last executing test programs: 1.823560119s ago: executing program 4 (id=599): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0x5}, 0x686, 0xe, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) close(r0) 1.823127069s ago: executing program 2 (id=600): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0xfc, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4}, 0x94) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 1.81606273s ago: executing program 2 (id=601): socketpair(0xf, 0x3, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000800), &(0x7f0000000840)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r3}, 0x10) unlink(0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3f, 0x80, 0xcb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1c, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) 1.707922251s ago: executing program 4 (id=603): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000140000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r4) 1.707367201s ago: executing program 0 (id=604): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) 1.626254979s ago: executing program 4 (id=606): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000007000085000000060000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa1000000", @ANYBLOB="f066690240de885a62349c61814a12a5743c4dc2060c091bbca94dbcda7b48a5ee16bbfa7e6ff454603242af6931dfb71a69c9027ff1b8d94cf38ea03929d11816fccb84c1363cfb1c25d548ba9e9dbc642d44b9a5eb4582e2c33660b37df34b598797fc7cb948d2f155371e8319a57f5da09df30f61f101528e6338d430cb3a320fe7121f96e1e17d484ac0a4a231a06558f30c8499aae65dff03dfd3acc92d5300e1e14f4c1e462e0bffb5252364b52421cbf015286de8feb54c6aae99", @ANYBLOB="11e87b956e53d7f66f041f753e1f8faf3ad524f02e6438b847365bc424fe150f2c83d3d58741c9ea7fc590c7dd484233f487f64414f5761b2ee037ec77aedd993dc25c3038b2d12e81d43070f7832fe4bc4a04260fc196ceeebdcb39ced60a372cdcaaf97f24b0de5ec575e0429a357d311275125f18d216dbcc82edd76a8b202ef237955350e5d018d9763acbea71fe323b91f429b00526a255806fe3ac812f099ced96a288cdc7c25f05ba3499fd764a534c1c67c3433a8dfdb32b65ba00f952b404b883e9b2f72ab780ba1ac7e84e4094203078b5a3a4e65b48c5fc6f9d78220bc0514cdc751430942cf4687a"], 0x0, 0x1fffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d", @ANYRESHEX=r3, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000a00)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="05000000001af0c5246f653e652f45fd3f818636998c2789695bde5c1dbc7ba528a4cac411326327990b8c55160335f704f0db39bbda7445c2771af8d350af65035dacad460d70af1152b6fd06f62b23f457b383bea9b25d4b854c76cb46763c843416b6f5b4315a657f9acd22ceca2cc77f6998f6be7363bf6652387c7cf98c44d685549e6ca05a27d33602df36b44532797ff043183474eb895548c506fcfabbd39bd76de52ed576f9981ed354bcd2cad2781f04bef083e32be909f6de18bfa35d1b84e269c8a195ddad057c4d8d9f7be6c8240e"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="0100000000000000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x50) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, 0x0, 0x0) close(r8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) 1.431498598s ago: executing program 3 (id=607): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed", 0x2a}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 1.340822467s ago: executing program 3 (id=609): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000003c0)="d7d18a81726d4895460865716e5cf1246b349d7a9fca097e8a8f3711f7b6b957d1aced7daec72cbaedb8e52cec5e6e7ed04701299b50be8dc0b81384", &(0x7f0000000080), 0x1003, r0, 0x0, 0x1000000}, 0x38) 1.336372117s ago: executing program 0 (id=610): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1201, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000c50000000600000095", @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x80, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000015c0)="7c533121ba56b5b10006000081001a", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r8 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000000)={'vlan0\x00'}) 1.331148748s ago: executing program 2 (id=611): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0xfc, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4}, 0x94) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 1.330347278s ago: executing program 4 (id=612): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000007000000050001000800000001000000", @ANYRES32, @ANYBLOB="010000000000000000000000000000000000000037d5", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x5, 0x0, 0x0, 0x40, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x2, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='btrfs_failed_cluster_setup\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='afs_lookup\x00', r5}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x8810) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES64=r6], 0x18, 0x20040004}, 0x4000000) close(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES64=r11], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000500), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1.299301501s ago: executing program 2 (id=613): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES8, @ANYRES32, @ANYRES32=0x0, @ANYRES64], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYRESDEC], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) write$cgroup_devices(r1, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='afs_file_error\x00', r1, 0x0, 0x100000000}, 0x18) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x20000, &(0x7f00000003c0)={0x0, 0x0}) close(r2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1e000000090001000000ac82822de9ab54e945cb7ad244362f4705085870e1eec0460fc6e8872c56a21be85ab2007050b07a63f6acc3c245cccaa0e486bf82d0900afc1e0e7566c7346825ed0be17f6d43ee04a0b586d74b0426e83daeee69993b673f158969ed92915800a9cba0f8a4c77678131c91b335b0c7485405027f1b2d503ddca47f997723d5aeabdbc07416797c7a588376216cb085403d966340bc56fb797879b337c7fe4700990e9ba5c5d319e29d9293a18ab4ebc3b6b686ac3a53cb09339722f276a7f7dfb573bef4b5572547158f73c3a895d745571dbf3861b1f10000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) socketpair(0x1e, 0x80005, 0x0, 0x0) close(r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{r4}, &(0x7f00000005c0), &(0x7f00000008c0)='%-010d \x00'}, 0x20) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r6, 0x0, 0xffbf) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.166732714s ago: executing program 3 (id=614): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000067733660c9f03637bcf7972e699000001e000200000400000000"], 0x50) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007f6a2b4d0403a9ae36582240904e1e50e1bd166ae8ed65cfccf2ab04b42833fcffffffffffffffe98fcbca5d6e7d23e77a9af1a265c18355d7c0f43646d20a1477d52722f9677a731fab9f50673f162a874cb612926e3add2e464d80b96bf5aff7403900aa685260b2d52b9897b0ff9a22aff51c0263932be254616a93d554d165ceb5afb880c18833a61fddc9ce515eec1796471be450634d16efcdbe7f71bc1ed7acd474e57f3c8c50a7b772837479ac9db53689883f7917c9dc35a86a2f727b27460f2e8925e2106624f89d86fe0c3b7e220f41eaf634c3936fca4e6543fa6ca11c852bfece481bcca4aa9463d76d16b52cea0687d56004f6749fe48cacb30c4118545f5746edaefe6308b12052c30f71c5b35f5f508190"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r9}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) 1.139208717s ago: executing program 4 (id=616): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000088459a44ed7a1f7a19c680d5f465007910480000000000a600"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r6, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000180)=""/50, 0x32, 0x0, &(0x7f0000000740)=""/39, 0x27}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYRESOCT=r7], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000380)="a56a88caffff0000000040876f2f35", 0x0, 0x400000ff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) write$cgroup_subtree(r5, &(0x7f0000000880)=ANY=[@ANYBLOB="2b667265657a6572202d637075730200202343aa1827655dcd0dec57e66daa255568a2d440b8350100f2cfc09f76a7951b57861ff98a67dea77f6211de7570a55334d9c77d430db87f4b05f378a187fab5003a54f6f47931dbd2bd488231236b681113a6baf0a61c9d8a9f033306ce8dd401843f0e0489680bf17be0c919a957541e1559e0871720cd9590328b564ff893d11c8e0595854f296f1fa3958bd41343934f101156e5fbbac830c7603c979f51ef8b1d92d589abe25340e3341b40aab081818051"], 0x11) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r13}, 0x10) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r14, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) close(r10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 920.559069ms ago: executing program 1 (id=619): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed", 0x2a}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 859.330595ms ago: executing program 1 (id=620): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0x7fffffff, 0x0, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x50) getpid() bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) socketpair(0xa, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x45, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) 858.831685ms ago: executing program 0 (id=621): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) 807.71012ms ago: executing program 4 (id=622): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000003f0000004000000042000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/12], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x2000004f, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000380), 0x0, 0x0, 0x3f, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f00000028c0)=ANY=[@ANYBLOB="b700000028000000bca30000000000003403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002604fdffffff000e61144400000000001d430000000000007a0a00fe0000001f61141c0000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fd79153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb7ed9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef", @ANYRES64=r3, @ANYRES8=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x2a, 0x0, &(0x7f00000020c0)="b9ff03316844268cb89e14f0080047e0ffff00124000632f0100000000000000030a07080403fe800000", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1400000000000000010000", @ANYRES32=r9], 0x18, 0x10}, 0x0) close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x2, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x1}], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xeb, &(0x7f0000000780)=""/235, 0x41100, 0x40, '\x00', r5, 0x0, r10, 0x8, &(0x7f0000000640)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x3, 0x3, 0x7f}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000006c0)=[{0x4, 0x4, 0x6, 0xc}], 0x10, 0x2}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000940)={r2, r1}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r11 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000003c0)="d7d18a81726d4895460865716e5cf1246b349d7a9fca097e8a8f3711f7b6b957d1aced7daec72cbaedb8e52cec5e6e7ed04701299b50be8dc0b81384", &(0x7f0000000080), 0x1003, r0}, 0x38) 800.58228ms ago: executing program 3 (id=623): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0xfc, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4}, 0x94) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 721.759048ms ago: executing program 3 (id=624): perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100ff08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 656.861895ms ago: executing program 1 (id=625): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000007000085000000060000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa1000000", @ANYBLOB="f066690240de885a62349c61814a12a5743c4dc2060c091bbca94dbcda7b48a5ee16bbfa7e6ff454603242af6931dfb71a69c9027ff1b8d94cf38ea03929d11816fccb84c1363cfb1c25d548ba9e9dbc642d44b9a5eb4582e2c33660b37df34b598797fc7cb948d2f155371e8319a57f5da09df30f61f101528e6338d430cb3a320fe7121f96e1e17d484ac0a4a231a06558f30c8499aae65dff03dfd3acc92d5300e1e14f4c1e462e0bffb5252364b52421cbf015286de8feb54c6aae99", @ANYBLOB="11e87b956e53d7f66f041f753e1f8faf3ad524f02e6438b847365bc424fe150f2c83d3d58741c9ea7fc590c7dd484233f487f64414f5761b2ee037ec77aedd993dc25c3038b2d12e81d43070f7832fe4bc4a04260fc196ceeebdcb39ced60a372cdcaaf97f24b0de5ec575e0429a357d311275125f18d216dbcc82edd76a8b202ef237955350e5d018d9763acbea71fe323b91f429b00526a255806fe3ac812f099ced96a288cdc7c25f05ba3499fd764a534c1c67c3433a8dfdb32b65ba00f952b404b883e9b2f72ab780ba1ac7e84e4094203078b5a3a4e65b48c5fc6f9d78220bc0514cdc751430942cf4687a"], 0x0, 0x1fffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d", @ANYRESHEX=r3, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000a00)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="05000000001af0c5246f653e652f45fd3f818636998c2789695bde5c1dbc7ba528a4cac411326327990b8c55160335f704f0db39bbda7445c2771af8d350af65035dacad460d70af1152b6fd06f62b23f457b383bea9b25d4b854c76cb46763c843416b6f5b4315a657f9acd22ceca2cc77f6998f6be7363bf6652387c7cf98c44d685549e6ca05a27d33602df36b44532797ff043183474eb895548c506fcfabbd39bd76de52ed576f9981ed354bcd2cad2781f04bef083e32be909f6de18bfa35d1b84e269c8a195ddad057c4d8d9f7be6c8240e"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="0100000000000000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x50) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, 0x0, 0x0) close(r8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) 645.046546ms ago: executing program 0 (id=626): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xbb, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000007c0)='kvm_userspace_exit\x00', r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0400000004000000040000000400000000000000", @ANYRES32, @ANYBLOB="00000000000000ffffffff0035414a0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 596.049291ms ago: executing program 3 (id=627): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008700000000000000a6000000ffffff8595", @ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x3, 0x105, &(0x7f0000000580)=""/261, 0x40f00}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xea, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x200, '\x00', r3, 0xffffffffffffffff, 0x3}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x4}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], {0x95, 0x0, 0x0, 0x1a03d3}}, &(0x7f0000000100)='GPL\x00', 0x9, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x1000070}, 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000004000000020"], 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETCARRIER(r10, 0x400454e2, &(0x7f0000000900)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) sendmsg$unix(r9, &(0x7f00000028c0)={&(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008814}, 0x20008800) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x605, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_clone(0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r13, &(0x7f00000004c0)=ANY=[], 0xfdef) 521.538508ms ago: executing program 0 (id=628): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000001400"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r4) 519.638268ms ago: executing program 1 (id=629): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000009955cbd76d2fa9b85ab62b31b3f1ed831e8c3bf74cb8bbd1f978c32eac8aa0a614985eabc3921aeaa04a78d3f886f45f99d2c39cdf272286eb9930451bd6dd60e75b786a6404da2cbde3f9a7bfb500"/106], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x24ad3180, 0x0, 0x0, 0x0, 0x0, 0x0) 331.902157ms ago: executing program 1 (id=630): bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) 266.516273ms ago: executing program 0 (id=631): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 228.361657ms ago: executing program 32 (id=631): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 224.967218ms ago: executing program 1 (id=633): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) (fail_nth: 24) 199.24246ms ago: executing program 33 (id=633): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) (fail_nth: 24) 166.500263ms ago: executing program 2 (id=634): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0xfc, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4}, 0x94) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 479.65µs ago: executing program 2 (id=635): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x7}, 0xa100, 0xc8, 0x3, 0x0, 0x8001, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) 0s ago: executing program 34 (id=635): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x7}, 0xa100, 0xc8, 0x3, 0x0, 0x8001, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.161' (ED25519) to the list of known hosts. [ 21.704434][ T30] audit: type=1400 audit(1760983851.534:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.706026][ T273] cgroup: Unknown subsys name 'net' [ 21.727735][ T30] audit: type=1400 audit(1760983851.534:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.756834][ T30] audit: type=1400 audit(1760983851.564:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.757052][ T273] cgroup: Unknown subsys name 'devices' [ 21.965321][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.971042][ T273] cgroup: Unknown subsys name 'rlimit' [ 22.231328][ T30] audit: type=1400 audit(1760983852.054:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.255109][ T30] audit: type=1400 audit(1760983852.054:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.280595][ T30] audit: type=1400 audit(1760983852.054:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.288183][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.313371][ T30] audit: type=1400 audit(1760983852.144:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.339274][ T30] audit: type=1400 audit(1760983852.144:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 22.453291][ T30] audit: type=1400 audit(1760983852.284:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.479495][ T30] audit: type=1400 audit(1760983852.284:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.479570][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.450316][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.457710][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.465648][ T282] device bridge_slave_0 entered promiscuous mode [ 23.479610][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.487052][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.494568][ T282] device bridge_slave_1 entered promiscuous mode [ 23.546489][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.554681][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.562409][ T281] device bridge_slave_0 entered promiscuous mode [ 23.570791][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.578248][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.586055][ T281] device bridge_slave_1 entered promiscuous mode [ 23.654843][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.662391][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.670335][ T283] device bridge_slave_0 entered promiscuous mode [ 23.677484][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.684886][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.692690][ T283] device bridge_slave_1 entered promiscuous mode [ 23.737499][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.744727][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.752543][ T284] device bridge_slave_0 entered promiscuous mode [ 23.760244][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.767637][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.775228][ T284] device bridge_slave_1 entered promiscuous mode [ 23.857979][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.865235][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.872725][ T285] device bridge_slave_0 entered promiscuous mode [ 23.890147][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.897521][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.905286][ T285] device bridge_slave_1 entered promiscuous mode [ 24.010056][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.017375][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.025423][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.032845][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.053185][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.060361][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.067896][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.075291][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.108514][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.115706][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.123044][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.130198][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.147527][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.154906][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.162421][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.169788][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.209220][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.217431][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.225115][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.232464][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.240346][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.247826][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.255454][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.263135][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.272348][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.280725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.298368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.314537][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.322852][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.330057][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.338353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.346911][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.354321][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.363441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.387154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.395691][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.402822][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.410225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.419173][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.426333][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.433897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.442243][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.449323][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.457318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.465954][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.473260][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.480758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.488895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.525272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.533212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.541118][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.549709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.558269][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.566528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.575013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.583581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.591882][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.599096][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.606820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.616277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.625095][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.632477][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.640624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.649455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.658199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.666620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.674838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.683464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.698063][ T283] device veth0_vlan entered promiscuous mode [ 24.713609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.722717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.731293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.740020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.748602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.756279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.764462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.772601][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.781204][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.789696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.798343][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.805515][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.813263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.821874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.830216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.847406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.856289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.864913][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.872489][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.880227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.889031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.897260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.905768][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.914273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.922251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.932225][ T281] device veth0_vlan entered promiscuous mode [ 24.940986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.950068][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.962153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.970578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.987011][ T282] device veth0_vlan entered promiscuous mode [ 24.995764][ T283] device veth1_macvtap entered promiscuous mode [ 25.006692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.015311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.023849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.032048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.040296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.048911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.057130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.064928][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.078964][ T281] device veth1_macvtap entered promiscuous mode [ 25.090235][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.098952][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.107434][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.116207][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.125183][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.133782][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.142823][ T282] device veth1_macvtap entered promiscuous mode [ 25.155377][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.163585][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.172205][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.181098][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.190226][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.199212][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.207760][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.227113][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.236029][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.244738][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.252599][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.261137][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.268707][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.291506][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 25.300038][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.316378][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.325671][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.335089][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.344102][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.353707][ T284] device veth0_vlan entered promiscuous mode [ 25.385740][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.402557][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.410568][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.449990][ T285] device veth0_vlan entered promiscuous mode [ 25.460652][ T284] device veth1_macvtap entered promiscuous mode [ 25.478070][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.501981][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.512940][ C0] hrtimer: interrupt took 26715 ns [ 25.514215][ T285] device veth1_macvtap entered promiscuous mode [ 25.535651][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.544359][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.553060][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.561785][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.571012][ T344] @ÿ: renamed from bond_slave_0 [ 25.587355][ T340] FAULT_INJECTION: forcing a failure. [ 25.587355][ T340] name failslab, interval 1, probability 0, space 0, times 1 [ 25.600879][ T340] CPU: 0 PID: 340 Comm: syz.3.4 Not tainted syzkaller #0 [ 25.608059][ T340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 25.618619][ T340] Call Trace: [ 25.622011][ T340] [ 25.624968][ T340] __dump_stack+0x21/0x30 [ 25.629356][ T340] dump_stack_lvl+0xee/0x150 [ 25.633982][ T340] ? show_regs_print_info+0x20/0x20 [ 25.639480][ T340] dump_stack+0x15/0x20 [ 25.643681][ T340] should_fail+0x3c1/0x510 [ 25.648222][ T340] __should_failslab+0xa4/0xe0 [ 25.653206][ T340] should_failslab+0x9/0x20 [ 25.657954][ T340] slab_pre_alloc_hook+0x3b/0xe0 [ 25.663455][ T340] kmem_cache_alloc_trace+0x48/0x270 [ 25.669511][ T340] ? device_add+0xbf/0xed0 [ 25.674327][ T340] device_add+0xbf/0xed0 [ 25.678904][ T340] ? pm_runtime_init+0x258/0x330 [ 25.684073][ T340] ? device_initialize+0x1e1/0x420 [ 25.689218][ T340] netdev_register_kobject+0x179/0x320 [ 25.695026][ T340] ? raw_notifier_call_chain+0xe9/0x100 [ 25.700599][ T340] register_netdevice+0xdfa/0x13a0 [ 25.705847][ T340] ? netif_stacked_transfer_operstate+0x220/0x220 [ 25.712400][ T340] ? __sanitizer_cov_trace_switch+0x4/0xe0 [ 25.718258][ T340] tun_set_iff+0x812/0xe00 [ 25.722861][ T340] __tun_chr_ioctl+0x7e8/0x1eb0 [ 25.727759][ T340] ? tun_flow_create+0x320/0x320 [ 25.732912][ T340] ? mutex_unlock+0x89/0x220 [ 25.737661][ T340] ? __fget_files+0x2c4/0x320 [ 25.742551][ T340] tun_chr_ioctl+0x2a/0x40 [ 25.747000][ T340] ? tun_chr_poll+0x720/0x720 [ 25.751803][ T340] __se_sys_ioctl+0x121/0x1a0 [ 25.756514][ T340] __x64_sys_ioctl+0x7b/0x90 [ 25.761138][ T340] x64_sys_call+0x2f/0x9a0 [ 25.765679][ T340] do_syscall_64+0x4c/0xa0 [ 25.770178][ T340] ? clear_bhb_loop+0x50/0xa0 [ 25.774889][ T340] ? clear_bhb_loop+0x50/0xa0 [ 25.779653][ T340] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.785753][ T340] RIP: 0033:0x7fc75f68efc9 [ 25.790396][ T340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.810294][ T340] RSP: 002b:00007fc75e0d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 25.818956][ T340] RAX: ffffffffffffffda RBX: 00007fc75f8e6090 RCX: 00007fc75f68efc9 [ 25.827083][ T340] RDX: 0000200000001480 RSI: 00000000400454ca RDI: 0000000000000005 [ 25.835344][ T340] RBP: 00007fc75e0d6090 R08: 0000000000000000 R09: 0000000000000000 [ 25.843841][ T340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 25.852016][ T340] R13: 00007fc75f8e6128 R14: 00007fc75f8e6090 R15: 00007ffeab90be78 [ 25.860018][ T340] [ 25.876231][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.885938][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.920492][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.943787][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.036115][ T359] FAULT_INJECTION: forcing a failure. [ 26.036115][ T359] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 26.089935][ T364] FAULT_INJECTION: forcing a failure. [ 26.089935][ T364] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 26.148448][ T359] CPU: 1 PID: 359 Comm: syz.3.7 Not tainted syzkaller #0 [ 26.155564][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 26.165746][ T359] Call Trace: [ 26.169045][ T359] [ 26.171991][ T359] __dump_stack+0x21/0x30 [ 26.176657][ T359] dump_stack_lvl+0xee/0x150 [ 26.181365][ T359] ? show_regs_print_info+0x20/0x20 [ 26.186717][ T359] dump_stack+0x15/0x20 [ 26.190895][ T359] should_fail+0x3c1/0x510 [ 26.195515][ T359] should_fail_usercopy+0x1a/0x20 [ 26.200649][ T359] _copy_to_user+0x20/0x90 [ 26.205668][ T359] simple_read_from_buffer+0xe9/0x160 [ 26.211067][ T359] proc_fail_nth_read+0x19a/0x210 [ 26.216687][ T359] ? proc_fault_inject_write+0x2f0/0x2f0 [ 26.222438][ T359] ? security_file_permission+0x83/0xa0 [ 26.228264][ T359] ? proc_fault_inject_write+0x2f0/0x2f0 [ 26.234095][ T359] vfs_read+0x282/0xbe0 [ 26.238481][ T359] ? kernel_read+0x1f0/0x1f0 [ 26.243554][ T359] ? __kasan_check_write+0x14/0x20 [ 26.248772][ T359] ? mutex_lock+0x95/0x1a0 [ 26.253206][ T359] ? wait_for_completion_killable_timeout+0x10/0x10 [ 26.259896][ T359] ? __fget_files+0x2c4/0x320 [ 26.264678][ T359] ? __fdget_pos+0x2d2/0x380 [ 26.269328][ T359] ? ksys_read+0x71/0x240 [ 26.273793][ T359] ksys_read+0x140/0x240 [ 26.278238][ T359] ? fd_install+0x169/0x2a0 [ 26.283062][ T359] ? vfs_write+0xf70/0xf70 [ 26.287697][ T359] ? debug_smp_processor_id+0x17/0x20 [ 26.293303][ T359] __x64_sys_read+0x7b/0x90 [ 26.297839][ T359] x64_sys_call+0x96d/0x9a0 [ 26.302368][ T359] do_syscall_64+0x4c/0xa0 [ 26.306887][ T359] ? clear_bhb_loop+0x50/0xa0 [ 26.311671][ T359] ? clear_bhb_loop+0x50/0xa0 [ 26.316375][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.322381][ T359] RIP: 0033:0x7fc75f68d9dc [ 26.326987][ T359] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 26.347219][ T359] RSP: 002b:00007fc75e0f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 26.355856][ T359] RAX: ffffffffffffffda RBX: 00007fc75f8e5fa0 RCX: 00007fc75f68d9dc [ 26.363856][ T359] RDX: 000000000000000f RSI: 00007fc75e0f70a0 RDI: 0000000000000007 [ 26.372123][ T359] RBP: 00007fc75e0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 26.380139][ T359] R10: 00002000000029c0 R11: 0000000000000246 R12: 0000000000000002 [ 26.388492][ T359] R13: 00007fc75f8e6038 R14: 00007fc75f8e5fa0 R15: 00007ffeab90be78 [ 26.396598][ T359] [ 26.407492][ T364] CPU: 1 PID: 364 Comm: syz.0.8 Not tainted syzkaller #0 [ 26.415371][ T364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 26.425867][ T364] Call Trace: [ 26.429165][ T364] [ 26.432121][ T364] __dump_stack+0x21/0x30 [ 26.436702][ T364] dump_stack_lvl+0xee/0x150 [ 26.441313][ T364] ? show_regs_print_info+0x20/0x20 [ 26.446535][ T364] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 26.452013][ T364] dump_stack+0x15/0x20 [ 26.456294][ T364] should_fail+0x3c1/0x510 [ 26.460731][ T364] should_fail_alloc_page+0x55/0x80 [ 26.465949][ T364] prepare_alloc_pages+0x156/0x600 [ 26.471078][ T364] ? __alloc_pages_bulk+0xab0/0xab0 [ 26.476291][ T364] ? __kasan_slab_alloc+0xcf/0xf0 [ 26.481342][ T364] ? __kasan_slab_alloc+0xbd/0xf0 [ 26.486663][ T364] ? slab_post_alloc_hook+0x4f/0x2b0 [ 26.491973][ T364] ? alloc_vmap_area+0x17a/0x1990 [ 26.497452][ T364] __alloc_pages+0x10a/0x440 [ 26.502239][ T364] ? prep_new_page+0x110/0x110 [ 26.507072][ T364] ? _raw_spin_lock+0x8e/0xe0 [ 26.511874][ T364] ? _raw_spin_trylock_bh+0x130/0x130 [ 26.517704][ T364] __get_free_pages+0x10/0x30 [ 26.522510][ T364] kasan_populate_vmalloc_pte+0x29/0x120 [ 26.528183][ T364] __apply_to_page_range+0x8cd/0xc70 [ 26.534001][ T364] ? kasan_populate_vmalloc+0x70/0x70 [ 26.539607][ T364] ? kasan_populate_vmalloc+0x70/0x70 [ 26.545110][ T364] apply_to_page_range+0x3b/0x50 [ 26.550558][ T364] kasan_populate_vmalloc+0x60/0x70 [ 26.555891][ T364] alloc_vmap_area+0x185c/0x1990 [ 26.561045][ T364] ? vm_map_ram+0xa70/0xa70 [ 26.565658][ T364] ? kmem_cache_alloc_trace+0x119/0x270 [ 26.571648][ T364] ? __get_vm_area_node+0x11d/0x350 [ 26.577071][ T364] __get_vm_area_node+0x14e/0x350 [ 26.582500][ T364] __vmalloc_node_range+0xdf/0xaf0 [ 26.587824][ T364] ? reuseport_array_alloc+0xc7/0x160 [ 26.593318][ T364] ? avc_has_perm+0x158/0x240 [ 26.598151][ T364] ? security_capable+0x87/0xb0 [ 26.603110][ T364] bpf_map_area_alloc+0xd5/0xe0 [ 26.608075][ T364] ? reuseport_array_alloc+0xc7/0x160 [ 26.613641][ T364] reuseport_array_alloc+0xc7/0x160 [ 26.618947][ T364] map_create+0x455/0x21b0 [ 26.623581][ T364] __sys_bpf+0x2cf/0x730 [ 26.627845][ T364] ? bpf_link_show_fdinfo+0x310/0x310 [ 26.633321][ T364] ? debug_smp_processor_id+0x17/0x20 [ 26.638796][ T364] __x64_sys_bpf+0x7c/0x90 [ 26.643880][ T364] x64_sys_call+0x4b9/0x9a0 [ 26.648682][ T364] do_syscall_64+0x4c/0xa0 [ 26.653276][ T364] ? clear_bhb_loop+0x50/0xa0 [ 26.658271][ T364] ? clear_bhb_loop+0x50/0xa0 [ 26.663064][ T364] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.669262][ T364] RIP: 0033:0x7f932585efc9 [ 26.673982][ T364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.694403][ T364] RSP: 002b:00007f93242c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 26.702856][ T364] RAX: ffffffffffffffda RBX: 00007f9325ab5fa0 RCX: 00007f932585efc9 [ 26.710851][ T364] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 26.719147][ T364] RBP: 00007f93242c7090 R08: 0000000000000000 R09: 0000000000000000 [ 26.727141][ T364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 26.735483][ T364] R13: 00007f9325ab6038 R14: 00007f9325ab5fa0 R15: 00007ffdb72caf98 [ 26.743586][ T364] [ 26.812209][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 26.812225][ T30] audit: type=1400 audit(1760983856.634:106): avc: denied { read } for pid=367 comm="syz.1.9" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.942910][ T380] syz.2.13[380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.957909][ T380] syz.2.13[380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.014639][ T384] syz.0.12[384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.041367][ T30] audit: type=1400 audit(1760983856.644:107): avc: denied { open } for pid=367 comm="syz.1.9" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.143284][ T384] syz.0.12[384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.177627][ T30] audit: type=1400 audit(1760983856.644:108): avc: denied { ioctl } for pid=367 comm="syz.1.9" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.219258][ T30] audit: type=1400 audit(1760983856.744:109): avc: denied { create } for pid=361 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.241904][ T30] audit: type=1400 audit(1760983856.854:110): avc: denied { create } for pid=381 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.347261][ T30] audit: type=1400 audit(1760983856.884:111): avc: denied { setopt } for pid=381 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.540485][ T30] audit: type=1400 audit(1760983857.364:112): avc: denied { create } for pid=394 comm="syz.4.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.648311][ T398] syz.3.17[398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.648415][ T398] syz.3.17[398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.681665][ T30] audit: type=1400 audit(1760983857.504:113): avc: denied { write } for pid=399 comm="syz.4.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.063584][ T30] audit: type=1400 audit(1760983857.894:114): avc: denied { read } for pid=401 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.043133][ T437] @ÿ: renamed from bond_slave_0 [ 29.159883][ T439] device veth1_macvtap left promiscuous mode [ 29.198811][ T30] audit: type=1400 audit(1760983859.024:115): avc: denied { tracepoint } for pid=440 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.220423][ T446] device veth1_macvtap entered promiscuous mode [ 29.296146][ T446] device macsec0 entered promiscuous mode [ 29.739891][ T470] syz.3.41[470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.739973][ T470] syz.3.41[470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.662092][ T548] syz.3.67[548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.699970][ T548] syz.3.67[548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.811897][ T550] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.834304][ T550] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.936725][ T558] device pim6reg1 entered promiscuous mode [ 34.169944][ T643] @ÿ: renamed from bond_slave_0 [ 34.402316][ T30] audit: type=1400 audit(1760983864.224:116): avc: denied { relabelfrom } for pid=658 comm="syz.4.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.467314][ T30] audit: type=1400 audit(1760983864.224:117): avc: denied { relabelto } for pid=658 comm="syz.4.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.469281][ T676] device veth0_vlan left promiscuous mode [ 35.496094][ T676] device veth0_vlan entered promiscuous mode [ 35.633915][ T682] syz.2.112[682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.634105][ T682] syz.2.112[682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.837897][ T687] @ÿ: renamed from bond_slave_0 [ 36.249076][ T697] bridge0: port 3(veth1) entered blocking state [ 36.259492][ T697] bridge0: port 3(veth1) entered disabled state [ 36.303676][ T697] device veth1 entered promiscuous mode [ 36.330542][ T697] bridge0: port 3(veth1) entered blocking state [ 36.337339][ T697] bridge0: port 3(veth1) entered forwarding state [ 36.572576][ T708] FAULT_INJECTION: forcing a failure. [ 36.572576][ T708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 36.692015][ T706] device veth1_macvtap left promiscuous mode [ 36.703208][ T708] CPU: 1 PID: 708 Comm: syz.3.119 Not tainted syzkaller #0 [ 36.710713][ T708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 36.721161][ T708] Call Trace: [ 36.724462][ T708] [ 36.727763][ T708] __dump_stack+0x21/0x30 [ 36.732386][ T708] dump_stack_lvl+0xee/0x150 [ 36.737120][ T708] ? show_regs_print_info+0x20/0x20 [ 36.742524][ T708] dump_stack+0x15/0x20 [ 36.746784][ T708] should_fail+0x3c1/0x510 [ 36.751215][ T708] should_fail_alloc_page+0x55/0x80 [ 36.756520][ T708] prepare_alloc_pages+0x156/0x600 [ 36.761821][ T708] ? __alloc_pages_bulk+0xab0/0xab0 [ 36.767113][ T708] ? __alloc_pages_bulk+0x47f/0xab0 [ 36.772352][ T708] __alloc_pages+0x10a/0x440 [ 36.777120][ T708] ? prep_new_page+0x110/0x110 [ 36.782214][ T708] ? __vmalloc_node_range+0x375/0xaf0 [ 36.788084][ T708] __vmalloc_node_range+0x505/0xaf0 [ 36.793795][ T708] bpf_map_area_alloc+0xd5/0xe0 [ 36.798947][ T708] ? htab_map_alloc+0xb29/0x14f0 [ 36.804299][ T708] htab_map_alloc+0xb29/0x14f0 [ 36.809177][ T708] map_create+0x455/0x21b0 [ 36.813613][ T708] __sys_bpf+0x2cf/0x730 [ 36.818128][ T708] ? bpf_link_show_fdinfo+0x310/0x310 [ 36.823521][ T708] ? debug_smp_processor_id+0x17/0x20 [ 36.829246][ T708] __x64_sys_bpf+0x7c/0x90 [ 36.833698][ T708] x64_sys_call+0x4b9/0x9a0 [ 36.838213][ T708] do_syscall_64+0x4c/0xa0 [ 36.842813][ T708] ? clear_bhb_loop+0x50/0xa0 [ 36.847608][ T708] ? clear_bhb_loop+0x50/0xa0 [ 36.852467][ T708] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 36.858397][ T708] RIP: 0033:0x7fc75f68efc9 [ 36.863100][ T708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.883704][ T708] RSP: 002b:00007fc75e0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 36.892139][ T708] RAX: ffffffffffffffda RBX: 00007fc75f8e5fa0 RCX: 00007fc75f68efc9 [ 36.900338][ T708] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 36.908578][ T708] RBP: 00007fc75e0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 36.916693][ T708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 36.924909][ T708] R13: 00007fc75f8e6038 R14: 00007fc75f8e5fa0 R15: 00007ffeab90be78 [ 36.933158][ T708] [ 37.005646][ T706] device wg2 entered promiscuous mode [ 37.030496][ T714] FAULT_INJECTION: forcing a failure. [ 37.030496][ T714] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 37.046568][ T714] CPU: 1 PID: 714 Comm: syz.3.122 Not tainted syzkaller #0 [ 37.054234][ T714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 37.065031][ T714] Call Trace: [ 37.068430][ T714] [ 37.071650][ T714] __dump_stack+0x21/0x30 [ 37.076200][ T714] dump_stack_lvl+0xee/0x150 [ 37.080917][ T714] ? show_regs_print_info+0x20/0x20 [ 37.086159][ T714] ? memcpy+0x56/0x70 [ 37.090177][ T714] dump_stack+0x15/0x20 [ 37.094458][ T714] should_fail+0x3c1/0x510 [ 37.099048][ T714] should_fail_usercopy+0x1a/0x20 [ 37.104216][ T714] _copy_to_user+0x20/0x90 [ 37.108683][ T714] bpf_verifier_vlog+0x1b4/0x330 [ 37.114451][ T714] __btf_verifier_log+0xd1/0x120 [ 37.119442][ T714] ? btf_check_sec_info+0x330/0x330 [ 37.124863][ T714] ? kvmalloc_node+0x231/0x300 [ 37.130015][ T714] ? memcpy+0x56/0x70 [ 37.134664][ T714] btf_parse_hdr+0x395/0x7f0 [ 37.139420][ T714] btf_new_fd+0x42c/0x920 [ 37.143789][ T714] bpf_btf_load+0x6f/0x90 [ 37.148243][ T714] __sys_bpf+0x515/0x730 [ 37.152599][ T714] ? bpf_link_show_fdinfo+0x310/0x310 [ 37.158470][ T714] ? debug_smp_processor_id+0x17/0x20 [ 37.164409][ T714] __x64_sys_bpf+0x7c/0x90 [ 37.168843][ T714] x64_sys_call+0x4b9/0x9a0 [ 37.173376][ T714] do_syscall_64+0x4c/0xa0 [ 37.177940][ T714] ? clear_bhb_loop+0x50/0xa0 [ 37.182979][ T714] ? clear_bhb_loop+0x50/0xa0 [ 37.187663][ T714] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.193694][ T714] RIP: 0033:0x7fc75f68efc9 [ 37.198365][ T714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.219057][ T714] RSP: 002b:00007fc75e0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.227932][ T714] RAX: ffffffffffffffda RBX: 00007fc75f8e5fa0 RCX: 00007fc75f68efc9 [ 37.236190][ T714] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000012 [ 37.244255][ T714] RBP: 00007fc75e0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 37.252242][ T714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.260327][ T714] R13: 00007fc75f8e6038 R14: 00007fc75f8e5fa0 R15: 00007ffeab90be78 [ 37.268818][ T714] [ 37.281581][ T711] device wg2 left promiscuous mode [ 37.449204][ T30] audit: type=1400 audit(1760983867.274:118): avc: denied { create } for pid=722 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.829752][ T30] audit: type=1400 audit(1760983868.654:119): avc: denied { write } for pid=735 comm="syz.4.130" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.894326][ T771] bridge0: port 3(veth1) entered disabled state [ 40.243332][ T778] FAULT_INJECTION: forcing a failure. [ 40.243332][ T778] name failslab, interval 1, probability 0, space 0, times 0 [ 40.310678][ T778] CPU: 0 PID: 778 Comm: syz.1.144 Not tainted syzkaller #0 [ 40.317960][ T778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 40.328325][ T778] Call Trace: [ 40.331740][ T778] [ 40.334708][ T778] __dump_stack+0x21/0x30 [ 40.339066][ T778] dump_stack_lvl+0xee/0x150 [ 40.343777][ T778] ? show_regs_print_info+0x20/0x20 [ 40.349366][ T778] dump_stack+0x15/0x20 [ 40.353885][ T778] should_fail+0x3c1/0x510 [ 40.358428][ T778] __should_failslab+0xa4/0xe0 [ 40.363498][ T778] should_failslab+0x9/0x20 [ 40.368228][ T778] slab_pre_alloc_hook+0x3b/0xe0 [ 40.373645][ T778] ? getname_flags+0xb9/0x500 [ 40.378753][ T778] kmem_cache_alloc+0x44/0x260 [ 40.384015][ T778] getname_flags+0xb9/0x500 [ 40.388704][ T778] __x64_sys_unlink+0x3c/0x50 [ 40.393387][ T778] x64_sys_call+0x878/0x9a0 [ 40.398026][ T778] do_syscall_64+0x4c/0xa0 [ 40.402453][ T778] ? clear_bhb_loop+0x50/0xa0 [ 40.407681][ T778] ? clear_bhb_loop+0x50/0xa0 [ 40.412451][ T778] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.418456][ T778] RIP: 0033:0x7f2504011fc9 [ 40.422876][ T778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.443238][ T778] RSP: 002b:00007f2502a7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 40.452060][ T778] RAX: ffffffffffffffda RBX: 00007f2504268fa0 RCX: 00007f2504011fc9 [ 40.460394][ T778] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000140 [ 40.468547][ T778] RBP: 00007f2502a7a090 R08: 0000000000000000 R09: 0000000000000000 [ 40.476788][ T778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.484956][ T778] R13: 00007f2504269038 R14: 00007f2504268fa0 R15: 00007fff6fd21658 [ 40.493277][ T778] [ 40.716974][ T790] syz.2.148[790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.717065][ T790] syz.2.148[790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.107700][ T30] audit: type=1400 audit(1760983870.934:120): avc: denied { cpu } for pid=809 comm="syz.2.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 41.329843][ T812] device veth1_macvtap left promiscuous mode [ 41.337562][ T812] device macsec0 entered promiscuous mode [ 42.036783][ T854] FAULT_INJECTION: forcing a failure. [ 42.036783][ T854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 42.126120][ T854] CPU: 0 PID: 854 Comm: syz.3.170 Not tainted syzkaller #0 [ 42.133998][ T854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 42.144652][ T854] Call Trace: [ 42.148188][ T854] [ 42.151159][ T854] __dump_stack+0x21/0x30 [ 42.155622][ T854] dump_stack_lvl+0xee/0x150 [ 42.160369][ T854] ? show_regs_print_info+0x20/0x20 [ 42.165980][ T854] ? vfs_write+0xc17/0xf70 [ 42.170821][ T854] dump_stack+0x15/0x20 [ 42.175106][ T854] should_fail+0x3c1/0x510 [ 42.179837][ T854] should_fail_usercopy+0x1a/0x20 [ 42.185187][ T854] _copy_from_user+0x20/0xd0 [ 42.190001][ T854] __sys_bpf+0x233/0x730 [ 42.194539][ T854] ? bpf_link_show_fdinfo+0x310/0x310 [ 42.200051][ T854] ? debug_smp_processor_id+0x17/0x20 [ 42.208126][ T854] __x64_sys_bpf+0x7c/0x90 [ 42.213223][ T854] x64_sys_call+0x4b9/0x9a0 [ 42.218481][ T854] do_syscall_64+0x4c/0xa0 [ 42.224308][ T854] ? clear_bhb_loop+0x50/0xa0 [ 42.229524][ T854] ? clear_bhb_loop+0x50/0xa0 [ 42.235096][ T854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.241031][ T854] RIP: 0033:0x7fc75f68efc9 [ 42.245487][ T854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.266057][ T854] RSP: 002b:00007fc75e0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.274954][ T854] RAX: ffffffffffffffda RBX: 00007fc75f8e5fa0 RCX: 00007fc75f68efc9 [ 42.283156][ T854] RDX: 0000000000000050 RSI: 0000200000000900 RDI: 000000000000000a [ 42.291761][ T854] RBP: 00007fc75e0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 42.300404][ T854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.308603][ T854] R13: 00007fc75f8e6038 R14: 00007fc75f8e5fa0 R15: 00007ffeab90be78 [ 42.317399][ T854] [ 43.133145][ T890] @ÿ: renamed from bond_slave_0 [ 43.777368][ T906] device veth0_vlan left promiscuous mode [ 43.840464][ T906] device veth0_vlan entered promiscuous mode [ 44.162411][ T911] device syzkaller0 entered promiscuous mode [ 44.521521][ T936] FAULT_INJECTION: forcing a failure. [ 44.521521][ T936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 44.536508][ T936] CPU: 0 PID: 936 Comm: syz.4.200 Not tainted syzkaller #0 [ 44.544042][ T936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 44.554294][ T936] Call Trace: [ 44.557596][ T936] [ 44.560741][ T936] __dump_stack+0x21/0x30 [ 44.565186][ T936] dump_stack_lvl+0xee/0x150 [ 44.569872][ T936] ? show_regs_print_info+0x20/0x20 [ 44.575080][ T936] dump_stack+0x15/0x20 [ 44.579242][ T936] should_fail+0x3c1/0x510 [ 44.583783][ T936] should_fail_alloc_page+0x55/0x80 [ 44.589415][ T936] prepare_alloc_pages+0x156/0x600 [ 44.594637][ T936] ? __alloc_pages_bulk+0xab0/0xab0 [ 44.600210][ T936] ? irqentry_exit+0x37/0x40 [ 44.604904][ T936] ? exc_page_fault+0x5e/0xb0 [ 44.609858][ T936] __alloc_pages+0x10a/0x440 [ 44.614562][ T936] ? prep_new_page+0x110/0x110 [ 44.619558][ T936] ? copy_user_enhanced_fast_string+0xe/0x40 [ 44.625638][ T936] pipe_write+0x570/0x18d0 [ 44.630163][ T936] ? pipe_write+0x141/0x18d0 [ 44.634979][ T936] ? pipe_read+0xfe0/0xfe0 [ 44.639748][ T936] ? selinux_file_permission+0x3f4/0x510 [ 44.645735][ T936] ? memset+0x35/0x40 [ 44.650164][ T936] ? iov_iter_init+0xbc/0x180 [ 44.655399][ T936] vfs_write+0x802/0xf70 [ 44.660095][ T936] ? file_end_write+0x1b0/0x1b0 [ 44.665752][ T936] ? __fget_files+0x2c4/0x320 [ 44.670652][ T936] ? __fdget_pos+0x1f7/0x380 [ 44.675359][ T936] ? ksys_write+0x71/0x240 [ 44.680467][ T936] ksys_write+0x140/0x240 [ 44.684984][ T936] ? __ia32_sys_read+0x90/0x90 [ 44.689925][ T936] ? debug_smp_processor_id+0x17/0x20 [ 44.695467][ T936] __x64_sys_write+0x7b/0x90 [ 44.700144][ T936] x64_sys_call+0x8ef/0x9a0 [ 44.704773][ T936] do_syscall_64+0x4c/0xa0 [ 44.709203][ T936] ? clear_bhb_loop+0x50/0xa0 [ 44.713898][ T936] ? clear_bhb_loop+0x50/0xa0 [ 44.718840][ T936] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.724833][ T936] RIP: 0033:0x7f0bf5f9dfc9 [ 44.729259][ T936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.749737][ T936] RSP: 002b:00007f0bf4a06038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 44.758678][ T936] RAX: ffffffffffffffda RBX: 00007f0bf61f4fa0 RCX: 00007f0bf5f9dfc9 [ 44.767100][ T936] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 0000000000000000 [ 44.775253][ T936] RBP: 00007f0bf4a06090 R08: 0000000000000000 R09: 0000000000000000 [ 44.783435][ T936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.791430][ T936] R13: 00007f0bf61f5038 R14: 00007f0bf61f4fa0 R15: 00007ffd77ece568 [ 44.800517][ T936] [ 44.999024][ T946] device wg2 entered promiscuous mode [ 45.992377][ T982] syz.2.218[982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.992456][ T982] syz.2.218[982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.383643][ T1002] FAULT_INJECTION: forcing a failure. [ 46.383643][ T1002] name failslab, interval 1, probability 0, space 0, times 0 [ 46.616183][ T1002] CPU: 1 PID: 1002 Comm: syz.2.223 Not tainted syzkaller #0 [ 46.624065][ T1002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 46.635128][ T1002] Call Trace: [ 46.638436][ T1002] [ 46.641478][ T1002] __dump_stack+0x21/0x30 [ 46.646015][ T1002] dump_stack_lvl+0xee/0x150 [ 46.650980][ T1002] ? show_regs_print_info+0x20/0x20 [ 46.656751][ T1002] dump_stack+0x15/0x20 [ 46.661108][ T1002] should_fail+0x3c1/0x510 [ 46.665636][ T1002] __should_failslab+0xa4/0xe0 [ 46.670435][ T1002] should_failslab+0x9/0x20 [ 46.675349][ T1002] slab_pre_alloc_hook+0x3b/0xe0 [ 46.680342][ T1002] ? dup_task_struct+0x57/0xc10 [ 46.685813][ T1002] kmem_cache_alloc+0x44/0x260 [ 46.690807][ T1002] ? _raw_spin_lock_irq+0x8f/0xe0 [ 46.696032][ T1002] dup_task_struct+0x57/0xc10 [ 46.700823][ T1002] ? __kasan_check_write+0x14/0x20 [ 46.706235][ T1002] ? recalc_sigpending+0x1ac/0x230 [ 46.711448][ T1002] copy_process+0x5a9/0x3210 [ 46.716115][ T1002] ? kstrtol_from_user+0x260/0x260 [ 46.721502][ T1002] ? __kasan_check_write+0x14/0x20 [ 46.726966][ T1002] ? proc_fail_nth_write+0x17a/0x1f0 [ 46.732262][ T1002] ? proc_fail_nth_read+0x210/0x210 [ 46.737754][ T1002] ? __pidfd_prepare+0x150/0x150 [ 46.742895][ T1002] ? security_file_permission+0x83/0xa0 [ 46.748744][ T1002] kernel_clone+0x23f/0x940 [ 46.753455][ T1002] ? create_io_thread+0x130/0x130 [ 46.758495][ T1002] ? __kasan_check_write+0x14/0x20 [ 46.763613][ T1002] ? mutex_unlock+0x89/0x220 [ 46.768510][ T1002] __x64_sys_clone+0x176/0x1d0 [ 46.773770][ T1002] ? __kasan_check_write+0x14/0x20 [ 46.779014][ T1002] ? __ia32_sys_vfork+0xf0/0xf0 [ 46.783944][ T1002] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 46.790045][ T1002] x64_sys_call+0x41f/0x9a0 [ 46.794888][ T1002] do_syscall_64+0x4c/0xa0 [ 46.799823][ T1002] ? clear_bhb_loop+0x50/0xa0 [ 46.804609][ T1002] ? clear_bhb_loop+0x50/0xa0 [ 46.809391][ T1002] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.815384][ T1002] RIP: 0033:0x7f0906233fc9 [ 46.819808][ T1002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.839749][ T1002] RSP: 002b:00007f0904c9bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 46.848368][ T1002] RAX: ffffffffffffffda RBX: 00007f090648afa0 RCX: 00007f0906233fc9 [ 46.856439][ T1002] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062008000 [ 46.864793][ T1002] RBP: 00007f0904c9c090 R08: 0000000000000000 R09: 0000000000000000 [ 46.872941][ T1002] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 46.880920][ T1002] R13: 00007f090648b038 R14: 00007f090648afa0 R15: 00007ffecb550a48 [ 46.889436][ T1002] [ 47.175056][ T997] device syzkaller0 entered promiscuous mode [ 48.222943][ T1058] device veth1_macvtap left promiscuous mode [ 48.255879][ T1060] syz.2.244[1060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.255981][ T1060] syz.2.244[1060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.608519][ T1080] syz.4.250[1080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.703517][ T1080] syz.4.250[1080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.105329][ T1076] device syzkaller0 entered promiscuous mode [ 49.116298][ T1089] syz.1.252[1089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.124077][ T1089] syz.1.252[1089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.241364][ T1092] device veth1_macvtap left promiscuous mode [ 49.259164][ T1092] device macsec0 entered promiscuous mode [ 49.472476][ T1103] device macsec0 entered promiscuous mode [ 49.654326][ T1113] device syzkaller0 entered promiscuous mode [ 50.034857][ T30] audit: type=1400 audit(1760983879.864:121): avc: denied { create } for pid=1123 comm="syz.4.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 50.211693][ T1139] syz.1.271[1139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.211807][ T1139] syz.1.271[1139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.232423][ T1140] FAULT_INJECTION: forcing a failure. [ 50.232423][ T1140] name failslab, interval 1, probability 0, space 0, times 0 [ 50.257582][ T1140] CPU: 1 PID: 1140 Comm: syz.0.272 Not tainted syzkaller #0 [ 50.265159][ T1140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 50.275410][ T1140] Call Trace: [ 50.278711][ T1140] [ 50.281663][ T1140] __dump_stack+0x21/0x30 [ 50.286029][ T1140] dump_stack_lvl+0xee/0x150 [ 50.290763][ T1140] ? show_regs_print_info+0x20/0x20 [ 50.296174][ T1140] dump_stack+0x15/0x20 [ 50.300351][ T1140] should_fail+0x3c1/0x510 [ 50.305425][ T1140] __should_failslab+0xa4/0xe0 [ 50.310210][ T1140] should_failslab+0x9/0x20 [ 50.314831][ T1140] slab_pre_alloc_hook+0x3b/0xe0 [ 50.319780][ T1140] ? inet_getpeer+0x263/0x960 [ 50.324583][ T1140] kmem_cache_alloc+0x44/0x260 [ 50.329530][ T1140] inet_getpeer+0x263/0x960 [ 50.334037][ T1140] ? inet_peer_base_init+0x20/0x20 [ 50.339161][ T1140] ? ip6_route_output_flags_noref+0x283/0x340 [ 50.345427][ T1140] ? memcpy+0x56/0x70 [ 50.349510][ T1140] icmpv6_xrlim_allow+0x350/0x490 [ 50.354541][ T1140] ? dev_put+0x70/0x70 [ 50.358702][ T1140] ? __kasan_check_write+0x14/0x20 [ 50.364091][ T1140] icmp6_send+0xb92/0x14c0 [ 50.368608][ T1140] ? icmpv6_push_pending_frames+0x440/0x440 [ 50.374605][ T1140] ? numa_migrate_prep+0xd0/0xd0 [ 50.379637][ T1140] ? __skb_flow_dissect+0x520c/0x5930 [ 50.385102][ T1140] icmpv6_param_prob+0x2f/0x40 [ 50.389906][ T1140] ip6_parse_tlv+0x1a4c/0x1ba0 [ 50.394766][ T1140] ipv6_parse_hopopts+0x2a3/0x580 [ 50.399800][ T1140] ip6_rcv_core+0xca7/0x1390 [ 50.404428][ T1140] ipv6_rcv+0xca/0x210 [ 50.408687][ T1140] ? irqentry_exit+0x37/0x40 [ 50.413362][ T1140] ? exc_page_fault+0x5e/0xb0 [ 50.418042][ T1140] ? ip6_rcv_finish+0x360/0x360 [ 50.422981][ T1140] ? asm_exc_page_fault+0x27/0x30 [ 50.428098][ T1140] ? _copy_from_iter+0x191/0x1050 [ 50.433136][ T1140] ? ip6_rcv_finish+0x360/0x360 [ 50.438432][ T1140] __netif_receive_skb+0xc8/0x280 [ 50.443555][ T1140] ? _copy_from_iter+0x4ae/0x1050 [ 50.448679][ T1140] ? __kasan_check_write+0x14/0x20 [ 50.453803][ T1140] netif_receive_skb+0x98/0x3d0 [ 50.458916][ T1140] ? netif_receive_skb_core+0x100/0x100 [ 50.464571][ T1140] ? __kernel_text_address+0xa0/0x100 [ 50.469975][ T1140] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 50.475860][ T1140] tun_rx_batched+0x5e8/0x710 [ 50.480634][ T1140] ? local_bh_enable+0x30/0x30 [ 50.485407][ T1140] tun_get_user+0x279c/0x33c0 [ 50.490523][ T1140] ? __kasan_poison_slab+0x40/0x70 [ 50.495756][ T1140] ? kmem_cache_free+0x100/0x320 [ 50.501015][ T1140] ? __x64_sys_openat+0x136/0x160 [ 50.506099][ T1140] ? x64_sys_call+0x219/0x9a0 [ 50.510782][ T1140] ? tun_do_read+0x1c40/0x1c40 [ 50.515552][ T1140] ? kstrtouint_from_user+0x1a0/0x200 [ 50.521015][ T1140] ? kstrtol_from_user+0x260/0x260 [ 50.526487][ T1140] ? avc_policy_seqno+0x1b/0x70 [ 50.531431][ T1140] ? selinux_file_permission+0x2aa/0x510 [ 50.537086][ T1140] tun_chr_write_iter+0x1eb/0x2e0 [ 50.542203][ T1140] vfs_write+0x802/0xf70 [ 50.546458][ T1140] ? file_end_write+0x1b0/0x1b0 [ 50.551326][ T1140] ? __fget_files+0x2c4/0x320 [ 50.556131][ T1140] ? __fdget_pos+0x1f7/0x380 [ 50.561008][ T1140] ? ksys_write+0x71/0x240 [ 50.565444][ T1140] ksys_write+0x140/0x240 [ 50.569783][ T1140] ? __ia32_sys_read+0x90/0x90 [ 50.574566][ T1140] ? debug_smp_processor_id+0x17/0x20 [ 50.580345][ T1140] __x64_sys_write+0x7b/0x90 [ 50.585564][ T1140] x64_sys_call+0x8ef/0x9a0 [ 50.590178][ T1140] do_syscall_64+0x4c/0xa0 [ 50.594787][ T1140] ? clear_bhb_loop+0x50/0xa0 [ 50.599659][ T1140] ? clear_bhb_loop+0x50/0xa0 [ 50.604454][ T1140] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.610479][ T1140] RIP: 0033:0x7f932585efc9 [ 50.615310][ T1140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.635581][ T1140] RSP: 002b:00007f93242c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.644391][ T1140] RAX: ffffffffffffffda RBX: 00007f9325ab5fa0 RCX: 00007f932585efc9 [ 50.652422][ T1140] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 50.661121][ T1140] RBP: 00007f93242c7090 R08: 0000000000000000 R09: 0000000000000000 [ 50.669485][ T1140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.678070][ T1140] R13: 00007f9325ab6038 R14: 00007f9325ab5fa0 R15: 00007ffdb72caf98 [ 50.686430][ T1140] [ 51.753015][ T1186] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.760858][ T1186] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.894012][ T1192] syz.0.290[1192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.894097][ T1192] syz.0.290[1192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.919666][ T1189] bridge0: port 3(veth0) entered blocking state [ 51.990467][ T1195] syz.1.291[1195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.990566][ T1195] syz.1.291[1195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.028506][ T1189] bridge0: port 3(veth0) entered disabled state [ 52.158112][ T1189] device veth0 entered promiscuous mode [ 52.171579][ T1189] bridge0: port 3(veth0) entered blocking state [ 52.178596][ T1189] bridge0: port 3(veth0) entered forwarding state [ 52.244725][ T1190] device bridge_slave_1 left promiscuous mode [ 52.263143][ T1190] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.271152][ T1190] device bridge_slave_0 left promiscuous mode [ 52.277944][ T1190] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.834853][ T1229] device wg2 entered promiscuous mode [ 53.560461][ T1246] syz.3.310[1246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.560539][ T1246] syz.3.310[1246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.287901][ T1284] device macsec0 left promiscuous mode [ 54.383935][ T1284] device wg2 left promiscuous mode [ 54.418699][ T1284] device wg2 entered promiscuous mode [ 54.499324][ T1293] syz.2.325[1293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.499405][ T1293] syz.2.325[1293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.032524][ T1347] FAULT_INJECTION: forcing a failure. [ 56.032524][ T1347] name failslab, interval 1, probability 0, space 0, times 0 [ 56.072998][ T1347] CPU: 0 PID: 1347 Comm: syz.0.345 Not tainted syzkaller #0 [ 56.080447][ T1347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 56.090839][ T1347] Call Trace: [ 56.094151][ T1347] [ 56.097374][ T1347] __dump_stack+0x21/0x30 [ 56.102001][ T1347] dump_stack_lvl+0xee/0x150 [ 56.106647][ T1347] ? show_regs_print_info+0x20/0x20 [ 56.112017][ T1347] ? exc_page_fault+0x5e/0xb0 [ 56.116837][ T1347] ? asm_exc_page_fault+0x27/0x30 [ 56.122077][ T1347] dump_stack+0x15/0x20 [ 56.126442][ T1347] should_fail+0x3c1/0x510 [ 56.131263][ T1347] __should_failslab+0xa4/0xe0 [ 56.136270][ T1347] should_failslab+0x9/0x20 [ 56.140809][ T1347] slab_pre_alloc_hook+0x3b/0xe0 [ 56.145907][ T1347] __kmalloc+0x6d/0x2c0 [ 56.150220][ T1347] ? bpf_test_init+0x100/0x1c0 [ 56.155125][ T1347] bpf_test_init+0x100/0x1c0 [ 56.159854][ T1347] bpf_prog_test_run_skb+0x193/0x1150 [ 56.165260][ T1347] ? __kasan_check_write+0x14/0x20 [ 56.170413][ T1347] ? fput_many+0x15a/0x1a0 [ 56.174863][ T1347] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 56.181106][ T1347] bpf_prog_test_run+0x3d5/0x620 [ 56.186082][ T1347] ? bpf_prog_query+0x230/0x230 [ 56.191268][ T1347] ? selinux_bpf+0xce/0xf0 [ 56.195723][ T1347] ? security_bpf+0x82/0xa0 [ 56.200482][ T1347] __sys_bpf+0x52c/0x730 [ 56.205103][ T1347] ? bpf_link_show_fdinfo+0x310/0x310 [ 56.210950][ T1347] ? debug_smp_processor_id+0x17/0x20 [ 56.216546][ T1347] __x64_sys_bpf+0x7c/0x90 [ 56.221281][ T1347] x64_sys_call+0x4b9/0x9a0 [ 56.225827][ T1347] do_syscall_64+0x4c/0xa0 [ 56.230287][ T1347] ? clear_bhb_loop+0x50/0xa0 [ 56.235384][ T1347] ? clear_bhb_loop+0x50/0xa0 [ 56.240182][ T1347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.246225][ T1347] RIP: 0033:0x7f932585efc9 [ 56.251007][ T1347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.271734][ T1347] RSP: 002b:00007f93242c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 56.280435][ T1347] RAX: ffffffffffffffda RBX: 00007f9325ab5fa0 RCX: 00007f932585efc9 [ 56.288781][ T1347] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 56.296876][ T1347] RBP: 00007f93242c7090 R08: 0000000000000000 R09: 0000000000000000 [ 56.305120][ T1347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.313099][ T1347] R13: 00007f9325ab6038 R14: 00007f9325ab5fa0 R15: 00007ffdb72caf98 [ 56.321106][ T1347] [ 56.895504][ T1368] FAULT_INJECTION: forcing a failure. [ 56.895504][ T1368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.909070][ T1368] CPU: 0 PID: 1368 Comm: syz.2.353 Not tainted syzkaller #0 [ 56.916567][ T1368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 56.926726][ T1368] Call Trace: [ 56.930055][ T1368] [ 56.933096][ T1368] __dump_stack+0x21/0x30 [ 56.937583][ T1368] dump_stack_lvl+0xee/0x150 [ 56.942185][ T1368] ? show_regs_print_info+0x20/0x20 [ 56.947566][ T1368] ? memcpy+0x56/0x70 [ 56.951661][ T1368] dump_stack+0x15/0x20 [ 56.955969][ T1368] should_fail+0x3c1/0x510 [ 56.960492][ T1368] should_fail_usercopy+0x1a/0x20 [ 56.965888][ T1368] _copy_to_user+0x20/0x90 [ 56.970324][ T1368] bpf_verifier_vlog+0x1b4/0x330 [ 56.975368][ T1368] __btf_verifier_log+0xd1/0x120 [ 56.980319][ T1368] ? btf_check_sec_info+0x330/0x330 [ 56.985619][ T1368] ? kvmalloc_node+0x231/0x300 [ 56.990426][ T1368] ? memcpy+0x56/0x70 [ 56.994422][ T1368] btf_parse_hdr+0x3c0/0x7f0 [ 56.999037][ T1368] btf_new_fd+0x42c/0x920 [ 57.003492][ T1368] bpf_btf_load+0x6f/0x90 [ 57.007837][ T1368] __sys_bpf+0x515/0x730 [ 57.012078][ T1368] ? bpf_link_show_fdinfo+0x310/0x310 [ 57.017457][ T1368] ? debug_smp_processor_id+0x17/0x20 [ 57.022879][ T1368] __x64_sys_bpf+0x7c/0x90 [ 57.027422][ T1368] x64_sys_call+0x4b9/0x9a0 [ 57.031926][ T1368] do_syscall_64+0x4c/0xa0 [ 57.036348][ T1368] ? clear_bhb_loop+0x50/0xa0 [ 57.041037][ T1368] ? clear_bhb_loop+0x50/0xa0 [ 57.045844][ T1368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.051848][ T1368] RIP: 0033:0x7f0906233fc9 [ 57.056380][ T1368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.076258][ T1368] RSP: 002b:00007f0904c9c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.084776][ T1368] RAX: ffffffffffffffda RBX: 00007f090648afa0 RCX: 00007f0906233fc9 [ 57.092855][ T1368] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000012 [ 57.100920][ T1368] RBP: 00007f0904c9c090 R08: 0000000000000000 R09: 0000000000000000 [ 57.108909][ T1368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.116896][ T1368] R13: 00007f090648b038 R14: 00007f090648afa0 R15: 00007ffecb550a48 [ 57.124968][ T1368] [ 57.270818][ T1356] device wg2 entered promiscuous mode [ 57.385564][ T30] audit: type=1400 audit(1760983887.214:122): avc: denied { create } for pid=1379 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 61.108302][ T1436] FAULT_INJECTION: forcing a failure. [ 61.108302][ T1436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.274687][ T1436] CPU: 0 PID: 1436 Comm: syz.1.374 Not tainted syzkaller #0 [ 61.282045][ T1436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 61.292264][ T1436] Call Trace: [ 61.295677][ T1436] [ 61.298733][ T1436] __dump_stack+0x21/0x30 [ 61.303107][ T1436] dump_stack_lvl+0xee/0x150 [ 61.307747][ T1436] ? show_regs_print_info+0x20/0x20 [ 61.312998][ T1436] ? dump_stack+0x9/0x20 [ 61.317282][ T1436] dump_stack+0x15/0x20 [ 61.321825][ T1436] should_fail+0x3c1/0x510 [ 61.326357][ T1436] should_fail_usercopy+0x1a/0x20 [ 61.331525][ T1436] strncpy_from_user+0x24/0x2e0 [ 61.336421][ T1436] ? kmem_cache_alloc+0xf7/0x260 [ 61.341707][ T1436] getname_flags+0xf4/0x500 [ 61.346460][ T1436] __x64_sys_unlink+0x3c/0x50 [ 61.351588][ T1436] x64_sys_call+0x878/0x9a0 [ 61.356321][ T1436] do_syscall_64+0x4c/0xa0 [ 61.360779][ T1436] ? clear_bhb_loop+0x50/0xa0 [ 61.365492][ T1436] ? clear_bhb_loop+0x50/0xa0 [ 61.370193][ T1436] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 61.376540][ T1436] RIP: 0033:0x7f2504011fc9 [ 61.380981][ T1436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.400750][ T1436] RSP: 002b:00007f2502a7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 61.409381][ T1436] RAX: ffffffffffffffda RBX: 00007f2504268fa0 RCX: 00007f2504011fc9 [ 61.417518][ T1436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000140 [ 61.425794][ T1436] RBP: 00007f2502a7a090 R08: 0000000000000000 R09: 0000000000000000 [ 61.433775][ T1436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.441752][ T1436] R13: 00007f2504269038 R14: 00007f2504268fa0 R15: 00007fff6fd21658 [ 61.449918][ T1436] [ 64.591987][ T1523] device veth1_macvtap entered promiscuous mode [ 64.599147][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.363301][ T1549] syz.0.413[1549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.363383][ T1549] syz.0.413[1549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.587330][ T1552] device veth1_macvtap left promiscuous mode [ 65.605958][ T1552] device macsec0 entered promiscuous mode [ 66.011362][ T1573] syz.4.423[1573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.011466][ T1573] syz.4.423[1573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.015490][ T1570] bridge0: port 4(veth0) entered blocking state [ 66.044039][ T1570] bridge0: port 4(veth0) entered disabled state [ 66.154831][ T1570] device veth0 entered promiscuous mode [ 67.168965][ T1610] FAULT_INJECTION: forcing a failure. [ 67.168965][ T1610] name failslab, interval 1, probability 0, space 0, times 0 [ 67.254191][ T1610] CPU: 1 PID: 1610 Comm: syz.3.435 Not tainted syzkaller #0 [ 67.261726][ T1610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 67.272119][ T1610] Call Trace: [ 67.275415][ T1610] [ 67.278362][ T1610] __dump_stack+0x21/0x30 [ 67.282722][ T1610] dump_stack_lvl+0xee/0x150 [ 67.287339][ T1610] ? show_regs_print_info+0x20/0x20 [ 67.292845][ T1610] dump_stack+0x15/0x20 [ 67.297301][ T1610] should_fail+0x3c1/0x510 [ 67.301753][ T1610] __should_failslab+0xa4/0xe0 [ 67.306567][ T1610] should_failslab+0x9/0x20 [ 67.311197][ T1610] slab_pre_alloc_hook+0x3b/0xe0 [ 67.316335][ T1610] kmem_cache_alloc_trace+0x48/0x270 [ 67.321641][ T1610] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 67.327380][ T1610] selinux_sk_alloc_security+0x7e/0x1a0 [ 67.332941][ T1610] security_sk_alloc+0x72/0xa0 [ 67.337719][ T1610] sk_prot_alloc+0x108/0x320 [ 67.342329][ T1610] sk_alloc+0x38/0x430 [ 67.346438][ T1610] bpf_prog_test_run_skb+0x24b/0x1150 [ 67.351930][ T1610] ? __kasan_check_write+0x14/0x20 [ 67.357054][ T1610] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 67.362992][ T1610] bpf_prog_test_run+0x3d5/0x620 [ 67.368023][ T1610] ? bpf_prog_query+0x230/0x230 [ 67.372878][ T1610] ? selinux_bpf+0xce/0xf0 [ 67.377333][ T1610] ? security_bpf+0x82/0xa0 [ 67.381845][ T1610] __sys_bpf+0x52c/0x730 [ 67.386096][ T1610] ? bpf_link_show_fdinfo+0x310/0x310 [ 67.391747][ T1610] ? debug_smp_processor_id+0x17/0x20 [ 67.397215][ T1610] __x64_sys_bpf+0x7c/0x90 [ 67.401726][ T1610] x64_sys_call+0x4b9/0x9a0 [ 67.406266][ T1610] do_syscall_64+0x4c/0xa0 [ 67.411072][ T1610] ? clear_bhb_loop+0x50/0xa0 [ 67.415841][ T1610] ? clear_bhb_loop+0x50/0xa0 [ 67.420714][ T1610] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.426786][ T1610] RIP: 0033:0x7fc75f68efc9 [ 67.431323][ T1610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.451191][ T1610] RSP: 002b:00007fc75e0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.459877][ T1610] RAX: ffffffffffffffda RBX: 00007fc75f8e5fa0 RCX: 00007fc75f68efc9 [ 67.467856][ T1610] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 67.476126][ T1610] RBP: 00007fc75e0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 67.484285][ T1610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.492256][ T1610] R13: 00007fc75f8e6038 R14: 00007fc75f8e5fa0 R15: 00007ffeab90be78 [ 67.500515][ T1610] [ 67.869994][ T1624] FAULT_INJECTION: forcing a failure. [ 67.869994][ T1624] name failslab, interval 1, probability 0, space 0, times 0 [ 67.890840][ T1624] CPU: 1 PID: 1624 Comm: syz.1.439 Not tainted syzkaller #0 [ 67.898489][ T1624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 67.908936][ T1624] Call Trace: [ 67.912216][ T1624] [ 67.915237][ T1624] __dump_stack+0x21/0x30 [ 67.919663][ T1624] dump_stack_lvl+0xee/0x150 [ 67.924608][ T1624] ? show_regs_print_info+0x20/0x20 [ 67.929813][ T1624] dump_stack+0x15/0x20 [ 67.934060][ T1624] should_fail+0x3c1/0x510 [ 67.938475][ T1624] __should_failslab+0xa4/0xe0 [ 67.943247][ T1624] should_failslab+0x9/0x20 [ 67.947766][ T1624] slab_pre_alloc_hook+0x3b/0xe0 [ 67.952709][ T1624] ? __kernfs_new_node+0xdb/0x680 [ 67.957828][ T1624] kmem_cache_alloc+0x44/0x260 [ 67.962715][ T1624] __kernfs_new_node+0xdb/0x680 [ 67.967575][ T1624] ? make_kgid+0x1aa/0x640 [ 67.972199][ T1624] ? kernfs_new_node+0x260/0x260 [ 67.977248][ T1624] ? from_kuid_munged+0x690/0x690 [ 67.982281][ T1624] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 67.988534][ T1624] ? net_namespace+0x40/0x40 [ 67.993154][ T1624] ? net_ns_get_ownership+0xf8/0x180 [ 67.998460][ T1624] kernfs_new_node+0x150/0x260 [ 68.003229][ T1624] kernfs_create_dir_ns+0x47/0x130 [ 68.008692][ T1624] sysfs_create_dir_ns+0x11c/0x280 [ 68.013811][ T1624] ? x64_sys_call+0x2f/0x9a0 [ 68.018514][ T1624] ? sysfs_warn_dup+0xa0/0xa0 [ 68.023286][ T1624] ? _raw_spin_lock+0x8e/0xe0 [ 68.028151][ T1624] ? net_namespace+0xd/0x40 [ 68.032668][ T1624] kobject_add_internal+0x755/0xda0 [ 68.037869][ T1624] kobject_add+0x154/0x210 [ 68.042494][ T1624] ? mutex_unlock+0x89/0x220 [ 68.047107][ T1624] ? kobject_init+0x1d0/0x1d0 [ 68.052068][ T1624] ? __kasan_check_write+0x14/0x20 [ 68.057306][ T1624] ? get_device_parent+0x2a1/0x410 [ 68.062706][ T1624] device_add+0x3c1/0xed0 [ 68.067043][ T1624] netdev_register_kobject+0x179/0x320 [ 68.072516][ T1624] ? raw_notifier_call_chain+0xe9/0x100 [ 68.078092][ T1624] register_netdevice+0xdfa/0x13a0 [ 68.083315][ T1624] ? netif_stacked_transfer_operstate+0x220/0x220 [ 68.089833][ T1624] tun_set_iff+0x812/0xe00 [ 68.094351][ T1624] __tun_chr_ioctl+0x7e8/0x1eb0 [ 68.099207][ T1624] ? tun_flow_create+0x320/0x320 [ 68.104158][ T1624] ? irqentry_exit+0x37/0x40 [ 68.109364][ T1624] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 68.115405][ T1624] ? tun_chr_poll+0x720/0x720 [ 68.120332][ T1624] ? __se_sys_ioctl+0x114/0x1a0 [ 68.125292][ T1624] tun_chr_ioctl+0x2a/0x40 [ 68.129719][ T1624] ? tun_chr_poll+0x720/0x720 [ 68.134401][ T1624] __se_sys_ioctl+0x121/0x1a0 [ 68.139099][ T1624] __x64_sys_ioctl+0x7b/0x90 [ 68.143702][ T1624] x64_sys_call+0x2f/0x9a0 [ 68.148125][ T1624] do_syscall_64+0x4c/0xa0 [ 68.152546][ T1624] ? clear_bhb_loop+0x50/0xa0 [ 68.157234][ T1624] ? clear_bhb_loop+0x50/0xa0 [ 68.161913][ T1624] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.167814][ T1624] RIP: 0033:0x7f2504011fc9 [ 68.172243][ T1624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.192199][ T1624] RSP: 002b:00007f2502a7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 68.200631][ T1624] RAX: ffffffffffffffda RBX: 00007f2504268fa0 RCX: 00007f2504011fc9 [ 68.208816][ T1624] RDX: 0000200000001480 RSI: 00000000400454ca RDI: 0000000000000005 [ 68.217314][ T1624] RBP: 00007f2502a7a090 R08: 0000000000000000 R09: 0000000000000000 [ 68.225409][ T1624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 68.233387][ T1624] R13: 00007f2504269038 R14: 00007f2504268fa0 R15: 00007fff6fd21658 [ 68.241604][ T1624] [ 68.291016][ T1624] kobject_add_internal failed for syzkaller0 (error: -12 parent: net) [ 69.388628][ T1687] FAULT_INJECTION: forcing a failure. [ 69.388628][ T1687] name failslab, interval 1, probability 0, space 0, times 0 [ 69.401351][ T1687] CPU: 0 PID: 1687 Comm: syz.1.460 Not tainted syzkaller #0 [ 69.408659][ T1687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 69.418834][ T1687] Call Trace: [ 69.422228][ T1687] [ 69.425268][ T1687] __dump_stack+0x21/0x30 [ 69.429734][ T1687] dump_stack_lvl+0xee/0x150 [ 69.434364][ T1687] ? show_regs_print_info+0x20/0x20 [ 69.439798][ T1687] dump_stack+0x15/0x20 [ 69.444077][ T1687] should_fail+0x3c1/0x510 [ 69.448528][ T1687] ? alloc_skb_with_frags+0xa8/0x620 [ 69.453999][ T1687] __should_failslab+0xa4/0xe0 [ 69.458890][ T1687] should_failslab+0x9/0x20 [ 69.463435][ T1687] slab_pre_alloc_hook+0x3b/0xe0 [ 69.468509][ T1687] ? alloc_skb_with_frags+0xa8/0x620 [ 69.473999][ T1687] ? alloc_skb_with_frags+0xa8/0x620 [ 69.479314][ T1687] __kmalloc_track_caller+0x6c/0x2c0 [ 69.484817][ T1687] ? alloc_skb_with_frags+0xa8/0x620 [ 69.490236][ T1687] ? alloc_skb_with_frags+0xa8/0x620 [ 69.495903][ T1687] __alloc_skb+0x21a/0x740 [ 69.500647][ T1687] alloc_skb_with_frags+0xa8/0x620 [ 69.505969][ T1687] ? fib6_lookup+0x2a0/0x2a0 [ 69.510609][ T1687] sock_alloc_send_pskb+0x853/0x980 [ 69.515926][ T1687] ? sock_kzfree_s+0x60/0x60 [ 69.520800][ T1687] ? __local_bh_enable_ip+0x58/0x80 [ 69.526047][ T1687] ? local_bh_enable+0x1f/0x30 [ 69.531022][ T1687] ? ip6_dst_lookup_tail+0xd01/0x1370 [ 69.536435][ T1687] sock_alloc_send_skb+0x32/0x40 [ 69.541405][ T1687] __ip6_append_data+0x252e/0x37e0 [ 69.546825][ T1687] ? icmpv6_route_lookup+0x457/0x4e0 [ 69.552257][ T1687] ? ip6_setup_cork+0x1290/0x1290 [ 69.557327][ T1687] ? __kasan_check_read+0x11/0x20 [ 69.562390][ T1687] ? ip6_setup_cork+0xd10/0x1290 [ 69.567451][ T1687] ip6_append_data+0x1d0/0x330 [ 69.572251][ T1687] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 69.577580][ T1687] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 69.583257][ T1687] icmp6_send+0xeb8/0x14c0 [ 69.588004][ T1687] ? icmpv6_push_pending_frames+0x440/0x440 [ 69.593947][ T1687] ? numa_migrate_prep+0xd0/0xd0 [ 69.598936][ T1687] ? __skb_flow_dissect+0x520c/0x5930 [ 69.604452][ T1687] icmpv6_param_prob+0x2f/0x40 [ 69.609253][ T1687] ip6_parse_tlv+0x1a4c/0x1ba0 [ 69.614580][ T1687] ipv6_parse_hopopts+0x2a3/0x580 [ 69.619826][ T1687] ip6_rcv_core+0xca7/0x1390 [ 69.624642][ T1687] ipv6_rcv+0xca/0x210 [ 69.628895][ T1687] ? irqentry_exit+0x37/0x40 [ 69.633803][ T1687] ? exc_page_fault+0x5e/0xb0 [ 69.638815][ T1687] ? ip6_rcv_finish+0x360/0x360 [ 69.644138][ T1687] ? asm_exc_page_fault+0x27/0x30 [ 69.649203][ T1687] ? _copy_from_iter+0x191/0x1050 [ 69.654346][ T1687] ? ip6_rcv_finish+0x360/0x360 [ 69.659429][ T1687] __netif_receive_skb+0xc8/0x280 [ 69.664604][ T1687] ? _copy_from_iter+0x4ae/0x1050 [ 69.669868][ T1687] ? __kasan_check_write+0x14/0x20 [ 69.675206][ T1687] netif_receive_skb+0x98/0x3d0 [ 69.680278][ T1687] ? netif_receive_skb_core+0x100/0x100 [ 69.685954][ T1687] ? __kernel_text_address+0xa0/0x100 [ 69.691472][ T1687] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 69.697088][ T1687] tun_rx_batched+0x5e8/0x710 [ 69.701890][ T1687] ? local_bh_enable+0x30/0x30 [ 69.706688][ T1687] tun_get_user+0x279c/0x33c0 [ 69.711416][ T1687] ? __kasan_poison_slab+0x40/0x70 [ 69.716724][ T1687] ? kmem_cache_free+0x100/0x320 [ 69.721821][ T1687] ? __x64_sys_openat+0x136/0x160 [ 69.727176][ T1687] ? x64_sys_call+0x219/0x9a0 [ 69.731985][ T1687] ? tun_do_read+0x1c40/0x1c40 [ 69.736873][ T1687] ? kstrtouint_from_user+0x1a0/0x200 [ 69.742371][ T1687] ? kstrtol_from_user+0x260/0x260 [ 69.747728][ T1687] ? putname+0x111/0x160 [ 69.752024][ T1687] ? avc_policy_seqno+0x1b/0x70 [ 69.757271][ T1687] ? selinux_file_permission+0x2aa/0x510 [ 69.762949][ T1687] tun_chr_write_iter+0x1eb/0x2e0 [ 69.768190][ T1687] vfs_write+0x802/0xf70 [ 69.772587][ T1687] ? file_end_write+0x1b0/0x1b0 [ 69.777470][ T1687] ? __fget_files+0x2c4/0x320 [ 69.782184][ T1687] ? __fdget_pos+0x1f7/0x380 [ 69.786805][ T1687] ? ksys_write+0x71/0x240 [ 69.791255][ T1687] ksys_write+0x140/0x240 [ 69.795613][ T1687] ? __ia32_sys_read+0x90/0x90 [ 69.800426][ T1687] ? debug_smp_processor_id+0x17/0x20 [ 69.805831][ T1687] __x64_sys_write+0x7b/0x90 [ 69.810545][ T1687] x64_sys_call+0x8ef/0x9a0 [ 69.815077][ T1687] do_syscall_64+0x4c/0xa0 [ 69.819623][ T1687] ? clear_bhb_loop+0x50/0xa0 [ 69.824332][ T1687] ? clear_bhb_loop+0x50/0xa0 [ 69.829144][ T1687] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.835166][ T1687] RIP: 0033:0x7f2504011fc9 [ 69.839614][ T1687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.859794][ T1687] RSP: 002b:00007f2502a7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 69.868336][ T1687] RAX: ffffffffffffffda RBX: 00007f2504268fa0 RCX: 00007f2504011fc9 [ 69.876515][ T1687] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 69.884693][ T1687] RBP: 00007f2502a7a090 R08: 0000000000000000 R09: 0000000000000000 [ 69.892703][ T1687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.900897][ T1687] R13: 00007f2504269038 R14: 00007f2504268fa0 R15: 00007fff6fd21658 [ 69.909452][ T1687] [ 70.054357][ T1696] device sit0 entered promiscuous mode [ 71.497538][ T1752] FAULT_INJECTION: forcing a failure. [ 71.497538][ T1752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 71.512707][ T1752] CPU: 1 PID: 1752 Comm: syz.1.481 Not tainted syzkaller #0 [ 71.520390][ T1752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 71.530804][ T1752] Call Trace: [ 71.534375][ T1752] [ 71.537322][ T1752] __dump_stack+0x21/0x30 [ 71.541763][ T1752] dump_stack_lvl+0xee/0x150 [ 71.546464][ T1752] ? show_regs_print_info+0x20/0x20 [ 71.551872][ T1752] ? stack_trace_save+0x98/0xe0 [ 71.556738][ T1752] dump_stack+0x15/0x20 [ 71.560916][ T1752] should_fail+0x3c1/0x510 [ 71.565348][ T1752] should_fail_alloc_page+0x55/0x80 [ 71.570995][ T1752] prepare_alloc_pages+0x156/0x600 [ 71.576338][ T1752] ? __alloc_pages_bulk+0xab0/0xab0 [ 71.581669][ T1752] __alloc_pages+0x10a/0x440 [ 71.586271][ T1752] ? prep_new_page+0x110/0x110 [ 71.591055][ T1752] kmalloc_order+0x4c/0x160 [ 71.595570][ T1752] ? alloc_skb_with_frags+0xa8/0x620 [ 71.600957][ T1752] kmalloc_order_trace+0x18/0xb0 [ 71.606421][ T1752] __kmalloc_track_caller+0x198/0x2c0 [ 71.612772][ T1752] ? kmem_cache_alloc+0xf7/0x260 [ 71.617818][ T1752] ? alloc_skb_with_frags+0xa8/0x620 [ 71.623121][ T1752] __alloc_skb+0x21a/0x740 [ 71.627820][ T1752] alloc_skb_with_frags+0xa8/0x620 [ 71.633204][ T1752] sock_alloc_send_pskb+0x853/0x980 [ 71.638686][ T1752] ? is_bpf_text_address+0x177/0x190 [ 71.644343][ T1752] ? __kernel_text_address+0xa0/0x100 [ 71.649900][ T1752] ? sock_kzfree_s+0x60/0x60 [ 71.654591][ T1752] ? stack_trace_save+0x98/0xe0 [ 71.659679][ T1752] tun_get_user+0x4e6/0x33c0 [ 71.664685][ T1752] ? __kasan_poison_slab+0x40/0x70 [ 71.669891][ T1752] ? kmem_cache_free+0x100/0x320 [ 71.674849][ T1752] ? __x64_sys_openat+0x136/0x160 [ 71.679887][ T1752] ? x64_sys_call+0x219/0x9a0 [ 71.684570][ T1752] ? tun_do_read+0x1c40/0x1c40 [ 71.689365][ T1752] ? kstrtouint_from_user+0x1a0/0x200 [ 71.695394][ T1752] ? kstrtol_from_user+0x260/0x260 [ 71.700726][ T1752] ? putname+0x111/0x160 [ 71.705275][ T1752] ? avc_policy_seqno+0x1b/0x70 [ 71.710249][ T1752] ? selinux_file_permission+0x2aa/0x510 [ 71.716480][ T1752] tun_chr_write_iter+0x1eb/0x2e0 [ 71.721810][ T1752] vfs_write+0x802/0xf70 [ 71.726167][ T1752] ? file_end_write+0x1b0/0x1b0 [ 71.731041][ T1752] ? __fget_files+0x2c4/0x320 [ 71.735834][ T1752] ? __fdget_pos+0x1f7/0x380 [ 71.740464][ T1752] ? ksys_write+0x71/0x240 [ 71.745020][ T1752] ksys_write+0x140/0x240 [ 71.749539][ T1752] ? __ia32_sys_read+0x90/0x90 [ 71.754415][ T1752] ? debug_smp_processor_id+0x17/0x20 [ 71.759803][ T1752] __x64_sys_write+0x7b/0x90 [ 71.764700][ T1752] x64_sys_call+0x8ef/0x9a0 [ 71.769359][ T1752] do_syscall_64+0x4c/0xa0 [ 71.773919][ T1752] ? clear_bhb_loop+0x50/0xa0 [ 71.778871][ T1752] ? clear_bhb_loop+0x50/0xa0 [ 71.783589][ T1752] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.789508][ T1752] RIP: 0033:0x7f2504011fc9 [ 71.793939][ T1752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.813897][ T1752] RSP: 002b:00007f2502a7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 71.822433][ T1752] RAX: ffffffffffffffda RBX: 00007f2504268fa0 RCX: 00007f2504011fc9 [ 71.830416][ T1752] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 00000000000000c8 [ 71.838555][ T1752] RBP: 00007f2502a7a090 R08: 0000000000000000 R09: 0000000000000000 [ 71.846737][ T1752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.854807][ T1752] R13: 00007f2504269038 R14: 00007f2504268fa0 R15: 00007fff6fd21658 [ 71.863081][ T1752] [ 73.477325][ T1804] device macsec0 entered promiscuous mode [ 75.936367][ T1837] device veth1_macvtap left promiscuous mode [ 76.210737][ T1853] syz.4.519[1853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.211391][ T1853] syz.4.519[1853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.295336][ T1853] device sit0 entered promiscuous mode [ 76.657608][ T1867] FAULT_INJECTION: forcing a failure. [ 76.657608][ T1867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.674447][ T1867] CPU: 1 PID: 1867 Comm: syz.3.524 Not tainted syzkaller #0 [ 76.681794][ T1867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 76.692131][ T1867] Call Trace: [ 76.695438][ T1867] [ 76.698494][ T1867] __dump_stack+0x21/0x30 [ 76.702955][ T1867] dump_stack_lvl+0xee/0x150 [ 76.707655][ T1867] ? show_regs_print_info+0x20/0x20 [ 76.713005][ T1867] dump_stack+0x15/0x20 [ 76.717268][ T1867] should_fail+0x3c1/0x510 [ 76.721979][ T1867] should_fail_usercopy+0x1a/0x20 [ 76.727111][ T1867] _copy_from_user+0x20/0xd0 [ 76.731802][ T1867] bpf_test_init+0x13d/0x1c0 [ 76.736509][ T1867] bpf_prog_test_run_skb+0x193/0x1150 [ 76.742040][ T1867] ? __kasan_check_write+0x14/0x20 [ 76.747374][ T1867] ? fput_many+0x15a/0x1a0 [ 76.752018][ T1867] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 76.758111][ T1867] bpf_prog_test_run+0x3d5/0x620 [ 76.763164][ T1867] ? bpf_prog_query+0x230/0x230 [ 76.768139][ T1867] ? selinux_bpf+0xce/0xf0 [ 76.772663][ T1867] ? security_bpf+0x82/0xa0 [ 76.777268][ T1867] __sys_bpf+0x52c/0x730 [ 76.781527][ T1867] ? bpf_link_show_fdinfo+0x310/0x310 [ 76.786924][ T1867] ? debug_smp_processor_id+0x17/0x20 [ 76.792523][ T1867] __x64_sys_bpf+0x7c/0x90 [ 76.796984][ T1867] x64_sys_call+0x4b9/0x9a0 [ 76.801623][ T1867] do_syscall_64+0x4c/0xa0 [ 76.806165][ T1867] ? clear_bhb_loop+0x50/0xa0 [ 76.810878][ T1867] ? clear_bhb_loop+0x50/0xa0 [ 76.815586][ T1867] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.821501][ T1867] RIP: 0033:0x7fc75f68efc9 [ 76.825951][ T1867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.846129][ T1867] RSP: 002b:00007fc75e0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.854677][ T1867] RAX: ffffffffffffffda RBX: 00007fc75f8e5fa0 RCX: 00007fc75f68efc9 [ 76.862759][ T1867] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 76.870746][ T1867] RBP: 00007fc75e0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 76.879177][ T1867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.887269][ T1867] R13: 00007fc75f8e6038 R14: 00007fc75f8e5fa0 R15: 00007ffeab90be78 [ 76.895265][ T1867] [ 77.760843][ T1903] FAULT_INJECTION: forcing a failure. [ 77.760843][ T1903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.910390][ T1903] CPU: 1 PID: 1903 Comm: syz.4.537 Not tainted syzkaller #0 [ 77.918035][ T1903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 77.928208][ T1903] Call Trace: [ 77.931562][ T1903] [ 77.934521][ T1903] __dump_stack+0x21/0x30 [ 77.938983][ T1903] dump_stack_lvl+0xee/0x150 [ 77.943715][ T1903] ? show_regs_print_info+0x20/0x20 [ 77.949217][ T1903] ? memcpy+0x56/0x70 [ 77.953265][ T1903] dump_stack+0x15/0x20 [ 77.957550][ T1903] should_fail+0x3c1/0x510 [ 77.962230][ T1903] should_fail_usercopy+0x1a/0x20 [ 77.967411][ T1903] _copy_to_user+0x20/0x90 [ 77.972149][ T1903] bpf_verifier_vlog+0x1b4/0x330 [ 77.977117][ T1903] __btf_verifier_log+0xd1/0x120 [ 77.982178][ T1903] ? btf_check_sec_info+0x330/0x330 [ 77.987418][ T1903] ? kvmalloc_node+0x231/0x300 [ 77.992307][ T1903] ? memcpy+0x56/0x70 [ 77.996712][ T1903] btf_parse_hdr+0x3ea/0x7f0 [ 78.001620][ T1903] btf_new_fd+0x42c/0x920 [ 78.006088][ T1903] bpf_btf_load+0x6f/0x90 [ 78.010508][ T1903] __sys_bpf+0x515/0x730 [ 78.014785][ T1903] ? bpf_link_show_fdinfo+0x310/0x310 [ 78.020202][ T1903] ? debug_smp_processor_id+0x17/0x20 [ 78.025612][ T1903] __x64_sys_bpf+0x7c/0x90 [ 78.030067][ T1903] x64_sys_call+0x4b9/0x9a0 [ 78.034607][ T1903] do_syscall_64+0x4c/0xa0 [ 78.039057][ T1903] ? clear_bhb_loop+0x50/0xa0 [ 78.043953][ T1903] ? clear_bhb_loop+0x50/0xa0 [ 78.048669][ T1903] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.054610][ T1903] RIP: 0033:0x7f0bf5f9dfc9 [ 78.059271][ T1903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.079434][ T1903] RSP: 002b:00007f0bf4a06038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.088069][ T1903] RAX: ffffffffffffffda RBX: 00007f0bf61f4fa0 RCX: 00007f0bf5f9dfc9 [ 78.096212][ T1903] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000012 [ 78.104487][ T1903] RBP: 00007f0bf4a06090 R08: 0000000000000000 R09: 0000000000000000 [ 78.112492][ T1903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.120841][ T1903] R13: 00007f0bf61f5038 R14: 00007f0bf61f4fa0 R15: 00007ffd77ece568 [ 78.128939][ T1903] [ 79.905546][ T30] audit: type=1400 audit(1760983909.734:123): avc: denied { ioctl } for pid=1979 comm="syz.2.566" path="socket:[23079]" dev="sockfs" ino=23079 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.555987][ T2002] device syzkaller0 entered promiscuous mode [ 80.790392][ T2026] bond_slave_1: mtu less than device minimum [ 80.810470][ T2027] bond_slave_1: mtu less than device minimum [ 80.895583][ T2033] device macsec0 left promiscuous mode [ 80.925474][ T2041] device wg2 left promiscuous mode [ 80.945982][ T2033] device wg2 entered promiscuous mode [ 81.386392][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 81.419240][ T2065] FAULT_INJECTION: forcing a failure. [ 81.419240][ T2065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.432672][ T2065] CPU: 1 PID: 2065 Comm: syz.4.598 Not tainted syzkaller #0 [ 81.440006][ T2065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 81.450539][ T2065] Call Trace: [ 81.453976][ T2065] [ 81.456988][ T2065] __dump_stack+0x21/0x30 [ 81.461359][ T2065] dump_stack_lvl+0xee/0x150 [ 81.466043][ T2065] ? show_regs_print_info+0x20/0x20 [ 81.471345][ T2065] dump_stack+0x15/0x20 [ 81.475604][ T2065] should_fail+0x3c1/0x510 [ 81.480114][ T2065] should_fail_usercopy+0x1a/0x20 [ 81.485196][ T2065] _copy_to_user+0x20/0x90 [ 81.489616][ T2065] simple_read_from_buffer+0xe9/0x160 [ 81.494989][ T2065] proc_fail_nth_read+0x19a/0x210 [ 81.500031][ T2065] ? proc_fault_inject_write+0x2f0/0x2f0 [ 81.505665][ T2065] ? security_file_permission+0x83/0xa0 [ 81.511218][ T2065] ? proc_fault_inject_write+0x2f0/0x2f0 [ 81.516858][ T2065] vfs_read+0x282/0xbe0 [ 81.521021][ T2065] ? kernel_read+0x1f0/0x1f0 [ 81.525614][ T2065] ? __kasan_check_write+0x14/0x20 [ 81.530731][ T2065] ? mutex_lock+0x95/0x1a0 [ 81.535164][ T2065] ? wait_for_completion_killable_timeout+0x10/0x10 [ 81.541756][ T2065] ? __fget_files+0x2c4/0x320 [ 81.546442][ T2065] ? __fdget_pos+0x2d2/0x380 [ 81.551046][ T2065] ? ksys_read+0x71/0x240 [ 81.555556][ T2065] ksys_read+0x140/0x240 [ 81.559907][ T2065] ? vfs_write+0xf70/0xf70 [ 81.564423][ T2065] ? sched_clock_cpu+0x18/0x3c0 [ 81.569324][ T2065] __x64_sys_read+0x7b/0x90 [ 81.574095][ T2065] x64_sys_call+0x96d/0x9a0 [ 81.578777][ T2065] do_syscall_64+0x4c/0xa0 [ 81.583541][ T2065] ? clear_bhb_loop+0x50/0xa0 [ 81.588328][ T2065] ? clear_bhb_loop+0x50/0xa0 [ 81.593199][ T2065] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.599307][ T2065] RIP: 0033:0x7f0bf5f9c9dc [ 81.603738][ T2065] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 81.623971][ T2065] RSP: 002b:00007f0bf4a06030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 81.632827][ T2065] RAX: ffffffffffffffda RBX: 00007f0bf61f4fa0 RCX: 00007f0bf5f9c9dc [ 81.641004][ T2065] RDX: 000000000000000f RSI: 00007f0bf4a060a0 RDI: 0000000000000007 [ 81.649191][ T2065] RBP: 00007f0bf4a06090 R08: 0000000000000000 R09: 0000000000000000 [ 81.657956][ T2065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.666076][ T2065] R13: 00007f0bf61f5038 R14: 00007f0bf61f4fa0 R15: 00007ffd77ece568 [ 81.674332][ T2065] [ 82.166691][ T2093] device macsec0 entered promiscuous mode [ 82.288126][ T2103] device pim6reg1 entered promiscuous mode [ 82.843057][ T2126] device pim6reg1 left promiscuous mode [ 83.283253][ T283] syz-executor (283) used greatest stack depth: 20544 bytes left SYZFAIL: repeatedly failed to execute the program proc=5 req=632 state=1 status=7 (errno 9: Bad file descriptor) [ 84.424159][ T8] device veth0 left promiscuous mode [ 84.429551][ T8] bridge0: port 4(veth0) entered disabled state [ 84.436648][ T8] device veth1 left promiscuous mode [ 84.442252][ T8] bridge0: port 3(veth1) entered disabled state [ 84.449090][ T8] device bridge_slave_1 left promiscuous mode [ 84.455449][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.463347][ T8] device bridge_slave_0 left promiscuous mode [ 84.469627][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.478018][ T8] device bridge_slave_1 left promiscuous mode [ 84.484214][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.491762][ T8] device bridge_slave_0 left promiscuous mode [ 84.498173][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.506968][ T8] device veth0_vlan left promiscuous mode [ 86.494610][ T8] device veth0 left promiscuous mode [ 86.500369][ T8] bridge0: port 3(veth0) entered disabled state [ 86.508128][ T8] device bridge_slave_1 left promiscuous mode [ 86.514353][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.522260][ T8] device bridge_slave_0 left promiscuous mode [ 86.528675][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.537501][ T8] device veth0_vlan left promiscuous mode [ 86.543858][ T8] device veth0_vlan left promiscuous mode