FAULT_INJECTION: forcing a failure. [ 49.266417][ T1475] name failslab, interval 1, probability 0, space 0, times 0 [ 49.310430][ T1475] CPU: 1 PID: 1475 Comm: syz.3.360 Not tainted syzkaller #0 [ 49.317748][ T1475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 49.327806][ T1475] Call Trace: [ 49.331127][ T1475] __dump_stack+0x21/0x24 [ 49.335469][ T1475] dump_stack_lvl+0x169/0x1d8 [ 49.340152][ T1475] ? show_regs_print_info+0x18/0x18 [ 49.345357][ T1475] dump_stack+0x15/0x1c [ 49.349535][ T1475] should_fail+0x3c1/0x510 [ 49.353964][ T1475] ? alloc_perf_context+0x59/0x2e0 [ 49.359083][ T1475] __should_failslab+0xa4/0xe0 [ 49.363854][ T1475] should_failslab+0x9/0x20 [ 49.368357][ T1475] kmem_cache_alloc_trace+0x3a/0x2e0 [ 49.373649][ T1475] alloc_perf_context+0x59/0x2e0 [ 49.378589][ T1475] find_get_context+0x34c/0x9e0 [ 49.383449][ T1475] __se_sys_perf_event_open+0x8b9/0x1b10 [ 49.389084][ T1475] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 49.394728][ T1475] ? fpu__clear_all+0x20/0x20 [ 49.399409][ T1475] __x64_sys_perf_event_open+0xbf/0xd0 [ 49.404873][ T1475] do_syscall_64+0x31/0x40 [ 49.409292][ T1475] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.415181][ T1475] RIP: 0033:0x7ffb3e48cba9 [ 49.419627][ T1475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.439524][ T1475] RSP: 002b:00007ffb3cef5038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 49.447934][ T1475] RAX: ffffffffffffffda RBX: 00007ffb3e6d3fa0 RCX: 00007ffb3e48cba9 [ 49.455905][ T1475] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 49.464163][ T1475] RBP: 00007ffb3cef5090 R08: 0000000000000000 R09: 0000000000000000 [ 49.472126][ T1475] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 49.480090][ T1475] R13: 00007ffb3e6d4038 R14: 00007ffb3e6d3fa0 R15: 00007ffe36df7978 [ 49.494739][ T24] audit: type=1400 audit(1757490699.480:141): avc: denied { create } for pid=1480 comm="syz.4.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 51.395356][ T24] audit: type=1400 audit(1757490701.380:142): avc: denied { create } for pid=1572 comm="syz.3.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 51.492226][ T1596] bpf_get_probe_write_proto: 16 callbacks suppressed [ 51.492251][ T1596] syz.4.394[1596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.502257][ T1596] syz.4.394[1596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.522607][ T1596] syz.4.394[1596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.534087][ T1596] syz.4.394[1596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.157540][ T1622] syz.2.403[1622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.192208][ T1622] syz.2.403[1622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.211692][ T1627] syz.2.403[1627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.254893][ T1627] syz.2.403[1627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.310479][ T1632] device veth0_vlan left promiscuous mode [ 52.342453][ T1632] device veth0_vlan entered promiscuous mode [ 53.093989][ T1668] syz.1.418[1668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.094064][ T1668] syz.1.418[1668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.207090][ T24] audit: type=1400 audit(1757490703.190:143): avc: denied { create } for pid=1670 comm="syz.3.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 53.928804][ T1711] €Â0fÞ´ç“ù: renamed from pim6reg1 [ 54.383664][ T1734] device syzkaller0 entered promiscuous mode [ 58.968603][ T1872] bpf_get_probe_write_proto: 2 callbacks suppressed [ 58.968612][ T1872] syz.4.484[1872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.985586][ T1872] syz.4.484[1872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.002094][ T1875] syz.2.483[1875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.035283][ T1872] syz.4.484[1872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.061686][ T1875] syz.2.483[1875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.096217][ T1872] syz.4.484[1872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.575500][ T1948] device syzkaller0 entered promiscuous mode [ 60.658425][ T1959] syz.3.512[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.658487][ T1959] syz.3.512[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.672025][ T1959] syz.3.512[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.683351][ T1959] syz.3.512[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.599582][ T24] audit: type=1400 audit(1757490711.580:144): avc: denied { create } for pid=2004 comm="syz.2.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 61.840270][ T2010] device syzkaller0 entered promiscuous mode [ 61.874622][ T2007] device pim6reg1 entered promiscuous mode [ 62.190973][ T2036] device sit0 entered promiscuous mode [ 62.786275][ T2069] device sit0 entered promiscuous mode [ 62.934677][ T2074] device sit0 left promiscuous mode [ 63.924486][ T2137] ------------[ cut here ]------------ [ 63.939949][ T2137] trace type BPF program uses run-time allocation [ 63.951896][ T2137] WARNING: CPU: 1 PID: 2137 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 63.992355][ T2137] Modules linked in: [ 64.031968][ T2137] CPU: 1 PID: 2137 Comm: syz.1.565 Not tainted syzkaller #0 [ 64.104901][ T24] audit: type=1400 audit(1757490714.080:145): avc: denied { create } for pid=2145 comm="syz.4.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 64.150628][ T2137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 64.212044][ T2137] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 64.248417][ T2137] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 e3 c4 2c 05 01 48 c7 c7 00 79 05 85 e8 ca 82 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 64.283087][ T2137] RSP: 0018:ffffc900016ff468 EFLAGS: 00010246 [ 64.337879][ T2137] RAX: f87a006485f64700 RBX: 0000000000000001 RCX: 0000000000080000 [ 64.434429][ T2137] RDX: ffffc9000194c000 RSI: 0000000000002433 RDI: 0000000000002434 [ 64.481843][ T2137] RBP: ffffc900016ff4b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 64.491948][ T2137] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff8881280b4000 [ 64.499958][ T2137] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888110df5000 [ 64.526289][ T2137] FS: 00007fbb7210e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 64.526884][ T2171] device veth0_vlan left promiscuous mode [ 64.535576][ T2137] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 64.547986][ T2137] CR2: 00007ff63c469990 CR3: 0000000116292000 CR4: 00000000003506a0 [ 64.556141][ T2137] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 64.564318][ T2137] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 64.587536][ T2171] device veth0_vlan entered promiscuous mode [ 64.593675][ T2137] Call Trace: [ 64.596995][ T2137] ? __fdget+0x1a1/0x230 [ 64.601250][ T2137] resolve_pseudo_ldimm64+0x526/0x1020 [ 64.645169][ T2137] ? bpf_check+0xd680/0xd680 [ 64.669670][ T2137] ? kvmalloc_node+0x88/0x130 [ 64.677365][ T2137] bpf_check+0x8d4b/0xd680 [ 64.682191][ T2137] ? bpf_get_btf_vmlinux+0x60/0x60 [ 64.687404][ T2137] ? 0xffffffffa002e2fc [ 64.691630][ T2137] ? is_bpf_text_address+0x177/0x190 [ 64.698193][ T2137] ? selinux_bpf_prog_alloc+0x51/0x140 [ 64.703962][ T2137] ? __kernel_text_address+0xa0/0x100 [ 64.721848][ T2137] ? unwind_get_return_address+0x4d/0x90 [ 64.730057][ T2137] ? stack_trace_save+0xe0/0xe0 [ 64.735160][ T2137] ? arch_stack_walk+0xee/0x140 [ 64.740107][ T2137] ? stack_trace_save+0x98/0xe0 [ 64.745341][ T2137] ? stack_trace_snprint+0xf0/0xf0 [ 64.750499][ T2137] ? __kasan_slab_alloc+0x69/0xf0 [ 64.756806][ T2137] ? selinux_bpf_prog_alloc+0x51/0x140 [ 64.762712][ T2137] ? __kasan_kmalloc+0xec/0x110 [ 64.772202][ T2137] ? __kasan_kmalloc+0xda/0x110 [ 64.777150][ T2137] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 64.784792][ T2137] ? selinux_bpf_prog_alloc+0x51/0x140 [ 64.794169][ T2137] ? security_bpf_prog_alloc+0x62/0x90 [ 64.799686][ T2137] ? bpf_prog_load+0x949/0x1420 [ 64.810769][ T2137] ? __se_sys_bpf+0x442/0x680 [ 64.820878][ T2137] ? __x64_sys_bpf+0x7b/0x90 [ 64.825571][ T2137] ? do_syscall_64+0x31/0x40 [ 64.830162][ T2137] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.860678][ T2137] ? memset+0x35/0x40 [ 64.864745][ T2137] ? bpf_obj_name_cpy+0x193/0x1e0 [ 64.869774][ T2137] bpf_prog_load+0xf5a/0x1420 [ 64.874754][ T2137] ? map_freeze+0x320/0x320 [ 64.879306][ T2137] ? selinux_bpf+0xc7/0xf0 [ 64.883859][ T2137] ? security_bpf+0x82/0xa0 [ 64.888503][ T2137] __se_sys_bpf+0x442/0x680 [ 64.893175][ T2137] ? __x64_sys_bpf+0x90/0x90 [ 64.897786][ T2137] ? fpu__clear_all+0x20/0x20 [ 64.931786][ T2137] __x64_sys_bpf+0x7b/0x90 [ 64.938980][ T2137] do_syscall_64+0x31/0x40 [ 64.943808][ T2137] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.949934][ T2137] RIP: 0033:0x7fbb736a5ba9 [ 64.954608][ T2137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.977038][ T2137] RSP: 002b:00007fbb7210e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.985877][ T2137] RAX: ffffffffffffffda RBX: 00007fbb738ecfa0 RCX: 00007fbb736a5ba9 [ 64.993988][ T2137] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 65.005823][ T2137] RBP: 00007fbb73728e19 R08: 0000000000000000 R09: 0000000000000000 [ 65.041879][ T2137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 65.049885][ T2137] R13: 00007fbb738ed038 R14: 00007fbb738ecfa0 R15: 00007fff9b980e68 [ 65.081405][ T2137] ---[ end trace a68cac8e51821e1e ]--- [ 65.093849][ T2198] bpf_get_probe_write_proto: 4 callbacks suppressed [ 65.093855][ T2198] syz.3.585[2198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.102806][ T2198] syz.3.585[2198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.257029][ T2198] device veth0_vlan left promiscuous mode [ 65.286210][ T2198] device veth0_vlan entered promiscuous mode [ 65.808858][ T2220] syz.0.593[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.808928][ T2220] syz.0.593[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.904293][ T2220] syz.0.593[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.925714][ T2220] syz.0.593[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.653365][ T2259] device sit0 left promiscuous mode [ 66.977279][ T2273] syz.1.610[2273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.977354][ T2273] syz.1.610[2273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.042382][ T2273] syz.1.610[2273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.056270][ T2279] device pim6reg1 entered promiscuous mode [ 67.074456][ T2273] syz.1.610[2273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.481415][ T2311] ÿÿÿÿÿÿ: renamed from vlan1 [ 67.678967][ T2339] device wg2 entered promiscuous mode [ 67.895223][ T2343] device syzkaller0 entered promiscuous mode [ 67.907215][ T2353] device sit0 entered promiscuous mode [ 69.825619][ T2414] device veth0_vlan left promiscuous mode [ 69.845795][ T2414] device veth0_vlan entered promiscuous mode [ 69.860455][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.868984][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.880799][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 70.191620][ T2436] bpf_get_probe_write_proto: 6 callbacks suppressed [ 70.191629][ T2436] syz.3.665[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.191685][ T2435] syz.3.665[2435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.198541][ T2436] syz.3.665[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.511320][ T2540] device syzkaller0 entered promiscuous mode [ 72.042302][ T24] audit: type=1400 audit(1757490722.030:146): avc: denied { create } for pid=2560 comm="syz.4.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 73.115932][ T2624] device sit0 entered promiscuous mode [ 73.313179][ T2634] syz.0.717[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.313255][ T2634] syz.0.717[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.348712][ T2634] syz.0.717[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.378168][ T2634] syz.0.717[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.336530][ T2679] syz.0.734[2679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.397578][ T2679] syz.0.734[2679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.447410][ T2679] syz.0.734[2679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.538783][ T2721] bpf_get_probe_write_proto: 1 callbacks suppressed [ 75.538790][ T2721] syz.3.746[2721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.556642][ T2723] syz.0.747[2723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.556728][ T2723] syz.0.747[2723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.591343][ T2716] syz.1.745[2716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.607888][ T2716] syz.1.745[2716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.611933][ T2721] syz.3.746[2721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.630950][ T2723] syz.0.747[2723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.653977][ T2716] syz.1.745[2716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.665415][ T2723] syz.0.747[2723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.676937][ T2716] syz.1.745[2716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.992853][ T2738] device veth0_vlan left promiscuous mode [ 76.032282][ T2738] device veth0_vlan entered promiscuous mode [ 76.097389][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.143370][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.177028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.296422][ T2843] device syzkaller0 entered promiscuous mode [ 79.007575][ T24] audit: type=1400 audit(1757490728.990:147): avc: denied { create } for pid=2891 comm="syz.4.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 79.642902][ T2934] device sit0 left promiscuous mode [ 79.792528][ T2959] device sit0 left promiscuous mode [ 79.821827][ T2954] device wg2 entered promiscuous mode [ 79.827971][ T2959] device sit0 entered promiscuous mode [ 80.422995][ T2993] device veth0_vlan left promiscuous mode [ 80.429091][ T2993] device veth0_vlan entered promiscuous mode [ 80.438945][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.447368][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.455328][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 80.574000][ T3001] device wg2 entered promiscuous mode [ 80.766724][ T3025] FAULT_INJECTION: forcing a failure. [ 80.766724][ T3025] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 80.818680][ T3025] CPU: 0 PID: 3025 Comm: syz.3.841 Tainted: G W syzkaller #0 [ 80.827394][ T3025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 80.837442][ T3025] Call Trace: [ 80.840731][ T3025] __dump_stack+0x21/0x24 [ 80.845049][ T3025] dump_stack_lvl+0x169/0x1d8 [ 80.849724][ T3025] ? show_regs_print_info+0x18/0x18 [ 80.854914][ T3025] dump_stack+0x15/0x1c [ 80.859082][ T3025] should_fail+0x3c1/0x510 [ 80.863490][ T3025] should_fail_usercopy+0x1a/0x20 [ 80.868514][ T3025] copy_page_from_iter+0x381/0x6c0 [ 80.873617][ T3025] pipe_write+0x914/0x1890 [ 80.878029][ T3025] ? pipe_write+0xe1/0x1890 [ 80.882529][ T3025] ? pipe_read+0xfe0/0xfe0 [ 80.886935][ T3025] ? fsnotify_perm+0x66/0x4b0 [ 80.891613][ T3025] ? security_file_permission+0x83/0xa0 [ 80.897157][ T3025] ? iov_iter_init+0x3f/0x120 [ 80.901830][ T3025] vfs_write+0x725/0xd60 [ 80.906072][ T3025] ? kernel_write+0x3c0/0x3c0 [ 80.910758][ T3025] ? __fget_files+0x2c4/0x320 [ 80.915427][ T3025] ? __fdget_pos+0x1f7/0x380 [ 80.920018][ T3025] ? ksys_write+0x71/0x240 [ 80.924426][ T3025] ksys_write+0x140/0x240 [ 80.928743][ T3025] ? __ia32_sys_read+0x90/0x90 [ 80.933505][ T3025] ? fpu__clear_all+0x20/0x20 [ 80.938173][ T3025] __x64_sys_write+0x7b/0x90 [ 80.942755][ T3025] do_syscall_64+0x31/0x40 [ 80.947167][ T3025] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 80.953054][ T3025] RIP: 0033:0x7ffb3e48cba9 [ 80.957466][ T3025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.977066][ T3025] RSP: 002b:00007ffb3cef5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 80.985485][ T3025] RAX: ffffffffffffffda RBX: 00007ffb3e6d3fa0 RCX: 00007ffb3e48cba9 [ 80.993449][ T3025] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 81.001417][ T3025] RBP: 00007ffb3cef5090 R08: 0000000000000000 R09: 0000000000000000 [ 81.009385][ T3025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.017354][ T3025] R13: 00007ffb3e6d4038 R14: 00007ffb3e6d3fa0 R15: 00007ffe36df7978 [ 81.187473][ T3048] device veth0_vlan left promiscuous mode [ 81.201889][ T3048] device veth0_vlan entered promiscuous mode [ 81.218422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 81.232687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 81.241282][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.282027][ T3062] device syzkaller0 entered promiscuous mode [ 81.352208][ T3072] FAULT_INJECTION: forcing a failure. [ 81.352208][ T3072] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 81.365645][ T3072] CPU: 0 PID: 3072 Comm: syz.4.855 Tainted: G W syzkaller #0 [ 81.374311][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 81.384350][ T3072] Call Trace: [ 81.387635][ T3072] __dump_stack+0x21/0x24 [ 81.391959][ T3072] dump_stack_lvl+0x169/0x1d8 [ 81.396635][ T3072] ? show_regs_print_info+0x18/0x18 [ 81.401825][ T3072] ? do_kern_addr_fault+0x80/0x80 [ 81.406846][ T3072] ? unwind_get_return_address+0x4d/0x90 [ 81.412470][ T3072] dump_stack+0x15/0x1c [ 81.416632][ T3072] should_fail+0x3c1/0x510 [ 81.421041][ T3072] should_fail_alloc_page+0x4f/0x60 [ 81.426228][ T3072] __alloc_pages_nodemask+0x109/0x5f0 [ 81.431598][ T3072] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 81.437138][ T3072] ? copy_user_enhanced_fast_string+0xe/0x40 [ 81.443110][ T3072] pipe_write+0x570/0x1890 [ 81.447520][ T3072] ? pipe_write+0xe1/0x1890 [ 81.452024][ T3072] ? pipe_read+0xfe0/0xfe0 [ 81.456515][ T3072] ? fsnotify_perm+0x66/0x4b0 [ 81.461325][ T3072] ? security_file_permission+0x83/0xa0 [ 81.466878][ T3072] ? iov_iter_init+0x3f/0x120 [ 81.471634][ T3072] vfs_write+0x725/0xd60 [ 81.475878][ T3072] ? kernel_write+0x3c0/0x3c0 [ 81.480575][ T3072] ? __fget_files+0x2c4/0x320 [ 81.485240][ T3072] ? __fdget_pos+0x1f7/0x380 [ 81.489824][ T3072] ? ksys_write+0x71/0x240 [ 81.494237][ T3072] ksys_write+0x140/0x240 [ 81.498562][ T3072] ? __ia32_sys_read+0x90/0x90 [ 81.503317][ T3072] ? fpu__clear_all+0x20/0x20 [ 81.507983][ T3072] __x64_sys_write+0x7b/0x90 [ 81.512559][ T3072] do_syscall_64+0x31/0x40 [ 81.516963][ T3072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 81.522840][ T3072] RIP: 0033:0x7f6bd2703ba9 [ 81.527246][ T3072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.546936][ T3072] RSP: 002b:00007f6bd116c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 81.555338][ T3072] RAX: ffffffffffffffda RBX: 00007f6bd294afa0 RCX: 00007f6bd2703ba9 [ 81.563379][ T3072] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 81.571366][ T3072] RBP: 00007f6bd116c090 R08: 0000000000000000 R09: 0000000000000000 [ 81.579330][ T3072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.587294][ T3072] R13: 00007f6bd294b038 R14: 00007f6bd294afa0 R15: 00007fffe280e1f8 [ 81.752216][ T3080] device wg2 left promiscuous mode [ 82.548416][ T3118] bpf_get_probe_write_proto: 26 callbacks suppressed [ 82.548425][ T3118] syz.4.870[3118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.592461][ T3118] syz.4.870[3118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.688495][ T3123] device syzkaller0 entered promiscuous mode [ 82.825252][ T3143] FAULT_INJECTION: forcing a failure. [ 82.825252][ T3143] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 82.842863][ T3143] CPU: 0 PID: 3143 Comm: syz.0.878 Tainted: G W syzkaller #0 [ 82.851547][ T3143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 82.861602][ T3143] Call Trace: [ 82.864900][ T3143] __dump_stack+0x21/0x24 [ 82.869220][ T3143] dump_stack_lvl+0x169/0x1d8 [ 82.873884][ T3143] ? show_regs_print_info+0x18/0x18 [ 82.879066][ T3143] ? do_kern_addr_fault+0x80/0x80 [ 82.884079][ T3143] ? unwind_get_return_address+0x4d/0x90 [ 82.889702][ T3143] dump_stack+0x15/0x1c [ 82.893878][ T3143] should_fail+0x3c1/0x510 [ 82.898368][ T3143] should_fail_alloc_page+0x4f/0x60 [ 82.903550][ T3143] __alloc_pages_nodemask+0x109/0x5f0 [ 82.908908][ T3143] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 82.914439][ T3143] ? copy_user_enhanced_fast_string+0xe/0x40 [ 82.920405][ T3143] pipe_write+0x570/0x1890 [ 82.924812][ T3143] ? pipe_write+0xe1/0x1890 [ 82.929302][ T3143] ? pipe_read+0xfe0/0xfe0 [ 82.933704][ T3143] ? fsnotify_perm+0x66/0x4b0 [ 82.938503][ T3143] ? security_file_permission+0x83/0xa0 [ 82.944062][ T3143] ? iov_iter_init+0x3f/0x120 [ 82.948727][ T3143] vfs_write+0x725/0xd60 [ 82.952974][ T3143] ? __kasan_slab_free+0x11/0x20 [ 82.957901][ T3143] ? kernel_write+0x3c0/0x3c0 [ 82.962563][ T3143] ? __fget_files+0x2c4/0x320 [ 82.967222][ T3143] ? __fdget_pos+0x1f7/0x380 [ 82.971801][ T3143] ? ksys_write+0x71/0x240 [ 82.976204][ T3143] ksys_write+0x140/0x240 [ 82.980537][ T3143] ? __ia32_sys_read+0x90/0x90 [ 82.985289][ T3143] ? fpu__clear_all+0x20/0x20 [ 82.989955][ T3143] __x64_sys_write+0x7b/0x90 [ 82.994531][ T3143] do_syscall_64+0x31/0x40 [ 82.998934][ T3143] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 83.004818][ T3143] RIP: 0033:0x7ff63da21ba9 [ 83.009225][ T3143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.028817][ T3143] RSP: 002b:00007ff63c48a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 83.037211][ T3143] RAX: ffffffffffffffda RBX: 00007ff63dc68fa0 RCX: 00007ff63da21ba9 [ 83.045253][ T3143] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 83.053208][ T3143] RBP: 00007ff63c48a090 R08: 0000000000000000 R09: 0000000000000000 [ 83.061192][ T3143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.069151][ T3143] R13: 00007ff63dc69038 R14: 00007ff63dc68fa0 R15: 00007ffd4d37c8d8 [ 83.234955][ T3153] syz.0.883[3153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.235025][ T3153] syz.0.883[3153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.350997][ T3157] syz.0.883[3157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.442232][ T3157] syz.0.883[3157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.466535][ T3162] device veth0_vlan left promiscuous mode [ 83.547135][ T3162] device veth0_vlan entered promiscuous mode [ 83.561905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.618045][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.706916][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.199533][ T3189] device wg2 entered promiscuous mode [ 84.314300][ T3199] syz.1.898[3199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.314351][ T3199] syz.1.898[3199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.342996][ T3197] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 84.365418][ T3200] syz.1.898[3200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.392479][ T3205] syz.0.900[3205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.409685][ T3208] device pim6reg1 entered promiscuous mode [ 84.468816][ T3211] device sit0 entered promiscuous mode [ 84.661053][ T3218] -1: renamed from syzkaller0 [ 85.580873][ T3241] device syzkaller0 entered promiscuous mode [ 85.944690][ T3280] ªªªªªª: renamed from vlan0 [ 86.198228][ T3309] FAULT_INJECTION: forcing a failure. [ 86.198228][ T3309] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.274704][ T3309] CPU: 1 PID: 3309 Comm: syz.4.934 Tainted: G W syzkaller #0 [ 86.283416][ T3309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 86.293466][ T3309] Call Trace: [ 86.296762][ T3309] __dump_stack+0x21/0x24 [ 86.301096][ T3309] dump_stack_lvl+0x169/0x1d8 [ 86.305806][ T3309] ? show_regs_print_info+0x18/0x18 [ 86.311011][ T3309] dump_stack+0x15/0x1c [ 86.315186][ T3309] should_fail+0x3c1/0x510 [ 86.319605][ T3309] should_fail_usercopy+0x1a/0x20 [ 86.324649][ T3309] copy_page_from_iter+0x381/0x6c0 [ 86.329781][ T3309] pipe_write+0x914/0x1890 [ 86.334184][ T3309] ? pipe_write+0xe1/0x1890 [ 86.338700][ T3309] ? pipe_read+0xfe0/0xfe0 [ 86.343098][ T3309] ? fsnotify_perm+0x66/0x4b0 [ 86.347817][ T3309] ? security_file_permission+0x83/0xa0 [ 86.353349][ T3309] ? iov_iter_init+0x3f/0x120 [ 86.358013][ T3309] vfs_write+0x725/0xd60 [ 86.362258][ T3309] ? __kasan_slab_free+0x11/0x20 [ 86.367203][ T3309] ? kernel_write+0x3c0/0x3c0 [ 86.371870][ T3309] ? __fget_files+0x2c4/0x320 [ 86.376555][ T3309] ? __fdget_pos+0x1f7/0x380 [ 86.381221][ T3309] ? ksys_write+0x71/0x240 [ 86.385641][ T3309] ksys_write+0x140/0x240 [ 86.389959][ T3309] ? __ia32_sys_read+0x90/0x90 [ 86.394706][ T3309] ? fpu__clear_all+0x20/0x20 [ 86.399389][ T3309] __x64_sys_write+0x7b/0x90 [ 86.403970][ T3309] do_syscall_64+0x31/0x40 [ 86.408387][ T3309] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 86.414267][ T3309] RIP: 0033:0x7f6bd2703ba9 [ 86.418671][ T3309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.438258][ T3309] RSP: 002b:00007f6bd116c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 86.446659][ T3309] RAX: ffffffffffffffda RBX: 00007f6bd294afa0 RCX: 00007f6bd2703ba9 [ 86.454624][ T3309] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 86.462601][ T3309] RBP: 00007f6bd116c090 R08: 0000000000000000 R09: 0000000000000000 [ 86.470559][ T3309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 86.478521][ T3309] R13: 00007f6bd294b038 R14: 00007f6bd294afa0 R15: 00007fffe280e1f8 [ 87.132383][ T3356] FAULT_INJECTION: forcing a failure. [ 87.132383][ T3356] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 87.183078][ T3356] CPU: 1 PID: 3356 Comm: syz.1.946 Tainted: G W syzkaller #0 [ 87.191781][ T3356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 87.201840][ T3356] Call Trace: [ 87.205140][ T3356] __dump_stack+0x21/0x24 [ 87.209485][ T3356] dump_stack_lvl+0x169/0x1d8 [ 87.214168][ T3356] ? show_regs_print_info+0x18/0x18 [ 87.219375][ T3356] ? do_kern_addr_fault+0x80/0x80 [ 87.224404][ T3356] ? unwind_get_return_address+0x4d/0x90 [ 87.230046][ T3356] dump_stack+0x15/0x1c [ 87.234201][ T3356] should_fail+0x3c1/0x510 [ 87.238619][ T3356] should_fail_alloc_page+0x4f/0x60 [ 87.243915][ T3356] __alloc_pages_nodemask+0x109/0x5f0 [ 87.249290][ T3356] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 87.254839][ T3356] ? copy_user_enhanced_fast_string+0xe/0x40 [ 87.260910][ T3356] pipe_write+0x570/0x1890 [ 87.265337][ T3356] ? pipe_write+0xe1/0x1890 [ 87.269846][ T3356] ? pipe_read+0xfe0/0xfe0 [ 87.274266][ T3356] ? fsnotify_perm+0x66/0x4b0 [ 87.278951][ T3356] ? security_file_permission+0x83/0xa0 [ 87.284495][ T3356] ? iov_iter_init+0x3f/0x120 [ 87.289172][ T3356] vfs_write+0x725/0xd60 [ 87.293519][ T3356] ? __kasan_slab_free+0x11/0x20 [ 87.298462][ T3356] ? kernel_write+0x3c0/0x3c0 [ 87.303147][ T3356] ? __fget_files+0x2c4/0x320 [ 87.307834][ T3356] ? __fdget_pos+0x1f7/0x380 [ 87.312423][ T3356] ? ksys_write+0x71/0x240 [ 87.316851][ T3356] ksys_write+0x140/0x240 [ 87.321226][ T3356] ? __ia32_sys_read+0x90/0x90 [ 87.326001][ T3356] ? fpu__clear_all+0x20/0x20 [ 87.330675][ T3356] __x64_sys_write+0x7b/0x90 [ 87.335267][ T3356] do_syscall_64+0x31/0x40 [ 87.339691][ T3356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 87.345594][ T3356] RIP: 0033:0x7fbb736a5ba9 [ 87.350015][ T3356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.369618][ T3356] RSP: 002b:00007fbb7210e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 87.378025][ T3356] RAX: ffffffffffffffda RBX: 00007fbb738ecfa0 RCX: 00007fbb736a5ba9 [ 87.385986][ T3356] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 87.393947][ T3356] RBP: 00007fbb7210e090 R08: 0000000000000000 R09: 0000000000000000 [ 87.401907][ T3356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 87.409866][ T3356] R13: 00007fbb738ed038 R14: 00007fbb738ecfa0 R15: 00007fff9b980e68 [ 87.833051][ T3402] device wg2 left promiscuous mode [ 87.945180][ T3406] FAULT_INJECTION: forcing a failure. [ 87.945180][ T3406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.015619][ T3406] CPU: 0 PID: 3406 Comm: syz.2.961 Tainted: G W syzkaller #0 [ 88.024413][ T3406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 88.034471][ T3406] Call Trace: [ 88.037766][ T3406] __dump_stack+0x21/0x24 [ 88.042103][ T3406] dump_stack_lvl+0x169/0x1d8 [ 88.046783][ T3406] ? show_regs_print_info+0x18/0x18 [ 88.051989][ T3406] dump_stack+0x15/0x1c [ 88.056146][ T3406] should_fail+0x3c1/0x510 [ 88.060564][ T3406] should_fail_usercopy+0x1a/0x20 [ 88.065585][ T3406] copy_page_from_iter+0x381/0x6c0 [ 88.070681][ T3406] pipe_write+0x914/0x1890 [ 88.075083][ T3406] ? pipe_write+0xe1/0x1890 [ 88.079578][ T3406] ? pipe_read+0xfe0/0xfe0 [ 88.083980][ T3406] ? fsnotify_perm+0x66/0x4b0 [ 88.088643][ T3406] ? security_file_permission+0x83/0xa0 [ 88.094195][ T3406] ? iov_iter_init+0x3f/0x120 [ 88.098854][ T3406] vfs_write+0x725/0xd60 [ 88.103078][ T3406] ? __bpf_trace_kmem_free+0x6f/0x90 [ 88.108355][ T3406] ? kernel_write+0x3c0/0x3c0 [ 88.113028][ T3406] ? __fget_files+0x2c4/0x320 [ 88.117705][ T3406] ? __fdget_pos+0x1f7/0x380 [ 88.122293][ T3406] ? ksys_write+0x71/0x240 [ 88.126733][ T3406] ksys_write+0x140/0x240 [ 88.131062][ T3406] ? __ia32_sys_read+0x90/0x90 [ 88.135838][ T3406] ? fpu__clear_all+0x20/0x20 [ 88.140528][ T3406] __x64_sys_write+0x7b/0x90 [ 88.145127][ T3406] do_syscall_64+0x31/0x40 [ 88.149552][ T3406] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 88.155439][ T3406] RIP: 0033:0x7fec9755bba9 [ 88.159858][ T3406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.179595][ T3406] RSP: 002b:00007fec95fc4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 88.188027][ T3406] RAX: ffffffffffffffda RBX: 00007fec977a2fa0 RCX: 00007fec9755bba9 [ 88.195998][ T3406] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 88.203966][ T3406] RBP: 00007fec95fc4090 R08: 0000000000000000 R09: 0000000000000000 [ 88.211936][ T3406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 88.219913][ T3406] R13: 00007fec977a3038 R14: 00007fec977a2fa0 R15: 00007ffc54ab9378 [ 88.320246][ T3402] device wg2 entered promiscuous mode [ 88.678517][ T3439] device veth0_vlan left promiscuous mode [ 88.743979][ T3439] device veth0_vlan entered promiscuous mode [ 88.809608][ T3442] lo: mtu less than device minimum [ 89.664976][ T3487] bpf_get_probe_write_proto: 14 callbacks suppressed [ 89.664985][ T3487] syz.2.984[3487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.683925][ T3487] syz.2.984[3487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.731552][ T3485] device veth0_vlan left promiscuous mode [ 89.827162][ T3485] device veth0_vlan entered promiscuous mode [ 90.456642][ T3535] syz.4.997[3535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.456739][ T3535] syz.4.997[3535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.513344][ T3539] device syzkaller0 entered promiscuous mode [ 91.438280][ T3568] syz.1.1010[3568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.438360][ T3568] syz.1.1010[3568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.463251][ T3564] device pim6reg1 entered promiscuous mode [ 91.603623][ T3594] FAULT_INJECTION: forcing a failure. [ 91.603623][ T3594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 91.631811][ T3594] CPU: 0 PID: 3594 Comm: syz.1.1016 Tainted: G W syzkaller #0 [ 91.640617][ T3594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 91.650661][ T3594] Call Trace: [ 91.653931][ T3594] __dump_stack+0x21/0x24 [ 91.658243][ T3594] dump_stack_lvl+0x169/0x1d8 [ 91.662907][ T3594] ? show_regs_print_info+0x18/0x18 [ 91.668089][ T3594] ? do_kern_addr_fault+0x80/0x80 [ 91.673099][ T3594] ? unwind_get_return_address+0x4d/0x90 [ 91.678713][ T3594] dump_stack+0x15/0x1c [ 91.682850][ T3594] should_fail+0x3c1/0x510 [ 91.687247][ T3594] should_fail_alloc_page+0x4f/0x60 [ 91.692426][ T3594] __alloc_pages_nodemask+0x109/0x5f0 [ 91.697783][ T3594] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 91.703310][ T3594] ? copy_user_enhanced_fast_string+0xe/0x40 [ 91.709282][ T3594] pipe_write+0x570/0x1890 [ 91.713688][ T3594] ? pipe_write+0xe1/0x1890 [ 91.718211][ T3594] ? pipe_read+0xfe0/0xfe0 [ 91.722609][ T3594] ? fsnotify_perm+0x66/0x4b0 [ 91.727290][ T3594] ? security_file_permission+0x83/0xa0 [ 91.732818][ T3594] ? iov_iter_init+0x3f/0x120 [ 91.737491][ T3594] vfs_write+0x725/0xd60 [ 91.741716][ T3594] ? __kasan_slab_free+0x11/0x20 [ 91.746655][ T3594] ? kernel_write+0x3c0/0x3c0 [ 91.751319][ T3594] ? __fget_files+0x2c4/0x320 [ 91.755978][ T3594] ? __fdget_pos+0x1f7/0x380 [ 91.760555][ T3594] ? ksys_write+0x71/0x240 [ 91.764956][ T3594] ksys_write+0x140/0x240 [ 91.769272][ T3594] ? __ia32_sys_read+0x90/0x90 [ 91.774036][ T3594] ? fpu__clear_all+0x20/0x20 [ 91.778694][ T3594] __x64_sys_write+0x7b/0x90 [ 91.783288][ T3594] do_syscall_64+0x31/0x40 [ 91.787723][ T3594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.793595][ T3594] RIP: 0033:0x7fbb736a5ba9 [ 91.797991][ T3594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.817578][ T3594] RSP: 002b:00007fbb7210e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 91.825969][ T3594] RAX: ffffffffffffffda RBX: 00007fbb738ecfa0 RCX: 00007fbb736a5ba9 [ 91.833924][ T3594] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 91.841883][ T3594] RBP: 00007fbb7210e090 R08: 0000000000000000 R09: 0000000000000000 [ 91.849861][ T3594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 91.857824][ T3594] R13: 00007fbb738ed038 R14: 00007fbb738ecfa0 R15: 00007fff9b980e68 [ 92.028697][ T3616] syz.4.1022[3616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.028777][ T3616] syz.4.1022[3616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.088732][ T24] audit: type=1400 audit(1757490742.070:148): avc: denied { create } for pid=3618 comm="syz.1.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 92.152207][ T3631] FAULT_INJECTION: forcing a failure. [ 92.152207][ T3631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.165349][ T3631] CPU: 1 PID: 3631 Comm: syz.3.1028 Tainted: G W syzkaller #0 [ 92.174097][ T3631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 92.184156][ T3631] Call Trace: [ 92.187447][ T3631] __dump_stack+0x21/0x24 [ 92.191758][ T3631] dump_stack_lvl+0x169/0x1d8 [ 92.196417][ T3631] ? show_regs_print_info+0x18/0x18 [ 92.201600][ T3631] dump_stack+0x15/0x1c [ 92.205738][ T3631] should_fail+0x3c1/0x510 [ 92.210163][ T3631] should_fail_usercopy+0x1a/0x20 [ 92.215170][ T3631] copy_page_from_iter+0x381/0x6c0 [ 92.220264][ T3631] pipe_write+0x914/0x1890 [ 92.224671][ T3631] ? pipe_write+0xe1/0x1890 [ 92.229210][ T3631] ? pipe_read+0xfe0/0xfe0 [ 92.233629][ T3631] ? fsnotify_perm+0x66/0x4b0 [ 92.238292][ T3631] ? security_file_permission+0x83/0xa0 [ 92.243819][ T3631] ? iov_iter_init+0x3f/0x120 [ 92.248479][ T3631] vfs_write+0x725/0xd60 [ 92.252702][ T3631] ? putname+0xfe/0x150 [ 92.256846][ T3631] ? kernel_write+0x3c0/0x3c0 [ 92.261511][ T3631] ? __fget_files+0x2c4/0x320 [ 92.266185][ T3631] ? __fdget_pos+0x1f7/0x380 [ 92.270783][ T3631] ? ksys_write+0x71/0x240 [ 92.275199][ T3631] ksys_write+0x140/0x240 [ 92.279521][ T3631] ? __ia32_sys_read+0x90/0x90 [ 92.284277][ T3631] ? fpu__clear_all+0x20/0x20 [ 92.288940][ T3631] __x64_sys_write+0x7b/0x90 [ 92.293516][ T3631] do_syscall_64+0x31/0x40 [ 92.297926][ T3631] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 92.303820][ T3631] RIP: 0033:0x7ffb3e48cba9 [ 92.308227][ T3631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.327817][ T3631] RSP: 002b:00007ffb3cef5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 92.336237][ T3631] RAX: ffffffffffffffda RBX: 00007ffb3e6d3fa0 RCX: 00007ffb3e48cba9 [ 92.344214][ T3631] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 92.352182][ T3631] RBP: 00007ffb3cef5090 R08: 0000000000000000 R09: 0000000000000000 [ 92.360210][ T3631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 92.368200][ T3631] R13: 00007ffb3e6d4038 R14: 00007ffb3e6d3fa0 R15: 00007ffe36df7978 [ 92.380085][ T3626] device pim6reg1 entered promiscuous mode [ 92.618055][ T3646] device sit0 left promiscuous mode [ 92.653735][ T3646] device sit0 entered promiscuous mode [ 92.750200][ T3655] gretap0: refused to change device tx_queue_len [ 92.845798][ T3662] syz.4.1037[3662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.845894][ T3662] syz.4.1037[3662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.288566][ T3695] -1: renamed from syzkaller0 [ 93.454135][ T3698] device wg2 left promiscuous mode [ 93.704867][ T3699] device wg2 entered promiscuous mode [ 93.792176][ T3705] FAULT_INJECTION: forcing a failure. [ 93.792176][ T3705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.837385][ T3705] CPU: 0 PID: 3705 Comm: syz.1.1055 Tainted: G W syzkaller #0 [ 93.846163][ T3705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 93.856215][ T3705] Call Trace: [ 93.859494][ T3705] __dump_stack+0x21/0x24 [ 93.863810][ T3705] dump_stack_lvl+0x169/0x1d8 [ 93.868465][ T3705] ? show_regs_print_info+0x18/0x18 [ 93.873647][ T3705] dump_stack+0x15/0x1c [ 93.877785][ T3705] should_fail+0x3c1/0x510 [ 93.882189][ T3705] should_fail_usercopy+0x1a/0x20 [ 93.887199][ T3705] copy_page_from_iter+0x381/0x6c0 [ 93.892299][ T3705] pipe_write+0x914/0x1890 [ 93.896704][ T3705] ? pipe_write+0xe1/0x1890 [ 93.901213][ T3705] ? pipe_read+0xfe0/0xfe0 [ 93.905616][ T3705] ? fsnotify_perm+0x66/0x4b0 [ 93.910277][ T3705] ? security_file_permission+0x83/0xa0 [ 93.915823][ T3705] ? iov_iter_init+0x3f/0x120 [ 93.920482][ T3705] vfs_write+0x725/0xd60 [ 93.924707][ T3705] ? __kasan_slab_free+0x11/0x20 [ 93.929633][ T3705] ? kernel_write+0x3c0/0x3c0 [ 93.934307][ T3705] ? __fget_files+0x2c4/0x320 [ 93.938965][ T3705] ? __fdget_pos+0x1f7/0x380 [ 93.943582][ T3705] ? ksys_write+0x71/0x240 [ 93.948011][ T3705] ksys_write+0x140/0x240 [ 93.952339][ T3705] ? __ia32_sys_read+0x90/0x90 [ 93.957087][ T3705] ? fpu__clear_all+0x20/0x20 [ 93.961753][ T3705] __x64_sys_write+0x7b/0x90 [ 93.966326][ T3705] do_syscall_64+0x31/0x40 [ 93.970724][ T3705] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.976601][ T3705] RIP: 0033:0x7fbb736a5ba9 [ 93.981008][ T3705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.000596][ T3705] RSP: 002b:00007fbb7210e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 94.008998][ T3705] RAX: ffffffffffffffda RBX: 00007fbb738ecfa0 RCX: 00007fbb736a5ba9 [ 94.016952][ T3705] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 94.024910][ T3705] RBP: 00007fbb7210e090 R08: 0000000000000000 R09: 0000000000000000 [ 94.032866][ T3705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 94.040823][ T3705] R13: 00007fbb738ed038 R14: 00007fbb738ecfa0 R15: 00007fff9b980e68 [ 94.395341][ T3752] FAULT_INJECTION: forcing a failure. [ 94.395341][ T3752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 94.511791][ T3752] CPU: 0 PID: 3752 Comm: syz.3.1070 Tainted: G W syzkaller #0 [ 94.520597][ T3752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 94.530660][ T3752] Call Trace: [ 94.533963][ T3752] __dump_stack+0x21/0x24 [ 94.538313][ T3752] dump_stack_lvl+0x169/0x1d8 [ 94.543059][ T3752] ? show_regs_print_info+0x18/0x18 [ 94.548250][ T3752] ? do_kern_addr_fault+0x80/0x80 [ 94.553253][ T3752] ? unwind_get_return_address+0x4d/0x90 [ 94.558864][ T3752] dump_stack+0x15/0x1c [ 94.562998][ T3752] should_fail+0x3c1/0x510 [ 94.567398][ T3752] should_fail_alloc_page+0x4f/0x60 [ 94.572593][ T3752] __alloc_pages_nodemask+0x109/0x5f0 [ 94.577947][ T3752] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 94.583474][ T3752] ? copy_user_enhanced_fast_string+0xe/0x40 [ 94.589439][ T3752] pipe_write+0x570/0x1890 [ 94.593845][ T3752] ? pipe_write+0xe1/0x1890 [ 94.598336][ T3752] ? pipe_read+0xfe0/0xfe0 [ 94.602734][ T3752] ? fsnotify_perm+0x66/0x4b0 [ 94.607396][ T3752] ? security_file_permission+0x83/0xa0 [ 94.612933][ T3752] ? iov_iter_init+0x3f/0x120 [ 94.617592][ T3752] vfs_write+0x725/0xd60 [ 94.621825][ T3752] ? kernel_write+0x3c0/0x3c0 [ 94.626488][ T3752] ? __fget_files+0x2c4/0x320 [ 94.631165][ T3752] ? __fdget_pos+0x1f7/0x380 [ 94.635739][ T3752] ? ksys_write+0x71/0x240 [ 94.640136][ T3752] ksys_write+0x140/0x240 [ 94.644447][ T3752] ? __ia32_sys_read+0x90/0x90 [ 94.649191][ T3752] ? fpu__clear_all+0x20/0x20 [ 94.653848][ T3752] __x64_sys_write+0x7b/0x90 [ 94.658418][ T3752] do_syscall_64+0x31/0x40 [ 94.662831][ T3752] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 94.668705][ T3752] RIP: 0033:0x7ffb3e48cba9 [ 94.673109][ T3752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.692698][ T3752] RSP: 002b:00007ffb3cef5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 94.701099][ T3752] RAX: ffffffffffffffda RBX: 00007ffb3e6d3fa0 RCX: 00007ffb3e48cba9 [ 94.709070][ T3752] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 94.717040][ T3752] RBP: 00007ffb3cef5090 R08: 0000000000000000 R09: 0000000000000000 [ 94.724992][ T3752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 94.732953][ T3752] R13: 00007ffb3e6d4038 R14: 00007ffb3e6d3fa0 R15: 00007ffe36df7978 [ 95.324263][ T3798] bpf_get_probe_write_proto: 14 callbacks suppressed [ 95.324274][ T3798] syz.1.1082[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.331519][ T3798] syz.1.1082[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.344379][ T3798] syz.1.1082[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.355956][ T3798] syz.1.1082[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.440930][ T3810] FAULT_INJECTION: forcing a failure. [ 95.440930][ T3810] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.465811][ T3810] CPU: 1 PID: 3810 Comm: syz.0.1085 Tainted: G W syzkaller #0 [ 95.474584][ T3810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 95.484635][ T3810] Call Trace: [ 95.487913][ T3810] __dump_stack+0x21/0x24 [ 95.492241][ T3810] dump_stack_lvl+0x169/0x1d8 [ 95.496917][ T3810] ? show_regs_print_info+0x18/0x18 [ 95.502119][ T3810] dump_stack+0x15/0x1c [ 95.506265][ T3810] should_fail+0x3c1/0x510 [ 95.510668][ T3810] should_fail_usercopy+0x1a/0x20 [ 95.515678][ T3810] copy_page_from_iter+0x381/0x6c0 [ 95.520778][ T3810] pipe_write+0x914/0x1890 [ 95.525207][ T3810] ? pipe_write+0xe1/0x1890 [ 95.529724][ T3810] ? pipe_read+0xfe0/0xfe0 [ 95.534129][ T3810] ? fsnotify_perm+0x66/0x4b0 [ 95.538794][ T3810] ? security_file_permission+0x83/0xa0 [ 95.544326][ T3810] ? iov_iter_init+0x3f/0x120 [ 95.548992][ T3810] vfs_write+0x725/0xd60 [ 95.553217][ T3810] ? __kasan_slab_free+0x11/0x20 [ 95.558138][ T3810] ? kernel_write+0x3c0/0x3c0 [ 95.562819][ T3810] ? __fget_files+0x2c4/0x320 [ 95.567480][ T3810] ? __fdget_pos+0x1f7/0x380 [ 95.572058][ T3810] ? ksys_write+0x71/0x240 [ 95.576484][ T3810] ksys_write+0x140/0x240 [ 95.580819][ T3810] ? __ia32_sys_read+0x90/0x90 [ 95.585577][ T3810] ? fpu__clear_all+0x20/0x20 [ 95.590283][ T3810] __x64_sys_write+0x7b/0x90 [ 95.594890][ T3810] do_syscall_64+0x31/0x40 [ 95.599321][ T3810] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 95.605198][ T3810] RIP: 0033:0x7ff63da21ba9 [ 95.609598][ T3810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.629185][ T3810] RSP: 002b:00007ff63c48a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 95.637586][ T3810] RAX: ffffffffffffffda RBX: 00007ff63dc68fa0 RCX: 00007ff63da21ba9 [ 95.645550][ T3810] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 95.653515][ T3810] RBP: 00007ff63c48a090 R08: 0000000000000000 R09: 0000000000000000 [ 95.661480][ T3810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 95.669438][ T3810] R13: 00007ff63dc69038 R14: 00007ff63dc68fa0 R15: 00007ffd4d37c8d8 [ 95.789424][ T3814] syz.4.1087[3814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.789499][ T3814] syz.4.1087[3814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.418252][ T3847] FAULT_INJECTION: forcing a failure. [ 96.418252][ T3847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 96.512724][ T3847] CPU: 0 PID: 3847 Comm: syz.1.1096 Tainted: G W syzkaller #0 [ 96.521523][ T3847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 96.531568][ T3847] Call Trace: [ 96.534850][ T3847] __dump_stack+0x21/0x24 [ 96.539164][ T3847] dump_stack_lvl+0x169/0x1d8 [ 96.543834][ T3847] ? show_regs_print_info+0x18/0x18 [ 96.549015][ T3847] ? do_kern_addr_fault+0x80/0x80 [ 96.554019][ T3847] ? unwind_get_return_address+0x4d/0x90 [ 96.559636][ T3847] dump_stack+0x15/0x1c [ 96.563779][ T3847] should_fail+0x3c1/0x510 [ 96.568181][ T3847] should_fail_alloc_page+0x4f/0x60 [ 96.573366][ T3847] __alloc_pages_nodemask+0x109/0x5f0 [ 96.578724][ T3847] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 96.584260][ T3847] ? copy_user_enhanced_fast_string+0xe/0x40 [ 96.590223][ T3847] pipe_write+0x570/0x1890 [ 96.594626][ T3847] ? pipe_write+0xe1/0x1890 [ 96.599121][ T3847] ? pipe_read+0xfe0/0xfe0 [ 96.603526][ T3847] ? fsnotify_perm+0x66/0x4b0 [ 96.608186][ T3847] ? security_file_permission+0x83/0xa0 [ 96.613717][ T3847] ? iov_iter_init+0x3f/0x120 [ 96.618392][ T3847] vfs_write+0x725/0xd60 [ 96.622635][ T3847] ? __kasan_slab_free+0x11/0x20 [ 96.627571][ T3847] ? kernel_write+0x3c0/0x3c0 [ 96.632241][ T3847] ? __fget_files+0x2c4/0x320 [ 96.636930][ T3847] ? __fdget_pos+0x1f7/0x380 [ 96.641515][ T3847] ? ksys_write+0x71/0x240 [ 96.645931][ T3847] ksys_write+0x140/0x240 [ 96.650259][ T3847] ? __ia32_sys_read+0x90/0x90 [ 96.655021][ T3847] ? fpu__clear_all+0x20/0x20 [ 96.659679][ T3847] __x64_sys_write+0x7b/0x90 [ 96.664254][ T3847] do_syscall_64+0x31/0x40 [ 96.668663][ T3847] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 96.674541][ T3847] RIP: 0033:0x7fbb736a5ba9 [ 96.678947][ T3847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.698538][ T3847] RSP: 002b:00007fbb7210e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 96.706934][ T3847] RAX: ffffffffffffffda RBX: 00007fbb738ecfa0 RCX: 00007fbb736a5ba9 [ 96.714888][ T3847] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 96.722843][ T3847] RBP: 00007fbb7210e090 R08: 0000000000000000 R09: 0000000000000000 [ 96.730801][ T3847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 96.738762][ T3847] R13: 00007fbb738ed038 R14: 00007fbb738ecfa0 R15: 00007fff9b980e68 [ 96.817326][ T3851] device syzkaller0 entered promiscuous mode [ 96.823615][ T3853] syz.4.1099[3853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.823690][ T3853] syz.4.1099[3853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.899612][ T3865] device wg2 entered promiscuous mode [ 97.190456][ T3878] device veth0_vlan left promiscuous mode [ 97.197868][ T3882] syz.1.1108[3882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.197943][ T3882] syz.1.1108[3882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.209186][ T3878] device veth0_vlan entered promiscuous mode [ 97.266728][ T3889] FAULT_INJECTION: forcing a failure. [ 97.266728][ T3889] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.298973][ T3886] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 97.310705][ T3889] CPU: 1 PID: 3889 Comm: syz.1.1111 Tainted: G W syzkaller #0 [ 97.319471][ T3889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 97.328312][ T3886] device syzkaller0 entered promiscuous mode [ 97.329631][ T3889] Call Trace: [ 97.338881][ T3889] __dump_stack+0x21/0x24 [ 97.343224][ T3889] dump_stack_lvl+0x169/0x1d8 [ 97.347889][ T3889] ? show_regs_print_info+0x18/0x18 [ 97.353069][ T3889] dump_stack+0x15/0x1c [ 97.357213][ T3889] should_fail+0x3c1/0x510 [ 97.361619][ T3889] should_fail_usercopy+0x1a/0x20 [ 97.366649][ T3889] copy_page_from_iter+0x381/0x6c0 [ 97.371765][ T3889] pipe_write+0x914/0x1890 [ 97.376181][ T3889] ? pipe_write+0xe1/0x1890 [ 97.380672][ T3889] ? pipe_read+0xfe0/0xfe0 [ 97.385071][ T3889] ? fsnotify_perm+0x66/0x4b0 [ 97.389731][ T3889] ? security_file_permission+0x83/0xa0 [ 97.395263][ T3889] ? iov_iter_init+0x3f/0x120 [ 97.399924][ T3889] vfs_write+0x725/0xd60 [ 97.404154][ T3889] ? __bpf_trace_kmem_free+0x6f/0x90 [ 97.409424][ T3889] ? kernel_write+0x3c0/0x3c0 [ 97.414087][ T3889] ? __fget_files+0x2c4/0x320 [ 97.418757][ T3889] ? __fdget_pos+0x1f7/0x380 [ 97.423337][ T3889] ? ksys_write+0x71/0x240 [ 97.427737][ T3889] ksys_write+0x140/0x240 [ 97.432056][ T3889] ? __ia32_sys_read+0x90/0x90 [ 97.436808][ T3889] ? fpu__clear_all+0x20/0x20 [ 97.441471][ T3889] __x64_sys_write+0x7b/0x90 [ 97.446070][ T3889] do_syscall_64+0x31/0x40 [ 97.450474][ T3889] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 97.456353][ T3889] RIP: 0033:0x7fbb736a5ba9 [ 97.460759][ T3889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.480352][ T3889] RSP: 002b:00007fbb7210e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 97.488754][ T3889] RAX: ffffffffffffffda RBX: 00007fbb738ecfa0 RCX: 00007fbb736a5ba9 [ 97.496711][ T3889] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 97.504670][ T3889] RBP: 00007fbb7210e090 R08: 0000000000000000 R09: 0000000000000000 [ 97.512645][ T3889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 97.520609][ T3889] R13: 00007fbb738ed038 R14: 00007fbb738ecfa0 R15: 00007fff9b980e68 [ 98.043360][ T3936] FAULT_INJECTION: forcing a failure. [ 98.043360][ T3936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.080917][ T3936] CPU: 0 PID: 3936 Comm: syz.0.1124 Tainted: G W syzkaller #0 [ 98.089791][ T3936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 98.099847][ T3936] Call Trace: [ 98.103140][ T3936] __dump_stack+0x21/0x24 [ 98.107496][ T3936] dump_stack_lvl+0x169/0x1d8 [ 98.112177][ T3936] ? show_regs_print_info+0x18/0x18 [ 98.117385][ T3936] ? do_kern_addr_fault+0x80/0x80 [ 98.122412][ T3936] ? unwind_get_return_address+0x4d/0x90 [ 98.128044][ T3936] dump_stack+0x15/0x1c [ 98.132217][ T3936] should_fail+0x3c1/0x510 [ 98.136642][ T3936] should_fail_alloc_page+0x4f/0x60 [ 98.141853][ T3936] __alloc_pages_nodemask+0x109/0x5f0 [ 98.147232][ T3936] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 98.152780][ T3936] ? copy_user_enhanced_fast_string+0xe/0x40 [ 98.158762][ T3936] pipe_write+0x570/0x1890 [ 98.163184][ T3936] ? pipe_write+0xe1/0x1890 [ 98.167689][ T3936] ? pipe_read+0xfe0/0xfe0 [ 98.172112][ T3936] ? fsnotify_perm+0x66/0x4b0 [ 98.176793][ T3936] ? security_file_permission+0x83/0xa0 [ 98.182355][ T3936] ? iov_iter_init+0x3f/0x120 [ 98.187039][ T3936] vfs_write+0x725/0xd60 [ 98.191299][ T3936] ? kernel_write+0x3c0/0x3c0 [ 98.195981][ T3936] ? __fget_files+0x2c4/0x320 [ 98.200656][ T3936] ? __fdget_pos+0x1f7/0x380 [ 98.205239][ T3936] ? ksys_write+0x71/0x240 [ 98.209658][ T3936] ksys_write+0x140/0x240 [ 98.213987][ T3936] ? __ia32_sys_read+0x90/0x90 [ 98.218751][ T3936] ? fpu__clear_all+0x20/0x20 [ 98.223428][ T3936] __x64_sys_write+0x7b/0x90 [ 98.228022][ T3936] do_syscall_64+0x31/0x40 [ 98.232442][ T3936] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.238335][ T3936] RIP: 0033:0x7ff63da21ba9 [ 98.242765][ T3936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.262393][ T3936] RSP: 002b:00007ff63c48a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 98.270821][ T3936] RAX: ffffffffffffffda RBX: 00007ff63dc68fa0 RCX: 00007ff63da21ba9 [ 98.278803][ T3936] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 98.286785][ T3936] RBP: 00007ff63c48a090 R08: 0000000000000000 R09: 0000000000000000 [ 98.294760][ T3936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.302738][ T3936] R13: 00007ff63dc69038 R14: 00007ff63dc68fa0 R15: 00007ffd4d37c8d8 [ 99.024808][ T3979] FAULT_INJECTION: forcing a failure. [ 99.024808][ T3979] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.066156][ T3984] device wg2 left promiscuous mode [ 99.081024][ T3979] CPU: 1 PID: 3979 Comm: syz.4.1140 Tainted: G W syzkaller #0 [ 99.089803][ T3979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 99.099838][ T3979] Call Trace: [ 99.103126][ T3979] __dump_stack+0x21/0x24 [ 99.107455][ T3979] dump_stack_lvl+0x169/0x1d8 [ 99.112132][ T3979] ? show_regs_print_info+0x18/0x18 [ 99.117439][ T3979] dump_stack+0x15/0x1c [ 99.121603][ T3979] should_fail+0x3c1/0x510 [ 99.126020][ T3979] should_fail_usercopy+0x1a/0x20 [ 99.131039][ T3979] copy_page_from_iter+0x381/0x6c0 [ 99.136158][ T3979] pipe_write+0x914/0x1890 [ 99.140574][ T3979] ? pipe_write+0xe1/0x1890 [ 99.145078][ T3979] ? pipe_read+0xfe0/0xfe0 [ 99.149491][ T3979] ? fsnotify_perm+0x66/0x4b0 [ 99.154176][ T3979] ? security_file_permission+0x83/0xa0 [ 99.159717][ T3979] ? iov_iter_init+0x3f/0x120 [ 99.164388][ T3979] vfs_write+0x725/0xd60 [ 99.168716][ T3979] ? kernel_write+0x3c0/0x3c0 [ 99.173390][ T3979] ? __fget_files+0x2c4/0x320 [ 99.178059][ T3979] ? __fdget_pos+0x1f7/0x380 [ 99.182644][ T3979] ? ksys_write+0x71/0x240 [ 99.187065][ T3979] ksys_write+0x140/0x240 [ 99.191391][ T3979] ? __ia32_sys_read+0x90/0x90 [ 99.196158][ T3979] __x64_sys_write+0x7b/0x90 [ 99.200740][ T3979] do_syscall_64+0x31/0x40 [ 99.205160][ T3979] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 99.211032][ T3979] RIP: 0033:0x7f6bd2703ba9 [ 99.215430][ T3979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.235044][ T3979] RSP: 002b:00007f6bd116c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 99.243638][ T3979] RAX: ffffffffffffffda RBX: 00007f6bd294afa0 RCX: 00007f6bd2703ba9 [ 99.251597][ T3979] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 99.259556][ T3979] RBP: 00007f6bd116c090 R08: 0000000000000000 R09: 0000000000000000 [ 99.267515][ T3979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 99.275491][ T3979] R13: 00007f6bd294b038 R14: 00007f6bd294afa0 R15: 00007fffe280e1f8 [ 99.524764][ T4015] device pim6reg1 entered promiscuous mode [ 99.740481][ T4033] device bridge0 entered promiscuous mode [ 99.787485][ T4038] FAULT_INJECTION: forcing a failure. [ 99.787485][ T4038] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 99.840125][ T4038] CPU: 1 PID: 4038 Comm: syz.3.1157 Tainted: G W syzkaller #0 [ 99.848927][ T4038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 99.858985][ T4038] Call Trace: [ 99.862297][ T4038] __dump_stack+0x21/0x24 [ 99.866642][ T4038] dump_stack_lvl+0x169/0x1d8 [ 99.871318][ T4038] ? show_regs_print_info+0x18/0x18 [ 99.876540][ T4038] ? do_kern_addr_fault+0x80/0x80 [ 99.881582][ T4038] dump_stack+0x15/0x1c [ 99.885756][ T4038] should_fail+0x3c1/0x510 [ 99.890268][ T4038] should_fail_alloc_page+0x4f/0x60 [ 99.895473][ T4038] __alloc_pages_nodemask+0x109/0x5f0 [ 99.900883][ T4038] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 99.906447][ T4038] ? copy_user_enhanced_fast_string+0xe/0x40 [ 99.912435][ T4038] pipe_write+0x570/0x1890 [ 99.916897][ T4038] ? pipe_write+0xe1/0x1890 [ 99.921405][ T4038] ? pipe_read+0xfe0/0xfe0 [ 99.925847][ T4038] ? fsnotify_perm+0x66/0x4b0 [ 99.930522][ T4038] ? security_file_permission+0x83/0xa0 [ 99.936061][ T4038] ? iov_iter_init+0x3f/0x120 [ 99.940738][ T4038] vfs_write+0x725/0xd60 [ 99.945005][ T4038] ? kernel_write+0x3c0/0x3c0 [ 99.949685][ T4038] ? __fget_files+0x2c4/0x320 [ 99.954366][ T4038] ? __fdget_pos+0x1f7/0x380 [ 99.958955][ T4038] ? ksys_write+0x71/0x240 [ 99.963374][ T4038] ksys_write+0x140/0x240 [ 99.967698][ T4038] ? __ia32_sys_read+0x90/0x90 [ 99.972461][ T4038] ? __bpf_trace_sys_enter+0x62/0x70 [ 99.977740][ T4038] __x64_sys_write+0x7b/0x90 [ 99.982361][ T4038] do_syscall_64+0x31/0x40 [ 99.986776][ T4038] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 99.992674][ T4038] RIP: 0033:0x7ffb3e48cba9 [ 99.997086][ T4038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.016686][ T4038] RSP: 002b:00007ffb3cef5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 100.025105][ T4038] RAX: ffffffffffffffda RBX: 00007ffb3e6d3fa0 RCX: 00007ffb3e48cba9 [ 100.033082][ T4038] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 100.041054][ T4038] RBP: 00007ffb3cef5090 R08: 0000000000000000 R09: 0000000000000000 [ 100.049032][ T4038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.056997][ T4038] R13: 00007ffb3e6d4038 R14: 00007ffb3e6d3fa0 R15: 00007ffe36df7978 [ 101.313117][ T4107] device pim6reg1 entered promiscuous mode [ 101.776988][ T4130] bpf_get_probe_write_proto: 6 callbacks suppressed [ 101.776997][ T4130] syz.3.1186[4130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.832139][ T4130] syz.3.1186[4130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.904162][ T4132] syz.3.1186[4132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.963245][ T4132] syz.3.1186[4132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.355287][ T4152] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.373882][ T4152] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.446795][ T4152] device bridge0 left promiscuous mode [ 102.513361][ T4156] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.520444][ T4156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.527793][ T4156] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.534847][ T4156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.621851][ T4156] device bridge0 entered promiscuous mode [ 102.913257][ T4165] device pim6reg1 entered promiscuous mode [ 103.023724][ T4180] syz.4.1201[4180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.023810][ T4180] syz.4.1201[4180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.043900][ T4180] syz.4.1201[4180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.061982][ T4180] syz.4.1201[4180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.123565][ T4183] syz.1.1202[4183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.123671][ T4177] ªªªªªª: renamed from vlan0 [ 103.157165][ T4183] syz.1.1202[4183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.433441][ T24] audit: type=1400 audit(1757490753.420:149): avc: denied { create } for pid=4200 comm="syz.3.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 105.420224][ T4314] device wg2 left promiscuous mode [ 106.698648][ T4358] device veth1_macvtap left promiscuous mode [ 106.795035][ T4361] device veth1_macvtap entered promiscuous mode [ 106.826991][ T4361] device macsec0 entered promiscuous mode [ 107.060338][ T4384] syz.1.1264[4384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.060421][ T4384] syz.1.1264[4384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.152650][ T4384] syz.1.1264[4384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.252999][ T4384] syz.1.1264[4384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.896471][ T4403] device syzkaller0 entered promiscuous mode [ 108.928594][ T4455] syz.3.1287[4455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.928687][ T4455] syz.3.1287[4455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.951509][ T4455] syz.3.1287[4455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.004644][ T4455] syz.3.1287[4455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.246574][ T4472] device wg2 entered promiscuous mode [ 110.075725][ T4509] syz.1.1302[4509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.075799][ T4509] syz.1.1302[4509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.807535][ T4546] device syzkaller0 entered promiscuous mode [ 111.288270][ T4553] bridge0: port 3(veth1) entered blocking state [ 111.332090][ T4553] bridge0: port 3(veth1) entered disabled state [ 111.444451][ T4553] device veth1 entered promiscuous mode [ 111.498130][ T4555] device macsec0 entered promiscuous mode [ 111.812911][ T4569] tap0: tun_chr_ioctl cmd 1074025694 [ 112.251649][ T4587] device syzkaller0 entered promiscuous mode [ 112.260304][ T4587] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 112.345964][ T4597] device syzkaller0 entered promiscuous mode [ 112.532650][ T24] audit: type=1400 audit(1757490762.520:150): avc: denied { create } for pid=4619 comm="syz.4.1333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 113.002803][ T4643] device syzkaller0 entered promiscuous mode [ 113.362010][ T4653] device syzkaller0 entered promiscuous mode [ 113.376653][ T4657] device pim6reg1 entered promiscuous mode [ 113.579097][ T24] audit: type=1400 audit(1757490763.560:151): avc: denied { associate } for pid=4664 comm="syz.4.1346" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 113.610900][ T4663] device wg2 left promiscuous mode [ 113.651378][ T4663] device wg2 entered promiscuous mode [ 113.764344][ T4673] bpf_get_probe_write_proto: 8 callbacks suppressed [ 113.764353][ T4673] syz.0.1349[4673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.771309][ T4673] syz.0.1349[4673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.875677][ T4673] syz.0.1349[4673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.018486][ T4673] syz.0.1349[4673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.155737][ T4680] device syzkaller0 entered promiscuous mode [ 115.493649][ T4747] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.500769][ T4747] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.528354][ T4747] device bridge0 left promiscuous mode [ 115.641768][ T4747] device veth1 left promiscuous mode [ 115.650308][ T4747] bridge0: port 3(veth1) entered disabled state [ 115.675707][ T4747] device bridge_slave_1 left promiscuous mode [ 115.684068][ T4747] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.693559][ T4747] device bridge_slave_0 left promiscuous mode [ 115.700113][ T4747] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.204804][ T4782] device syzkaller0 entered promiscuous mode [ 116.934529][ T24] audit: type=1400 audit(1757490766.920:152): avc: denied { create } for pid=4817 comm="syz.4.1394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 117.185322][ T4838] device syzkaller0 entered promiscuous mode [ 117.811180][ T4872] device syzkaller0 entered promiscuous mode [ 118.287639][ T24] audit: type=1400 audit(1757490768.270:153): avc: denied { create } for pid=4932 comm="syz.4.1424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 118.517488][ T4945] device pim6reg1 entered promiscuous mode [ 118.660585][ T4955] syz.0.1432[4955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.660675][ T4955] syz.0.1432[4955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.714360][ T4955] syz.0.1432[4955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.755228][ T4955] syz.0.1432[4955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.937147][ T4973] syz.3.1436[4973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.078039][ T24] audit: type=1400 audit(1757490769.060:154): avc: denied { read } for pid=4987 comm="syz.4.1442" dev="nsfs" ino=4026532543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.145241][ T24] audit: type=1400 audit(1757490769.060:155): avc: denied { open } for pid=4987 comm="syz.4.1442" path="mnt:[4026532543]" dev="nsfs" ino=4026532543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.162324][ T4988] device syzkaller0 entered promiscuous mode [ 119.327542][ T5002] syz.2.1445[5002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.327643][ T5002] syz.2.1445[5002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.339678][ T4999] syz.0.1446[4999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.367233][ T4999] syz.0.1446[4999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.383556][ T5005] syz.2.1445[5005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.469461][ T5005] syz.2.1445[5005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.719627][ T5071] device syzkaller0 entered promiscuous mode [ 121.278601][ T5086] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 121.292149][ T5085] batadv0: tun_chr_ioctl cmd 1074025692 [ 121.759401][ T5127] device wg2 entered promiscuous mode [ 122.411647][ T5165] device veth0_vlan left promiscuous mode [ 122.456357][ T5165] device veth0_vlan entered promiscuous mode [ 122.622307][ T5178] device syzkaller0 entered promiscuous mode [ 122.932290][ T24] audit: type=1400 audit(1757490772.910:156): avc: denied { create } for pid=5211 comm="syz.0.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 123.201295][ T5240] device syzkaller0 entered promiscuous mode [ 123.602115][ T5274] syz.1.1524[5274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.602196][ T5274] syz.1.1524[5274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.635026][ T5274] syz.1.1524[5274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.554267][ T5310] bpf_get_probe_write_proto: 1 callbacks suppressed [ 124.554276][ T5310] syz.3.1537[5310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.613056][ T5312] syz.3.1537[5312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.654988][ T5312] syz.3.1537[5312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.713252][ T5310] syz.3.1537[5310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.340476][ T5349] device syzkaller0 entered promiscuous mode [ 125.429893][ T5355] device pim6reg1 entered promiscuous mode [ 125.477032][ T5363] device macsec0 entered promiscuous mode [ 125.532771][ T5365] device veth1_macvtap left promiscuous mode [ 125.544176][ T5365] device macsec0 left promiscuous mode [ 125.881421][ T24] audit: type=1400 audit(1757490775.860:157): avc: denied { create } for pid=5385 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 126.074719][ T5403] device sit0 left promiscuous mode [ 126.217430][ T5414] syz.4.1569[5414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.217485][ T5414] syz.4.1569[5414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.238630][ T5410] device syzkaller0 entered promiscuous mode [ 126.282288][ T24] audit: type=1400 audit(1757490776.260:158): avc: denied { ioctl } for pid=5413 comm="syz.4.1569" path="uts:[4026532554]" dev="nsfs" ino=4026532554 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 126.461834][ T24] audit: type=1400 audit(1757490776.310:159): avc: denied { create } for pid=5413 comm="syz.4.1569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 127.216606][ T5443] device pim6reg1 entered promiscuous mode [ 127.671431][ T5476] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.680688][ T5476] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.093730][ T5505] device pim6reg1 entered promiscuous mode [ 128.374879][ T5530] syz.3.1604[5530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.374953][ T5530] syz.3.1604[5530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.482327][ T5530] syz.3.1604[5530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.493942][ T5530] syz.3.1604[5530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.689599][ T5538] device bridge_slave_1 left promiscuous mode [ 128.740596][ T5538] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.754946][ T5538] device bridge_slave_0 left promiscuous mode [ 128.770045][ T5538] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.556994][ T5726] device pim6reg1 entered promiscuous mode [ 139.006717][ T5753] syz.3.1670[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.006866][ T5753] syz.3.1670[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.039250][ T5753] syz.3.1670[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.064056][ T5753] syz.3.1670[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.829189][ T5777] device sit0 left promiscuous mode [ 140.010981][ T5783] device sit0 entered promiscuous mode [ 140.148385][ T5788] syz.1.1682[5788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.148470][ T5788] syz.1.1682[5788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.172511][ T5788] syz.1.1682[5788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.199374][ T5788] syz.1.1682[5788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.964488][ T5817] device macsec0 entered promiscuous mode [ 141.184557][ T5846] device wg2 left promiscuous mode [ 141.216967][ T5846] device wg2 entered promiscuous mode [ 141.748428][ T5874] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.757405][ T5874] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.813304][ T5897] syz.0.1719[5897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.813376][ T5897] syz.0.1719[5897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.092840][ T5925] device syzkaller0 entered promiscuous mode [ 142.504384][ T5948] device syzkaller0 entered promiscuous mode [ 142.945264][ T5971] tap0: tun_chr_ioctl cmd 2147767506 [ 143.837499][ T6014] device pim6reg1 entered promiscuous mode [ 144.262720][ T6016] device wg2 left promiscuous mode [ 144.428626][ T6025] bpf_get_probe_write_proto: 10 callbacks suppressed [ 144.428635][ T6025] syz.1.1757[6025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.441985][ T6025] syz.1.1757[6025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.462104][ T6025] syz.1.1757[6025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.552392][ T6025] syz.1.1757[6025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.539885][ T6058] device syzkaller0 entered promiscuous mode [ 145.569274][ T6057] device sit0 entered promiscuous mode [ 145.809376][ T6052] device pim6reg1 entered promiscuous mode [ 146.086747][ T6099] device wg2 left promiscuous mode [ 146.290431][ T6120] device pim6reg1 entered promiscuous mode [ 146.360924][ T6129] device syzkaller0 entered promiscuous mode [ 146.383925][ T6131] syz.1.1796[6131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.383978][ T6131] syz.1.1796[6131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.412769][ T6131] syz.1.1796[6131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.424261][ T6131] syz.1.1796[6131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.676609][ T6166] syz.0.1808[6166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.688358][ T6159] device wg2 left promiscuous mode [ 146.701847][ T6166] syz.0.1808[6166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.879060][ T24] audit: type=1400 audit(1757490796.860:160): avc: denied { create } for pid=6176 comm="syz.2.1811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 147.791306][ T6253] ÿÿÿÿÿÿ: renamed from vlan1 [ 148.203684][ T6276] device pim6reg1 entered promiscuous mode [ 148.504898][ T6289] device syzkaller0 entered promiscuous mode [ 148.883644][ T6335] device syzkaller0 entered promiscuous mode [ 148.917869][ T6339] device syzkaller0 entered promiscuous mode [ 149.099967][ T6353] device veth1_to_bond entered promiscuous mode [ 149.232815][ T6363] device pim6reg1 entered promiscuous mode [ 149.565604][ T6382] device sit0 entered promiscuous mode [ 149.937457][ T6401] device syzkaller0 entered promiscuous mode [ 149.959500][ T6399] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 149.979826][ T6399] syzkaller0: Linktype set failed because interface is up [ 150.691237][ T6451] device syzkaller0 entered promiscuous mode [ 150.981596][ T6479] bpf_get_probe_write_proto: 14 callbacks suppressed [ 150.981607][ T6479] syz.2.1906[6479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.988826][ T6479] syz.2.1906[6479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.046328][ T6479] syz.2.1906[6479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.071956][ T6479] syz.2.1906[6479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.550648][ T6511] device syzkaller0 entered promiscuous mode [ 152.513802][ T6555] device sit0 entered promiscuous mode [ 153.344641][ T6581] device pim6reg1 entered promiscuous mode [ 153.918640][ T6631] FAULT_INJECTION: forcing a failure. [ 153.918640][ T6631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.965473][ T6631] CPU: 0 PID: 6631 Comm: syz.0.1955 Tainted: G W syzkaller #0 [ 153.974259][ T6631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 153.984327][ T6631] Call Trace: [ 153.987638][ T6631] __dump_stack+0x21/0x24 [ 153.991958][ T6631] dump_stack_lvl+0x169/0x1d8 [ 153.996629][ T6631] ? show_regs_print_info+0x18/0x18 [ 154.001861][ T6631] dump_stack+0x15/0x1c [ 154.006138][ T6631] should_fail+0x3c1/0x510 [ 154.010538][ T6631] should_fail_usercopy+0x1a/0x20 [ 154.015550][ T6631] _copy_from_user+0x20/0xd0 [ 154.020129][ T6631] sock_do_ioctl+0x1b2/0x330 [ 154.024701][ T6631] ? __kasan_slab_free+0x11/0x20 [ 154.029622][ T6631] ? sock_show_fdinfo+0xa0/0xa0 [ 154.034477][ T6631] ? selinux_file_ioctl+0x377/0x480 [ 154.039659][ T6631] ? mutex_trylock+0xa0/0xa0 [ 154.044244][ T6631] ? __fget_files+0x2c4/0x320 [ 154.048904][ T6631] sock_ioctl+0x504/0x710 [ 154.053229][ T6631] ? sock_poll+0x360/0x360 [ 154.057642][ T6631] ? __fget_files+0x2c4/0x320 [ 154.062336][ T6631] ? security_file_ioctl+0x84/0xa0 [ 154.067449][ T6631] ? sock_poll+0x360/0x360 [ 154.071865][ T6631] __se_sys_ioctl+0x121/0x1a0 [ 154.076532][ T6631] __x64_sys_ioctl+0x7b/0x90 [ 154.081110][ T6631] do_syscall_64+0x31/0x40 [ 154.085527][ T6631] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 154.091421][ T6631] RIP: 0033:0x7ff63da21ba9 [ 154.095853][ T6631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.115442][ T6631] RSP: 002b:00007ff63c48a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.123869][ T6631] RAX: ffffffffffffffda RBX: 00007ff63dc68fa0 RCX: 00007ff63da21ba9 [ 154.131836][ T6631] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 0000000000000005 [ 154.139806][ T6631] RBP: 00007ff63c48a090 R08: 0000000000000000 R09: 0000000000000000 [ 154.147761][ T6631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.155725][ T6631] R13: 00007ff63dc69038 R14: 00007ff63dc68fa0 R15: 00007ffd4d37c8d8 [ 154.699935][ T6663] device pim6reg1 entered promiscuous mode [ 155.206687][ T6714] €Â: renamed from pim6reg1 [ 155.234988][ T6727] device wg2 entered promiscuous mode [ 155.417049][ T6736] syz.1.1985[6736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.417094][ T6736] syz.1.1985[6736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.529958][ T6752] ±: renamed from pim6reg1 [ 155.802522][ T6776] device pim6reg1 entered promiscuous mode [ 156.168486][ T6799] device syzkaller0 entered promiscuous mode [ 156.286288][ T6805] device pim6reg1 entered promiscuous mode [ 156.575835][ T6815] device syzkaller0 entered promiscuous mode [ 156.977916][ T6833] bridge0: port 3(veth0_macvtap) entered blocking state [ 157.029667][ T6833] bridge0: port 3(veth0_macvtap) entered disabled state [ 157.101280][ T6833] device veth0_macvtap entered promiscuous mode [ 157.582246][ T6869] device sit0 left promiscuous mode [ 157.703459][ T6871] device sit0 entered promiscuous mode [ 158.409562][ T6898] device veth1_macvtap left promiscuous mode [ 158.461923][ T6898] device macsec0 left promiscuous mode [ 158.494665][ T6900] device sit0 left promiscuous mode [ 158.526960][ T6902] device sit0 entered promiscuous mode [ 159.455545][ T6928] syzkaller0: refused to change device tx_queue_len [ 163.406075][ T7093] syz.2.2099[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.406126][ T7093] syz.2.2099[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.418929][ T7093] syz.2.2099[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.430717][ T7093] syz.2.2099[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.932060][ T95] udevd[95]: worker [5649] terminated by signal 33 (Unknown signal 33) [ 164.983820][ T7147] device pim6reg1 entered promiscuous mode [ 164.989949][ T95] udevd[95]: worker [5649] failed while handling '/devices/virtual/block/loop3' [ 165.103119][ T7161] device sit0 left promiscuous mode [ 165.261719][ T7167] device sit0 entered promiscuous mode [ 165.728533][ T7202] syzkaller0: mtu less than device minimum [ 167.073813][ T7322] device syzkaller0 entered promiscuous mode [ 167.562555][ T7353] syz.3.2184[7353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.562601][ T7353] syz.3.2184[7353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.742298][ T7353] device veth0_vlan left promiscuous mode [ 167.778802][ T7353] device veth0_vlan entered promiscuous mode [ 167.801563][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.819256][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 167.831607][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.262877][ T7391] device pim6reg1 entered promiscuous mode [ 168.806736][ T7457] device sit0 left promiscuous mode [ 168.828428][ T7457] device sit0 entered promiscuous mode [ 169.221561][ T7490] ÿ: renamed from bond_slave_0 [ 169.252989][ T7491] ªªªªªª: renamed from vlan0 [ 169.997305][ T7519] device wg2 entered promiscuous mode [ 170.076017][ T7521] device pim6reg1 entered promiscuous mode [ 170.539891][ T7555] device pim6reg1 entered promiscuous mode [ 170.842731][ T7569] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.849918][ T7569] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.866008][ T7569] device bridge_slave_1 left promiscuous mode [ 170.876737][ T7569] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.901140][ T7569] device bridge_slave_0 left promiscuous mode [ 170.908807][ T7569] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.275015][ T7648] device veth1_macvtap left promiscuous mode [ 173.301424][ T7648] device macsec0 left promiscuous mode [ 173.383976][ T7651] device sit0 left promiscuous mode [ 173.441903][ T7648] device sit0 entered promiscuous mode [ 173.954163][ T7679] device pim6reg1 entered promiscuous mode [ 175.114357][ T7748] FAULT_INJECTION: forcing a failure. [ 175.114357][ T7748] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.173437][ T7748] CPU: 1 PID: 7748 Comm: syz.4.2314 Tainted: G W syzkaller #0 [ 175.182235][ T7748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 175.192287][ T7748] Call Trace: [ 175.195590][ T7748] __dump_stack+0x21/0x24 [ 175.199913][ T7748] dump_stack_lvl+0x169/0x1d8 [ 175.204583][ T7748] ? show_regs_print_info+0x18/0x18 [ 175.209770][ T7748] ? vfs_write+0xac8/0xd60 [ 175.214172][ T7748] dump_stack+0x15/0x1c [ 175.218316][ T7748] should_fail+0x3c1/0x510 [ 175.222718][ T7748] should_fail_usercopy+0x1a/0x20 [ 175.227736][ T7748] _copy_from_user+0x20/0xd0 [ 175.232313][ T7748] __se_sys_bpf+0x181/0x680 [ 175.236838][ T7748] ? __x64_sys_bpf+0x90/0x90 [ 175.241429][ T7748] ? fpu__clear_all+0x20/0x20 [ 175.246092][ T7748] __x64_sys_bpf+0x7b/0x90 [ 175.250494][ T7748] do_syscall_64+0x31/0x40 [ 175.254911][ T7748] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.260787][ T7748] RIP: 0033:0x7f6bd2703ba9 [ 175.265188][ T7748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.284775][ T7748] RSP: 002b:00007f6bd116c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 175.293174][ T7748] RAX: ffffffffffffffda RBX: 00007f6bd294afa0 RCX: 00007f6bd2703ba9 [ 175.301251][ T7748] RDX: 0000000000000050 RSI: 0000200000000900 RDI: 000000000000000a [ 175.309219][ T7748] RBP: 00007f6bd116c090 R08: 0000000000000000 R09: 0000000000000000 [ 175.317176][ T7748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.325135][ T7748] R13: 00007f6bd294b038 R14: 00007f6bd294afa0 R15: 00007fffe280e1f8 [ 175.583853][ T7766] syz.2.2319[7766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.583923][ T7766] syz.2.2319[7766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.872040][ T7790] syz.3.2327[7790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.891424][ T7790] syz.3.2327[7790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.084237][ T7802] device veth0_vlan left promiscuous mode [ 176.139488][ T7802] device veth0_vlan entered promiscuous mode [ 176.152624][ T7812] syz.1.2333[7812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.152696][ T7812] syz.1.2333[7812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.383047][ T7838] syz.1.2343[7838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.457611][ T7838] syz.1.2343[7838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.496503][ T7835] device pim6reg1 entered promiscuous mode [ 177.890745][ T7893] device syzkaller0 entered promiscuous mode [ 178.467139][ T7948] device sit0 left promiscuous mode [ 179.390026][ T7972] device sit0 entered promiscuous mode [ 179.406238][ T7985] syz.3.2390[7985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.932619][ T8004] device syzkaller0 entered promiscuous mode [ 182.283750][ T8178] device sit0 left promiscuous mode [ 182.354428][ T8179] device sit0 entered promiscuous mode [ 182.496436][ T8184] device pim6reg1 entered promiscuous mode [ 183.010852][ T8217] device sit0 left promiscuous mode [ 183.497944][ T8241] device pim6reg1 entered promiscuous mode [ 184.180680][ T8306] device syzkaller0 entered promiscuous mode [ 184.533009][ T8317] device pim6reg1 entered promiscuous mode [ 185.396093][ T8403] device sit0 left promiscuous mode [ 185.507471][ T8403] device sit0 entered promiscuous mode [ 185.520930][ T8413] device wg2 left promiscuous mode [ 185.532654][ T8413] device wg2 entered promiscuous mode [ 186.545568][ T8477] syz.4.2536[8477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.545645][ T8477] syz.4.2536[8477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.596249][ T8483] syz.4.2536[8483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.649382][ T8483] syz.4.2536[8483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.735903][ T8489] device wg2 left promiscuous mode [ 186.808154][ T8489] device wg2 entered promiscuous mode [ 187.347147][ T8515] syz.3.2549[8515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.347216][ T8515] syz.3.2549[8515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.395714][ T8515] syz.3.2549[8515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.414415][ T8515] syz.3.2549[8515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.766406][ T8684] device sit0 left promiscuous mode [ 189.797844][ T8684] device sit0 entered promiscuous mode [ 190.481029][ T8708] device wg2 left promiscuous mode [ 190.674682][ T8715] device syzkaller0 entered promiscuous mode [ 191.281473][ T8741] device pim6reg1 entered promiscuous mode [ 192.275304][ T8790] device syzkaller0 entered promiscuous mode [ 192.366366][ T8792] device sit0 left promiscuous mode [ 192.422506][ T8797] device sit0 entered promiscuous mode [ 192.689270][ T8807] syz.1.2640[8807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.689348][ T8807] syz.1.2640[8807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.713127][ T24] audit: type=1400 audit(1757490843.700:161): avc: denied { create } for pid=8876 comm="syz.3.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 193.872941][ T8886] syz.3.2665[8886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.873021][ T8886] syz.3.2665[8886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.454162][ T8923] syz.3.2678[8923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.490360][ T8923] syz.3.2678[8923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.679093][ T8915] device syzkaller0 entered promiscuous mode [ 194.749361][ T8942] device pim6reg1 entered promiscuous mode [ 194.857245][ T8946] device syzkaller0 entered promiscuous mode [ 194.937421][ T8953] device pim6reg1 entered promiscuous mode [ 195.072977][ T8962] syz.2.2690[8962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.073051][ T8962] syz.2.2690[8962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.652454][ T8992] syz.2.2700[8992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.715665][ T8992] syz.2.2700[8992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.840458][ T8992] device veth0_vlan left promiscuous mode [ 196.042699][ T8992] device veth0_vlan entered promiscuous mode [ 196.460517][ T9018] syz_tun: tun_chr_ioctl cmd 9217 [ 197.149400][ T9063] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.159950][ T9063] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.172511][ T9063] device bridge_slave_0 entered promiscuous mode [ 197.179993][ T9063] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.187256][ T9063] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.194851][ T9063] device bridge_slave_1 entered promiscuous mode [ 197.314527][ T24] audit: type=1400 audit(1757490847.300:162): avc: denied { create } for pid=9063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 197.320111][ T9063] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.342199][ T9063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.349483][ T9063] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.356556][ T9063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.366134][ T24] audit: type=1400 audit(1757490847.300:163): avc: denied { write } for pid=9063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 197.387833][ T24] audit: type=1400 audit(1757490847.300:164): avc: denied { read } for pid=9063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 197.447486][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.456906][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.464425][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.499002][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.520736][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.527800][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.552523][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.566946][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.573996][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.633872][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.644733][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.666568][ T9093] tap0: tun_chr_ioctl cmd 1074025694 [ 198.009779][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.042987][ T9063] device veth0_vlan entered promiscuous mode [ 198.059018][ T9063] device veth1_macvtap entered promiscuous mode [ 198.084539][ T24] audit: type=1400 audit(1757490848.070:165): avc: denied { unmount } for pid=9063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 198.125348][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.138306][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.146356][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.155744][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.164035][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.171591][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.179911][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.188519][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.197252][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.225503][ T9116] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.232755][ T9116] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.241695][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.249143][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.442678][ T9121] bpf_get_probe_write_proto: 6 callbacks suppressed [ 198.442688][ T9121] syz.0.2738[9121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.535327][ T49] device veth0_vlan left promiscuous mode [ 198.561908][ T9121] syz.0.2738[9121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.086997][ T9143] device sit0 left promiscuous mode [ 199.251642][ T9151] device sit0 entered promiscuous mode [ 199.344250][ T9167] device syzkaller0 entered promiscuous mode [ 199.611133][ T9176] syz.1.2754[9176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.611247][ T9176] syz.1.2754[9176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.053835][ T9211] device syzkaller0 entered promiscuous mode [ 200.173340][ T9222] syz.0.2767[9222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.173433][ T9222] syz.0.2767[9222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.432398][ T9244] syz.3.2776[9244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.461604][ T9244] syz.3.2776[9244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.752964][ T9258] syz.1.2781[9258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.765089][ T9258] syz.1.2781[9258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.972686][ T24] audit: type=1400 audit(1757490851.960:166): avc: denied { create } for pid=9322 comm="syz.0.2802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 202.613147][ T9360] device pim6reg1 entered promiscuous mode [ 202.946877][ T9376] device veth1_macvtap left promiscuous mode [ 203.598864][ T9435] bpf_get_probe_write_proto: 6 callbacks suppressed [ 203.598874][ T9435] syz.3.2833[9435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.613431][ T9435] syz.3.2833[9435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.289697][ T9468] syz.1.2844[9468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.308172][ T9468] syz.1.2844[9468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.571295][ T9476] device pim6reg1 entered promiscuous mode [ 204.892308][ T9504] syz.1.2855[9504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.892407][ T9504] syz.1.2855[9504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.585796][ T9618] cgroup: fork rejected by pids controller in /syz2 [ 208.084024][ T24] audit: type=1400 audit(1757490858.070:167): avc: denied { mounton } for pid=9633 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 208.970141][ T9669] device sit0 left promiscuous mode [ 209.035532][ T9673] device wg2 entered promiscuous mode [ 209.075948][ T9669] device sit0 entered promiscuous mode [ 209.998175][ T382] device veth0_macvtap left promiscuous mode [ 210.006237][ T382] bridge0: port 3(veth0_macvtap) entered disabled state [ 210.013542][ T382] device bridge_slave_1 left promiscuous mode [ 210.019665][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.027068][ T382] device bridge_slave_0 left promiscuous mode [ 210.033245][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.041224][ T382] device veth0_vlan left promiscuous mode [ 210.237140][ T9704] device sit0 entered promiscuous mode [ 212.012623][ T9764] syz.4.2933[9764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.012672][ T9764] syz.4.2933[9764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.148253][ T9764] device veth0_vlan left promiscuous mode [ 212.175152][ T9764] device veth0_vlan entered promiscuous mode [ 212.186517][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.198554][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 212.218469][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.582311][T10063] syz.1.3010[10063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.582405][T10063] syz.1.3010[10063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.705387][T10071] device veth0_vlan left promiscuous mode [ 222.709866][ T24] audit: type=1400 audit(1757490872.690:168): avc: denied { create } for pid=10072 comm="syz.0.3013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 222.780552][T10071] device veth0_vlan entered promiscuous mode [ 222.792613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.801072][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 222.808856][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.725161][T10179] syz.0.3040[10179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.725218][T10179] syz.0.3040[10179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.055059][T10179] device veth0_vlan left promiscuous mode [ 231.134058][T10179] device veth0_vlan entered promiscuous mode [ 231.185506][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.193906][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.201534][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 233.445790][T10221] device veth0_vlan left promiscuous mode [ 233.452453][T10221] device veth0_vlan entered promiscuous mode [ 233.460698][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.471123][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 233.478999][ T1172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.567209][T10242] cgroup: fork rejected by pids controller in /syz1 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=2893 state=3 status=67 (errno 9: Bad file descriptor) [ 235.701694][ T24] audit: type=1400 audit(1757490885.670:169): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[1808]" dev="pipefs" ino=1808 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 237.861520][ T9] device bridge_slave_1 left promiscuous mode [ 237.867706][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.875110][ T9] device bridge_slave_0 left promiscuous mode [ 237.881210][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.889170][ T9] device bridge_slave_1 left promiscuous mode [ 237.895287][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.902619][ T9] device bridge_slave_0 left promiscuous mode [ 237.908706][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.917726][ T9] device veth1_macvtap left promiscuous mode [ 237.923740][ T9] device veth0_vlan left promiscuous mode [ 237.929591][ T9] device veth0_vlan left promiscuous mode [ 237.935537][ T9] device veth1_macvtap left promiscuous mode [ 237.941521][ T9] device veth0_vlan left promiscuous mode