last executing test programs: 5.456111788s ago: executing program 0 (id=6079): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r3, 0x0, 0x20000000}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0x180) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000400)='./file0\x00', r7}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.310570704s ago: executing program 0 (id=6085): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xe) 5.185053189s ago: executing program 0 (id=6087): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00020000000083211cd0000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, &(0x7f0000001140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd"], 0xfdef) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000440)={'veth1_to_bond\x00', @local}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r3], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340), 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8982, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x5, 0x1, 0x40}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 4.93855061s ago: executing program 4 (id=6088): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x60}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x4fc2, 0x0, 0xfffffd, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r1, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67", @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="0000000002000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.519208138s ago: executing program 0 (id=6096): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x429, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1, 0x1, 0x20000, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x8000, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.023199919s ago: executing program 1 (id=6099): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x2fd7782f}, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="7e00000055000001000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) 2.734742563s ago: executing program 1 (id=6100): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x7, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0x1, 0x0, r0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r1}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0x36) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r7, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x1a9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB="0000000800000000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r10}, 0x10) 2.202920407s ago: executing program 1 (id=6110): bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="720ac9ff002100007110830000000000950000000000080069c80a5e5d2065c69cd8dd8b77401fb2bd140642e234330569bfdd7fd743d8b7bccfabfa8241313df2eef11651c10599189407badd91b1ddc6f8b7"], &(0x7f0000000480)='GPL\x00'}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x34, &(0x7f00000000c0)=r2, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0xfffffffb, 0x18}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r8, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xffbf) socketpair(0x2, 0xa, 0xfffffffe, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.093705471s ago: executing program 3 (id=6111): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x2000000000000071, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.89196703s ago: executing program 2 (id=6112): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.89135937s ago: executing program 2 (id=6113): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x7}, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xfffffdef) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5fb11a82cc0046000000452f000000000000000000007133aa5184dc6b449ef7a645bfad56db3a16", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2f9a15814c06d50b) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f0000000a40)=""/160}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=0x0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) 1.842141342s ago: executing program 3 (id=6114): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r1}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) (async) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) (async) 1.631032041s ago: executing program 3 (id=6115): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000c27f00000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000100000000000000000000000000000100", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='f2fs_writepages\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x2b6, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x2b6, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1308f7b5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1308f7b5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)=r4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000180)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r3, @ANYBLOB='\t\x00'/20, @ANYRES32=r6, @ANYRES32, @ANYBLOB="0000000001000000070000000100000000"], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f2, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xa5, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731141000000000020000000000000009500200000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 1.583053133s ago: executing program 0 (id=6116): bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa0000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc80000000000000", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={&(0x7f00000028c0)=""/4096, 0x1000, 0x0, &(0x7f00000007c0)=""/159, 0x9f}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3c}, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000e3000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.582459293s ago: executing program 1 (id=6117): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000c700"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100006b6c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) close(r3) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x63) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="1805000000000000000000000000ba6343cc13860b8f00007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r10}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xfdef) 1.558484864s ago: executing program 4 (id=6118): bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32], 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000400000073011000000000009500000000000000faa5274454c3468d9f42331140f3159db1e431b87aad15005e46430e059c7992625ddd90388985677e3bf79832c735934b70848a67f6fa2a4e3c4fbb85f4ddf1975897d9cebad8dd6a68e86f89552c8fe0"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000080)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="b60a0000ffffffff6111240000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc42}, 0x58) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r4) (async) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) (async) close(r2) (async) close(r3) (async) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) (async) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) 1.545504594s ago: executing program 4 (id=6119): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, @perf_config_ext={0x6}, 0x102259, 0xc8, 0x0, 0x8, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000010bfa200000000000027020000f8ffffffb703000008000000b7040000fa7b0000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e"], 0xfdef) 1.492115927s ago: executing program 4 (id=6120): bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000080)=@base={0xa, 0x16, 0xb5, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="000000000000000079f96f00000000001800000000000000000000000000000095833e3ba9bc78dec31300000000000095000000000000001b21ea44c125fe2a2615aa3e7e9b758f93501d9f9e2700e7626988408968ee656cfde91ca8f1be69b36dce90f3d27070f7ea71e0b3dd78a7b4d6e0403c13906c1df2579f3253c0e082f5c3b2ca203bb449ae1cf377108da8790d73fdc2aaedb6487082998691c47feb0a9f73f7a86d0073c775decb336c28b234efa07fc6e7260b9573fdf762f95770af19a177526d8014a52f4c568dca13717b8d3a98f79b7958c709d25e20835d84f8919a31e31b5945111663e16ab0e5bc28894e88"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 1.491551297s ago: executing program 4 (id=6121): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x2, 0x2, 0x8, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0x2}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[], 0x50) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x0, 0x0, 0x0, 0x2000, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000200)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_clone(0x40049480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x2, 0x2, 0x8, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0x2}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) (async) gettid() (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[], 0x50) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x0, 0x0, 0x0, 0x2000, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x0) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000200)) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x1ff) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) syz_clone(0x40049480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) (async) 1.481538707s ago: executing program 0 (id=6122): openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) (async) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x50) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) (async) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r2 = openat$cgroup_ro(r1, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7f6b32e5, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r2, 0x4) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.316117464s ago: executing program 3 (id=6124): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xf8, 0x8, 0x0, 0xfffffffffffffffd}}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x18) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001d00)={0x1b, 0x0, 0x0, 0x200, 0x0, r2, 0x6, '\x00', r1, r6, 0x4, 0x3, 0x5}, 0x50) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) close(0x3) close(r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000500)=@raw=[@alu={0x7, 0x0, 0x5, 0x3, 0x4, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0xb, 0xd0c083bb9cc6caa9, 0x8, 0x8, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xbd4e28ed9b1af5c8}}, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0xcd}], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x24, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x1, 0x1, 0x2, 0x4}, 0x10, 0x227a1, r0, 0x8, &(0x7f0000000700)=[r2, r8], &(0x7f0000000780)=[{0x1, 0x2, 0x10, 0x4}, {0x3, 0x1, 0x0, 0x7}, {0x0, 0x2, 0x4, 0xc}, {0x2, 0x1, 0x1, 0xb}, {0x3, 0x3, 0xe, 0x3}, {0x3, 0x2, 0x2, 0xb}, {0x0, 0x3, 0x4, 0x2}, {0x3, 0x1, 0x9, 0xb}], 0x10, 0x80}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001c80)={r9, 0x0, 0x7a, 0x1000, &(0x7f0000000880)="8a26f53f9d97123a6530d44c8e6df64c3ea453f83377dc746e61d8793bbb80f28281c92cb620f26b090d2061a9eefd1ec6fbb965a362a2dfcb103f201e2025710fb98afa37e79d7a81e295d3d18cce75b5ee8dec7fac1c7ccbb0f74c308e942cad2ada5297c3be192ab2efa9c64a0aa9b43a5e6f4249b819a4f8", &(0x7f0000000b80)=""/4096, 0x4, 0x0, 0x5d, 0x79, &(0x7f0000001b80)="952ecf9571579776f0b62d467d0e1995132105d741a1625f5fc24e2a7dc74f75e7a84889428498a5d85a09445be8004df439537c2237aa1bc6f1bfcfda608621754cab49c282555541da3e3b94a307de87c006c7a19771eca4e7cbff12", &(0x7f0000001c00)="298c45a90428da327bb29d7fc8f45f1c1823195da74a264c3ca98be694b015f65a69e3a1e4226b1fb3b00a1a4b007a7d10a38a36f62e949dbcfc72cd4d701315ffc902f9b56dc251ca8ffa5aea94bbeb6d0ddfe3fd3d85de59759aaf8214f493af5ae66d7f49dddc428dd012baa852d7878999fd0be033ad01", 0x2, 0x0, 0x8}, 0x50) 1.260730107s ago: executing program 1 (id=6125): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x331002, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x18, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x36}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @jmp={0x5, 0x0, 0xb, 0x1, 0x7, 0x40, 0x8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0xe000000, 0x0, 0x0, 0x100, 0x2f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x8, 0x1, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r2, r2, r2], 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="00000000000000b7f00e6937def924eb8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000009539aad3437b681f5f1618e2314970cdf8771a91c7e749d2a138db185b53b3f920b57815cd01373e8e965957985ba2a85957cc920a4e64f765d4448d1ca4b102c7a1827cf5d94a5aef5c385f4f088cab61619241578111a20c7e3b239a867bb1b31d34cfc5b2772b65eb972b740cb40faf9ab6d38efb9f2ad804a593e41dbf265e2d68d1cf4262d435deb9131ab4ed23e600"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0, 0xe8e}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) 1.257043217s ago: executing program 2 (id=6126): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f3, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000835336bc03020000000000000900000000000000000000000d020000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.201589509s ago: executing program 3 (id=6127): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x3, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000600)=""/4074, 0x28, 0xfea, 0x1}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000007f000000000000000000000000000000000000000021f5eae3804863836c000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x5, &(0x7f0000001dc0)=@framed={{}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) recvmsg$unix(r0, &(0x7f0000001cc0)={&(0x7f0000001600), 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001680)=""/168, 0xa8}, {&(0x7f0000001740)=""/162, 0xa2}, {&(0x7f0000000400)=""/29, 0x1d}, {&(0x7f0000001800)=""/119, 0x77}, {&(0x7f0000001880)=""/214, 0xd6}, {&(0x7f0000001980)=""/243, 0xf3}, {&(0x7f0000000580)=""/30, 0x1e}, {&(0x7f0000001a80)=""/104, 0x68}, {&(0x7f0000001b00)=""/151, 0x97}], 0x9, &(0x7f0000001c80)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x10001) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d80)={&(0x7f0000001e00)='sched_process_exec\x00', r3, 0x0, 0x1}, 0x18) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r8}, 0x10) write$cgroup_int(r7, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="0200000000000000000005000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0d0000000400"/28], 0x50) 682.036551ms ago: executing program 2 (id=6128): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000000000000000000a9760000ed171200"/36, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) 334.967436ms ago: executing program 2 (id=6129): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd4, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0xeb, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000d0ffffff000000000000001718110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b50902000f0000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRES32=r0, @ANYRES64=r0], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 334.180006ms ago: executing program 1 (id=6130): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001200), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x18) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) r4 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x80, 0x0, 0x9, 0x4, 0x0, 0x8, 0x4, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x777d, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x110aa, 0x10000, 0x4, 0x7, 0x7fffffffffffffff, 0x2, 0x3a, 0x0, 0x3ff, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x6) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 323.884607ms ago: executing program 2 (id=6131): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000100)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) close(0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 279.832218ms ago: executing program 3 (id=6132): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x10040) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08fff500000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.io_merged\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x2, 0x0, 0x8000, 0x10000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r2}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='syz1\x00', 0x1ff) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4 (id=6133): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@generic={0x0, 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x281}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x2000000000c9, 0x0, 0x3, 0x3, 0x0, 0x9, 0x0, 0x20, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNGETDEVNETNS(r8, 0x54e3, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r9, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'ip6tnl0\x00', 0x20}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.42' (ED25519) to the list of known hosts. [ 20.727914][ T24] audit: type=1400 audit(1763897289.650:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.729236][ T267] cgroup: Unknown subsys name 'net' [ 20.750594][ T24] audit: type=1400 audit(1763897289.650:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.777908][ T24] audit: type=1400 audit(1763897289.680:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.778235][ T267] cgroup: Unknown subsys name 'devices' [ 20.980448][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.986409][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.156222][ T24] audit: type=1400 audit(1763897290.080:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.179470][ T24] audit: type=1400 audit(1763897290.080:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.204322][ T24] audit: type=1400 audit(1763897290.080:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.210000][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.236257][ T24] audit: type=1400 audit(1763897290.160:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.261819][ T24] audit: type=1400 audit(1763897290.160:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.294412][ T24] audit: type=1400 audit(1763897290.220:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.319967][ T24] audit: type=1400 audit(1763897290.220:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.320004][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.217621][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.224706][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.232209][ T275] device bridge_slave_0 entered promiscuous mode [ 22.239270][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.246425][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.253920][ T275] device bridge_slave_1 entered promiscuous mode [ 22.332498][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.339576][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.346860][ T280] device bridge_slave_0 entered promiscuous mode [ 22.361870][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.368936][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.376249][ T280] device bridge_slave_1 entered promiscuous mode [ 22.441031][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.448079][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.455637][ T276] device bridge_slave_0 entered promiscuous mode [ 22.464669][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.471796][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.479198][ T276] device bridge_slave_1 entered promiscuous mode [ 22.499083][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.506132][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.513507][ T277] device bridge_slave_0 entered promiscuous mode [ 22.522647][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.529866][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.537168][ T277] device bridge_slave_1 entered promiscuous mode [ 22.547969][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.555033][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.562337][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.569376][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.589446][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.596476][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.604067][ T278] device bridge_slave_0 entered promiscuous mode [ 22.610825][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.617847][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.625517][ T278] device bridge_slave_1 entered promiscuous mode [ 22.692099][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.699155][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.706401][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.713447][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.752881][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.759937][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.767167][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.774242][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.796362][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.803765][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.811454][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.818895][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.826296][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.833698][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.841309][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.848751][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.868462][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.900960][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.909292][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.916296][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.923862][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.932300][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.939346][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.946921][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.955075][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.962097][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.969454][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.977559][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.984591][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.992009][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.999970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.007847][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.015772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.033857][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.041538][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.050217][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.057250][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.064812][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.073257][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.080292][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.091935][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.108667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.116788][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.124642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.133122][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.141352][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.148394][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.162504][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.170885][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.179096][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.186467][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.194358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.202071][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.210423][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.217435][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.230522][ T280] device veth0_vlan entered promiscuous mode [ 23.240631][ T275] device veth0_vlan entered promiscuous mode [ 23.249687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.258171][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.266839][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.273912][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.281501][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.290181][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.298262][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.305298][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.312740][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.321022][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.329400][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.337197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.345254][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.352972][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.360598][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.372123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.380447][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.391227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.399720][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.411975][ T275] device veth1_macvtap entered promiscuous mode [ 23.419538][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.427534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.435544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.443715][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.452342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.464085][ T280] device veth1_macvtap entered promiscuous mode [ 23.471613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.479755][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.487627][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.496144][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.504548][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.512128][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.520123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.540898][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.549283][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.557502][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.566413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.575275][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.583809][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.592187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.600098][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.609447][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.616848][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.624305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.632755][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.641988][ T277] device veth0_vlan entered promiscuous mode [ 23.651633][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.659743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.667651][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.675908][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.684385][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.692255][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.704499][ T278] device veth0_vlan entered promiscuous mode [ 23.716558][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.726824][ T280] request_module fs-gadgetfs succeeded, but still no fs? [ 23.734227][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.745037][ T277] device veth1_macvtap entered promiscuous mode [ 23.759141][ T280] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.761665][ T278] device veth1_macvtap entered promiscuous mode [ 23.776360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.792755][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.801402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.809898][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.817757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.826271][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.834615][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.843109][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.859873][ T276] device veth0_vlan entered promiscuous mode [ 23.872318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.888920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.893005][ C0] hrtimer: interrupt took 33840 ns [ 23.896529][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.910890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.919889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.928145][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.936769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.945740][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.954189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.991145][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.035321][ T276] device veth1_macvtap entered promiscuous mode [ 24.058255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.076666][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.117472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.175717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.249162][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.260004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.268273][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.425970][ T315] syz.4.5 uses obsolete (PF_INET,SOCK_PACKET) [ 24.891611][ T95] udevd[95]: worker [299] terminated by signal 33 (Unknown signal 33) [ 24.922249][ T95] udevd[95]: worker [299] failed while handling '/devices/virtual/block/loop1' [ 25.004874][ T95] udevd[95]: worker [326] terminated by signal 33 (Unknown signal 33) [ 25.018892][ T95] udevd[95]: worker [326] failed while handling '/devices/virtual/block/loop2' [ 25.148516][ T95] udevd[95]: worker [339] terminated by signal 33 (Unknown signal 33) [ 25.156757][ T95] udevd[95]: worker [339] failed while handling '/devices/virtual/block/loop2' [ 25.240354][ T95] udevd[95]: worker [337] terminated by signal 33 (Unknown signal 33) [ 25.277153][ T95] udevd[95]: worker [337] failed while handling '/devices/virtual/block/loop4' [ 25.328568][ T359] device pim6reg1 entered promiscuous mode [ 25.786373][ T385] syz.4.21[385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.786426][ T385] syz.4.21[385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.341001][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 26.341019][ T24] audit: type=1400 audit(1763897295.270:113): avc: denied { create } for pid=402 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 26.447136][ T24] audit: type=1400 audit(1763897295.310:114): avc: denied { setopt } for pid=402 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.479270][ T24] audit: type=1400 audit(1763897295.390:115): avc: denied { read } for pid=406 comm="syz.2.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.583497][ T409] cgroup: syz.3.29 (409) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.638892][ T409] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.641577][ T417] device wg2 entered promiscuous mode [ 26.730397][ T24] audit: type=1400 audit(1763897295.660:116): avc: denied { relabelfrom } for pid=425 comm="syz.3.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.851181][ T24] audit: type=1400 audit(1763897295.660:117): avc: denied { relabelto } for pid=425 comm="syz.3.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.396971][ T24] audit: type=1400 audit(1763897296.320:118): avc: denied { cpu } for pid=450 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.513598][ T24] audit: type=1400 audit(1763897296.440:119): avc: denied { write } for pid=456 comm="syz.2.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.333574][ T24] audit: type=1400 audit(1763897297.260:120): avc: denied { create } for pid=495 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 28.420487][ T95] udevd[95]: worker [338] terminated by signal 33 (Unknown signal 33) [ 28.469136][ T95] udevd[95]: worker [338] failed while handling '/devices/virtual/block/loop2' [ 28.747565][ T24] audit: type=1400 audit(1763897297.670:121): avc: denied { create } for pid=513 comm="syz.3.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 29.177619][ T563] device wg2 left promiscuous mode [ 29.215727][ T563] device wg2 entered promiscuous mode [ 29.340527][ T24] audit: type=1400 audit(1763897298.270:122): avc: denied { tracepoint } for pid=569 comm="syz.4.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.787746][ T663] device wg2 left promiscuous mode [ 30.794665][ T663] device wg2 entered promiscuous mode [ 30.846751][ T661] device syzkaller0 entered promiscuous mode [ 32.056548][ T746] device veth0_vlan left promiscuous mode [ 32.076618][ T746] device veth0_vlan entered promiscuous mode [ 32.212679][ T764] device pim6reg1 entered promiscuous mode [ 32.260853][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 32.260865][ T24] audit: type=1400 audit(1763897301.190:125): avc: denied { create } for pid=768 comm="syz.4.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.542327][ T24] audit: type=1400 audit(1763897301.470:126): avc: denied { create } for pid=785 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 32.571103][ T786] GPL: port 1(vlan0) entered blocking state [ 32.577187][ T786] GPL: port 1(vlan0) entered disabled state [ 32.588427][ T786] device vlan0 entered promiscuous mode [ 34.040185][ T911] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 34.115178][ T904] device sit0 entered promiscuous mode [ 34.354594][ T936] device sit0 left promiscuous mode [ 34.415915][ T936] device sit0 entered promiscuous mode [ 34.880204][ T24] audit: type=1400 audit(1763897303.810:127): avc: denied { create } for pid=947 comm="syz.3.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 35.175523][ T24] audit: type=1400 audit(1763897304.100:128): avc: denied { ioctl } for pid=959 comm="syz.4.174" path="socket:[17714]" dev="sockfs" ino=17714 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.498182][ T1000] device sit0 entered promiscuous mode [ 35.536644][ T1002] device veth1_to_team entered promiscuous mode [ 36.510305][ T1049] syz.0.198[1049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.510363][ T1049] syz.0.198[1049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.837403][ T95] udevd[95]: worker [336] terminated by signal 33 (Unknown signal 33) [ 36.859449][ T95] udevd[95]: worker [336] failed while handling '/devices/virtual/block/loop0' [ 36.910799][ T1076] syz.0.206[1076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.910866][ T1076] syz.0.206[1076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.988822][ T24] audit: type=1400 audit(1763897305.910:129): avc: denied { create } for pid=1082 comm="syz.2.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 37.233432][ T1076] device syzkaller0 entered promiscuous mode [ 37.678804][ T1113] syz.4.216[1113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.678864][ T1113] syz.4.216[1113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.975119][ T1127] device veth0_vlan left promiscuous mode [ 38.000014][ T1127] device veth0_vlan entered promiscuous mode [ 38.089961][ T1130] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.099458][ T1130] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.528144][ T24] audit: type=1400 audit(1763897307.450:130): avc: denied { create } for pid=1150 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 38.775047][ T1166] device sit0 entered promiscuous mode [ 38.998262][ T1173] tun0: tun_chr_ioctl cmd 1074025678 [ 39.038218][ T1173] tun0: group set to 1 [ 39.178968][ T1173] device syzkaller0 entered promiscuous mode [ 39.436655][ T24] audit: type=1400 audit(1763897308.360:131): avc: denied { create } for pid=1198 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 40.949770][ T1233] device sit0 left promiscuous mode [ 42.393111][ T1270] device syzkaller0 entered promiscuous mode [ 43.296499][ T1287] syz.2.268[1287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.296579][ T1287] syz.2.268[1287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.538750][ T24] audit: type=1400 audit(1763897312.470:132): avc: denied { create } for pid=1307 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 44.029977][ T1329] device sit0 entered promiscuous mode [ 44.235386][ T1336] device sit0 left promiscuous mode [ 44.254561][ T1339] device sit0 entered promiscuous mode [ 44.534059][ T24] audit: type=1400 audit(1763897313.460:133): avc: denied { create } for pid=1359 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 45.902734][ T24] audit: type=1400 audit(1763897314.830:134): avc: denied { create } for pid=1458 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 46.184537][ T1476] device pim6reg1 entered promiscuous mode [ 46.608018][ T24] audit: type=1400 audit(1763897315.530:135): avc: denied { create } for pid=1495 comm="syz.4.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 46.884324][ T1507] device veth1_macvtap left promiscuous mode [ 46.897948][ T1511] device veth1_macvtap entered promiscuous mode [ 46.905260][ T1511] device macsec0 entered promiscuous mode [ 47.028346][ T1530] syz.2.330[1530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.033154][ T1530] syz.2.330[1530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.059801][ T1530] syz.2.330[1530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.078104][ T1530] syz.2.330[1530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.107121][ T1530] syz.2.330[1530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.138974][ T1530] syz.2.330[1530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.185682][ T1554] device pim6reg1 entered promiscuous mode [ 47.219927][ T24] audit: type=1400 audit(1763897316.150:136): avc: denied { create } for pid=1545 comm="syz.4.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 48.024031][ T24] audit: type=1400 audit(1763897316.950:137): avc: denied { ioctl } for pid=1574 comm="syz.2.342" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.125435][ T1589] syz.3.346[1589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.125486][ T1589] syz.3.346[1589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.406852][ T1599] Q±6ã×\b‹¡Y­4: renamed from lo [ 48.692904][ T1615] device wg2 left promiscuous mode [ 48.712840][ T1615] device wg2 entered promiscuous mode [ 51.077491][ T1735] device syzkaller0 entered promiscuous mode [ 52.483034][ T1841] device wg2 entered promiscuous mode [ 52.547129][ T1851] device sit0 entered promiscuous mode [ 53.632060][ T1905] device pim6reg1 entered promiscuous mode [ 54.159189][ T1920] device sit0 left promiscuous mode [ 54.314295][ T1940] bpf_get_probe_write_proto: 2 callbacks suppressed [ 54.314303][ T1940] syz.4.447[1940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.333105][ T1940] syz.4.447[1940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.734214][ T1952] device syzkaller0 entered promiscuous mode [ 55.494785][ T1977] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.501997][ T1977] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.681960][ T1983] device bridge_slave_1 left promiscuous mode [ 55.718574][ T1983] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.817705][ T1983] device bridge_slave_0 left promiscuous mode [ 55.877364][ T1983] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.949650][ T24] audit: type=1400 audit(1763897324.880:138): avc: denied { create } for pid=1999 comm="syz.1.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 56.873799][ T2017] device syzkaller0 entered promiscuous mode [ 59.553065][ T2082] device wg2 entered promiscuous mode [ 60.341078][ T2095] device sit0 entered promiscuous mode [ 60.784417][ T2103] device pim6reg1 entered promiscuous mode [ 61.195345][ T2116] device lo entered promiscuous mode [ 61.612831][ T2161] device wg2 left promiscuous mode [ 61.750856][ T2161] device wg2 entered promiscuous mode [ 62.263430][ T2180] device syzkaller0 entered promiscuous mode [ 62.623157][ T2210] device wg2 entered promiscuous mode [ 63.161738][ T2224] device pim6reg1 entered promiscuous mode [ 63.506910][ T2240] device wg2 left promiscuous mode [ 63.561053][ T2240] device wg2 entered promiscuous mode [ 63.621743][ T24] audit: type=1400 audit(1763897332.550:139): avc: denied { create } for pid=2262 comm="syz.0.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 63.846095][ T2269] device veth1_macvtap left promiscuous mode [ 63.990071][ T2278] device veth1_macvtap entered promiscuous mode [ 63.996359][ T2278] device macsec0 entered promiscuous mode [ 64.008059][ T2289] device sit0 entered promiscuous mode [ 64.249413][ T2301] device wg2 left promiscuous mode [ 64.371215][ T2309] device veth1_to_team entered promiscuous mode [ 65.192811][ T2336] device sit0 left promiscuous mode [ 65.349377][ T2338] device veth0_vlan left promiscuous mode [ 65.355564][ T2338] device veth0_vlan entered promiscuous mode [ 65.363000][ T2343] device sit0 entered promiscuous mode [ 65.469328][ T2362] ÿÿÿÿÿÿ: renamed from vlan1 [ 65.634222][ T2383] device bridge_slave_1 left promiscuous mode [ 65.642436][ T2383] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.665436][ T2383] device bridge_slave_0 left promiscuous mode [ 65.675729][ T2383] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.256963][ T1926] syzkaller0: tun_net_xmit 76 [ 67.262316][ T1926] syzkaller0: tun_net_xmit 48 [ 67.278421][ C1] syzkaller0: tun_net_xmit 76 [ 67.285545][ T2470] syzkaller0: create flow: hash 1654146013 index 1 [ 67.310987][ T2470] syzkaller0: delete flow: hash 1654146013 index 1 [ 67.770839][ T2514] device syzkaller0 entered promiscuous mode [ 67.811717][ T2505] device pim6reg1 entered promiscuous mode [ 68.030411][ T2526] device pim6reg1 entered promiscuous mode [ 68.051102][ T2533] device syzkaller0 entered promiscuous mode [ 69.580612][ T2606] device sit0 left promiscuous mode [ 69.618244][ T2606] device sit0 entered promiscuous mode [ 69.839606][ T2624] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.849494][ T2624] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.230829][ T2703] device veth0_vlan left promiscuous mode [ 71.255358][ T2703] device veth0_vlan entered promiscuous mode [ 71.352392][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.371005][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.379076][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.964933][ T2712] device sit0 left promiscuous mode [ 72.508065][ T2763] ªªªªªª: renamed from vlan0 [ 72.565750][ T2769] syz.0.681[2769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.565799][ T2769] syz.0.681[2769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.234690][ T2850] device wg2 entered promiscuous mode [ 74.916346][ T2909] device veth0_vlan left promiscuous mode [ 74.938978][ T2909] device veth0_vlan entered promiscuous mode [ 74.983884][ T24] audit: type=1400 audit(1763897343.910:140): avc: denied { create } for pid=2911 comm="syz.1.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 75.049249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.057388][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 75.115005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.239355][ T2905] device sit0 left promiscuous mode [ 75.386457][ T2915] sit0: mtu less than device minimum [ 75.561513][ T2947] device sit0 left promiscuous mode [ 75.613393][ T2947] device sit0 entered promiscuous mode [ 76.011375][ T2989] device veth1_macvtap left promiscuous mode [ 76.622280][ T3047] device team_slave_0 entered promiscuous mode [ 76.664007][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.690896][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.030395][ T3062] device syzkaller0 entered promiscuous mode [ 77.129579][ T3067] syz.0.768[3067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.129659][ T3067] syz.0.768[3067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.468918][ T3093] device syzkaller0 entered promiscuous mode [ 80.412625][ T3206] device veth1_macvtap left promiscuous mode [ 80.425799][ T3206] device macsec0 entered promiscuous mode [ 80.675458][ T24] audit: type=1400 audit(1763897349.600:141): avc: denied { create } for pid=3230 comm="syz.0.815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 82.034967][ T3315] device wg2 left promiscuous mode [ 82.072388][ T3317] device wg2 left promiscuous mode [ 82.158788][ T3315] device wg2 entered promiscuous mode [ 82.485070][ T3333] device wg2 left promiscuous mode [ 82.486897][ T24] audit: type=1400 audit(1763897351.410:142): avc: denied { create } for pid=3352 comm="syz.0.851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 82.611626][ T3356] device bridge0 entered promiscuous mode [ 83.336126][ T3415] device wg2 left promiscuous mode [ 83.864871][ T3456] device pim6reg1 entered promiscuous mode [ 83.889707][ T3473] syz.1.884 (3473) used obsolete PPPIOCDETACH ioctl [ 83.966805][ T3487] device syzkaller0 entered promiscuous mode [ 84.135925][ T3489] device syzkaller0 entered promiscuous mode [ 84.697959][ T3540] device sit0 entered promiscuous mode [ 85.234644][ T3578] device wg2 entered promiscuous mode [ 85.258721][ T3583] device sit0 left promiscuous mode [ 85.315143][ T24] audit: type=1400 audit(1763897354.240:143): avc: denied { create } for pid=3582 comm="syz.3.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 85.337770][ T3587] device sit0 entered promiscuous mode [ 85.516563][ T3618] device macsec0 entered promiscuous mode [ 85.962555][ T3655] device pim6reg1 entered promiscuous mode [ 86.534551][ T3702] device veth0_vlan left promiscuous mode [ 86.541128][ T3702] device veth0_vlan entered promiscuous mode [ 86.558401][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.580512][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.588197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.611295][ T3709] device syzkaller0 entered promiscuous mode [ 87.376357][ T3757] device sit0 left promiscuous mode [ 87.941508][ T3804] device syzkaller0 entered promiscuous mode [ 88.339564][ T3815] Q±6ã×\b‹¡Y­4: renamed from lo [ 89.754260][ T3897] device veth1_macvtap left promiscuous mode [ 89.768097][ T3897] device macsec0 left promiscuous mode [ 89.820714][ T3899] device veth1_macvtap entered promiscuous mode [ 89.827004][ T3899] device macsec0 entered promiscuous mode [ 89.928754][ T24] audit: type=1400 audit(1763897358.860:144): avc: denied { create } for pid=3906 comm="syz.0.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 90.250279][ T3914] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 90.293559][ T3914] device syzkaller0 entered promiscuous mode [ 90.653786][ T3931] ------------[ cut here ]------------ [ 90.668503][ T3931] trace type BPF program uses run-time allocation [ 90.675318][ T3931] WARNING: CPU: 0 PID: 3931 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 90.705037][ T3931] Modules linked in: [ 90.715014][ T3931] CPU: 0 PID: 3931 Comm: syz.0.1015 Not tainted syzkaller #0 [ 90.758803][ T3931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 90.786844][ T3931] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 90.804511][ T3931] Code: 85 e9 14 fe ff ff e8 69 fa ef ff 31 c0 e9 15 fe ff ff e8 5d fa ef ff c6 05 34 d5 2c 05 01 48 c7 c7 a0 80 05 85 e8 ba df fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 90.839457][ T3931] RSP: 0018:ffffc90000da7468 EFLAGS: 00010246 [ 90.867401][ T3931] RAX: 57a0e71b6a6f5200 RBX: 0000000000000001 RCX: 0000000000080000 [ 90.875642][ T3931] RDX: ffffc9000195c000 RSI: 0000000000002114 RDI: 0000000000002115 [ 90.884239][ T3931] RBP: ffffc90000da74b0 R08: dffffc0000000000 R09: ffffed103ee04e8b [ 90.892431][ T3931] R10: ffffed103ee04e8b R11: 1ffff1103ee04e8a R12: ffff88810ad50000 [ 90.900656][ T3931] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810ea42800 [ 90.908906][ T3931] FS: 00007f3fa272b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 90.917940][ T3931] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 90.926818][ T3931] CR2: 0000000100000001 CR3: 000000010db55000 CR4: 00000000003506b0 [ 90.946775][ T3931] DR0: 0000000000000000 DR1: fffffffffffffffb DR2: 0000000000000000 [ 90.959057][ T3931] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 91.048683][ T3931] Call Trace: [ 91.070709][ T3931] ? __fdget+0x1a1/0x230 [ 91.089988][ T3931] resolve_pseudo_ldimm64+0x526/0x1020 [ 91.107742][ T3931] ? bpf_check+0xd680/0xd680 [ 91.114406][ T3931] ? kvmalloc_node+0x88/0x130 [ 91.120827][ T3931] bpf_check+0x8d4b/0xd680 [ 91.127083][ T3931] ? bpf_get_btf_vmlinux+0x60/0x60 [ 91.132487][ T3931] ? 0xffffffffa0012000 [ 91.136708][ T3931] ? is_bpf_text_address+0x177/0x190 [ 91.142868][ T3931] ? selinux_bpf_prog_alloc+0x51/0x140 [ 91.148533][ T3931] ? __kernel_text_address+0xa0/0x100 [ 91.154077][ T3931] ? unwind_get_return_address+0x4d/0x90 [ 91.159996][ T3931] ? stack_trace_save+0xe0/0xe0 [ 91.165029][ T3931] ? arch_stack_walk+0xee/0x140 [ 91.170139][ T3931] ? stack_trace_save+0x98/0xe0 [ 91.175119][ T3931] ? stack_trace_snprint+0xf0/0xf0 [ 91.183353][ T3931] ? __kasan_slab_alloc+0x69/0xf0 [ 91.188624][ T3931] ? pcpu_block_update+0x3ec/0x900 [ 91.193839][ T3931] ? selinux_bpf_prog_alloc+0x51/0x140 [ 91.199553][ T3931] ? __kasan_kmalloc+0xec/0x110 [ 91.204482][ T3931] ? __kasan_kmalloc+0xda/0x110 [ 91.209593][ T3931] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 91.215215][ T3931] ? selinux_bpf_prog_alloc+0x51/0x140 [ 91.221073][ T3931] ? security_bpf_prog_alloc+0x62/0x90 [ 91.226830][ T3931] ? bpf_prog_load+0x949/0x1420 [ 91.234126][ T3931] ? __se_sys_bpf+0x442/0x680 [ 91.239016][ T3931] ? __x64_sys_bpf+0x7b/0x90 [ 91.243661][ T3931] ? do_syscall_64+0x31/0x40 [ 91.248784][ T3931] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.255223][ T3931] ? memset+0x35/0x40 [ 91.259487][ T3931] ? bpf_obj_name_cpy+0x193/0x1e0 [ 91.264855][ T3931] bpf_prog_load+0xf5a/0x1420 [ 91.269969][ T3931] ? map_freeze+0x320/0x320 [ 91.276198][ T3931] ? selinux_bpf+0xc7/0xf0 [ 91.280907][ T3931] ? security_bpf+0x82/0xa0 [ 91.285616][ T3931] __se_sys_bpf+0x442/0x680 [ 91.290374][ T3931] ? __x64_sys_bpf+0x90/0x90 [ 91.295210][ T3931] ? __kasan_check_read+0x11/0x20 [ 91.300484][ T3931] __x64_sys_bpf+0x7b/0x90 [ 91.304974][ T3931] do_syscall_64+0x31/0x40 [ 91.309711][ T3931] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.315851][ T3931] RIP: 0033:0x7f3fa3cc3749 [ 91.322488][ T3931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.344888][ T3931] RSP: 002b:00007f3fa272b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 91.355471][ T3931] RAX: ffffffffffffffda RBX: 00007f3fa3f19fa0 RCX: 00007f3fa3cc3749 [ 91.363673][ T3931] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 91.376946][ T3931] RBP: 00007f3fa3d47f91 R08: 0000000000000000 R09: 0000000000000000 [ 91.392111][ T3931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 91.405736][ T3931] R13: 00007f3fa3f1a038 R14: 00007f3fa3f19fa0 R15: 00007fffea6f7b28 [ 91.415902][ T3931] ---[ end trace 7b1bdbe0eb70eca2 ]--- [ 92.153849][ T3980] device syzkaller0 entered promiscuous mode [ 92.344706][ T3996] syz.0.1034[3996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.344757][ T3996] syz.0.1034[3996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.695440][ T4024] device sit0 left promiscuous mode [ 92.753613][ T4032] device wg2 left promiscuous mode [ 92.772650][ T4032] device sit0 entered promiscuous mode [ 93.462791][ T4060] device macsec0 entered promiscuous mode [ 93.469383][ T24] audit: type=1400 audit(1763897362.400:145): avc: denied { create } for pid=4059 comm="syz.3.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 95.427943][ T24] audit: type=1400 audit(1763897364.350:146): avc: denied { ioctl } for pid=4138 comm="syz.0.1074" path="" dev="cgroup2" ino=141 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 97.310423][ T4209] device wg2 entered promiscuous mode [ 98.488418][ T4267] device syzkaller0 entered promiscuous mode [ 98.549747][ T4279] syz.0.1117[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.549801][ T4279] syz.0.1117[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.138013][ T4291] device syzkaller0 entered promiscuous mode [ 99.199741][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.220015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.247779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 99.629043][ T4333] device sit0 entered promiscuous mode [ 101.391898][ T4405] syz.1.1152[4405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.391955][ T4405] syz.1.1152[4405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.822530][ T4441] device pim6reg1 entered promiscuous mode [ 101.919906][ T24] audit: type=1400 audit(1763897370.840:147): avc: denied { attach_queue } for pid=4434 comm="syz.2.1161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 102.087348][ T4470] device syzkaller0 entered promiscuous mode [ 102.396382][ T95] udevd[95]: worker [4144] terminated by signal 33 (Unknown signal 33) [ 102.500374][ T95] udevd[95]: worker [4144] failed while handling '/devices/virtual/block/loop4' [ 103.151948][ T4496] device veth0_vlan left promiscuous mode [ 103.188453][ T4496] device veth0_vlan entered promiscuous mode [ 103.195472][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.228816][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 103.277257][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.439962][ T4528] device sit0 left promiscuous mode [ 105.608197][ T4532] device sit0 entered promiscuous mode [ 105.796576][ T4533] device syzkaller0 entered promiscuous mode [ 105.806853][ T4535] device wg2 left promiscuous mode [ 106.084757][ T4554] device wg2 left promiscuous mode [ 106.876632][ T4625] device pim6reg1 entered promiscuous mode [ 107.021936][ T4651] syz.2.1216[4651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.021987][ T4651] syz.2.1216[4651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.165191][ T4662] device macsec0 left promiscuous mode [ 107.175923][ T4665] syz.4.1221[4665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.184075][ T4665] syz.4.1221[4665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.295211][ T4679] device syzkaller0 entered promiscuous mode [ 108.543163][ T4767] device sit0 left promiscuous mode [ 109.428117][ T4832] device veth1_macvtap left promiscuous mode [ 109.443830][ T4832] device macsec0 left promiscuous mode [ 109.537341][ T4832] device pim6reg1 entered promiscuous mode [ 109.683644][ T4847] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.793029][ T4866] device syzkaller0 entered promiscuous mode [ 110.118417][ T4879] device syzkaller0 entered promiscuous mode [ 110.814398][ T4925] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.865269][ T4939] cgroup: fork rejected by pids controller in /syz0 [ 110.925750][ T4925] device bridge_slave_1 left promiscuous mode [ 110.936947][ T4925] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.961392][ T4925] device bridge_slave_0 left promiscuous mode [ 110.973148][ T4925] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.107169][ T4942] device sit0 left promiscuous mode [ 111.192432][ T4946] device sit0 entered promiscuous mode [ 111.326750][ T4948] device veth1_macvtap left promiscuous mode [ 111.333026][ T4948] device macsec0 left promiscuous mode [ 112.073013][ T4964] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.086037][ T4964] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.093555][ T4964] device bridge_slave_0 entered promiscuous mode [ 112.101210][ T4964] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.108331][ T4964] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.115807][ T4964] device bridge_slave_1 entered promiscuous mode [ 112.510618][ T24] audit: type=1400 audit(1763897381.440:148): avc: denied { create } for pid=4964 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.692426][ T24] audit: type=1400 audit(1763897381.440:149): avc: denied { write } for pid=4964 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.817637][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.839882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.004370][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.068510][ T24] audit: type=1400 audit(1763897381.440:150): avc: denied { read } for pid=4964 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 113.135296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.143824][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.150890][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.159021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.170695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.181414][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.188478][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.224849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.233338][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.241605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.249862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.257888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.354717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.363203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.376689][ T4964] device veth0_vlan entered promiscuous mode [ 113.457887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.473097][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.488280][ T4964] device veth1_macvtap entered promiscuous mode [ 113.519035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.528005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.536116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.544499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.558161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.642712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.698671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.778866][ T5014] device wg2 entered promiscuous mode [ 113.808776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.827109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.167063][ T366] device vlan0 left promiscuous mode [ 114.172571][ T366] GPL: port 1(vlan0) entered disabled state [ 114.295199][ T366] device bridge_slave_1 left promiscuous mode [ 114.303789][ T366] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.325923][ T366] device bridge_slave_0 left promiscuous mode [ 114.345283][ T366] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.372821][ T366] device veth1_macvtap left promiscuous mode [ 114.392197][ T366] device veth0_vlan left promiscuous mode [ 116.423178][ T5159] device wg2 entered promiscuous mode [ 118.495990][ T5238] device wg2 entered promiscuous mode [ 118.757156][ T5252] device pim6reg1 entered promiscuous mode [ 120.684449][ T24] audit: type=1400 audit(1763897389.610:151): avc: denied { create } for pid=5332 comm="syz.4.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 121.535575][ T5387] syz.1.1414[5387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.535626][ T5387] syz.1.1414[5387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.004277][ T5397] syz.3.1418[5397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.019583][ T5397] syz.3.1418[5397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.044563][ T5387] device veth0_vlan left promiscuous mode [ 122.126044][ T5387] device veth0_vlan entered promiscuous mode [ 123.140974][ T5442] device dummy0 entered promiscuous mode [ 124.094135][ T5477] device sit0 left promiscuous mode [ 125.460192][ T24] audit: type=1400 audit(1763897394.390:152): avc: denied { create } for pid=5535 comm="syz.3.1457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 125.481652][ T5526] device sit0 entered promiscuous mode [ 125.569007][ T24] audit: type=1400 audit(1763897394.500:153): avc: denied { create } for pid=5535 comm="syz.3.1457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 126.232181][ T5575] device syzkaller0 entered promiscuous mode [ 126.345947][ T5579] device wg2 entered promiscuous mode [ 126.981226][ T5629] : port 1(syz_tun) entered blocking state [ 126.987340][ T5629] : port 1(syz_tun) entered disabled state [ 126.993839][ T5629] device syz_tun entered promiscuous mode [ 127.000336][ T5627] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.007511][ T5627] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.139883][ T5633] device bridge_slave_1 left promiscuous mode [ 127.199667][ T5633] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.219425][ T5633] device bridge_slave_0 left promiscuous mode [ 127.274012][ T5633] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.362326][ T5629] device syzkaller0 entered promiscuous mode [ 128.943979][ T5747] device veth0_vlan left promiscuous mode [ 128.950305][ T5747] device veth0_vlan entered promiscuous mode [ 129.110511][ T5759] device sit0 left promiscuous mode [ 129.127105][ T5759] device sit0 entered promiscuous mode [ 130.285610][ T5848] device veth0_vlan left promiscuous mode [ 130.303842][ T5848] device veth0_vlan entered promiscuous mode [ 130.371611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.382306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 130.395175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.537353][ T5858] device pim6reg1 entered promiscuous mode [ 131.759601][ T5933] device sit0 entered promiscuous mode [ 132.958410][ T6007] device sit0 left promiscuous mode [ 135.813591][ T6115] device syzkaller0 entered promiscuous mode [ 136.117753][ T6136] device syzkaller0 entered promiscuous mode [ 136.445660][ T6154] device veth0_vlan left promiscuous mode [ 136.475522][ T6154] device veth0_vlan entered promiscuous mode [ 136.510670][ T24] audit: type=1400 audit(1763897405.440:154): avc: denied { create } for pid=6160 comm="syz.3.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 136.532430][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.540832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.554695][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.590970][ T24] audit: type=1400 audit(1763897405.520:155): avc: denied { read } for pid=6177 comm="syz.1.1638" dev="nsfs" ino=4026532283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.617051][ T24] audit: type=1400 audit(1763897405.520:156): avc: denied { open } for pid=6177 comm="syz.1.1638" path="mnt:[4026532283]" dev="nsfs" ino=4026532283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.640626][ T24] audit: type=1400 audit(1763897405.520:157): avc: denied { ioctl } for pid=6177 comm="syz.1.1638" path="mnt:[4026532283]" dev="nsfs" ino=4026532283 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.365854][ T6220] device syzkaller0 entered promiscuous mode [ 137.520850][ T6253] syz.1.1657[6253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.520910][ T6253] syz.1.1657[6253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.721960][ T24] audit: type=1400 audit(1763897406.650:158): avc: denied { create } for pid=6248 comm="syz.0.1655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 138.012027][ T6249] device syzkaller0 entered promiscuous mode [ 138.158495][ T6258] device macsec0 left promiscuous mode [ 139.016326][ T24] audit: type=1400 audit(1763897407.940:159): avc: denied { create } for pid=6340 comm="syz.4.1682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 139.329654][ T6354] device wg2 left promiscuous mode [ 139.457253][ T6354] device wg2 entered promiscuous mode [ 139.738386][ T6386] device sit0 left promiscuous mode [ 143.916356][ T6582] device pim6reg1 entered promiscuous mode [ 144.039507][ T6583] device syzkaller0 entered promiscuous mode [ 145.847980][ T6663] device syzkaller0 entered promiscuous mode [ 145.926486][ T6688] device pim6reg1 entered promiscuous mode [ 146.129008][ T6714] device pim6reg1 entered promiscuous mode [ 150.163217][ T24] audit: type=1400 audit(1763897419.090:160): avc: denied { create } for pid=6863 comm="syz.0.1833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 151.939184][ T24] audit: type=1400 audit(1763897420.870:161): avc: denied { create } for pid=6965 comm="syz.2.1871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 153.216048][ T24] audit: type=1400 audit(1763897422.130:162): avc: denied { associate } for pid=7025 comm="syz.4.1882" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 153.509513][ T7081] device pim6reg1 entered promiscuous mode [ 153.555861][ T7106] device veth1_macvtap entered promiscuous mode [ 153.562787][ T7106] device macsec0 entered promiscuous mode [ 153.570403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.598628][ T7224] device sit0 entered promiscuous mode [ 156.334950][ T7271] device syzkaller0 entered promiscuous mode [ 156.356507][ T7275] device pim6reg1 left promiscuous mode [ 157.256437][ T7308] device syzkaller0 entered promiscuous mode [ 157.417696][ T7334] syz.3.1965[7334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.428868][ T7334] syz.3.1965[7334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.533244][ T24] audit: type=1400 audit(1763897426.460:163): avc: denied { create } for pid=7345 comm="syz.0.1970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 157.960497][ T7384] syz.2.1982[7384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.960549][ T7384] syz.2.1982[7384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.074107][ T7403] device sit0 left promiscuous mode [ 158.197406][ T7408] device sit0 entered promiscuous mode [ 158.314500][ T7402] device pim6reg1 entered promiscuous mode [ 160.658663][ T24] audit: type=1400 audit(1763897429.570:164): avc: denied { create } for pid=7519 comm="syz.2.2018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 160.999971][ T7536] device syzkaller0 entered promiscuous mode [ 162.291737][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.230104][ T7635] device syzkaller0 entered promiscuous mode [ 166.962240][ T24] audit: type=1400 audit(1763897435.890:165): avc: denied { create } for pid=7785 comm="syz.2.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 168.620954][ T7870] device sit0 left promiscuous mode [ 170.444525][ T7902] device pim6reg1 left promiscuous mode [ 170.880408][ T7949] device wg2 left promiscuous mode [ 170.887416][ T7960] device wg2 entered promiscuous mode [ 170.900107][ T7942] device wg2 left promiscuous mode [ 170.929910][ T7959] device veth0_vlan left promiscuous mode [ 170.947097][ T7959] device veth0_vlan entered promiscuous mode [ 171.304488][ T7986] device veth1_macvtap left promiscuous mode [ 171.317350][ T7986] device macsec0 left promiscuous mode [ 172.790557][ T8064] device veth0_vlan left promiscuous mode [ 172.844429][ T8064] device veth0_vlan entered promiscuous mode [ 173.024633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.047213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.122126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.200284][ T8075] device veth0_vlan left promiscuous mode [ 173.212149][ T8075] device veth0_vlan entered promiscuous mode [ 173.303690][ T8081] device pim6reg1 entered promiscuous mode [ 173.355229][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.378948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 173.429485][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.817507][ T8107] device pim6reg1 entered promiscuous mode [ 174.343910][ T8142] device syzkaller0 entered promiscuous mode [ 175.271011][ T8184] device syzkaller0 entered promiscuous mode [ 179.070971][ T8270] device sit0 left promiscuous mode [ 179.144886][ T8270] device sit0 entered promiscuous mode [ 181.566038][ T8377] device pim6reg1 entered promiscuous mode [ 182.171008][ T8407] device pim6reg1 entered promiscuous mode [ 182.258358][ T8413] device pim6reg1 entered promiscuous mode [ 182.365430][ T8417] device sit0 left promiscuous mode [ 183.053820][ T8434] device veth0_vlan left promiscuous mode [ 183.131844][ T8434] device veth0_vlan entered promiscuous mode [ 183.260787][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.281143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.342592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.391735][ T8446] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.947633][ T8504] device syzkaller0 entered promiscuous mode [ 185.408117][ T8522] device syzkaller0 entered promiscuous mode [ 185.606627][ T8531] device sit0 left promiscuous mode [ 185.647165][ T8531] device sit0 entered promiscuous mode [ 185.690509][ T8542] device wg2 left promiscuous mode [ 185.698083][ T8542] device wg2 entered promiscuous mode [ 186.043744][ T24] audit: type=1400 audit(1763897454.970:166): avc: denied { create } for pid=8561 comm="syz.4.2326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 186.418899][ T8600] device syzkaller0 entered promiscuous mode [ 186.886158][ T8616] device veth1_macvtap entered promiscuous mode [ 186.899752][ T8616] device macsec0 entered promiscuous mode [ 186.964045][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.556017][ T8648] device sit0 entered promiscuous mode [ 188.743282][ T8694] device veth0_vlan left promiscuous mode [ 188.756454][ T8694] device veth0_vlan entered promiscuous mode [ 188.765854][ T8696] device sit0 left promiscuous mode [ 188.979918][ T8714] device veth0_vlan left promiscuous mode [ 189.042974][ T8714] device veth0_vlan entered promiscuous mode [ 189.090650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.112969][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.138906][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.833708][ T8783] device pim6reg1 left promiscuous mode [ 189.951800][ T8799] syz.1.2384[8799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.951881][ T8799] syz.1.2384[8799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.003457][ T8798] device pim6reg1 entered promiscuous mode [ 191.842823][ T8872] device veth0_vlan left promiscuous mode [ 191.858545][ T8872] device veth0_vlan entered promiscuous mode [ 191.923509][ T8879] device syzkaller0 entered promiscuous mode [ 191.945302][ T8878] device sit0 entered promiscuous mode [ 192.213502][ T8884] ÿ: renamed from team_slave_1 [ 192.677978][ T8941] device pim6reg1 entered promiscuous mode [ 195.619770][ T9122] device syzkaller0 entered promiscuous mode [ 197.635395][ T9184] device sit0 entered promiscuous mode [ 198.325606][ T9249] syz.4.2501[9249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.325658][ T9249] syz.4.2501[9249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.481318][ T9245] device veth0_vlan left promiscuous mode [ 198.528038][ T9245] device veth0_vlan entered promiscuous mode [ 198.800969][ T9283] device syzkaller0 entered promiscuous mode [ 199.530580][ T9304] device syzkaller0 entered promiscuous mode [ 199.648129][ T9303] device syzkaller0 entered promiscuous mode [ 200.020239][ T9324] device veth0_vlan left promiscuous mode [ 200.054536][ T9324] device veth0_vlan entered promiscuous mode [ 200.288364][ T24] audit: type=1400 audit(1763897469.200:167): avc: denied { create } for pid=9358 comm="syz.2.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 200.341306][ T9362] device pim6reg1 entered promiscuous mode [ 200.782009][ T9413] device syzkaller0 entered promiscuous mode [ 200.939415][ T9418] device syzkaller0 entered promiscuous mode [ 201.482390][ T9444] device pim6reg1 entered promiscuous mode [ 201.666955][ T9459] device syzkaller0 entered promiscuous mode [ 202.059174][ T9510] device veth1_macvtap left promiscuous mode [ 202.836504][ T9552] device pim6reg1 entered promiscuous mode [ 203.621486][ T9610] device sit0 entered promiscuous mode [ 205.602219][ T9718] device syzkaller0 entered promiscuous mode [ 206.098799][ T9728] device sit0 left promiscuous mode [ 207.404580][ T9758] device pim6reg1 entered promiscuous mode [ 207.805015][ T9773] device veth0_vlan left promiscuous mode [ 207.842510][ T9773] device veth0_vlan entered promiscuous mode [ 207.921088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.939290][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.976209][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.750134][ T9832] syz.2.2675[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.750203][ T9832] syz.2.2675[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.939637][ T9836] syz.0.2676[9836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.968378][ T9836] syz.0.2676[9836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.989096][ T9881] device sit0 left promiscuous mode [ 211.470745][ T9917] device syzkaller0 entered promiscuous mode [ 211.649264][ T9917] device syzkaller0 left promiscuous mode [ 211.720436][ T9929] device pim6reg1 entered promiscuous mode [ 212.150451][ T24] audit: type=1400 audit(1763897481.080:168): avc: denied { mounton } for pid=9959 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 212.535406][ T9966] device sit0 entered promiscuous mode [ 212.685834][ T9969] device syzkaller0 entered promiscuous mode [ 212.792341][ T9959] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.808320][ T9959] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.815847][ T9959] device bridge_slave_0 entered promiscuous mode [ 212.847248][ T9959] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.854405][ T9959] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.862150][ T9959] device bridge_slave_1 entered promiscuous mode [ 212.970994][ T9997] device syzkaller0 entered promiscuous mode [ 213.032776][ T9959] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.039862][ T9959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.047132][ T9959] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.054174][ T9959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.162995][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.173272][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.202694][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.215513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.223906][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.230957][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.255940][T10018] device veth0_vlan left promiscuous mode [ 213.273557][T10018] device veth0_vlan entered promiscuous mode [ 213.311521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.322694][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.329744][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.337053][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.345864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.353371][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.364505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.372901][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.411288][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.419595][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.432725][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.441916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.652599][ T9959] device veth0_vlan entered promiscuous mode [ 213.667110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.675200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.687805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.695814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.738330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.756128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.813017][ T366] device veth1_macvtap left promiscuous mode [ 213.824358][ T366] device veth0_vlan left promiscuous mode [ 213.932228][ T9959] device veth1_macvtap entered promiscuous mode [ 213.983962][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.998643][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.006943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.043850][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.046841][ T24] audit: type=1400 audit(1763897482.970:169): avc: denied { unmount } for pid=9959 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 214.060161][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.037630][T10138] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.049264][T10138] device bridge0 left promiscuous mode [ 216.137971][ T24] audit: type=1400 audit(1763897485.060:170): avc: denied { create } for pid=10180 comm="syz.2.2778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 218.805442][T10269] device pim6reg1 entered promiscuous mode [ 219.374002][T10310] device syzkaller0 entered promiscuous mode [ 219.696167][T10345] device sit0 entered promiscuous mode [ 220.241540][T10370] bridge0: port 3(veth0) entered blocking state [ 220.293684][T10370] bridge0: port 3(veth0) entered disabled state [ 220.378568][T10370] device veth0 entered promiscuous mode [ 220.428727][T10370] bridge0: port 3(veth0) entered blocking state [ 220.435162][T10370] bridge0: port 3(veth0) entered forwarding state [ 220.507022][T10376] device veth0 left promiscuous mode [ 220.512947][T10376] bridge0: port 3(veth0) entered disabled state [ 220.698805][T10394] syz.0.2846[10394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.698891][T10394] syz.0.2846[10394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.708423][T10395] syz.0.2846[10395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.988971][T10395] syz.0.2846[10395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.277761][T10505] device veth0_vlan left promiscuous mode [ 223.320649][T10505] device veth0_vlan entered promiscuous mode [ 223.343299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.352220][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.365411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.612222][T10573] batadv0: tun_chr_ioctl cmd 2147767521 [ 224.696309][T10573] batadv0: tun_chr_ioctl cmd 1074025692 [ 225.223401][T10608] device syzkaller0 entered promiscuous mode [ 226.699082][T10666] device syzkaller0 entered promiscuous mode [ 227.587326][T10688] device sit0 left promiscuous mode [ 227.744310][T10695] device syzkaller0 entered promiscuous mode [ 228.115769][T10706] syz.2.2934[10706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.203112][T10737] device syzkaller0 entered promiscuous mode [ 231.523245][T10892] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.548290][T10892] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.555650][T10892] device bridge_slave_0 entered promiscuous mode [ 231.593020][T10892] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.600471][T10892] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.609529][T10892] device bridge_slave_1 entered promiscuous mode [ 231.849626][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.859825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.889095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.906408][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.924807][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.931973][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.957642][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.979225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.987731][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.994790][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.002676][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.013562][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.046686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.185666][T10911] device syzkaller0 entered promiscuous mode [ 232.220167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.285421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.308231][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.318645][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.346113][T10892] device veth0_vlan entered promiscuous mode [ 232.390486][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.425110][T10892] device veth1_macvtap entered promiscuous mode [ 232.507448][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.519232][T10938] device sit0 left promiscuous mode [ 232.533559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.615453][T10938] device sit0 entered promiscuous mode [ 232.780535][T10962] device syzkaller0 entered promiscuous mode [ 233.083092][T10984] tun0: tun_chr_ioctl cmd 1074025692 [ 234.197580][T11067] device pim6reg1 entered promiscuous mode [ 234.342289][T11075] device wg2 entered promiscuous mode [ 234.736204][T11109] syz.4.3047[11109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.736282][T11109] syz.4.3047[11109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.387105][T11133] device veth1_macvtap left promiscuous mode [ 235.551795][T11148] device pim6reg1 entered promiscuous mode [ 237.221225][T11208] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.228670][T11208] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.236429][T11208] device bridge_slave_0 entered promiscuous mode [ 237.272812][T11208] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.287230][T11208] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.295001][T11208] device bridge_slave_1 entered promiscuous mode [ 237.367171][T11208] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.374246][T11208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.381539][T11208] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.388592][T11208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.500453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.508161][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.515789][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.601159][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.618509][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.625579][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.691402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.699669][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.706702][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.787787][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.796363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.815885][T11208] device veth0_vlan entered promiscuous mode [ 237.827271][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.841001][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.849332][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.857151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.870460][T11208] device veth1_macvtap entered promiscuous mode [ 237.895681][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.912940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.922924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.739065][T11264] device pim6reg1 entered promiscuous mode [ 239.171225][T11274] device syzkaller0 entered promiscuous mode [ 239.422276][ T366] device veth0_vlan left promiscuous mode [ 240.156829][T11294] device syzkaller0 entered promiscuous mode [ 240.771035][T11339] ÿÿÿÿÿÿ: renamed from vlan1 [ 241.137132][T11385] device pim6reg1 entered promiscuous mode [ 241.504054][T11420] device veth0_vlan left promiscuous mode [ 241.518560][T11420] device veth0_vlan entered promiscuous mode [ 241.590245][T11427] device syzkaller0 entered promiscuous mode [ 241.772762][T11442] device syzkaller0 entered promiscuous mode [ 241.866546][T11472] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.874981][T11472] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.895061][T11465] ref_ctr_offset mismatch. inode: 0xc23 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 242.260606][T11501] device sit0 entered promiscuous mode [ 242.365283][T11504] device wg2 entered promiscuous mode [ 242.674838][T11546] device macsec0 entered promiscuous mode [ 242.910681][T11563] tap0: tun_chr_ioctl cmd 2147767506 [ 243.044518][T11583] device wg2 left promiscuous mode [ 243.148512][T11580] device bridge_slave_1 left promiscuous mode [ 243.159776][T11580] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.223607][T11580] device bridge_slave_0 left promiscuous mode [ 243.282591][T11580] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.604729][T11600] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.611949][T11600] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.742833][T11607] device pim6reg1 entered promiscuous mode [ 245.397960][T11637] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.466338][T11637] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.517396][T11637] device bridge_slave_0 entered promiscuous mode [ 245.695844][T11637] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.708323][T11637] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.751628][T11637] device bridge_slave_1 entered promiscuous mode [ 246.710842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.738551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.780186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.808678][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.911654][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.918760][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.034577][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.061211][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.069679][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.076841][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.084516][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.117375][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.126214][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.206155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.228175][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.319138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.362491][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.423263][T11637] device veth0_vlan entered promiscuous mode [ 247.460744][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.538690][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.570462][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.593466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.625056][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.647696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.691202][T11637] device veth1_macvtap entered promiscuous mode [ 247.738002][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.806361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.919153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.038339][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.046670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.414143][T11717] device syzkaller0 entered promiscuous mode [ 249.022426][ T366] device veth0_vlan left promiscuous mode [ 250.623123][ T276] device syz_tun left promiscuous mode [ 250.667212][ T276] : port 1(syz_tun) entered disabled state [ 250.919263][T11811] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.926334][T11811] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.975614][T11811] device bridge_slave_0 entered promiscuous mode [ 251.014372][T11811] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.044857][T11811] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.052468][T11811] device bridge_slave_1 entered promiscuous mode [ 251.160807][T11811] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.167871][T11811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.175182][T11811] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.182233][T11811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.205016][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.302721][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.315882][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.376238][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.449356][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.456511][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.494117][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.563472][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.570562][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.584441][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.592554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.617381][T11846] cgroup: fork rejected by pids controller in /syz4 [ 251.624607][T11834] device wg2 left promiscuous mode [ 251.681265][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.699362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.723038][T11811] device veth0_vlan entered promiscuous mode [ 251.853186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.921337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.979295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.986818][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.090989][T11893] device syzkaller0 entered promiscuous mode [ 252.115132][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.126049][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.135922][T11811] device veth1_macvtap entered promiscuous mode [ 252.154798][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.175239][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.184329][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.222337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.283643][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.365496][T11923] ÿÿÿÿÿÿ: renamed from vlan1 [ 252.924139][T11934] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.998388][T11934] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.055803][T11934] device bridge_slave_0 entered promiscuous mode [ 253.250050][T11934] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.257212][T11934] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.285362][T11934] device bridge_slave_1 entered promiscuous mode [ 253.703391][T11934] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.710526][T11934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.717797][T11934] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.724853][T11934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.757958][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.766039][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.898205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.912313][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.982311][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.995811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.004157][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.011224][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.018835][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.027098][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.035363][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.042401][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.096254][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.105007][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.113232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.121537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.172884][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.181328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.199346][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.207252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.216396][T11934] device veth0_vlan entered promiscuous mode [ 254.228302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.236623][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.250654][ T366] device bridge_slave_1 left promiscuous mode [ 254.256795][ T366] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.276731][ T366] device bridge_slave_0 left promiscuous mode [ 254.286961][ T366] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.304211][ T366] device bridge_slave_1 left promiscuous mode [ 254.322053][ T366] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.329899][ T366] device bridge_slave_0 left promiscuous mode [ 254.337331][ T366] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.347928][ T366] device veth1_macvtap left promiscuous mode [ 254.354060][ T366] device veth0_vlan left promiscuous mode [ 254.619055][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.629916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.640461][T11934] device veth1_macvtap entered promiscuous mode [ 254.654279][T11988] device syzkaller0 entered promiscuous mode [ 254.670777][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.678969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.687234][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.697021][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.706059][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.004482][T12010] device veth0_vlan left promiscuous mode [ 255.065625][T12010] device veth0_vlan entered promiscuous mode [ 255.765675][T12058] device pim6reg1 entered promiscuous mode [ 255.949656][T12058] device syzkaller0 entered promiscuous mode [ 258.841609][T12172] device pim6reg1 entered promiscuous mode [ 259.201320][T12184] device pim6reg1 entered promiscuous mode [ 260.837353][T12279] device sit0 left promiscuous mode [ 260.914590][T12288] device sit0 entered promiscuous mode [ 261.136181][T12286] device wg2 entered promiscuous mode [ 261.154585][T12302] device pim6reg1 entered promiscuous mode [ 261.182487][T12305] device sit0 entered promiscuous mode [ 261.488207][T12322] device syzkaller0 entered promiscuous mode [ 261.595531][T12328] device pim6reg1 entered promiscuous mode [ 262.593464][T12409] tap0: tun_chr_ioctl cmd 1074025673 [ 262.657480][T12408] tap0: tun_chr_ioctl cmd 1074025675 [ 262.741893][T12408] tap0: persist enabled [ 262.758500][T12415] tap0: tun_chr_ioctl cmd 1074025675 [ 262.778445][T12415] tap0: persist disabled [ 263.975719][T12465] device vlan0 entered promiscuous mode [ 264.870909][T12505] syz.4.3447[12505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.870971][T12505] syz.4.3447[12505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.190087][T12512] device veth1_to_team entered promiscuous mode [ 265.525258][T12541] device pim6reg1 entered promiscuous mode [ 265.609673][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.638925][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.647936][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 265.902541][T12557] device pim6reg1 entered promiscuous mode [ 266.189111][T12567] device sit0 left promiscuous mode [ 267.456864][T12616] syz.0.3479[12616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.456921][T12616] syz.0.3479[12616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.704398][T12633] device wg2 entered promiscuous mode [ 268.096052][T12679] device pim6reg1 entered promiscuous mode [ 269.228360][T12730] device sit0 left promiscuous mode [ 269.338711][T12729] device sit0 entered promiscuous mode [ 269.515307][T12737] device veth0_vlan left promiscuous mode [ 269.559560][T12737] device veth0_vlan entered promiscuous mode [ 270.390968][T12798] syz.0.3527[12798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.391052][T12798] syz.0.3527[12798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.335925][T12823] device wg2 entered promiscuous mode [ 271.542755][T12835] device sit0 entered promiscuous mode [ 271.759838][T12843] device sit0 left promiscuous mode [ 271.837946][T12855] syz.3.3543[12855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.838024][T12855] syz.3.3543[12855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.305290][T12865] device syzkaller0 entered promiscuous mode [ 273.066899][T12916] device wg2 left promiscuous mode [ 273.110166][T12921] device sit0 entered promiscuous mode [ 273.369300][T12916] device wg2 entered promiscuous mode [ 273.411844][T12924] device veth0_vlan left promiscuous mode [ 273.420143][T12924] device veth0_vlan entered promiscuous mode [ 273.504211][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.518684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.532970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 274.102719][T12952] device syzkaller0 entered promiscuous mode [ 275.095949][T12987] device pim6reg1 left promiscuous mode [ 275.467761][T13026] device sit0 left promiscuous mode [ 275.566902][T13035] device sit0 entered promiscuous mode [ 275.855600][T13047] device wg2 left promiscuous mode [ 275.872914][T13049] syz.4.3601[13049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.872981][T13049] syz.4.3601[13049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.902968][T13050] device wg2 entered promiscuous mode [ 276.442847][T13051] device veth0_vlan left promiscuous mode [ 276.460318][T13051] device veth0_vlan entered promiscuous mode [ 276.761826][T13077] device wg2 left promiscuous mode [ 277.060404][T13093] device wg2 entered promiscuous mode [ 277.202227][T13114] device veth0_vlan left promiscuous mode [ 277.210040][T13114] device veth0_vlan entered promiscuous mode [ 278.883133][T13236] device syzkaller0 entered promiscuous mode [ 279.278143][T13255] device pim6reg1 entered promiscuous mode [ 280.791401][T13343] sock: sock_set_timeout: `syz.2.3688' (pid 13343) tries to set negative timeout [ 281.133556][T13361] device pim6reg1 entered promiscuous mode [ 281.148956][T13360] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.156007][T13360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.163328][T13360] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.170394][T13360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.180349][T13360] device bridge0 entered promiscuous mode [ 282.235333][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.048482][T13422] device veth1_macvtap left promiscuous mode [ 290.054506][T13422] device macsec0 entered promiscuous mode [ 290.634483][T13454] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.642078][T13454] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.650570][T13454] device bridge0 left promiscuous mode [ 291.729519][T13515] device syzkaller0 entered promiscuous mode [ 293.163398][T13560] device syzkaller0 entered promiscuous mode [ 293.925052][T13679] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.933943][T13679] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.134292][T13676] device veth0_vlan left promiscuous mode [ 294.156762][T13676] device veth0_vlan entered promiscuous mode [ 294.229179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.257357][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.315707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.465510][T13707] syz.3.3790[13707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.465580][T13707] syz.3.3790[13707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.535176][T13709] device syzkaller0 entered promiscuous mode [ 294.723610][T13722] device sit0 left promiscuous mode [ 294.938405][T13723] device sit0 entered promiscuous mode [ 296.102458][T13777] device pim6reg1 entered promiscuous mode [ 296.397087][T13803] device syzkaller0 entered promiscuous mode [ 297.185064][T13856] device pim6reg1 entered promiscuous mode [ 297.344111][T13869] batadv0: tun_chr_ioctl cmd 2147767521 [ 298.171902][T13883] device syzkaller0 entered promiscuous mode [ 298.448203][T13903] device veth1_macvtap left promiscuous mode [ 299.102348][T13925] device wg2 left promiscuous mode [ 299.133885][T13929] device veth0_vlan left promiscuous mode [ 299.150817][T13929] device veth0_vlan entered promiscuous mode [ 299.177374][T13932] device wg2 entered promiscuous mode [ 299.847352][T13978] syz.2.3868[13978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.847406][T13978] syz.2.3868[13978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.911613][T13979] syz.2.3868[13979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.998612][T13979] syz.2.3868[13979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.157569][T13984] device syzkaller0 entered promiscuous mode [ 300.251480][T13986] device veth0_vlan left promiscuous mode [ 300.269082][T13986] device veth0_vlan entered promiscuous mode [ 300.287693][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.297129][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.305747][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.562641][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.578499][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.606341][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 301.691050][T14118] syz.1.3906[14118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.691141][T14118] syz.1.3906[14118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.711069][T14115] device syzkaller0 entered promiscuous mode [ 301.718883][T14119] syz.1.3906[14119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.909236][T14129] device bridge_slave_1 left promiscuous mode [ 301.935974][T14129] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.961174][T14129] device bridge_slave_0 left promiscuous mode [ 301.971601][T14129] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.095415][T14158] device sit0 entered promiscuous mode [ 302.229156][T14163] device sit0 entered promiscuous mode [ 302.380678][ T24] audit: type=1400 audit(1763897571.310:171): avc: denied { create } for pid=14170 comm="syz.4.3921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 302.661348][T14205] device pim6reg1 entered promiscuous mode [ 302.951466][T14234] device syzkaller0 entered promiscuous mode [ 303.034681][T14229] device bridge_slave_1 left promiscuous mode [ 303.042660][T14229] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.168218][T14229] device bridge_slave_0 left promiscuous mode [ 303.178991][T14229] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.731428][T14281] syz.1.3953[14281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.731984][T14281] syz.1.3953[14281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.927359][T14290] device pim6reg1 entered promiscuous mode [ 304.896531][T14348] device wg2 entered promiscuous mode [ 305.573794][T14386] device syzkaller0 entered promiscuous mode [ 307.085341][T14465] device pim6reg1 entered promiscuous mode [ 307.147002][T14472] device sit0 entered promiscuous mode [ 308.752738][T14576] syz.3.4042[14576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.752807][T14576] syz.3.4042[14576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.914140][T14618] device veth0_vlan left promiscuous mode [ 309.931864][T14618] device veth0_vlan entered promiscuous mode [ 309.971496][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.980046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.987635][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 310.235794][T14653] device wg2 left promiscuous mode [ 310.358997][T14653] device wg2 entered promiscuous mode [ 310.634829][T14664] device sit0 left promiscuous mode [ 310.812636][T14676] device sit0 entered promiscuous mode [ 312.263118][T14762] device pim6reg1 entered promiscuous mode [ 312.969094][T14792] device sit0 left promiscuous mode [ 313.067660][T14792] device sit0 entered promiscuous mode [ 313.306987][T14795] ±ÿ: renamed from team_slave_1 [ 313.567258][T14820] tap0: tun_chr_ioctl cmd 1074025675 [ 313.582803][T14820] tap0: persist enabled [ 313.593010][T14820] tap0: tun_chr_ioctl cmd 1074025675 [ 313.609926][T14820] tap0: persist enabled [ 313.667923][T14845] device sit0 left promiscuous mode [ 315.689734][T14962] device syzkaller0 entered promiscuous mode [ 316.388618][T15003] syz.1.4164[15003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.388696][T15003] syz.1.4164[15003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.484435][T15110] device wg2 left promiscuous mode [ 318.524437][T15110] device wg2 entered promiscuous mode [ 320.250928][T15230] device sit0 left promiscuous mode [ 320.558631][T15241] syz.1.4233[15241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.558692][T15241] syz.1.4233[15241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.804490][T15254] device syzkaller0 entered promiscuous mode [ 320.894762][T15256] device syzkaller0 entered promiscuous mode [ 320.942934][T15266] syz.2.4240[15266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.943022][T15266] syz.2.4240[15266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.466829][T15293] device syzkaller0 entered promiscuous mode [ 321.855862][ T24] audit: type=1400 audit(1763897590.780:172): avc: denied { create } for pid=15333 comm="syz.1.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 322.083750][T15347] syz.1.4266[15347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.817822][T15427] device wg2 entered promiscuous mode [ 324.936396][T15444] syz.4.4295[15444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.936448][T15444] syz.4.4295[15444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.035306][T15444] device macsec0 left promiscuous mode [ 326.655334][T15534] device wg2 left promiscuous mode [ 326.720414][T15534] device wg2 entered promiscuous mode [ 326.818757][T15550] device wg2 left promiscuous mode [ 326.908306][T15550] device wg2 entered promiscuous mode [ 327.525147][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.578965][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.628712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 329.533729][T15728] device pim6reg1 entered promiscuous mode [ 329.854786][T15741] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.866591][T15741] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.967336][T15746] device pim6reg1 entered promiscuous mode [ 330.101907][T15749] device sit0 left promiscuous mode [ 330.184939][T15746] device sit0 entered promiscuous mode [ 330.264626][T15766] syz.1.4393[15766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.264684][T15766] syz.1.4393[15766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.004046][T15827] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 332.145508][T15827] syzkaller0: linktype set to 784 [ 333.407014][T15901] batadv0: tun_chr_ioctl cmd 2147767521 [ 333.420779][T15901] batadv0: tun_chr_ioctl cmd 1074025692 [ 334.521493][T15921] device veth0_vlan left promiscuous mode [ 334.548360][T15921] device veth0_vlan entered promiscuous mode [ 334.587280][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.595631][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.603658][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.695792][T15938] device sit0 left promiscuous mode [ 334.711344][T15939] device sit0 entered promiscuous mode [ 335.252167][T15960] device xfrm0 entered promiscuous mode [ 335.775118][T15978] device syzkaller0 entered promiscuous mode [ 337.795635][T16055] device pim6reg1 entered promiscuous mode [ 339.197026][T16111] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 339.213126][T16111] syzkaller0: persist disabled [ 339.974999][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.997477][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.076143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 341.780875][T16209] device sit0 left promiscuous mode [ 341.806572][T16217] device sit0 entered promiscuous mode [ 344.065345][T16304] device wg2 left promiscuous mode [ 344.084125][T16304] device wg2 entered promiscuous mode [ 344.107221][T16313] device wg2 left promiscuous mode [ 344.117035][T16313] device wg2 entered promiscuous mode [ 345.217798][T16371] device syzkaller0 entered promiscuous mode [ 345.259143][T16368] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 347.039608][T16439] device veth1_macvtap entered promiscuous mode [ 347.046312][T16439] device macsec0 entered promiscuous mode [ 347.088391][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.653477][T16493] device veth0_vlan left promiscuous mode [ 347.666021][T16493] device veth0_vlan entered promiscuous mode [ 347.709732][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.725704][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.736690][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.928828][T16520] syz.2.4605[16520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.928919][T16520] syz.2.4605[16520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.170508][T16529] device syzkaller0 entered promiscuous mode [ 348.615703][T16554] device veth1_macvtap left promiscuous mode [ 348.622969][T16554] device macsec0 entered promiscuous mode [ 350.303009][T16603] device pim6reg1 entered promiscuous mode [ 350.711380][T16618] device macsec0 entered promiscuous mode [ 350.816608][T16626] syz.4.4634[16626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.817125][T16626] syz.4.4634[16626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.660206][T16662] device sit0 left promiscuous mode [ 351.757592][T16664] device sit0 entered promiscuous mode [ 352.079838][T16674] device sit0 left promiscuous mode [ 353.442362][T16777] device wg2 left promiscuous mode [ 355.825636][T16846] device wg2 left promiscuous mode [ 355.942851][T16846] device wg2 entered promiscuous mode [ 356.150147][T16863] device veth1_macvtap left promiscuous mode [ 359.726566][T17031] device veth0_vlan left promiscuous mode [ 359.743234][T17031] device veth0_vlan entered promiscuous mode [ 359.778600][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.804597][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.852353][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.910824][T17056] device pim6reg1 entered promiscuous mode [ 360.202925][T17071] device macsec0 left promiscuous mode [ 360.516348][T17091] FAULT_INJECTION: forcing a failure. [ 360.516348][T17091] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 360.539121][T17091] CPU: 0 PID: 17091 Comm: syz.2.4768 Tainted: G W syzkaller #0 [ 360.548020][T17091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 360.558100][T17091] Call Trace: [ 360.561383][T17091] __dump_stack+0x21/0x24 [ 360.565700][T17091] dump_stack_lvl+0x169/0x1d8 [ 360.570363][T17091] ? show_regs_print_info+0x18/0x18 [ 360.575554][T17091] dump_stack+0x15/0x1c [ 360.579699][T17091] should_fail+0x3c1/0x510 [ 360.584108][T17091] should_fail_usercopy+0x1a/0x20 [ 360.589124][T17091] _copy_from_user+0x20/0xd0 [ 360.593706][T17091] do_vfs_ioctl+0xf42/0x1510 [ 360.598285][T17091] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 360.603907][T17091] ? has_cap_mac_admin+0x330/0x330 [ 360.609015][T17091] ? irq_exit_rcu+0x9/0x10 [ 360.613422][T17091] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 360.619573][T17091] ? selinux_file_ioctl+0x377/0x480 [ 360.624790][T17091] ? mutex_trylock+0xa0/0xa0 [ 360.629373][T17091] ? __fget_files+0x2c4/0x320 [ 360.634039][T17091] ? selinux_file_alloc_security+0x120/0x120 [ 360.640009][T17091] ? __fget_files+0x2c4/0x320 [ 360.644678][T17091] ? security_file_ioctl+0x84/0xa0 [ 360.649785][T17091] __se_sys_ioctl+0x9f/0x1a0 [ 360.654366][T17091] __x64_sys_ioctl+0x7b/0x90 [ 360.658951][T17091] do_syscall_64+0x31/0x40 [ 360.663369][T17091] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 360.669253][T17091] RIP: 0033:0x7fb2aeafe749 [ 360.673758][T17091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.693353][T17091] RSP: 002b:00007fb2ad566038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.701766][T17091] RAX: ffffffffffffffda RBX: 00007fb2aed54fa0 RCX: 00007fb2aeafe749 [ 360.709727][T17091] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 360.717697][T17091] RBP: 00007fb2ad566090 R08: 0000000000000000 R09: 0000000000000000 [ 360.725666][T17091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.733626][T17091] R13: 00007fb2aed55038 R14: 00007fb2aed54fa0 R15: 00007ffe6d03f6e8 [ 361.214743][T17127] FAULT_INJECTION: forcing a failure. [ 361.214743][T17127] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 361.257030][T17127] CPU: 0 PID: 17127 Comm: syz.3.4780 Tainted: G W syzkaller #0 [ 361.265902][T17127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 361.275957][T17127] Call Trace: [ 361.279255][T17127] __dump_stack+0x21/0x24 [ 361.283606][T17127] dump_stack_lvl+0x169/0x1d8 [ 361.288291][T17127] ? show_regs_print_info+0x18/0x18 [ 361.293930][T17127] ? 0xffffffffa003c000 [ 361.298100][T17127] dump_stack+0x15/0x1c [ 361.302259][T17127] should_fail+0x3c1/0x510 [ 361.306691][T17127] should_fail_alloc_page+0x4f/0x60 [ 361.311888][T17127] __alloc_pages_nodemask+0x109/0x5f0 [ 361.317275][T17127] ? __kernel_text_address+0xa0/0x100 [ 361.322641][T17127] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 361.328318][T17127] ? arch_stack_walk+0xee/0x140 [ 361.333176][T17127] shmem_alloc_page+0x1b1/0x300 [ 361.338026][T17127] ? put_page+0xd0/0xd0 [ 361.342182][T17127] ? percpu_counter_add_batch+0x13c/0x160 [ 361.347901][T17127] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 361.353529][T17127] ? shmem_swapin_page+0x16c0/0x16c0 [ 361.358824][T17127] ? xas_load+0x27d/0x2a0 [ 361.363148][T17127] ? find_get_entry+0x366/0x3c0 [ 361.367992][T17127] ? page_cache_prev_miss+0x270/0x270 [ 361.373443][T17127] ? __irq_exit_rcu+0x40/0x150 [ 361.378198][T17127] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 361.384003][T17127] ? find_lock_entry+0x4b/0x200 [ 361.388844][T17127] shmem_getpage_gfp+0x625/0x2110 [ 361.393874][T17127] shmem_fallocate+0x817/0xc20 [ 361.398630][T17127] ? avc_ss_reset+0x280/0x280 [ 361.403299][T17127] ? shmem_mmap+0x200/0x200 [ 361.407795][T17127] ? avc_policy_seqno+0x1b/0x70 [ 361.412634][T17127] ? selinux_file_permission+0x2a5/0x510 [ 361.418365][T17127] ? fsnotify_perm+0x66/0x4b0 [ 361.423037][T17127] ? preempt_count_add+0x90/0x1b0 [ 361.428072][T17127] vfs_fallocate+0x4b4/0x590 [ 361.432658][T17127] do_vfs_ioctl+0x12e3/0x1510 [ 361.437412][T17127] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 361.443036][T17127] ? has_cap_mac_admin+0x330/0x330 [ 361.448145][T17127] ? __bpf_trace_kmem_free+0x6f/0x90 [ 361.453425][T17127] ? selinux_file_ioctl+0x377/0x480 [ 361.458632][T17127] ? mutex_trylock+0xa0/0xa0 [ 361.463216][T17127] ? __fget_files+0x2c4/0x320 [ 361.467884][T17127] ? selinux_file_alloc_security+0x120/0x120 [ 361.473858][T17127] ? __fget_files+0x2c4/0x320 [ 361.478534][T17127] ? security_file_ioctl+0x84/0xa0 [ 361.483635][T17127] __se_sys_ioctl+0x9f/0x1a0 [ 361.488218][T17127] __x64_sys_ioctl+0x7b/0x90 [ 361.492798][T17127] do_syscall_64+0x31/0x40 [ 361.497199][T17127] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 361.503080][T17127] RIP: 0033:0x7f3eeedb9749 [ 361.507491][T17127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.527088][T17127] RSP: 002b:00007f3eed821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.535490][T17127] RAX: ffffffffffffffda RBX: 00007f3eef00ffa0 RCX: 00007f3eeedb9749 [ 361.543458][T17127] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 361.551430][T17127] RBP: 00007f3eed821090 R08: 0000000000000000 R09: 0000000000000000 [ 361.559389][T17127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.567351][T17127] R13: 00007f3eef010038 R14: 00007f3eef00ffa0 R15: 00007ffdb309fca8 [ 362.212079][T17182] device syzkaller0 entered promiscuous mode [ 362.468781][T17192] device pim6reg1 entered promiscuous mode [ 362.547150][T17193] device syzkaller0 entered promiscuous mode [ 363.454787][T17236] device wg2 left promiscuous mode [ 363.624335][T17236] device wg2 entered promiscuous mode [ 365.315169][T17330] device sit0 left promiscuous mode [ 365.453728][T17336] device sit0 entered promiscuous mode [ 365.753120][T17368] device syzkaller0 entered promiscuous mode [ 365.993758][T17391] device pim6reg1 entered promiscuous mode [ 367.393582][T17468] -1: renamed from syzkaller0 [ 368.740326][T17546] device veth0_vlan left promiscuous mode [ 368.752776][T17546] device veth0_vlan entered promiscuous mode [ 370.176932][T17614] device syzkaller0 entered promiscuous mode [ 370.457814][T17619] device veth1_macvtap left promiscuous mode [ 371.724755][T17685] sit0: mtu less than device minimum [ 372.340651][T17694] device sit0 entered promiscuous mode [ 376.465286][ T24] audit: type=1400 audit(1763897645.390:173): avc: denied { create } for pid=17867 comm="syz.4.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 376.984827][T17885] device macsec0 left promiscuous mode [ 378.943339][T18026] device syzkaller0 entered promiscuous mode [ 379.063709][T18039] device veth0_vlan left promiscuous mode [ 379.074856][T18039] device veth0_vlan entered promiscuous mode [ 379.115849][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.146321][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.166353][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.165285][T18083] device veth0_vlan left promiscuous mode [ 380.210308][T18083] device veth0_vlan entered promiscuous mode [ 380.210500][T18091] syz.2.5057[18091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.267576][T18091] syz.2.5057[18091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.288132][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.318163][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.336141][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.030404][T18170] FAULT_INJECTION: forcing a failure. [ 381.030404][T18170] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 381.050963][T18170] CPU: 1 PID: 18170 Comm: syz.0.5081 Tainted: G W syzkaller #0 [ 381.059838][T18170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 381.069906][T18170] Call Trace: [ 381.073208][T18170] __dump_stack+0x21/0x24 [ 381.077546][T18170] dump_stack_lvl+0x169/0x1d8 [ 381.082234][T18170] ? show_regs_print_info+0x18/0x18 [ 381.087436][T18170] ? kvm_sched_clock_read+0x18/0x40 [ 381.092640][T18170] dump_stack+0x15/0x1c [ 381.096804][T18170] should_fail+0x3c1/0x510 [ 381.101239][T18170] should_fail_alloc_page+0x4f/0x60 [ 381.106453][T18170] __alloc_pages_nodemask+0x109/0x5f0 [ 381.111838][T18170] ? __irq_exit_rcu+0x40/0x150 [ 381.116617][T18170] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 381.122169][T18170] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 381.127988][T18170] ? shmem_alloc_page+0xd9/0x300 [ 381.132969][T18170] shmem_alloc_page+0x1b1/0x300 [ 381.137839][T18170] ? put_page+0xd0/0xd0 [ 381.142009][T18170] ? percpu_counter_add_batch+0x13c/0x160 [ 381.147746][T18170] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 381.153391][T18170] ? shmem_swapin_page+0x16c0/0x16c0 [ 381.158683][T18170] ? xas_load+0x28b/0x2a0 [ 381.163021][T18170] ? find_get_entry+0x366/0x3c0 [ 381.167881][T18170] ? page_cache_prev_miss+0x270/0x270 [ 381.173258][T18170] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 381.179160][T18170] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 381.184799][T18170] ? __kasan_check_write+0x14/0x20 [ 381.189925][T18170] ? _raw_spin_lock_irq+0x8f/0xe0 [ 381.194954][T18170] ? find_lock_entry+0x4b/0x200 [ 381.199821][T18170] ? shmem_getpage_gfp+0x8f3/0x2110 [ 381.205026][T18170] shmem_getpage_gfp+0x625/0x2110 [ 381.210073][T18170] shmem_fallocate+0x817/0xc20 [ 381.214843][T18170] ? avc_ss_reset+0x280/0x280 [ 381.219535][T18170] ? shmem_mmap+0x200/0x200 [ 381.224044][T18170] ? avc_policy_seqno+0x1b/0x70 [ 381.228904][T18170] ? selinux_file_permission+0x2a5/0x510 [ 381.234549][T18170] ? fsnotify_perm+0x66/0x4b0 [ 381.239232][T18170] ? preempt_count_add+0x90/0x1b0 [ 381.244277][T18170] vfs_fallocate+0x4b4/0x590 [ 381.248894][T18170] do_vfs_ioctl+0x12e3/0x1510 [ 381.253634][T18170] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 381.259384][T18170] ? has_cap_mac_admin+0x330/0x330 [ 381.264511][T18170] ? __kasan_slab_free+0x11/0x20 [ 381.269465][T18170] ? selinux_file_ioctl+0x377/0x480 [ 381.274683][T18170] ? mutex_trylock+0xa0/0xa0 [ 381.279276][T18170] ? __fget_files+0x2c4/0x320 [ 381.283956][T18170] ? selinux_file_alloc_security+0x120/0x120 [ 381.289937][T18170] ? __fget_files+0x2c4/0x320 [ 381.294709][T18170] ? security_file_ioctl+0x84/0xa0 [ 381.299827][T18170] __se_sys_ioctl+0x9f/0x1a0 [ 381.304422][T18170] __x64_sys_ioctl+0x7b/0x90 [ 381.309013][T18170] do_syscall_64+0x31/0x40 [ 381.313437][T18170] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 381.319326][T18170] RIP: 0033:0x7f7ae6e31749 [ 381.323746][T18170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.343365][T18170] RSP: 002b:00007f7ae5899038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 381.351784][T18170] RAX: ffffffffffffffda RBX: 00007f7ae7087fa0 RCX: 00007f7ae6e31749 [ 381.359753][T18170] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 381.367730][T18170] RBP: 00007f7ae5899090 R08: 0000000000000000 R09: 0000000000000000 [ 381.375700][T18170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 381.383669][T18170] R13: 00007f7ae7088038 R14: 00007f7ae7087fa0 R15: 00007ffd86e93388 [ 381.841851][T18215] FAULT_INJECTION: forcing a failure. [ 381.841851][T18215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 381.858151][T18215] CPU: 1 PID: 18215 Comm: syz.2.5097 Tainted: G W syzkaller #0 [ 381.867009][T18215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 381.877086][T18215] Call Trace: [ 381.880385][T18215] __dump_stack+0x21/0x24 [ 381.884720][T18215] dump_stack_lvl+0x169/0x1d8 [ 381.889409][T18215] ? show_regs_print_info+0x18/0x18 [ 381.894617][T18215] dump_stack+0x15/0x1c [ 381.898788][T18215] should_fail+0x3c1/0x510 [ 381.903216][T18215] should_fail_alloc_page+0x4f/0x60 [ 381.908416][T18215] __alloc_pages_nodemask+0x109/0x5f0 [ 381.913806][T18215] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 381.919359][T18215] ? kvm_restore_sched_clock_state+0x10/0x70 [ 381.925343][T18215] ? ctx_flexible_sched_in+0x50/0x70 [ 381.930631][T18215] shmem_alloc_page+0x1b1/0x300 [ 381.935482][T18215] ? put_page+0xd0/0xd0 [ 381.939688][T18215] ? percpu_counter_add_batch+0x13c/0x160 [ 381.945412][T18215] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 381.951049][T18215] ? shmem_swapin_page+0x16c0/0x16c0 [ 381.956333][T18215] ? xas_load+0x28b/0x2a0 [ 381.960675][T18215] ? find_get_entry+0x366/0x3c0 [ 381.965526][T18215] ? page_cache_prev_miss+0x270/0x270 [ 381.970897][T18215] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 381.976815][T18215] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 381.982454][T18215] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 381.988266][T18215] ? __kasan_check_write+0x14/0x20 [ 381.993384][T18215] ? _raw_spin_lock_irq+0x8f/0xe0 [ 381.998415][T18215] ? find_lock_entry+0x4b/0x200 [ 382.003271][T18215] ? shmem_getpage_gfp+0x8f3/0x2110 [ 382.008478][T18215] shmem_getpage_gfp+0x625/0x2110 [ 382.013517][T18215] shmem_fallocate+0x817/0xc20 [ 382.018287][T18215] ? shmem_mmap+0x200/0x200 [ 382.022802][T18215] ? avc_policy_seqno+0x1b/0x70 [ 382.027659][T18215] ? selinux_file_permission+0x2a5/0x510 [ 382.033295][T18215] ? fsnotify_perm+0x66/0x4b0 [ 382.037991][T18215] ? preempt_count_add+0x90/0x1b0 [ 382.043027][T18215] vfs_fallocate+0x4b4/0x590 [ 382.047625][T18215] do_vfs_ioctl+0x12e3/0x1510 [ 382.052308][T18215] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 382.057944][T18215] ? has_cap_mac_admin+0x330/0x330 [ 382.063059][T18215] ? native_set_ldt+0x370/0x370 [ 382.067923][T18215] ? perf_sched_cb_inc+0x240/0x240 [ 382.073056][T18215] ? selinux_file_ioctl+0x377/0x480 [ 382.078254][T18215] ? __switch_to_asm+0x34/0x60 [ 382.083023][T18215] ? selinux_file_alloc_security+0x120/0x120 [ 382.089004][T18215] ? __schedule+0xb4f/0x1310 [ 382.093600][T18215] ? __fget_files+0x2c4/0x320 [ 382.098294][T18215] ? security_file_ioctl+0x84/0xa0 [ 382.103426][T18215] __se_sys_ioctl+0x9f/0x1a0 [ 382.108022][T18215] __x64_sys_ioctl+0x7b/0x90 [ 382.112631][T18215] do_syscall_64+0x31/0x40 [ 382.117052][T18215] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 382.122945][T18215] RIP: 0033:0x7fb2aeafe749 [ 382.127451][T18215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.147059][T18215] RSP: 002b:00007fb2ad566038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 382.155486][T18215] RAX: ffffffffffffffda RBX: 00007fb2aed54fa0 RCX: 00007fb2aeafe749 [ 382.163471][T18215] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 382.171453][T18215] RBP: 00007fb2ad566090 R08: 0000000000000000 R09: 0000000000000000 [ 382.179537][T18215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 382.187537][T18215] R13: 00007fb2aed55038 R14: 00007fb2aed54fa0 R15: 00007ffe6d03f6e8 [ 382.760386][T18233] device wg2 entered promiscuous mode [ 383.136452][T18262] FAULT_INJECTION: forcing a failure. [ 383.136452][T18262] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.211199][T18262] CPU: 0 PID: 18262 Comm: syz.3.5112 Tainted: G W syzkaller #0 [ 383.220250][T18262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 383.230308][T18262] Call Trace: [ 383.233592][T18262] __dump_stack+0x21/0x24 [ 383.237925][T18262] dump_stack_lvl+0x169/0x1d8 [ 383.242608][T18262] ? show_regs_print_info+0x18/0x18 [ 383.247911][T18262] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 383.253715][T18262] dump_stack+0x15/0x1c [ 383.257948][T18262] should_fail+0x3c1/0x510 [ 383.262365][T18262] should_fail_alloc_page+0x4f/0x60 [ 383.267553][T18262] __alloc_pages_nodemask+0x109/0x5f0 [ 383.272921][T18262] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 383.278462][T18262] shmem_alloc_page+0x1b1/0x300 [ 383.283301][T18262] ? put_page+0xd0/0xd0 [ 383.287453][T18262] ? percpu_counter_add_batch+0x13c/0x160 [ 383.293170][T18262] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 383.298802][T18262] ? shmem_swapin_page+0x16c0/0x16c0 [ 383.304080][T18262] ? xas_load+0x28b/0x2a0 [ 383.308402][T18262] ? find_get_entry+0x366/0x3c0 [ 383.313251][T18262] ? page_cache_prev_miss+0x270/0x270 [ 383.318616][T18262] ? __kasan_check_write+0x14/0x20 [ 383.323718][T18262] ? _raw_spin_lock_irq+0x8f/0xe0 [ 383.328738][T18262] ? find_lock_entry+0x4b/0x200 [ 383.333576][T18262] ? shmem_getpage_gfp+0x8f3/0x2110 [ 383.338764][T18262] shmem_getpage_gfp+0x625/0x2110 [ 383.343785][T18262] shmem_fallocate+0x817/0xc20 [ 383.348541][T18262] ? avc_ss_reset+0x280/0x280 [ 383.353223][T18262] ? shmem_mmap+0x200/0x200 [ 383.357718][T18262] ? avc_policy_seqno+0x1b/0x70 [ 383.362564][T18262] ? selinux_file_permission+0x2a5/0x510 [ 383.368193][T18262] ? fsnotify_perm+0x66/0x4b0 [ 383.372888][T18262] ? preempt_count_add+0x90/0x1b0 [ 383.377904][T18262] vfs_fallocate+0x4b4/0x590 [ 383.382486][T18262] do_vfs_ioctl+0x12e3/0x1510 [ 383.387158][T18262] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 383.392869][T18262] ? has_cap_mac_admin+0x330/0x330 [ 383.397972][T18262] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 383.403769][T18262] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 383.409913][T18262] ? selinux_file_ioctl+0x368/0x480 [ 383.415102][T18262] ? selinux_file_ioctl+0x377/0x480 [ 383.420291][T18262] ? selinux_file_alloc_security+0x120/0x120 [ 383.426262][T18262] ? __fget_files+0x2c4/0x320 [ 383.430951][T18262] ? security_file_ioctl+0x84/0xa0 [ 383.436085][T18262] __se_sys_ioctl+0x9f/0x1a0 [ 383.440669][T18262] __x64_sys_ioctl+0x7b/0x90 [ 383.445255][T18262] do_syscall_64+0x31/0x40 [ 383.449678][T18262] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 383.455592][T18262] RIP: 0033:0x7f3eeedb9749 [ 383.460018][T18262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.479616][T18262] RSP: 002b:00007f3eed821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 383.488020][T18262] RAX: ffffffffffffffda RBX: 00007f3eef00ffa0 RCX: 00007f3eeedb9749 [ 383.496010][T18262] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 383.503976][T18262] RBP: 00007f3eed821090 R08: 0000000000000000 R09: 0000000000000000 [ 383.511961][T18262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 383.519946][T18262] R13: 00007f3eef010038 R14: 00007f3eef00ffa0 R15: 00007ffdb309fca8 [ 383.923277][T18277] device syzkaller0 entered promiscuous mode [ 384.018600][T18272] device pim6reg1 entered promiscuous mode [ 384.648416][T18310] FAULT_INJECTION: forcing a failure. [ 384.648416][T18310] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.833245][T18310] CPU: 1 PID: 18310 Comm: syz.0.5125 Tainted: G W syzkaller #0 [ 384.842133][T18310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 384.852199][T18310] Call Trace: [ 384.855615][T18310] __dump_stack+0x21/0x24 [ 384.859971][T18310] dump_stack_lvl+0x169/0x1d8 [ 384.864660][T18310] ? show_regs_print_info+0x18/0x18 [ 384.869864][T18310] ? sched_clock_cpu+0x1b/0x3d0 [ 384.874721][T18310] ? sched_clock_cpu+0x1b/0x3d0 [ 384.879582][T18310] dump_stack+0x15/0x1c [ 384.883746][T18310] should_fail+0x3c1/0x510 [ 384.888185][T18310] should_fail_alloc_page+0x4f/0x60 [ 384.893387][T18310] __alloc_pages_nodemask+0x109/0x5f0 [ 384.898764][T18310] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 384.904930][T18310] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 384.910503][T18310] ? __memcg_kmem_uncharge+0x40/0x40 [ 384.915885][T18310] shmem_alloc_page+0x1b1/0x300 [ 384.920754][T18310] ? put_page+0xd0/0xd0 [ 384.924931][T18310] ? percpu_counter_add_batch+0x13c/0x160 [ 384.930681][T18310] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 384.936345][T18310] ? shmem_swapin_page+0x16c0/0x16c0 [ 384.941641][T18310] ? xas_load+0x28b/0x2a0 [ 384.945992][T18310] ? find_get_entry+0x366/0x3c0 [ 384.950856][T18310] ? page_cache_prev_miss+0x270/0x270 [ 384.956233][T18310] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 384.962399][T18310] ? find_lock_entry+0x4b/0x200 [ 384.967262][T18310] shmem_getpage_gfp+0x625/0x2110 [ 384.972308][T18310] shmem_fallocate+0x817/0xc20 [ 384.977085][T18310] ? sched_clock_cpu+0x1b/0x3d0 [ 384.981952][T18310] ? shmem_mmap+0x200/0x200 [ 384.986463][T18310] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 384.992282][T18310] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 384.998448][T18310] ? preempt_count_add+0x90/0x1b0 [ 385.003482][T18310] vfs_fallocate+0x4b4/0x590 [ 385.008084][T18310] do_vfs_ioctl+0x12e3/0x1510 [ 385.012774][T18310] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 385.018438][T18310] ? has_cap_mac_admin+0x330/0x330 [ 385.023567][T18310] ? selinux_file_ioctl+0x377/0x480 [ 385.028776][T18310] ? sched_clock+0x3a/0x40 [ 385.033204][T18310] ? sched_clock_cpu+0x1b/0x3d0 [ 385.038069][T18310] ? selinux_file_alloc_security+0x120/0x120 [ 385.044061][T18310] ? sched_clock_cpu+0x1b/0x3d0 [ 385.048921][T18310] ? __fget_files+0x2c4/0x320 [ 385.053621][T18310] ? security_file_ioctl+0x84/0xa0 [ 385.058743][T18310] __se_sys_ioctl+0x9f/0x1a0 [ 385.063361][T18310] __x64_sys_ioctl+0x7b/0x90 [ 385.067959][T18310] do_syscall_64+0x31/0x40 [ 385.072386][T18310] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 385.078282][T18310] RIP: 0033:0x7f7ae6e31749 [ 385.082706][T18310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.102329][T18310] RSP: 002b:00007f7ae5899038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 385.110895][T18310] RAX: ffffffffffffffda RBX: 00007f7ae7087fa0 RCX: 00007f7ae6e31749 [ 385.118877][T18310] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 385.127072][T18310] RBP: 00007f7ae5899090 R08: 0000000000000000 R09: 0000000000000000 [ 385.135053][T18310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 385.143032][T18310] R13: 00007f7ae7088038 R14: 00007f7ae7087fa0 R15: 00007ffd86e93388 [ 385.239798][T18326] device veth1_macvtap entered promiscuous mode [ 385.246177][T18326] device macsec0 entered promiscuous mode [ 385.260444][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.363363][T18336] tap0: tun_chr_ioctl cmd 2147767521 [ 385.466412][T18354] device pim6reg1 entered promiscuous mode [ 385.555904][T18362] device sit0 left promiscuous mode [ 385.582515][T18359] device veth1_macvtap entered promiscuous mode [ 385.588992][T18359] device macsec0 entered promiscuous mode [ 385.595867][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.652237][T18362] device sit0 entered promiscuous mode [ 385.657768][T18368] FAULT_INJECTION: forcing a failure. [ 385.657768][T18368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.710747][T18368] CPU: 0 PID: 18368 Comm: syz.4.5141 Tainted: G W syzkaller #0 [ 385.719636][T18368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 385.729698][T18368] Call Trace: [ 385.733009][T18368] __dump_stack+0x21/0x24 [ 385.737357][T18368] dump_stack_lvl+0x169/0x1d8 [ 385.742053][T18368] ? show_regs_print_info+0x18/0x18 [ 385.747264][T18368] dump_stack+0x15/0x1c [ 385.751431][T18368] should_fail+0x3c1/0x510 [ 385.755853][T18368] should_fail_alloc_page+0x4f/0x60 [ 385.761060][T18368] __alloc_pages_nodemask+0x109/0x5f0 [ 385.766454][T18368] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 385.772009][T18368] ? sched_clock+0x3a/0x40 [ 385.776434][T18368] ? sched_clock_cpu+0x1b/0x3d0 [ 385.781332][T18368] ? sched_clock+0x3a/0x40 [ 385.785758][T18368] ? sched_clock_cpu+0x1b/0x3d0 [ 385.790618][T18368] shmem_alloc_page+0x1b1/0x300 [ 385.795479][T18368] ? put_page+0xd0/0xd0 [ 385.799661][T18368] ? percpu_counter_add_batch+0x13c/0x160 [ 385.805392][T18368] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 385.811038][T18368] ? shmem_swapin_page+0x16c0/0x16c0 [ 385.816345][T18368] ? xas_load+0x28b/0x2a0 [ 385.820688][T18368] ? find_get_entry+0x366/0x3c0 [ 385.825549][T18368] ? page_cache_prev_miss+0x270/0x270 [ 385.830962][T18368] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 385.836879][T18368] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 385.842531][T18368] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 385.848358][T18368] ? __kasan_check_write+0x14/0x20 [ 385.853480][T18368] ? _raw_spin_lock_irq+0x8f/0xe0 [ 385.858515][T18368] ? find_lock_entry+0x4b/0x200 [ 385.863377][T18368] ? shmem_getpage_gfp+0x8f3/0x2110 [ 385.868584][T18368] shmem_getpage_gfp+0x625/0x2110 [ 385.873626][T18368] shmem_fallocate+0x817/0xc20 [ 385.878394][T18368] ? avc_ss_reset+0x280/0x280 [ 385.883080][T18368] ? shmem_mmap+0x200/0x200 [ 385.887594][T18368] ? avc_policy_seqno+0x1b/0x70 [ 385.892458][T18368] ? selinux_file_permission+0x2a5/0x510 [ 385.898110][T18368] ? fsnotify_perm+0x66/0x4b0 [ 385.902779][T18368] ? preempt_count_add+0x90/0x1b0 [ 385.907793][T18368] vfs_fallocate+0x4b4/0x590 [ 385.912383][T18368] do_vfs_ioctl+0x12e3/0x1510 [ 385.917048][T18368] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 385.922666][T18368] ? has_cap_mac_admin+0x330/0x330 [ 385.927771][T18368] ? lapic_next_event+0x5f/0x70 [ 385.932616][T18368] ? selinux_file_ioctl+0x377/0x480 [ 385.937820][T18368] ? selinux_file_alloc_security+0x120/0x120 [ 385.943795][T18368] ? __fget_files+0x2c4/0x320 [ 385.948467][T18368] ? security_file_ioctl+0x84/0xa0 [ 385.953586][T18368] __se_sys_ioctl+0x9f/0x1a0 [ 385.958166][T18368] __x64_sys_ioctl+0x7b/0x90 [ 385.962750][T18368] do_syscall_64+0x31/0x40 [ 385.967156][T18368] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 385.973066][T18368] RIP: 0033:0x7f7be7231749 [ 385.977477][T18368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.997070][T18368] RSP: 002b:00007f7be5c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 386.005473][T18368] RAX: ffffffffffffffda RBX: 00007f7be7487fa0 RCX: 00007f7be7231749 [ 386.013432][T18368] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 386.021395][T18368] RBP: 00007f7be5c99090 R08: 0000000000000000 R09: 0000000000000000 [ 386.029355][T18368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.037317][T18368] R13: 00007f7be7488038 R14: 00007f7be7487fa0 R15: 00007ffcd984fb08 [ 387.672614][T18465] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 387.718310][T18465] syzkaller0: linktype set to 773 [ 388.270684][T18472] ªªªªªª: renamed from vlan0 [ 388.318957][T18472] device macsec0 left promiscuous mode [ 388.324953][T18472] device veth1_macvtap entered promiscuous mode [ 388.331906][T18472] device macsec0 entered promiscuous mode [ 388.338219][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.480163][T18495] device sit0 left promiscuous mode [ 388.706578][T18502] device sit0 entered promiscuous mode [ 389.219744][T18522] device sit0 left promiscuous mode [ 389.430352][T18540] device syzkaller0 entered promiscuous mode [ 389.546049][T18554] device sit0 entered promiscuous mode [ 389.927042][T18564] FAULT_INJECTION: forcing a failure. [ 389.927042][T18564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 389.941891][T18564] CPU: 1 PID: 18564 Comm: syz.1.5198 Tainted: G W syzkaller #0 [ 389.950753][T18564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 389.960810][T18564] Call Trace: [ 389.964107][T18564] __dump_stack+0x21/0x24 [ 389.968444][T18564] dump_stack_lvl+0x169/0x1d8 [ 389.973129][T18564] ? show_regs_print_info+0x18/0x18 [ 389.978328][T18564] dump_stack+0x15/0x1c [ 389.982561][T18564] should_fail+0x3c1/0x510 [ 389.986969][T18564] should_fail_alloc_page+0x4f/0x60 [ 389.992156][T18564] __alloc_pages_nodemask+0x109/0x5f0 [ 389.997513][T18564] ? __irq_exit_rcu+0x40/0x150 [ 390.002278][T18564] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 390.007817][T18564] shmem_alloc_page+0x1b1/0x300 [ 390.012655][T18564] ? sched_clock_cpu+0x1b/0x3d0 [ 390.017496][T18564] ? put_page+0xd0/0xd0 [ 390.021652][T18564] ? percpu_counter_add_batch+0x68/0x160 [ 390.027277][T18564] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 390.032919][T18564] ? shmem_swapin_page+0x16c0/0x16c0 [ 390.038193][T18564] ? xas_load+0x28b/0x2a0 [ 390.042535][T18564] ? find_get_entry+0x366/0x3c0 [ 390.047380][T18564] ? page_cache_prev_miss+0x270/0x270 [ 390.052830][T18564] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 390.058713][T18564] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 390.064350][T18564] ? __kasan_check_write+0x14/0x20 [ 390.069467][T18564] ? _raw_spin_lock_irq+0x8f/0xe0 [ 390.074501][T18564] ? find_lock_entry+0x4b/0x200 [ 390.079338][T18564] ? shmem_getpage_gfp+0x8f3/0x2110 [ 390.084526][T18564] shmem_getpage_gfp+0x625/0x2110 [ 390.089545][T18564] shmem_fallocate+0x817/0xc20 [ 390.094293][T18564] ? avc_ss_reset+0x280/0x280 [ 390.098960][T18564] ? shmem_mmap+0x200/0x200 [ 390.103453][T18564] ? avc_policy_seqno+0x1b/0x70 [ 390.108303][T18564] ? selinux_file_permission+0x2a5/0x510 [ 390.113924][T18564] ? fsnotify_perm+0x66/0x4b0 [ 390.118593][T18564] ? preempt_count_add+0x90/0x1b0 [ 390.123606][T18564] vfs_fallocate+0x4b4/0x590 [ 390.128182][T18564] do_vfs_ioctl+0x12e3/0x1510 [ 390.132857][T18564] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 390.138482][T18564] ? has_cap_mac_admin+0x330/0x330 [ 390.143669][T18564] ? sched_clock+0x3a/0x40 [ 390.148104][T18564] ? sched_clock_cpu+0x1b/0x3d0 [ 390.152950][T18564] ? sched_clock_cpu+0x1b/0x3d0 [ 390.157791][T18564] ? selinux_file_ioctl+0x377/0x480 [ 390.162977][T18564] ? selinux_file_alloc_security+0x120/0x120 [ 390.168947][T18564] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 390.174744][T18564] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 390.180912][T18564] ? security_file_ioctl+0x84/0xa0 [ 390.186010][T18564] __se_sys_ioctl+0x9f/0x1a0 [ 390.190584][T18564] __x64_sys_ioctl+0x7b/0x90 [ 390.195165][T18564] do_syscall_64+0x31/0x40 [ 390.199569][T18564] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 390.205444][T18564] RIP: 0033:0x7fae5f47d749 [ 390.209846][T18564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.229550][T18564] RSP: 002b:00007fae5dee5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 390.237960][T18564] RAX: ffffffffffffffda RBX: 00007fae5f6d3fa0 RCX: 00007fae5f47d749 [ 390.245942][T18564] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 390.253906][T18564] RBP: 00007fae5dee5090 R08: 0000000000000000 R09: 0000000000000000 [ 390.261872][T18564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 390.269836][T18564] R13: 00007fae5f6d4038 R14: 00007fae5f6d3fa0 R15: 00007ffecc0064f8 [ 390.582595][T18610] FAULT_INJECTION: forcing a failure. [ 390.582595][T18610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 390.604367][T18610] CPU: 1 PID: 18610 Comm: syz.1.5212 Tainted: G W syzkaller #0 [ 390.613284][T18610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 390.623344][T18610] Call Trace: [ 390.626655][T18610] __dump_stack+0x21/0x24 [ 390.630987][T18610] dump_stack_lvl+0x169/0x1d8 [ 390.635688][T18610] ? show_regs_print_info+0x18/0x18 [ 390.640890][T18610] ? sched_clock+0x3a/0x40 [ 390.645312][T18610] dump_stack+0x15/0x1c [ 390.649469][T18610] should_fail+0x3c1/0x510 [ 390.653894][T18610] should_fail_alloc_page+0x4f/0x60 [ 390.659096][T18610] __alloc_pages_nodemask+0x109/0x5f0 [ 390.664477][T18610] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 390.670038][T18610] shmem_alloc_page+0x1b1/0x300 [ 390.674901][T18610] ? put_page+0xd0/0xd0 [ 390.679071][T18610] ? percpu_counter_add_batch+0x13c/0x160 [ 390.684805][T18610] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 390.690443][T18610] ? shmem_swapin_page+0x16c0/0x16c0 [ 390.695735][T18610] ? xas_load+0x28b/0x2a0 [ 390.700077][T18610] ? find_get_entry+0x366/0x3c0 [ 390.704933][T18610] ? page_cache_prev_miss+0x270/0x270 [ 390.710326][T18610] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 390.716227][T18610] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 390.721872][T18610] ? __kasan_check_write+0x14/0x20 [ 390.727002][T18610] ? _raw_spin_lock_irq+0x8f/0xe0 [ 390.732032][T18610] ? find_lock_entry+0x4b/0x200 [ 390.736878][T18610] ? shmem_getpage_gfp+0x8f3/0x2110 [ 390.742072][T18610] shmem_getpage_gfp+0x625/0x2110 [ 390.747094][T18610] shmem_fallocate+0x817/0xc20 [ 390.751840][T18610] ? sched_clock+0x3a/0x40 [ 390.756242][T18610] ? shmem_mmap+0x200/0x200 [ 390.760738][T18610] ? __irq_exit_rcu+0x40/0x150 [ 390.765498][T18610] ? irq_exit_rcu+0x9/0x10 [ 390.769908][T18610] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 390.775704][T18610] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 390.781853][T18610] ? preempt_count_add+0x90/0x1b0 [ 390.786867][T18610] vfs_fallocate+0x4b4/0x590 [ 390.791534][T18610] do_vfs_ioctl+0x12e3/0x1510 [ 390.796287][T18610] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 390.801906][T18610] ? has_cap_mac_admin+0x330/0x330 [ 390.807016][T18610] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 390.812808][T18610] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 390.818964][T18610] ? selinux_file_ioctl+0x368/0x480 [ 390.824163][T18610] ? selinux_file_ioctl+0x377/0x480 [ 390.829355][T18610] ? mutex_trylock+0xa0/0xa0 [ 390.833934][T18610] ? __fget_files+0x2c4/0x320 [ 390.838601][T18610] ? selinux_file_alloc_security+0x120/0x120 [ 390.844572][T18610] ? __fget_files+0x2c4/0x320 [ 390.849243][T18610] ? security_file_ioctl+0x84/0xa0 [ 390.854346][T18610] __se_sys_ioctl+0x9f/0x1a0 [ 390.858928][T18610] __x64_sys_ioctl+0x7b/0x90 [ 390.863509][T18610] do_syscall_64+0x31/0x40 [ 390.867922][T18610] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 390.873846][T18610] RIP: 0033:0x7fae5f47d749 [ 390.878256][T18610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.897851][T18610] RSP: 002b:00007fae5dee5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 390.906256][T18610] RAX: ffffffffffffffda RBX: 00007fae5f6d3fa0 RCX: 00007fae5f47d749 [ 390.914221][T18610] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 390.922193][T18610] RBP: 00007fae5dee5090 R08: 0000000000000000 R09: 0000000000000000 [ 390.930150][T18610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 390.938120][T18610] R13: 00007fae5f6d4038 R14: 00007fae5f6d3fa0 R15: 00007ffecc0064f8 [ 391.849469][T18660] FAULT_INJECTION: forcing a failure. [ 391.849469][T18660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 391.886188][T18660] CPU: 1 PID: 18660 Comm: syz.3.5226 Tainted: G W syzkaller #0 [ 391.895071][T18660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 391.905153][T18660] Call Trace: [ 391.908463][T18660] __dump_stack+0x21/0x24 [ 391.912802][T18660] dump_stack_lvl+0x169/0x1d8 [ 391.917489][T18660] ? show_regs_print_info+0x18/0x18 [ 391.922709][T18660] dump_stack+0x15/0x1c [ 391.926872][T18660] should_fail+0x3c1/0x510 [ 391.931307][T18660] should_fail_alloc_page+0x4f/0x60 [ 391.936600][T18660] __alloc_pages_nodemask+0x109/0x5f0 [ 391.941989][T18660] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 391.947545][T18660] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 391.953715][T18660] shmem_alloc_page+0x1b1/0x300 [ 391.958577][T18660] ? put_page+0xd0/0xd0 [ 391.962748][T18660] ? percpu_counter_add_batch+0x13c/0x160 [ 391.968481][T18660] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 391.974109][T18660] ? shmem_swapin_page+0x16c0/0x16c0 [ 391.979388][T18660] ? xas_load+0x28b/0x2a0 [ 391.983885][T18660] ? find_get_entry+0x366/0x3c0 [ 391.988727][T18660] ? page_cache_prev_miss+0x270/0x270 [ 391.994088][T18660] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 391.999991][T18660] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 392.005624][T18660] ? __kasan_check_write+0x14/0x20 [ 392.010724][T18660] ? _raw_spin_lock_irq+0x8f/0xe0 [ 392.015741][T18660] ? find_lock_entry+0x4b/0x200 [ 392.020587][T18660] ? shmem_getpage_gfp+0x8f3/0x2110 [ 392.025776][T18660] shmem_getpage_gfp+0x625/0x2110 [ 392.030795][T18660] shmem_fallocate+0x817/0xc20 [ 392.035637][T18660] ? avc_ss_reset+0x280/0x280 [ 392.040321][T18660] ? shmem_mmap+0x200/0x200 [ 392.044817][T18660] ? avc_policy_seqno+0x1b/0x70 [ 392.049832][T18660] ? selinux_file_permission+0x2a5/0x510 [ 392.055468][T18660] ? fsnotify_perm+0x66/0x4b0 [ 392.060225][T18660] ? preempt_count_add+0x90/0x1b0 [ 392.065243][T18660] vfs_fallocate+0x4b4/0x590 [ 392.069821][T18660] do_vfs_ioctl+0x12e3/0x1510 [ 392.074490][T18660] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 392.080111][T18660] ? has_cap_mac_admin+0x330/0x330 [ 392.085211][T18660] ? __kasan_slab_free+0x11/0x20 [ 392.090144][T18660] ? selinux_file_ioctl+0x377/0x480 [ 392.095326][T18660] ? mutex_trylock+0xa0/0xa0 [ 392.099903][T18660] ? __fget_files+0x2c4/0x320 [ 392.104569][T18660] ? selinux_file_alloc_security+0x120/0x120 [ 392.110543][T18660] ? __fget_files+0x2c4/0x320 [ 392.115299][T18660] ? security_file_ioctl+0x84/0xa0 [ 392.120399][T18660] __se_sys_ioctl+0x9f/0x1a0 [ 392.124995][T18660] __x64_sys_ioctl+0x7b/0x90 [ 392.129586][T18660] do_syscall_64+0x31/0x40 [ 392.133993][T18660] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 392.139880][T18660] RIP: 0033:0x7f3eeedb9749 [ 392.144287][T18660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.163890][T18660] RSP: 002b:00007f3eed821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 392.172300][T18660] RAX: ffffffffffffffda RBX: 00007f3eef00ffa0 RCX: 00007f3eeedb9749 [ 392.180275][T18660] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 392.188242][T18660] RBP: 00007f3eed821090 R08: 0000000000000000 R09: 0000000000000000 [ 392.196245][T18660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 392.204204][T18660] R13: 00007f3eef010038 R14: 00007f3eef00ffa0 R15: 00007ffdb309fca8 [ 393.342655][T18706] FAULT_INJECTION: forcing a failure. [ 393.342655][T18706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 393.448871][T18706] CPU: 0 PID: 18706 Comm: syz.4.5241 Tainted: G W syzkaller #0 [ 393.457755][T18706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 393.467820][T18706] Call Trace: [ 393.471125][T18706] __dump_stack+0x21/0x24 [ 393.475462][T18706] dump_stack_lvl+0x169/0x1d8 [ 393.480143][T18706] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 393.486304][T18706] ? show_regs_print_info+0x18/0x18 [ 393.491505][T18706] ? dump_stack+0x9/0x1c [ 393.495752][T18706] dump_stack+0x15/0x1c [ 393.499915][T18706] should_fail+0x3c1/0x510 [ 393.504338][T18706] should_fail_alloc_page+0x4f/0x60 [ 393.509537][T18706] __alloc_pages_nodemask+0x109/0x5f0 [ 393.514914][T18706] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 393.520460][T18706] ? __this_cpu_preempt_check+0x13/0x20 [ 393.526019][T18706] ? __perf_event_task_sched_in+0x1fb/0x280 [ 393.531921][T18706] shmem_alloc_page+0x1b1/0x300 [ 393.536770][T18706] ? put_page+0xd0/0xd0 [ 393.540922][T18706] ? sched_clock+0x3a/0x40 [ 393.545362][T18706] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 393.551163][T18706] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 393.557317][T18706] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 393.562966][T18706] ? shmem_swapin_page+0x16c0/0x16c0 [ 393.568256][T18706] ? xas_load+0x28b/0x2a0 [ 393.572590][T18706] ? find_get_entry+0x366/0x3c0 [ 393.577446][T18706] ? page_cache_prev_miss+0x270/0x270 [ 393.582817][T18706] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 393.588730][T18706] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 393.594362][T18706] ? sched_clock+0x3a/0x40 [ 393.598782][T18706] ? __kasan_check_write+0x14/0x20 [ 393.603898][T18706] ? _raw_spin_lock_irq+0x8f/0xe0 [ 393.608925][T18706] ? find_lock_entry+0x4b/0x200 [ 393.613777][T18706] ? shmem_getpage_gfp+0x8f3/0x2110 [ 393.618994][T18706] shmem_getpage_gfp+0x625/0x2110 [ 393.624039][T18706] shmem_fallocate+0x817/0xc20 [ 393.628810][T18706] ? avc_ss_reset+0x280/0x280 [ 393.633493][T18706] ? shmem_mmap+0x200/0x200 [ 393.637998][T18706] ? avc_policy_seqno+0x1b/0x70 [ 393.642858][T18706] ? selinux_file_permission+0x2a5/0x510 [ 393.648492][T18706] ? fsnotify_perm+0x66/0x4b0 [ 393.653169][T18706] ? preempt_count_add+0x90/0x1b0 [ 393.658204][T18706] vfs_fallocate+0x4b4/0x590 [ 393.662793][T18706] do_vfs_ioctl+0x12e3/0x1510 [ 393.667470][T18706] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 393.673106][T18706] ? has_cap_mac_admin+0x330/0x330 [ 393.678227][T18706] ? __irq_exit_rcu+0x40/0x150 [ 393.682997][T18706] ? selinux_file_ioctl+0x377/0x480 [ 393.688201][T18706] ? selinux_file_alloc_security+0x120/0x120 [ 393.694180][T18706] ? __fget_files+0x2c4/0x320 [ 393.698871][T18706] ? security_file_ioctl+0x84/0xa0 [ 393.703979][T18706] __se_sys_ioctl+0x9f/0x1a0 [ 393.708572][T18706] __x64_sys_ioctl+0x7b/0x90 [ 393.713166][T18706] do_syscall_64+0x31/0x40 [ 393.717584][T18706] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 393.723476][T18706] RIP: 0033:0x7f7be7231749 [ 393.727900][T18706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.747532][T18706] RSP: 002b:00007f7be5c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 393.755948][T18706] RAX: ffffffffffffffda RBX: 00007f7be7487fa0 RCX: 00007f7be7231749 [ 393.763923][T18706] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 393.771898][T18706] RBP: 00007f7be5c99090 R08: 0000000000000000 R09: 0000000000000000 [ 393.779876][T18706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 393.787851][T18706] R13: 00007f7be7488038 R14: 00007f7be7487fa0 R15: 00007ffcd984fb08 [ 394.593208][T18742] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 395.270297][T18753] device syzkaller0 entered promiscuous mode [ 396.277283][T18760] FAULT_INJECTION: forcing a failure. [ 396.277283][T18760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 396.312440][T18760] CPU: 0 PID: 18760 Comm: syz.4.5255 Tainted: G W syzkaller #0 [ 396.321316][T18760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 396.331371][T18760] Call Trace: [ 396.334663][T18760] __dump_stack+0x21/0x24 [ 396.338986][T18760] dump_stack_lvl+0x169/0x1d8 [ 396.343652][T18760] ? show_regs_print_info+0x18/0x18 [ 396.348867][T18760] dump_stack+0x15/0x1c [ 396.353012][T18760] should_fail+0x3c1/0x510 [ 396.357625][T18760] should_fail_alloc_page+0x4f/0x60 [ 396.362806][T18760] __alloc_pages_nodemask+0x109/0x5f0 [ 396.368168][T18760] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 396.373711][T18760] ? sched_clock+0x3a/0x40 [ 396.378125][T18760] ? sched_clock_cpu+0x1b/0x3d0 [ 396.382961][T18760] ? sched_clock+0x3a/0x40 [ 396.387360][T18760] ? sched_clock_cpu+0x1b/0x3d0 [ 396.392204][T18760] shmem_alloc_page+0x1b1/0x300 [ 396.397058][T18760] ? put_page+0xd0/0xd0 [ 396.401211][T18760] ? percpu_counter_add_batch+0x13c/0x160 [ 396.406928][T18760] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 396.412555][T18760] ? shmem_swapin_page+0x16c0/0x16c0 [ 396.417832][T18760] ? xas_load+0x28b/0x2a0 [ 396.422171][T18760] ? find_get_entry+0x366/0x3c0 [ 396.427021][T18760] ? page_cache_prev_miss+0x270/0x270 [ 396.432391][T18760] ? pagevec_add_and_need_flush+0x198/0x2e0 [ 396.438286][T18760] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 396.443912][T18760] ? sched_clock+0x3a/0x40 [ 396.448324][T18760] ? __kasan_check_write+0x14/0x20 [ 396.453425][T18760] ? _raw_spin_lock_irq+0x8f/0xe0 [ 396.458444][T18760] ? find_lock_entry+0x4b/0x200 [ 396.463281][T18760] ? shmem_getpage_gfp+0x8f3/0x2110 [ 396.468480][T18760] shmem_getpage_gfp+0x625/0x2110 [ 396.473507][T18760] shmem_fallocate+0x817/0xc20 [ 396.478263][T18760] ? avc_ss_reset+0x280/0x280 [ 396.482950][T18760] ? shmem_mmap+0x200/0x200 [ 396.487444][T18760] ? avc_policy_seqno+0x1b/0x70 [ 396.492309][T18760] ? selinux_file_permission+0x2a5/0x510 [ 396.497929][T18760] ? fsnotify_perm+0x66/0x4b0 [ 396.502596][T18760] ? preempt_count_add+0x90/0x1b0 [ 396.507611][T18760] vfs_fallocate+0x4b4/0x590 [ 396.512190][T18760] do_vfs_ioctl+0x12e3/0x1510 [ 396.516856][T18760] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 396.522498][T18760] ? has_cap_mac_admin+0x330/0x330 [ 396.527601][T18760] ? selinux_file_ioctl+0x377/0x480 [ 396.532783][T18760] ? mutex_trylock+0xa0/0xa0 [ 396.537358][T18760] ? __fget_files+0x2c4/0x320 [ 396.542025][T18760] ? selinux_file_alloc_security+0x120/0x120 [ 396.547991][T18760] ? __fget_files+0x2c4/0x320 [ 396.552670][T18760] ? security_file_ioctl+0x84/0xa0 [ 396.557766][T18760] __se_sys_ioctl+0x9f/0x1a0 [ 396.562370][T18760] __x64_sys_ioctl+0x7b/0x90 [ 396.566951][T18760] do_syscall_64+0x31/0x40 [ 396.571359][T18760] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 396.577323][T18760] RIP: 0033:0x7f7be7231749 [ 396.581731][T18760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.601328][T18760] RSP: 002b:00007f7be5c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.609834][T18760] RAX: ffffffffffffffda RBX: 00007f7be7487fa0 RCX: 00007f7be7231749 [ 396.617794][T18760] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 396.625755][T18760] RBP: 00007f7be5c99090 R08: 0000000000000000 R09: 0000000000000000 [ 396.633715][T18760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 396.641685][T18760] R13: 00007f7be7488038 R14: 00007f7be7487fa0 R15: 00007ffcd984fb08 [ 397.238481][T18818] FAULT_INJECTION: forcing a failure. [ 397.238481][T18818] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 397.372601][T18818] CPU: 0 PID: 18818 Comm: syz.4.5271 Tainted: G W syzkaller #0 [ 397.381531][T18818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 397.391613][T18818] Call Trace: [ 397.394914][T18818] __dump_stack+0x21/0x24 [ 397.399248][T18818] dump_stack_lvl+0x169/0x1d8 [ 397.403960][T18818] ? show_regs_print_info+0x18/0x18 [ 397.409165][T18818] ? kvm_sched_clock_read+0x18/0x40 [ 397.414363][T18818] ? sched_clock_cpu+0x1b/0x3d0 [ 397.419225][T18818] dump_stack+0x15/0x1c [ 397.423389][T18818] should_fail+0x3c1/0x510 [ 397.427808][T18818] should_fail_alloc_page+0x4f/0x60 [ 397.433107][T18818] __alloc_pages_nodemask+0x109/0x5f0 [ 397.438486][T18818] ? irq_exit_rcu+0x9/0x10 [ 397.442919][T18818] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 397.448480][T18818] ? avc_lookup+0x33/0x2e0 [ 397.452906][T18818] shmem_alloc_page+0x1b1/0x300 [ 397.457767][T18818] ? put_page+0xd0/0xd0 [ 397.461940][T18818] ? percpu_counter_add_batch+0x13c/0x160 [ 397.467672][T18818] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 397.473329][T18818] ? shmem_swapin_page+0x16c0/0x16c0 [ 397.478641][T18818] ? xas_load+0x28b/0x2a0 [ 397.482994][T18818] ? find_get_entry+0x366/0x3c0 [ 397.487857][T18818] ? page_cache_prev_miss+0x270/0x270 [ 397.493245][T18818] ? sched_clock+0x3a/0x40 [ 397.497675][T18818] ? sched_clock_cpu+0x1b/0x3d0 [ 397.502544][T18818] ? sched_clock+0x3a/0x40 [ 397.507000][T18818] ? sched_clock_cpu+0x1b/0x3d0 [ 397.511871][T18818] ? find_lock_entry+0x4b/0x200 [ 397.516732][T18818] shmem_getpage_gfp+0x625/0x2110 [ 397.521763][T18818] shmem_fallocate+0x817/0xc20 [ 397.526519][T18818] ? sched_clock_cpu+0x1b/0x3d0 [ 397.531368][T18818] ? shmem_mmap+0x200/0x200 [ 397.535864][T18818] ? irq_exit_rcu+0x9/0x10 [ 397.540292][T18818] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 397.546441][T18818] ? file_start_write+0xe9/0x180 [ 397.551368][T18818] vfs_fallocate+0x4b4/0x590 [ 397.555948][T18818] do_vfs_ioctl+0x12e3/0x1510 [ 397.560626][T18818] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 397.566355][T18818] ? kvm_sched_clock_read+0x18/0x40 [ 397.571541][T18818] ? sched_clock+0x3a/0x40 [ 397.575944][T18818] ? sched_clock_cpu+0x1b/0x3d0 [ 397.580798][T18818] ? __irq_exit_rcu+0x40/0x150 [ 397.585566][T18818] ? irq_exit_rcu+0x9/0x10 [ 397.589974][T18818] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 397.595771][T18818] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 397.601944][T18818] ? __se_sys_ioctl+0x62/0x1a0 [ 397.606703][T18818] __se_sys_ioctl+0x9f/0x1a0 [ 397.611289][T18818] __x64_sys_ioctl+0x7b/0x90 [ 397.615866][T18818] do_syscall_64+0x31/0x40 [ 397.620270][T18818] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 397.626147][T18818] RIP: 0033:0x7f7be7231749 [ 397.630555][T18818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 397.650145][T18818] RSP: 002b:00007f7be5c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.658542][T18818] RAX: ffffffffffffffda RBX: 00007f7be7487fa0 RCX: 00007f7be7231749 [ 397.666780][T18818] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 397.674744][T18818] RBP: 00007f7be5c99090 R08: 0000000000000000 R09: 0000000000000000 [ 397.682706][T18818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 397.690675][T18818] R13: 00007f7be7488038 R14: 00007f7be7487fa0 R15: 00007ffcd984fb08 [ 398.128869][T18901] device pim6reg1 entered promiscuous mode [ 398.385332][T18929] device wg2 left promiscuous mode [ 398.915480][T18978] device pim6reg1 left promiscuous mode [ 399.019313][T18984] device wg2 left promiscuous mode [ 399.112344][T18984] device wg2 entered promiscuous mode [ 399.432073][T18984] device syzkaller0 entered promiscuous mode [ 399.770728][T19013] ÿ: renamed from bond_slave_0 [ 399.951245][T19025] device sit0 entered promiscuous mode [ 400.328811][T19045] device wg2 left promiscuous mode [ 400.344302][T19046] device wg2 entered promiscuous mode [ 400.625450][T19096] device wg2 left promiscuous mode [ 401.099008][T19108] device veth0_vlan left promiscuous mode [ 401.130561][T19108] device veth0_vlan entered promiscuous mode [ 401.165471][T19105] device wg2 entered promiscuous mode [ 401.187591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.196243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.204506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.368094][T19121] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.377511][T19121] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.705847][T19209] device veth1_macvtap entered promiscuous mode [ 415.722391][T19209] device macsec0 entered promiscuous mode [ 415.758864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 416.074863][ T24] audit: type=1400 audit(1763897685.000:174): avc: denied { create } for pid=19242 comm="syz.3.5395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 416.382929][T19258] device wg2 left promiscuous mode [ 416.706600][T19275] device syzkaller0 entered promiscuous mode [ 416.791272][T19294] syz.1.5410[19294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.791343][T19294] syz.1.5410[19294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.818896][T19293] device veth0_vlan left promiscuous mode [ 416.917728][T19293] device veth0_vlan entered promiscuous mode [ 417.021440][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.046142][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 417.054445][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.064767][T19294] device pim6reg1 entered promiscuous mode [ 417.168903][T19304] device syzkaller0 entered promiscuous mode [ 418.179174][T19358] device pim6reg1 entered promiscuous mode [ 419.217802][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.281146][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 419.303323][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 419.498984][T19440] device sit0 left promiscuous mode [ 419.646511][T19445] device sit0 entered promiscuous mode [ 419.749345][T19455] device syzkaller0 entered promiscuous mode [ 420.098474][T19482] device wg2 entered promiscuous mode [ 420.455690][T19512] device syzkaller0 entered promiscuous mode [ 421.698747][T19544] -: renamed from syzkaller0 [ 421.830635][T19554] device syzkaller0 entered promiscuous mode [ 425.039178][T19677] -1: renamed from syzkaller0 [ 425.098567][T19691] device sit0 left promiscuous mode [ 425.170172][T19690] device sit0 entered promiscuous mode [ 426.085140][T19722] syz.4.5537[19722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.085205][T19722] syz.4.5537[19722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.147013][T19730] device pim6reg1 entered promiscuous mode [ 426.728939][T19749] device pim6reg1 left promiscuous mode [ 426.872235][T19752] device wg2 left promiscuous mode [ 426.893149][T19752] device wg2 entered promiscuous mode [ 427.045681][T19759] device veth0_vlan left promiscuous mode [ 427.109210][T19759] device veth0_vlan entered promiscuous mode [ 427.212267][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.257836][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 427.320961][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 428.422687][T19818] device pim6reg1 entered promiscuous mode [ 431.029806][T19905] device wg2 left promiscuous mode [ 431.560589][T19950] device pim6reg1 entered promiscuous mode [ 433.047745][T19982] device syzkaller0 entered promiscuous mode [ 433.104091][T19994] device veth0_vlan left promiscuous mode [ 433.112626][T19994] device veth0_vlan entered promiscuous mode [ 433.173668][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.206758][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 433.228858][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 433.328853][T20002] device wg2 left promiscuous mode [ 433.401420][T20012] device veth1_macvtap left promiscuous mode [ 433.420896][T20012] device macsec0 left promiscuous mode [ 433.970314][T20032] device syzkaller0 entered promiscuous mode [ 434.007096][T20044] device macsec0 entered promiscuous mode [ 434.352691][T20068] device pim6reg1 entered promiscuous mode [ 434.440966][T20085] device syzkaller0 entered promiscuous mode [ 434.524952][T20085] device sit0 left promiscuous mode [ 434.730554][T20098] device sit0 left promiscuous mode [ 434.785441][T20107] device sit0 entered promiscuous mode [ 435.607103][T20182] syz.4.5668[20182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.607159][T20182] syz.4.5668[20182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.803964][T20191] device veth1_to_team entered promiscuous mode [ 436.680990][T20234] ªªªªªª: renamed from vlan0 [ 436.836630][T20242] tap0: tun_chr_ioctl cmd 1074025677 [ 436.861950][T20242] tap0: linktype set to 24 [ 437.020616][T20251] device syzkaller0 entered promiscuous mode [ 437.621460][T20277] device veth0_vlan left promiscuous mode [ 437.634269][T20277] device veth0_vlan entered promiscuous mode [ 437.649464][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.657945][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 437.671182][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 438.041368][T20301] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 438.141833][T20301] device syzkaller0 entered promiscuous mode [ 439.214435][T20336] device veth0_vlan left promiscuous mode [ 439.234890][T20336] device veth0_vlan entered promiscuous mode [ 439.293947][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.341259][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 441.231093][T20447] FAULT_INJECTION: forcing a failure. [ 441.231093][T20447] name failslab, interval 1, probability 0, space 0, times 1 [ 441.254196][T20447] CPU: 0 PID: 20447 Comm: syz.2.5738 Tainted: G W syzkaller #0 [ 441.263156][T20447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 441.273208][T20447] Call Trace: [ 441.276517][T20447] __dump_stack+0x21/0x24 [ 441.280952][T20447] dump_stack_lvl+0x169/0x1d8 [ 441.285636][T20447] ? show_regs_print_info+0x18/0x18 [ 441.290838][T20447] dump_stack+0x15/0x1c [ 441.294999][T20447] should_fail+0x3c1/0x510 [ 441.299418][T20447] ? __alloc_file+0x28/0x320 [ 441.304016][T20447] __should_failslab+0xa4/0xe0 [ 441.308790][T20447] should_failslab+0x9/0x20 [ 441.313298][T20447] kmem_cache_alloc+0x3d/0x2e0 [ 441.318069][T20447] ? _raw_spin_trylock_bh+0x130/0x130 [ 441.323492][T20447] __alloc_file+0x28/0x320 [ 441.327914][T20447] alloc_empty_file+0x97/0x180 [ 441.332696][T20447] alloc_file+0x59/0x540 [ 441.336952][T20447] alloc_file_pseudo+0x17a/0x1f0 [ 441.341896][T20447] ? alloc_empty_file_noaccount+0x80/0x80 [ 441.347609][T20447] ? __kasan_check_write+0x14/0x20 [ 441.352726][T20447] anon_inode_getfile+0xa6/0x180 [ 441.357669][T20447] __se_sys_perf_event_open+0xb6e/0x1b10 [ 441.363308][T20447] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 441.368955][T20447] __x64_sys_perf_event_open+0xbf/0xd0 [ 441.374426][T20447] do_syscall_64+0x31/0x40 [ 441.378939][T20447] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.384834][T20447] RIP: 0033:0x7fb2aeafe749 [ 441.389261][T20447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.408869][T20447] RSP: 002b:00007fb2ad566038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 441.417295][T20447] RAX: ffffffffffffffda RBX: 00007fb2aed54fa0 RCX: 00007fb2aeafe749 [ 441.425281][T20447] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 441.433271][T20447] RBP: 00007fb2ad566090 R08: 0000000000000000 R09: 0000000000000000 [ 441.441405][T20447] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 441.449377][T20447] R13: 00007fb2aed55038 R14: 00007fb2aed54fa0 R15: 00007ffe6d03f6e8 [ 441.879751][T20506] FAULT_INJECTION: forcing a failure. [ 441.879751][T20506] name failslab, interval 1, probability 0, space 0, times 0 [ 441.894176][T20506] CPU: 0 PID: 20506 Comm: syz.2.5756 Tainted: G W syzkaller #0 [ 441.903046][T20506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 441.913099][T20506] Call Trace: [ 441.916397][T20506] __dump_stack+0x21/0x24 [ 441.920729][T20506] dump_stack_lvl+0x169/0x1d8 [ 441.925403][T20506] ? thaw_kernel_threads+0x220/0x220 [ 441.930705][T20506] ? show_regs_print_info+0x18/0x18 [ 441.935918][T20506] dump_stack+0x15/0x1c [ 441.940071][T20506] should_fail+0x3c1/0x510 [ 441.944488][T20506] ? security_file_alloc+0x33/0x120 [ 441.949700][T20506] __should_failslab+0xa4/0xe0 [ 441.954478][T20506] should_failslab+0x9/0x20 [ 441.958987][T20506] kmem_cache_alloc+0x3d/0x2e0 [ 441.963752][T20506] ? __alloc_file+0x28/0x320 [ 441.968351][T20506] security_file_alloc+0x33/0x120 [ 441.973377][T20506] __alloc_file+0xb5/0x320 [ 441.977795][T20506] alloc_empty_file+0x97/0x180 [ 441.982825][T20506] alloc_file+0x59/0x540 [ 441.987067][T20506] alloc_file_pseudo+0x17a/0x1f0 [ 441.992001][T20506] ? alloc_empty_file_noaccount+0x80/0x80 [ 441.997718][T20506] ? __kasan_check_write+0x14/0x20 [ 442.002836][T20506] anon_inode_getfile+0xa6/0x180 [ 442.007775][T20506] __se_sys_perf_event_open+0xb6e/0x1b10 [ 442.013412][T20506] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 442.019059][T20506] __x64_sys_perf_event_open+0xbf/0xd0 [ 442.024518][T20506] do_syscall_64+0x31/0x40 [ 442.028935][T20506] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 442.034830][T20506] RIP: 0033:0x7fb2aeafe749 [ 442.039252][T20506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.058868][T20506] RSP: 002b:00007fb2ad566038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 442.067282][T20506] RAX: ffffffffffffffda RBX: 00007fb2aed54fa0 RCX: 00007fb2aeafe749 [ 442.075254][T20506] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 442.083223][T20506] RBP: 00007fb2ad566090 R08: 0000000000000000 R09: 0000000000000000 [ 442.091220][T20506] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 442.099191][T20506] R13: 00007fb2aed55038 R14: 00007fb2aed54fa0 R15: 00007ffe6d03f6e8 [ 442.659083][T20519] device veth1_macvtap left promiscuous mode [ 442.673928][T20519] device macsec0 left promiscuous mode [ 443.013165][T20552] FAULT_INJECTION: forcing a failure. [ 443.013165][T20552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.028672][T20552] CPU: 1 PID: 20552 Comm: syz.0.5770 Tainted: G W syzkaller #0 [ 443.037531][T20552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 443.047767][T20552] Call Trace: [ 443.051070][T20552] __dump_stack+0x21/0x24 [ 443.055411][T20552] dump_stack_lvl+0x169/0x1d8 [ 443.060100][T20552] ? thaw_kernel_threads+0x220/0x220 [ 443.065385][T20552] ? vsnprintf+0x186d/0x1960 [ 443.069976][T20552] ? show_regs_print_info+0x18/0x18 [ 443.075170][T20552] dump_stack+0x15/0x1c [ 443.079314][T20552] should_fail+0x3c1/0x510 [ 443.083720][T20552] should_fail_usercopy+0x1a/0x20 [ 443.088734][T20552] _copy_to_user+0x20/0x90 [ 443.093151][T20552] simple_read_from_buffer+0xe9/0x160 [ 443.098517][T20552] proc_fail_nth_read+0x19a/0x210 [ 443.103531][T20552] ? proc_fault_inject_write+0x2f0/0x2f0 [ 443.109165][T20552] ? rw_verify_area+0x1c0/0x360 [ 443.114016][T20552] ? proc_fault_inject_write+0x2f0/0x2f0 [ 443.119638][T20552] vfs_read+0x1fe/0xa10 [ 443.123787][T20552] ? __kasan_check_write+0x14/0x20 [ 443.128904][T20552] ? preempt_count_add+0x90/0x1b0 [ 443.133936][T20552] ? kernel_read+0x70/0x70 [ 443.138346][T20552] ? __kasan_check_write+0x14/0x20 [ 443.143444][T20552] ? mutex_lock+0x8c/0xe0 [ 443.147762][T20552] ? mutex_trylock+0xa0/0xa0 [ 443.152351][T20552] ? __fget_files+0x2c4/0x320 [ 443.157038][T20552] ? __fdget_pos+0x2d2/0x380 [ 443.161623][T20552] ? ksys_read+0x71/0x240 [ 443.165953][T20552] ksys_read+0x140/0x240 [ 443.170212][T20552] ? vfs_write+0xd60/0xd60 [ 443.174622][T20552] ? debug_smp_processor_id+0x17/0x20 [ 443.179982][T20552] __x64_sys_read+0x7b/0x90 [ 443.184496][T20552] do_syscall_64+0x31/0x40 [ 443.188902][T20552] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 443.194870][T20552] RIP: 0033:0x7f7ae6e3015c [ 443.199297][T20552] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 443.218899][T20552] RSP: 002b:00007f7ae5899030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 443.227327][T20552] RAX: ffffffffffffffda RBX: 00007f7ae7087fa0 RCX: 00007f7ae6e3015c [ 443.235297][T20552] RDX: 000000000000000f RSI: 00007f7ae58990a0 RDI: 000000000000000a [ 443.243263][T20552] RBP: 00007f7ae5899090 R08: 0000000000000000 R09: 0000000000000000 [ 443.251238][T20552] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 443.259326][T20552] R13: 00007f7ae7088038 R14: 00007f7ae7087fa0 R15: 00007ffd86e93388 [ 443.503168][T20559] ÿÿÿÿÿÿ: renamed from vlan1 [ 444.448210][T20604] device veth0_vlan left promiscuous mode [ 444.485999][T20604] device veth0_vlan entered promiscuous mode [ 445.338457][T20650] device veth0_vlan left promiscuous mode [ 445.344687][T20650] device veth0_vlan entered promiscuous mode [ 445.469444][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.477946][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.485770][T19110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 445.891977][T20659] device wg2 entered promiscuous mode [ 446.136851][T20660] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.144370][T20660] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.151945][T20660] device bridge_slave_0 entered promiscuous mode [ 446.193846][T20660] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.201013][T20660] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.208515][T20660] device bridge_slave_1 entered promiscuous mode [ 446.596258][T20660] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.603352][T20660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.610649][T20660] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.617678][T20660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.645712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 446.661752][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.673784][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.803192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 446.852319][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.859411][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.867249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 446.875970][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.883052][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.930280][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 446.939358][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 447.056338][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 447.066913][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 447.075066][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.129498][T20660] device veth0_vlan entered promiscuous mode [ 447.150638][T20660] device veth1_macvtap entered promiscuous mode [ 447.168258][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 447.198886][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.215118][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 447.228537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 447.236739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 447.422756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 447.436144][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 447.444707][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 447.452981][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 447.592370][T20715] device sit0 left promiscuous mode [ 447.608825][T20715] device sit0 entered promiscuous mode [ 448.120796][ T366] device veth0_vlan left promiscuous mode [ 448.627312][T20739] device sit0 entered promiscuous mode [ 451.267338][T20931] device veth0_vlan left promiscuous mode [ 451.277030][T20931] device veth0_vlan entered promiscuous mode [ 451.350162][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.381175][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 451.495391][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.606279][T20946] syz.1.5877[20946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.606339][T20946] syz.1.5877[20946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.778037][T20946] device wg2 left promiscuous mode [ 451.861873][T20950] device syzkaller0 entered promiscuous mode [ 452.354747][T20976] device veth0_vlan left promiscuous mode [ 452.370844][T20976] device veth0_vlan entered promiscuous mode [ 453.619565][T21054] device sit0 entered promiscuous mode [ 455.464534][T21150] device sit0 left promiscuous mode [ 455.609267][T21154] device sit0 entered promiscuous mode [ 455.881044][T21183] device sit0 left promiscuous mode [ 455.896562][T21183] device sit0 entered promiscuous mode [ 456.406107][T21206] syz.1.5949[21206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.406169][T21206] syz.1.5949[21206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.857057][T21316] device syzkaller0 entered promiscuous mode [ 459.010444][T21332] syz.1.5984[21332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.010531][T21332] syz.1.5984[21332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.543673][T21350] tap0: tun_chr_ioctl cmd 2147767521 [ 459.765453][T21352] device syzkaller0 entered promiscuous mode [ 461.467429][T21441] device veth1_macvtap left promiscuous mode [ 461.489510][T21441] device macsec0 left promiscuous mode [ 461.552333][T21441] device sit0 left promiscuous mode [ 461.902159][T21480] device pim6reg1 entered promiscuous mode [ 464.000109][T21592] device pim6reg1 entered promiscuous mode [ 464.799204][T21630] device syzkaller0 entered promiscuous mode [ 465.127562][T21661] device pim6reg1 entered promiscuous mode [ 465.582208][T21683] device syzkaller0 entered promiscuous mode [ 466.891718][T21736] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.899071][T21736] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.906636][T21736] device bridge_slave_0 entered promiscuous mode [ 466.913857][T21736] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.923942][T21736] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.931539][T21736] device bridge_slave_1 entered promiscuous mode [ 467.066477][T21744] device veth0_vlan left promiscuous mode [ 467.074189][T21744] device veth0_vlan entered promiscuous mode [ 467.092765][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.101573][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 467.109551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.210471][T21749] device wg2 left promiscuous mode [ 467.276646][T21749] device wg2 entered promiscuous mode [ 467.363378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 467.371672][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 467.387895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 467.396835][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 467.405969][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.413044][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.420536][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 467.430610][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 467.439061][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 467.447285][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.454349][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.507275][T21736] device veth0_vlan entered promiscuous mode [ 467.521191][T21736] device veth1_macvtap entered promiscuous mode [ 467.528520][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 467.553161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.581433][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.604686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.622868][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 467.634960][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 467.643538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 467.713646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 467.726252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 467.735059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 467.743637][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 469.444006][T21815] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.457803][T21815] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.465785][T21815] device bridge_slave_0 entered promiscuous mode [ 469.474408][T21833] device pim6reg1 entered promiscuous mode [ 469.586488][T21815] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.670927][T21815] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.702799][T21815] device bridge_slave_1 entered promiscuous mode [ 470.281061][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 470.333624][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.648301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 470.678755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 470.738390][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.745448][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.858779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 470.898478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 470.938348][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.945405][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.038785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready