last executing test programs: 15.853247803s ago: executing program 0 (id=2559): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0015a6c290000000b703000000000000850000001b000000b7e47c4e1d67202b00000000fdbb0000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0015a6c290000000b703000000000000850000001b000000b7e47c4e1d67202b00000000fdbb0000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001000000", @ANYRES32, @ANYRES32=r2], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000300)="33639ae298", &(0x7f0000000280)=""/40}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x9, 0x3}]}}, 0x0, 0x26}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x9, 0x3}]}}, 0x0, 0x26}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='module_request\x00', r5}, 0x18) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x6, 0x4, 0x1, &(0x7f0000000300)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) (async) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) sendmsg$unix(r6, &(0x7f0000000240)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)="5217a58c7a4fcea82599351f75293c5c391e40ad5fb7513c428b812f1d969e0f3750cea824eadb340434d052402adc0e247586119d831ec1735f82ff6a64bca3be7994d0939553db402281e840e8c4d699f23a9857f81723118fc0c717d54dada856754f929c2f801812868557", 0x6d}, {&(0x7f0000000940)="d6161bf3d0752e5afc6f14f2c2b44d6f9994f32e2c8d1b59fc9e54353c4738dad085d9f953c135a202a2088dcf0068d09bac481c2958a04662f34fa6a9d7845bca49e02a7ac003eeaa2b74b02b80463d573bd918ccfc119736eaa258ce4279b41b4d5384c75933228b4222988a0c235cfc742b7cb296742cafa78158be3fb73752c9d072e82636ef5b4c9b112e6400a568382a01bb065b3483e920aa62b596dac44ab58ba6967e81a5322142ff5377b5164c46e008730fda6cc0f2976412d06ff13d551d1a803c0af0545019a404ea0a09176d8a8efb7187e8439799337a75b52d261a1747fafd13ff0acab8955e606a789dd2aedfa846dc", 0xf8}, {&(0x7f0000000a40)="d24e600ce92ab9fbda1f4849e996cd382629939e9e6bba8696630c6e05707e56543815ca155db01d254352f417c12cb545d51ff5e0d5b9c422ca308cdb3d5d97fc3056aff1bedfe23f96d1d5784adac97128b32245bf2d38a169f9df0c8c177bab48b3ce83503d326ac5095f8bb7636ae484cb39401b0f1e8d2f5f4695e4db3660bd539063169b3c14945bf06270445bf825e2a267d3c2e250670780c680085c533b10db8488991fde9f365717dca5ca5b75cf746a96aad02d62dd8b3c563a720762b940af816783b84abe3d028a73be27e8fd360608ccb17f47dfcc5dc2a5c79b4b40103e046bf8f6ff", 0xea}], 0x3, 0x0, 0x0, 0x40800}, 0x20008005) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 15.768764744s ago: executing program 0 (id=2563): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ebff"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x7, 0xff, 0x0, 0x1000, 0x20848, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x22, 0x80}, 0x80, 0x7, 0x1, 0x4, 0x0, 0x0, 0x6, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xe, 0x1000, 0x2, 0x7, 0x960a, 0x1, 0xa55, '\x00', r2, r3, 0x4, 0x3, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@call={0x85, 0x0, 0x0, 0xa2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x61, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 12.042377777s ago: executing program 0 (id=2563): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ebff"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x7, 0xff, 0x0, 0x1000, 0x20848, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x22, 0x80}, 0x80, 0x7, 0x1, 0x4, 0x0, 0x0, 0x6, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xe, 0x1000, 0x2, 0x7, 0x960a, 0x1, 0xa55, '\x00', r2, r3, 0x4, 0x3, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@call={0x85, 0x0, 0x0, 0xa2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x61, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 8.852527598s ago: executing program 0 (id=2563): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ebff"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x7, 0xff, 0x0, 0x1000, 0x20848, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x22, 0x80}, 0x80, 0x7, 0x1, 0x4, 0x0, 0x0, 0x6, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xe, 0x1000, 0x2, 0x7, 0x960a, 0x1, 0xa55, '\x00', r2, r3, 0x4, 0x3, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@call={0x85, 0x0, 0x0, 0xa2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x61, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 5.66281862s ago: executing program 0 (id=2563): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ebff"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x7, 0xff, 0x0, 0x1000, 0x20848, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x22, 0x80}, 0x80, 0x7, 0x1, 0x4, 0x0, 0x0, 0x6, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xe, 0x1000, 0x2, 0x7, 0x960a, 0x1, 0xa55, '\x00', r2, r3, 0x4, 0x3, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@call={0x85, 0x0, 0x0, 0xa2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x61, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 3.477145372s ago: executing program 1 (id=2689): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x17, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffb}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x401}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000180)='GPL\x00', 0xffffffff, 0xaa, &(0x7f00000001c0)=""/170, 0x41000, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0x1000, 0x1}, 0x10}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='dlm_recv\x00', r1, 0x0, 0xd5ae}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1f, 0x3, 0x3, 0x2621baca, 0xa00, r0, 0xd, '\x00', 0x0, r0, 0x2, 0x2, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x2b, &(0x7f0000000400)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @jmp={0x5, 0x0, 0x6, 0x3, 0x3, 0xc, 0x10}, @map_fd={0x18, 0x3, 0x1, 0x0, 0x1}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000580)='GPL\x00', 0x2, 0xd4, &(0x7f00000005c0)=""/212, 0x40f00, 0x40, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000006c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0xf, 0x80, 0x1ff}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000007c0)=[r0, r0, r0, r0, r0, r3, r0, r0], &(0x7f0000000800)=[{0x5, 0x5, 0xf, 0x7}, {0x4, 0x2, 0x3}, {0x4, 0x5, 0xe, 0xa}, {0x0, 0x2, 0x10, 0xc}, {0x5, 0x4, 0x4, 0xc}, {0x2, 0x1, 0xa, 0xc}, {0x3, 0x4, 0x0, 0xa}], 0x10, 0xf}, 0x94) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x3, 0x80, 0x3, 0x6, 0x9, 0x9, 0x0, 0x9, 0x2000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x19, 0x80000000}, 0x2, 0x5, 0x9eb9, 0x8, 0xc, 0xa42f, 0x4, 0x0, 0x0, 0x0, 0xc}, r0, 0x8, r2, 0x2) r5 = gettid() syz_open_procfs$namespace(r5, &(0x7f00000009c0)='ns/mnt\x00') r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a80)={&(0x7f0000000a40)='reclaim_retry_zone\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ac0)=@o_path={&(0x7f0000000a00)='./file0\x00', 0xffffffffffffffff, 0x4000, r6}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000b00)='reclaim_retry_zone\x00') write$cgroup_subtree(r0, &(0x7f0000000b40)={[{0x16, 'rdma'}, {0x2d, 'blkio'}, {0x15, 'net_cls'}, {0x2d, 'rlimit'}]}, 0x1e) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000e40)={&(0x7f0000000b80)="05de5c8b8279de9c2bf76d40d5e6acea9db1281041ba387b8ecd7f1308c496e33d326f4e", &(0x7f0000000bc0)=""/82, &(0x7f0000000c40)="04a8d790a13e869c0ef0f41df107c85801fa23d0b728b34be154440cad07b9abff0d23406e428e9c342d13d83909f64c3132b5109f33a206c636ef1333c63e3844032caeeec444de65aea435a95ec637956eaad85f35ff157075c535d6dae158af67ced4857724c9c40c107b76b0dcf1ed4e4d84a45f2be2814083f60e879b4eb3b43aab8be74592d4f4db65f03c0a373c6bdd9d11bf34fab9dfdb4d52a24f5602a1a3d02e84e4edf32ef8f3cf62ac23e1c19b991473f27f3f3bbe2469c67d5aedbfb55d1c6c51a2c287cd0252a2699b266c72df02d214d71a7c80beb52a04", &(0x7f0000000d40)="7c8c5f6927cadfb068c6fbc6a7fd42c1f69a7299508e02844045fdb9f9abedc6c4ff84cf7c0dce791a7f40a93cc592d127ff8619095b104c0c1de40e704c3a578e2326d3a1b5315535586f14b46be9f63dec5df742d656ca7fa350df89bca2fea32c9c0d462869af90a3e2801aa9377075d886f2b8388af3422f7c2417a56de8ed4f728b10086bdfbb38276bbf0151ca7ac9abd6ec829cc1f18ffca860c2fca87d62ba5415f7fc0b6fe299eae30d0f7ae9e04f6d935ce0f4e3816a27f575666171c0a5055aaaa25aa4dad0bdd8d94543c7957ad9dba21d", 0x80000001, r3, 0x4}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f00)={r0, 0x58, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000f40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@typedef={0xf}, @const={0xa, 0x0, 0x0, 0xa, 0x5}, @ptr={0xb, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000f80)=""/233, 0x40, 0xe9, 0x0, 0x7, 0x10000, @value=r0}, 0x28) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000010c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', r7, r8, 0x1, 0x3, 0x5}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001280)={0xffffffffffffffff, &(0x7f0000001140)="6840e116bf0e750be80c3a7321afaf992b98f2f491f5b2b91d955d5bdc2deb1fa3a9d72228103b29d7a5944bf90a84298ddf305f8ae4113ad1f6a51aca1f688f7bb4b115874013184d0d9fa29fae2e20bd7f5e9485d8dd54ccc6ce6f518dd317885df07f754f8220b2a0fc42a679fbfd01081f099501999c9df573522f608ed65f74a5aa91777f15c4503a076d6e0d9b94e763cf03ce31f9d05cfa4f62db7d145fdb0e715bd7cafb871563d4998f61ed2fd8576373f2d04a2af4761670873235bcf4fc233f416669a68070f591aea97acada9c974ee2a35a50822889abef27dd8271188a9bd093aa47098b", &(0x7f0000001240)=""/46, 0x4}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001500)={&(0x7f00000012c0)="86312069a013359cf541a790b7", &(0x7f0000001300)=""/181, &(0x7f00000013c0)="dc084793085b7df54dffb54b6268e04e10c9ec2f53ea0a22ae96", &(0x7f0000001400)="562adb85c48cbe8e0124c3815a988613b0ca5eccd6ed4cb4a5b2f7d6cd72d260ac5c07ad85a9dba0b7e674b26752bbddc423fa213f61a0bd1d65df21912d563f0e21dcc66b5dfdb6b07241fd8ff039636f203458229b5d7c6829fd9570f6735a41a24f1df5890468a71c4c7eefd53e14909d2bdc2413b4dc1d367fed5ed3f5999c5d2c479f82555469909daab9cfff82b236e8e9f332a02d030131ed1f727e0689836af6c8f994048b1082d2ff84d731bfbffab00b39722f3176fcaa2dae9e8c6220a5c8499be43c6e99df319f393b3dbb79e1947bfa0bc7dc92d884965d17", 0x4, r4}, 0x38) syz_clone(0x0, &(0x7f0000001540)="a7fef58a16f9be9235396488b8f76171e772c9b82b7e", 0x16, &(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)="6b91fc3416a1507584e2d468999e2abd5924f455fe80ebea2f10765e2b78d9d333f90b359444e198fd33c1dc5da3e9ff") r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000016c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@int={0x2, 0x0, 0x0, 0x1, 0x0, 0x1b, 0x0, 0x1e, 0x6}, @restrict={0xb, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x2e, 0x71, 0x30, 0x5f, 0x30, 0x0, 0x61]}}, &(0x7f0000001680)=""/59, 0x3d, 0x3b, 0x1, 0x2}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x18, 0xff, 0x1, 0x2, 0x8, r9, 0x4, '\x00', r7, r10, 0x2, 0x0, 0x2}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001a00)={&(0x7f0000001780)="f1f3c1937be681a5130af0f3b03b409e3eefc1d6e5fce80d3ec683371061080142e5d678bef000af233d", &(0x7f00000017c0)=""/241, &(0x7f00000018c0)="e67ec5230aef0295dec9db66cf421baf5a6a9d546f56fa4de2dda1599442c218fed066900b9a277ae1b2af1b507f2c2c0f51d73b9d5c331c7b36e33b3139dad3284b4ff3579f03339f60d157069a2ac16b98cb32b87bbd631350bf4b1acb245bbf7711c5afaaea89932a3aadd6eb7bd3f6f33d9681a4d36ef844cd15a40f8bf81b19d4b427c40b08ede7f93b0941adc50aea3dd12115bff56e32c5fbdca4f04752d7e77663bcc02a12be1cc01f0bf539f6", &(0x7f0000001980)="45bb8797297b035e2936cf8c5bae8d38bcf48c374fa713be0f9474cb55017405d345d3e9ece5e5557541105229868cbda4f57b38eb11141b0bcef756463ce54ceddfbb7b42782b0cf007c379e9b4af8ea43c325482116d0942ed765b5237f34905df589b330887348bc497192f4655cc64e5b425c5bbb1d452a077575ce0", 0xa30, r0}, 0x38) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a40)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0xe, '\x00', r7, r10, 0x2, 0x0, 0x2}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000001ac0)={0x0, r11}, 0x8) syz_open_procfs$namespace(r5, &(0x7f0000001b00)='ns/ipc\x00') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001b40)={0x3, 0x4, 0x4, 0xa, 0x0, r11, 0x886b, '\x00', r7, r8, 0x5, 0x0, 0x1}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001cc0)={@map=r11, 0x2b, 0x0, 0x0, &(0x7f0000001bc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c80)=[0x0, 0x0]}, 0x40) ioctl$TUNSETVNETLE(r11, 0x400454dc, &(0x7f0000001d00)) 3.258723536s ago: executing program 1 (id=2690): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000030000000600000000000000000b00000000003000"/51], &(0x7f0000000280)=""/175, 0x33, 0xaf, 0x1, 0xa, 0x10000}, 0x28) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x6}, 0xa28c, 0xc8, 0x0, 0x6, 0x200, 0x511, 0xffff}, 0x0, 0x10, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r10}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xe) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r11 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000340)=@base={0x12, 0xffffffff, 0x0, 0x1ffc, 0x600, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000004000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r12}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x12, 0xc, 0x4, 0x2}, 0x50) 2.456393412s ago: executing program 0 (id=2563): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ebff"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x7, 0xff, 0x0, 0x1000, 0x20848, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x22, 0x80}, 0x80, 0x7, 0x1, 0x4, 0x0, 0x0, 0x6, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xe, 0x1000, 0x2, 0x7, 0x960a, 0x1, 0xa55, '\x00', r2, r3, 0x4, 0x3, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@call={0x85, 0x0, 0x0, 0xa2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x61, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 1.861611484s ago: executing program 1 (id=2698): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, 0x0, 0x0}, 0x94) (async, rerun: 32) socketpair(0x10, 0x5, 0x4, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r0}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2bf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffffe) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) (async, rerun: 32) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) (rerun: 32) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000002c0)='syzkaller\x00') (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000d00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000302"], 0x48) 1.832003204s ago: executing program 1 (id=2702): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f00000001c0)="0d3814fd857da457bc6f55cbbe7e4d84ba8d94b62003b31cd609fee4e37999fc870c087d66b519aa33bae9625000", &(0x7f0000000280), &(0x7f00000002c0)="1ec24c66d3577a152fe6bb5f05014813ab278d5db8f5cfa7f497271285b847c1ad44b44f37d52770071e6330d52492b02d3369761f51dbcb2164806404dd521f78e21ee191ce03ab6049447f7b3a7f302f505bddf3279c6617b31192bb1a181a22cc7a81835c59b658c013e013519059259f514e59de50403395d2", &(0x7f00000003c0)="3d4e2c3e8095cba8d2377d6f8d68c792566961474aefa875da729d44602b53b657249012212a60a11a89e75209e785089c83e12d101dc12f42e4555f0f05be7566869badc9284f9895c8b6d07e1f62a9bf3b6d145197264691809bcb969a25539ecef3", 0x7ff, r2, 0x4}, 0x38) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xfdef) 1.775784225s ago: executing program 2 (id=2703): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = getpid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000e7ffff07850000001700000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000001d00008500000086000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0xfca804a0, 0xe, 0x0, &(0x7f00000002c0)="b8010045c72ce8558525bceb691f", 0x0, 0xd41, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.50934013s ago: executing program 3 (id=2705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200002104"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x6}, 0x10, 0x0, r2}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB='&\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x2000000000000329, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1ffffc8b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='timer_start\x00', r11}, 0x10) 1.498675611s ago: executing program 1 (id=2706): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000280)='skb_copy_datagram_iovec\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 1.433337602s ago: executing program 1 (id=2708): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="a1788eca333de437d7b993ef1877da430100001c0000000000000000682e82445dc624074747449c08bc1d613908bf57c00d2fb203e6a6dfbd7d879832711ce19a662c334d3589eb2a407a3b89db86bb53003cd308bae21a67fc6fccac15a0e6205ab831c5db4f8d92b68155e3a32d4ab1a95bdc0c5b3df85f53d0cadf13f703f481f73620454a51bfdeb96d64bf07bd6e232ccc"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f0000000580)=r3, 0x4) r6 = openat$cgroup_procs(r1, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r7, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000500)=ANY=[@ANYBLOB="9febc88db1010019000000000000000000000000000080000000000000"], 0x0, 0x1a}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x6, 0x3, 0x6, 0x3f, 0x16ab, 0x0, 0x5, 0x0, 0xffff}, r1, 0x1, r4, 0x7) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0xb701, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0300000004000000040000000a0000000000", @ANYRES32=0x1, @ANYBLOB="000000000000761fa1a3660ec1f310306645845a4d9942bd47a86827cd515e31f901e4a576e71488bcc38d84307c9a4c6aa83fc4bfdfdf5ed1f30298c439726ee93ad576c88177a2f505341a980ec6c75ae49d52b8ee5829a5f55618484cbffbfa357da7f150eb0db085f9955af5023fee50d4589c160645b837def0ce614bef2d6d407a59a549a77c4339680a5d5d28aa718ce5010b625223039fcc8445e4cf251dbd390bf6d57e48c92231da58bb0c779bd03ad65d67669fd1923a9074729ec1992dc5febbdca71a02795e2b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000030000000200"/25], 0x50) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) 1.211304306s ago: executing program 4 (id=2709): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="fa69c1647a7dd6e88ba8ceb68e0f7f287d3fbbf1e2c3dd7e42f9e0edb6dbd389db9a89a2786b172936823e78989c8e210f3b45a1ede54ff6b5e0490fa25aea5d10607e123b4e302d11c72b2b5f905352d8ae12c4486acc59c10f9322a7e75e39296a17d3a8f1b823fb99cf763fe3e68a811e8984ab458d5540bda117d28af10247242039e7606917b2532ca6a6a50816a1e72a3b4adc91b9c85f23bcc77f123c351b51f62179aeb73e", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYRESOCT=r1, @ANYRES64=r3], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0xa, 0x1, 0x200000, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES8=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)}, {0x0}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) recvmsg$unix(r3, &(0x7f0000000880)={&(0x7f00000004c0)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/57, 0x39}, {&(0x7f0000000540)=""/63, 0x3f}, {&(0x7f0000000740)=""/108, 0x6c}], 0x3, &(0x7f0000000800)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x68}, 0x40002122) syz_clone(0x5524d980, 0x0, 0x0, 0x0, 0x0, 0x0) 1.113830038s ago: executing program 2 (id=2710): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='fib_table_lookup\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.074937219s ago: executing program 4 (id=2711): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xf5, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x8e, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000b7bb63cf5ecbceb80000", @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000001100a200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020656c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.02905209s ago: executing program 4 (id=2712): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xa20, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) (async) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10, 0x0}, 0x40000) r9 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7, 0x4, 0x8, 0x2, 0x0, 0x4b56, 0x800, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x1, 0x5}, 0x9242, 0x752a, 0x1, 0x3, 0x8001, 0x2, 0xfff4, 0x0, 0x1, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x200) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x62}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000280)=""/195, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe78}, 0x10}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0xf, 0xbb, 0xf, 0x2, 0x0, 0x6, 0x2e500, 0xf, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x40, 0x6575}, 0x60c0, 0xefcc, 0x5, 0x3, 0x9, 0x8, 0x9, 0x0, 0xfffff000}, 0xffffffffffffffff, 0x4, r0, 0xc) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0xfffffffd}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) 991.84278ms ago: executing program 2 (id=2713): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f82818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) write$cgroup_pid(r2, &(0x7f0000000040)=0xffffffffffffffff, 0x12) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@ifindex, 0x11, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup, 0x24, 0x0, 0xffff, &(0x7f0000000000)=[0x0], 0x40e8, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x3, 0xffffff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2280, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x2, 0x1, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000180)=ANY=[@ANYBLOB='-', @ANYRESOCT], 0x27) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8982, &(0x7f0000000080)) 867.748383ms ago: executing program 2 (id=2714): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x2c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00ffffffff000000000000000000e80000000000e3c8fdf126c379b4e92cb1ab55d4a627f8a12d150e3a1f988f9a9cb4", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9000}, 0x10}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x2, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000400040100000900", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x8}, 0x512b, 0x5, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000002240)=""/99}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x1c}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0, 0xc4, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x14, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) 867.296073ms ago: executing program 4 (id=2715): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x20004000) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080), 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x18, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffff7fe}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000340)='cachefiles_ondemand_fd_write\x00', r5, 0x0, 0x1ff}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000400000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) 658.405817ms ago: executing program 3 (id=2716): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000005c0)={[{0x2d, 'net'}, {0x2d, 'io'}, {0x2b, 'net_prio'}, {0x2b, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'net_cls'}, {0x2b, 'net_cls'}]}, 0x31) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0x9, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40000000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed}, @ldst={0x2, 0x3, 0x1, 0x2, 0x4, 0x1, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @ldst={0x0, 0x2, 0x0, 0x5, 0xb, 0x20, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xfffffffa}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000200)='syzkaller\x00', 0x1, 0x2e, &(0x7f0000000280)=""/46, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0xc, 0x4, 0x8}, 0x10, r5, 0x0, 0x8, 0x0, &(0x7f0000000540)=[{0x2, 0x5, 0x0, 0x3}, {0x5, 0x1, 0x1, 0x1}, {0x1, 0x3, 0x0, 0x6}, {0x1, 0x2, 0x4, 0xa}, {0x5, 0x2, 0x5, 0x1}, {0x4, 0x5, 0xf, 0x2}, {0x5, 0x2, 0xd, 0x3}, {0x4, 0x1, 0x1, 0x4}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 395.020472ms ago: executing program 3 (id=2717): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f00000001c0)="0d3814fd857da457bc6f55cbbe7e4d84ba8d94b62003b31cd609fee4e37999fc870c087d66b519aa33bae9625000", &(0x7f0000000280), &(0x7f00000002c0)="1ec24c66d3577a152fe6bb5f05014813ab278d5db8f5cfa7f497271285b847c1ad44b44f37d52770071e6330d52492b02d3369761f51dbcb2164806404dd521f78e21ee191ce03ab6049447f7b3a7f302f505bddf3279c6617b31192bb1a181a22cc7a81835c59b658c013e013519059259f514e59de50403395d2", &(0x7f00000003c0)="3d4e2c3e8095cba8d2377d6f8d68c792566961474aefa875da729d44602b53b657249012212a60a11a89e75209e785089c83e12d101dc12f42e4555f0f05be7566869badc9284f9895c8b6d07e1f62a9bf3b6d145197264691809bcb969a25539ecef3", 0x7ff, r2, 0x4}, 0x38) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xfdef) 244.326915ms ago: executing program 2 (id=2718): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000280)='skb_copy_datagram_iovec\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 242.451125ms ago: executing program 4 (id=2719): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000280)='skb_copy_datagram_iovec\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 234.872435ms ago: executing program 2 (id=2720): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xf03d) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000840)=r5}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, 0x0) r11 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x8, 0xa, &(0x7f00000003c0)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @func, @alu={0xa08a248382a5843d, 0x1, 0xd, 0xa, 0x9}], &(0x7f0000000080)='GPL\x00', 0x0, 0x80, &(0x7f00000005c0)=""/128, 0x41100, 0x0, '\x00', 0x0, @cgroup_skb=0x1, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x10, 0xc}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r9, r9, r4, r6, r9, r7, r11], 0x0, 0x10, 0x74}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) 213.610506ms ago: executing program 4 (id=2721): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"/2813], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1e}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 150.881327ms ago: executing program 3 (id=2722): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x5, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000600)={r2, r0, 0x4, r0}, 0x10) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x26000, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x12, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff466e, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd}, @exit, @generic={0x3, 0xe, 0x9, 0x11b, 0xffffffff}, @ldst={0x0, 0x3, 0x6, 0x14, 0xb, 0xfffffffffffffff3, 0x10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x1000, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x2, 0x46, 0x37e5}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000500)=[{0x3, 0x5, 0x2, 0x6}, {0x0, 0x3, 0x7, 0x65f8982dc09a9320}, {0x4, 0x1, 0xc, 0x3}, {0x3, 0x4, 0x2, 0x1}], 0x10, 0x8}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000500000000000000", @ANYRES32, @ANYBLOB="ff7fff000036b2000000000000000000000000000000df540a0470ffbb85d527318f67866bd1697acf59eeb4547b245b646d40bc3673c70c481903a7c9269e2ba6b52e91299bc426058a52237b7b8df01fc1ba83c54835ee5b760fe2846ac46cbe37e65a894201b3f2fc3af07b700e83aca8744f23fcc6759876b5a3f0", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="03000000020000000200"/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) 366.819µs ago: executing program 3 (id=2723): bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=ANY=[@ANYRES32], 0x48) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001180)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000005740)=ANY=[], 0x0, 0x4a}, 0x28) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe87) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000010000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000009400000094000000040000000f000000020000130d0000000c00000000000000010000000800000007000000020000000f00000000000007000000000800000006000005090000000d00000000000000010000000d00000005000000c90d00000200000000000009000000000000000000010001000000030000000b000000040000000000000005000000002e0000"], &(0x7f0000000240)=""/50, 0xb0, 0x32, 0x0, 0x6}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', r4, r5}, 0x50) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@raw=[@exit, @exit, @ldst={0x2, 0x1, 0x1, 0x8, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x7}, @ldst={0x2, 0x3, 0x6, 0x3, 0x4, 0xfffffffffffffff8, 0x1}, @alu={0x7, 0x1, 0x9, 0x8, 0x8, 0x4, 0xfffffffffffffffc}], &(0x7f0000000440)='GPL\x00', 0x9, 0x36, &(0x7f0000000480)=""/54, 0x41000, 0x0, '\x00', r4, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x2be73, r2, 0x2, 0x0, &(0x7f0000000500)=[{0x2, 0x2, 0xf, 0x6}, {0x5, 0x1, 0xc, 0x7}], 0x10, 0xa}, 0x94) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) (async) socketpair(0xb, 0x3, 0x4, &(0x7f0000000340)) (async) close(r6) 0s ago: executing program 3 (id=2724): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='fib_table_lookup\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.77' (ED25519) to the list of known hosts. [ 22.720429][ T30] audit: type=1400 audit(1756881906.746:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.722088][ T273] cgroup: Unknown subsys name 'net' [ 22.745696][ T30] audit: type=1400 audit(1756881906.746:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.784041][ T30] audit: type=1400 audit(1756881906.786:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.784326][ T273] cgroup: Unknown subsys name 'devices' [ 22.965071][ T273] cgroup: Unknown subsys name 'hugetlb' [ 22.971303][ T273] cgroup: Unknown subsys name 'rlimit' [ 23.232386][ T30] audit: type=1400 audit(1756881907.266:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.258853][ T30] audit: type=1400 audit(1756881907.266:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.287475][ T30] audit: type=1400 audit(1756881907.266:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.298281][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.330021][ T30] audit: type=1400 audit(1756881907.356:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.361332][ T30] audit: type=1400 audit(1756881907.356:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.363579][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.389059][ T30] audit: type=1400 audit(1756881907.386:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.425781][ T30] audit: type=1400 audit(1756881907.386:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.357637][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.366188][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.376561][ T284] device bridge_slave_0 entered promiscuous mode [ 24.388626][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.397236][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.408254][ T284] device bridge_slave_1 entered promiscuous mode [ 24.429400][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.439285][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.448526][ T281] device bridge_slave_0 entered promiscuous mode [ 24.468953][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.477996][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.488447][ T281] device bridge_slave_1 entered promiscuous mode [ 24.507968][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.517573][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.531797][ T282] device bridge_slave_0 entered promiscuous mode [ 24.541459][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.554896][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.566783][ T282] device bridge_slave_1 entered promiscuous mode [ 24.664084][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.673375][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.690098][ T285] device bridge_slave_0 entered promiscuous mode [ 24.719431][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.727954][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.741170][ T285] device bridge_slave_1 entered promiscuous mode [ 24.788367][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.797575][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.808849][ T283] device bridge_slave_0 entered promiscuous mode [ 24.833523][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.845505][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.859732][ T283] device bridge_slave_1 entered promiscuous mode [ 25.070532][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.079960][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.089293][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.097511][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.107134][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.116795][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.127096][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.136269][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.174278][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.183921][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.193603][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.201556][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.219984][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.227906][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.235674][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.244072][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.271174][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.279518][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.290470][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.301436][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.332431][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.340849][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.352666][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.360685][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.371072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.380885][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.391918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.402480][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.412753][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.422458][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.434009][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.465152][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.475929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.487772][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.497808][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.509151][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.521903][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.533021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.550096][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.586917][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.598009][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.607523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.620080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.631024][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.639384][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.648555][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.658232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.669589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.680381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.692348][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.701245][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.710823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.721157][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.730641][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.740365][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.751421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.761747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.770838][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.779116][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.787698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.797910][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.810131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.819376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.830982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.846119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.859197][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.875103][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.904437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.915809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.925650][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.934953][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.947567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.957174][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.966636][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.977488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.987017][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.997471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.007129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.030743][ T281] device veth0_vlan entered promiscuous mode [ 26.043455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.054096][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.066272][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.078192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.088739][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.100744][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.113326][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.125259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.133302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.142162][ T282] device veth0_vlan entered promiscuous mode [ 26.153467][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.175215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.184200][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.193563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.212051][ T282] device veth1_macvtap entered promiscuous mode [ 26.228179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.238164][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.248283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.261418][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.270337][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.280414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.294368][ T281] device veth1_macvtap entered promiscuous mode [ 26.305933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.320083][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.330578][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.341876][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.362796][ T285] device veth0_vlan entered promiscuous mode [ 26.374879][ T284] device veth0_vlan entered promiscuous mode [ 26.382857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.393012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.403449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.420011][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.433650][ T283] device veth0_vlan entered promiscuous mode [ 26.443391][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.453409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.464787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.476395][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.499199][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.508862][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.520462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.533952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.547229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.559149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.572420][ T284] device veth1_macvtap entered promiscuous mode [ 26.589427][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.605417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.623421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.647756][ T285] device veth1_macvtap entered promiscuous mode [ 26.666238][ T283] device veth1_macvtap entered promiscuous mode [ 26.673963][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 26.686119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.697234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.709747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.719222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.732401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.742969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.780580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.801979][ C0] hrtimer: interrupt took 36453 ns [ 26.807931][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.818601][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.828406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.838219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.848367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.862917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.883090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.915328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.932696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.062995][ T386] €Â0: renamed from pim6reg1 [ 28.277222][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 28.277244][ T30] audit: type=1400 audit(1756881912.306:108): avc: denied { setopt } for pid=393 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.533491][ T30] audit: type=1400 audit(1756881912.346:109): avc: denied { read } for pid=389 comm="syz.3.11" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.625490][ T30] audit: type=1400 audit(1756881912.346:110): avc: denied { open } for pid=389 comm="syz.3.11" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.654653][ T396] device sit0 entered promiscuous mode [ 28.681754][ T30] audit: type=1400 audit(1756881912.346:111): avc: denied { ioctl } for pid=389 comm="syz.3.11" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.538687][ T30] audit: type=1400 audit(1756881913.566:112): avc: denied { cpu } for pid=410 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.653482][ T30] audit: type=1400 audit(1756881913.686:113): avc: denied { write } for pid=410 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.715860][ T411] device sit0 entered promiscuous mode [ 30.421225][ T430] device pim6reg1 entered promiscuous mode [ 30.640364][ T438] €Â0: renamed from pim6reg1 [ 30.960248][ T30] audit: type=1400 audit(1756881914.986:114): avc: denied { tracepoint } for pid=456 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.998949][ T454] device sit0 left promiscuous mode [ 31.655437][ T454] device sit0 entered promiscuous mode [ 31.888550][ T479] device sit0 entered promiscuous mode [ 32.192208][ T489] device veth1_to_bond entered promiscuous mode [ 32.213406][ T497] device pim6reg1 entered promiscuous mode [ 32.246674][ T511] device sit0 left promiscuous mode [ 32.278351][ T511] device sit0 entered promiscuous mode [ 32.389793][ T30] audit: type=1400 audit(1756881916.416:115): avc: denied { read } for pid=512 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.525815][ T30] audit: type=1400 audit(1756881916.556:116): avc: denied { write } for pid=517 comm="syz.4.46" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.978039][ T531] device sit0 left promiscuous mode [ 33.449836][ T30] audit: type=1400 audit(1756881917.476:117): avc: denied { relabelfrom } for pid=541 comm="syz.3.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.523024][ T30] audit: type=1400 audit(1756881917.476:118): avc: denied { relabelto } for pid=541 comm="syz.3.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.632264][ T548] device sit0 entered promiscuous mode [ 34.617271][ T580] device sit0 entered promiscuous mode [ 34.982936][ T582] bond_slave_1: mtu less than device minimum [ 35.052777][ T30] audit: type=1400 audit(1756881919.076:119): avc: denied { create } for pid=585 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 36.369517][ T621] device sit0 entered promiscuous mode [ 37.796663][ T661] device syzkaller0 entered promiscuous mode [ 37.956216][ T664] device sit0 left promiscuous mode [ 38.280412][ T665] device sit0 entered promiscuous mode [ 39.719487][ T713] device sit0 left promiscuous mode [ 39.826478][ T30] audit: type=1400 audit(1756881923.846:120): avc: denied { create } for pid=719 comm="syz.3.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 39.932132][ T720] device sit0 entered promiscuous mode [ 40.453103][ T738] device syzkaller0 entered promiscuous mode [ 41.266666][ T30] audit: type=1400 audit(1756881925.296:121): avc: denied { create } for pid=765 comm="syz.4.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.410489][ T770] device sit0 left promiscuous mode [ 41.445269][ T772] bond_slave_1: mtu less than device minimum [ 41.466003][ T770] device sit0 entered promiscuous mode [ 41.502272][ T30] audit: type=1400 audit(1756881925.536:122): avc: denied { ioctl } for pid=771 comm="syz.0.120" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.644747][ T776] tap0: tun_chr_ioctl cmd 1074025692 [ 42.667300][ T30] audit: type=1400 audit(1756881926.696:123): avc: denied { append } for pid=811 comm="syz.4.131" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.852845][ T814] device syzkaller0 entered promiscuous mode [ 42.862033][ T30] audit: type=1400 audit(1756881926.886:124): avc: denied { create } for pid=809 comm="syz.2.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 43.170148][ T828] device sit0 left promiscuous mode [ 43.194110][ T833] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.248930][ T831] device sit0 entered promiscuous mode [ 43.380086][ T835] syz.4.137[835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.380210][ T835] syz.4.137[835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.440645][ T30] audit: type=1400 audit(1756881927.466:125): avc: denied { create } for pid=834 comm="syz.4.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 43.915172][ T848] GPL: port 1(erspan0) entered blocking state [ 43.992408][ T848] GPL: port 1(erspan0) entered disabled state [ 44.084901][ T848] device erspan0 entered promiscuous mode [ 44.184618][ T867] GPL: port 1(erspan0) entered blocking state [ 44.193023][ T867] GPL: port 1(erspan0) entered forwarding state [ 44.880733][ T30] audit: type=1400 audit(1756881928.906:126): avc: denied { create } for pid=921 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 45.328090][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 47.237856][ T30] audit: type=1400 audit(1756881931.266:127): avc: denied { create } for pid=974 comm="syz.3.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 47.353295][ T976] device pim6reg1 entered promiscuous mode [ 47.490074][ T977] device syzkaller0 entered promiscuous mode [ 47.865528][ T30] audit: type=1400 audit(1756881931.886:128): avc: denied { create } for pid=981 comm="syz.3.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 48.120805][ T990] ------------[ cut here ]------------ [ 48.128019][ T990] Please remove unsupported % in format string [ 48.135545][ T990] WARNING: CPU: 0 PID: 990 at lib/vsprintf.c:2667 format_decode+0xcfe/0x1520 [ 48.149089][ T990] Modules linked in: [ 48.153475][ T990] CPU: 0 PID: 990 Comm: syz.4.178 Not tainted syzkaller #0 [ 48.166021][ T990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 48.179142][ T990] RIP: 0010:format_decode+0xcfe/0x1520 [ 48.186613][ T990] Code: 78 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 04 84 c0 0f 85 10 08 00 00 41 0f be 36 48 c7 c7 a0 a2 64 85 e8 72 10 32 02 <0f> 0b e9 d6 fc ff ff 48 8b 4d c0 80 e1 07 38 c1 0f 8c 47 f3 ff ff [ 48.215450][ T990] RSP: 0018:ffffc90000b577f8 EFLAGS: 00010246 [ 48.226426][ T990] RAX: 6083cb9feb0a0300 RBX: 00000000ffffffdb RCX: 0000000000080000 [ 48.237142][ T990] RDX: ffffc90002f22000 RSI: 00000000000026e5 RDI: 00000000000026e6 [ 48.247231][ T990] RBP: ffffc90000b57868 R08: dffffc0000000000 R09: fffff5200016ae4d [ 48.257673][ T990] R10: fffff5200016ae4d R11: 1ffff9200016ae4c R12: 1ffff9200016af45 [ 48.271240][ T990] R13: ffff0000ffffff00 R14: ffffc90000b57a2c R15: ffff0a00ffffff00 [ 48.281758][ T990] FS: 00007f13615f96c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 48.292819][ T990] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.301288][ T990] CR2: 0000000100000001 CR3: 0000000112d74000 CR4: 00000000003506b0 [ 48.314547][ T990] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.324596][ T990] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 48.335705][ T990] Call Trace: [ 48.339140][ T990] [ 48.343096][ T990] bstr_printf+0xc2/0xef0 [ 48.349133][ T990] ? slab_post_alloc_hook+0x4f/0x2b0 [ 48.355546][ T990] ? kmem_cache_alloc+0xf7/0x260 [ 48.361583][ T990] bpf_trace_printk+0x106/0x250 [ 48.368070][ T990] ? bpf_probe_write_user+0xf0/0xf0 [ 48.374763][ T990] bpf_prog_12183cdb1cd51dab+0x2e/0x9a8 [ 48.382776][ T990] bpf_test_run+0x33d/0x8d0 [ 48.388736][ T990] ? convert___skb_to_skb+0x4f0/0x4f0 [ 48.396885][ T990] ? eth_get_headlen+0x1f0/0x1f0 [ 48.403567][ T990] ? convert___skb_to_skb+0x41/0x4f0 [ 48.410996][ T990] ? bpf_prog_test_run_skb+0x99b/0x1150 [ 48.417965][ T990] bpf_prog_test_run_skb+0x9ec/0x1150 [ 48.424853][ T990] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 48.434865][ T990] bpf_prog_test_run+0x3d5/0x620 [ 48.440506][ T990] ? bpf_prog_query+0x230/0x230 [ 48.446219][ T990] ? selinux_bpf+0xce/0xf0 [ 48.452510][ T990] ? security_bpf+0x82/0xa0 [ 48.458069][ T990] __sys_bpf+0x52c/0x730 [ 48.463047][ T990] ? bpf_link_show_fdinfo+0x310/0x310 [ 48.470476][ T990] ? __kasan_check_write+0x14/0x20 [ 48.476124][ T990] ? switch_fpu_return+0x15d/0x2c0 [ 48.483872][ T990] __x64_sys_bpf+0x7c/0x90 [ 48.488688][ T990] x64_sys_call+0x4b9/0x9a0 [ 48.495976][ T990] do_syscall_64+0x4c/0xa0 [ 48.501518][ T990] ? clear_bhb_loop+0x50/0xa0 [ 48.510238][ T990] ? clear_bhb_loop+0x50/0xa0 [ 48.518039][ T990] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.525411][ T990] RIP: 0033:0x7f1362b90be9 [ 48.531255][ T990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.557874][ T990] RSP: 002b:00007f13615f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.569097][ T990] RAX: ffffffffffffffda RBX: 00007f1362dc7fa0 RCX: 00007f1362b90be9 [ 48.578517][ T990] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 48.590106][ T990] RBP: 00007f1362c13e19 R08: 0000000000000000 R09: 0000000000000000 [ 48.602146][ T990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 48.612242][ T990] R13: 00007f1362dc8038 R14: 00007f1362dc7fa0 R15: 00007ffce2ebd038 [ 48.622247][ T990] [ 48.626610][ T990] ---[ end trace f6c909068f6a6734 ]--- [ 48.852554][ T101] udevd[101]: worker [338] terminated by signal 33 (Unknown signal 33) [ 49.092411][ T101] udevd[101]: worker [338] failed while handling '/devices/virtual/block/loop3' [ 50.926482][ T1032] syz.3.191[1032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.926630][ T1032] syz.3.191[1032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.964464][ T1028] device sit0 left promiscuous mode [ 51.054088][ T30] audit: type=1400 audit(1756881935.086:129): avc: denied { create } for pid=1031 comm="syz.3.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 51.372457][ T30] audit: type=1400 audit(1756881935.406:130): avc: denied { create } for pid=1039 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 51.682775][ T30] audit: type=1400 audit(1756881935.706:131): avc: denied { create } for pid=1027 comm="syz.2.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 51.719700][ T1028] device sit0 entered promiscuous mode [ 53.331965][ T1079] device veth0_vlan left promiscuous mode [ 53.392324][ T1079] device veth0_vlan entered promiscuous mode [ 53.599522][ T30] audit: type=1400 audit(1756881937.626:132): avc: denied { create } for pid=1083 comm="syz.3.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 54.639884][ T1116] device pim6reg1 entered promiscuous mode [ 55.140620][ T1142] device pim6reg1 entered promiscuous mode [ 55.255386][ T1143] device sit0 left promiscuous mode [ 55.312573][ T1139] device sit0 entered promiscuous mode [ 56.424485][ T1164] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 56.448909][ T30] audit: type=1400 audit(1756881940.476:133): avc: denied { create } for pid=1160 comm="syz.4.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 56.918510][ T1195] device sit0 left promiscuous mode [ 57.165300][ T1195] device sit0 entered promiscuous mode [ 57.468508][ T1197] device pim6reg1 entered promiscuous mode [ 57.832975][ T1222] device sit0 left promiscuous mode [ 59.111346][ T1333] device veth0_vlan left promiscuous mode [ 59.183250][ T1333] device veth0_vlan entered promiscuous mode [ 59.493449][ T1351] device pim6reg1 entered promiscuous mode [ 59.875397][ T1374] device sit0 left promiscuous mode [ 59.923838][ T1377] device sit0 entered promiscuous mode [ 60.982829][ T1391] device sit0 left promiscuous mode [ 61.117034][ T1391] device sit0 entered promiscuous mode [ 61.586391][ T1407] device sit0 left promiscuous mode [ 61.914548][ T30] audit: type=1400 audit(1756881945.946:134): avc: denied { associate } for pid=1411 comm="syz.3.297" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 62.153429][ T1420] device pim6reg1 entered promiscuous mode [ 63.093617][ T1469] device veth0_vlan left promiscuous mode [ 63.119086][ T1469] device veth0_vlan entered promiscuous mode [ 63.187122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.199480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.212169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.223952][ T1470] device sit0 entered promiscuous mode [ 63.256486][ T1478] GPL: port 1(erspan0) entered blocking state [ 63.272174][ T1478] GPL: port 1(erspan0) entered disabled state [ 63.289578][ T1478] device erspan0 entered promiscuous mode [ 63.537395][ T30] audit: type=1400 audit(1756881947.566:135): avc: denied { create } for pid=1490 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 63.843744][ T1494] device sit0 left promiscuous mode [ 64.816736][ T1525] device syzkaller0 entered promiscuous mode [ 67.060528][ T1590] device pim6reg1 entered promiscuous mode [ 67.194232][ T1595] tun0: tun_chr_ioctl cmd 1074025678 [ 67.210471][ T1595] tun0: group set to 0 [ 68.013352][ T30] audit: type=1400 audit(1756881952.046:136): avc: denied { create } for pid=1613 comm="syz.4.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 69.124850][ T1647] device syzkaller0 entered promiscuous mode [ 70.087241][ T1679] device veth1_macvtap left promiscuous mode [ 70.119805][ T1683] device veth0_vlan left promiscuous mode [ 70.177754][ T1683] device veth0_vlan entered promiscuous mode [ 70.732428][ T30] audit: type=1400 audit(1756881954.766:137): avc: denied { write } for pid=1708 comm="syz.2.382" name="cgroup.subtree_control" dev="cgroup2" ino=376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 70.785216][ T30] audit: type=1400 audit(1756881954.766:138): avc: denied { open } for pid=1708 comm="syz.2.382" path="" dev="cgroup2" ino=376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 70.826678][ T1709] device veth0_vlan left promiscuous mode [ 70.852729][ T1709] device veth0_vlan entered promiscuous mode [ 71.479456][ T1748] -: renamed from syzkaller0 [ 71.480682][ T1752] syz.1.393[1752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.514271][ T1752] syz.1.393[1752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.649105][ T30] audit: type=1400 audit(1756881955.686:139): avc: denied { setattr } for pid=1754 comm="syz.3.394" path="pipe:[12831]" dev="pipefs" ino=12831 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 71.713400][ T1752] device veth0_vlan left promiscuous mode [ 71.732210][ T1752] device veth0_vlan entered promiscuous mode [ 71.741289][ T1755] device veth0_vlan left promiscuous mode [ 71.769864][ T1755] device veth0_vlan entered promiscuous mode [ 71.843409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.870907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.902351][ T1771] syz.1.397[1771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.902434][ T1771] syz.1.397[1771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.929593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.992610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.012985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.032556][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.636690][ T1804] device sit0 entered promiscuous mode [ 75.143276][ T1821] device wg2 entered promiscuous mode [ 76.107984][ T1829] device syzkaller0 entered promiscuous mode [ 76.340190][ T30] audit: type=1400 audit(1756881960.366:140): avc: denied { ioctl } for pid=1855 comm="syz.4.419" path="socket:[21133]" dev="sockfs" ino=21133 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 76.585662][ T1862] device wg2 entered promiscuous mode [ 77.576920][ T1893] device pim6reg1 entered promiscuous mode [ 77.792358][ T1896] device sit0 entered promiscuous mode [ 78.423746][ T1932] device wg2 entered promiscuous mode [ 79.049414][ T1953] device sit0 left promiscuous mode [ 79.158255][ T1953] device sit0 entered promiscuous mode [ 79.223719][ T1955] device pim6reg1 entered promiscuous mode [ 79.558205][ T1954] device syzkaller0 entered promiscuous mode [ 79.676353][ T2001] bond_slave_1: mtu less than device minimum [ 79.739819][ T2008] device sit0 left promiscuous mode [ 79.772168][ T2008] device sit0 entered promiscuous mode [ 80.648943][ T2069] device pim6reg1 entered promiscuous mode [ 80.832843][ T2084] syz.4.479[2084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.832968][ T2084] syz.4.479[2084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.203091][ T2089] device syzkaller0 entered promiscuous mode [ 81.272670][ T2107] device pim6reg1 entered promiscuous mode [ 81.472719][ T2118] device sit0 left promiscuous mode [ 81.588581][ T2118] device sit0 entered promiscuous mode [ 81.962358][ T30] audit: type=1400 audit(1756881965.996:141): avc: denied { create } for pid=2137 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 82.202961][ T2149] device sit0 left promiscuous mode [ 82.247500][ T2149] device sit0 entered promiscuous mode [ 83.584439][ T2169] device syzkaller0 entered promiscuous mode [ 84.999943][ T2232] device veth1_macvtap left promiscuous mode [ 85.096646][ T2234] syzkaller0: refused to change device tx_queue_len [ 85.155359][ T30] audit: type=1400 audit(1756881969.186:142): avc: denied { create } for pid=2233 comm="syz.1.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 85.752155][ T30] audit: type=1400 audit(1756881969.786:143): avc: denied { create } for pid=2255 comm="syz.0.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 85.904831][ T2260] device wg2 left promiscuous mode [ 85.925333][ T2264] device pim6reg1 entered promiscuous mode [ 86.042119][ T2260] device wg2 entered promiscuous mode [ 86.356860][ T2272] device syzkaller0 entered promiscuous mode [ 86.408761][ T30] audit: type=1400 audit(1756881970.436:144): avc: denied { create } for pid=2279 comm="syz.3.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 86.734250][ T2298] device sit0 left promiscuous mode [ 86.986713][ T2304] device sit0 entered promiscuous mode [ 87.402543][ T30] audit: type=1400 audit(1756881971.436:145): avc: denied { create } for pid=2318 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 92.041280][ T30] audit: type=1400 audit(1756881976.066:146): avc: denied { create } for pid=2330 comm="syz.1.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 92.073668][ T2337] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 92.089860][ T2337] device syzkaller0 entered promiscuous mode [ 92.190738][ T2349] device sit0 left promiscuous mode [ 92.380089][ T2352] device sit0 entered promiscuous mode [ 92.843600][ T2363] GPL: port 1(erspan0) entered blocking state [ 92.852075][ T2363] GPL: port 1(erspan0) entered disabled state [ 92.883129][ T2363] device erspan0 entered promiscuous mode [ 92.942532][ T2365] ±ÿ: renamed from team_slave_1 [ 92.962712][ T2371] GPL: port 1(erspan0) entered blocking state [ 92.970374][ T2371] GPL: port 1(erspan0) entered forwarding state [ 93.005588][ T2373] device sit0 left promiscuous mode [ 94.008975][ T2404] device syzkaller0 entered promiscuous mode [ 94.281847][ T2424] device pim6reg1 entered promiscuous mode [ 94.478693][ T2438] syz.4.580[2438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.478800][ T2438] syz.4.580[2438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.988666][ T2455] device syzkaller0 entered promiscuous mode [ 98.361244][ T2549] device sit0 left promiscuous mode [ 98.422741][ T2553] device sit0 entered promiscuous mode [ 102.817048][ T30] audit: type=1400 audit(1756881986.846:147): avc: denied { create } for pid=2644 comm="syz.0.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 102.895019][ T30] audit: type=1400 audit(1756881986.876:148): avc: denied { read } for pid=2648 comm="syz.3.641" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 103.020422][ T30] audit: type=1400 audit(1756881986.886:150): avc: denied { ioctl } for pid=2644 comm="syz.0.639" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 103.102103][ T30] audit: type=1400 audit(1756881986.876:149): avc: denied { open } for pid=2648 comm="syz.3.641" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 103.225143][ T30] audit: type=1400 audit(1756881986.976:151): avc: denied { create } for pid=2652 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 105.017223][ T2735] €Â0: renamed from pim6reg1 [ 105.313369][ T2752] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.323194][ T2752] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.339876][ T2752] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.347852][ T2752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.356412][ T2752] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.364484][ T2752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.373925][ T2752] device bridge0 entered promiscuous mode [ 105.662068][ T2792] device sit0 left promiscuous mode [ 105.937871][ T2810] device sit0 entered promiscuous mode [ 106.594534][ T30] audit: type=1400 audit(1756881990.626:152): avc: denied { create } for pid=2838 comm="syz.1.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 106.864715][ T2855] device sit0 left promiscuous mode [ 106.975713][ T2856] device sit0 entered promiscuous mode [ 107.152607][ T2864] device pim6reg1 entered promiscuous mode [ 107.242407][ T2866] device veth1_macvtap left promiscuous mode [ 107.264179][ T2875] ±ÿ: renamed from bond_slave_0 [ 107.465508][ T2892] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.474740][ T2892] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.586584][ T2894] device wg2 entered promiscuous mode [ 108.229288][ T2940] device sit0 left promiscuous mode [ 108.321642][ T2940] device sit0 entered promiscuous mode [ 109.214051][ T30] audit: type=1400 audit(1756881993.246:153): avc: denied { create } for pid=2980 comm="syz.0.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 109.524036][ T2985] device sit0 left promiscuous mode [ 109.567964][ T2986] device sit0 entered promiscuous mode [ 109.707042][ T2992] device pim6reg1 entered promiscuous mode [ 111.055626][ T3013] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 111.283118][ T3037] device sit0 entered promiscuous mode [ 111.745468][ T3056] device sit0 left promiscuous mode [ 111.779056][ T3059] device pim6reg1 entered promiscuous mode [ 112.005778][ T3056] device sit0 entered promiscuous mode [ 113.162608][ T3100] device veth0_vlan left promiscuous mode [ 113.177194][ T3100] device veth0_vlan entered promiscuous mode [ 113.233642][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.248101][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.271719][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 114.112290][ T3145] ip6_vti0: mtu greater than device maximum [ 114.740578][ T3156] bond_slave_1: mtu less than device minimum [ 115.133948][ T30] audit: type=1400 audit(1756881999.166:154): avc: denied { create } for pid=3175 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 115.230267][ T3185] device sit0 left promiscuous mode [ 115.291393][ T3185] device sit0 entered promiscuous mode [ 116.122725][ T3218] device sit0 left promiscuous mode [ 116.279523][ T3224] device sit0 left promiscuous mode [ 116.409698][ T3220] device sit0 entered promiscuous mode [ 116.717470][ T3238] device wg2 left promiscuous mode [ 117.176537][ T3264] syz.2.820[3264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.176619][ T3264] syz.2.820[3264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.408619][ T3284] bond_slave_1: mtu less than device minimum [ 117.776298][ T3309] device sit0 left promiscuous mode [ 117.808385][ T3309] device sit0 entered promiscuous mode [ 117.826195][ T3311] device sit0 left promiscuous mode [ 117.879573][ T3311] device sit0 entered promiscuous mode [ 118.564466][ T3368] device sit0 left promiscuous mode [ 118.655261][ T3369] device sit0 entered promiscuous mode [ 118.726160][ T3376] bond_slave_1: mtu less than device minimum [ 119.050264][ T3391] device sit0 left promiscuous mode [ 119.306193][ T3397] device sit0 entered promiscuous mode [ 119.476451][ T3411] ªªªªªª: renamed from vlan0 [ 119.493257][ T3412] device sit0 entered promiscuous mode [ 120.245013][ T3457] device sit0 left promiscuous mode [ 120.848711][ T3465] device sit0 left promiscuous mode [ 120.914358][ T3467] device sit0 entered promiscuous mode [ 121.643713][ T3495] syz.2.885[3495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.643798][ T3495] syz.2.885[3495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.660252][ T3515] device pim6reg1 entered promiscuous mode [ 123.634665][ T3559] device sit0 left promiscuous mode [ 123.705331][ T3559] device sit0 entered promiscuous mode [ 123.855716][ T3564] device syzkaller0 entered promiscuous mode [ 123.901456][ T26] syzkaller0: tun_net_xmit 48 [ 123.929325][ T3564] syzkaller0: tun_net_xmit 1280 [ 123.950355][ T3564] syzkaller0: create flow: hash 2079729075 index 1 [ 124.072285][ T3563] syzkaller0: delete flow: hash 2079729075 index 1 [ 124.498341][ T3610] device sit0 left promiscuous mode [ 124.617659][ T30] audit: type=1400 audit(1756882008.646:155): avc: denied { create } for pid=3614 comm="syz.0.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 127.620865][ T3646] device sit0 left promiscuous mode [ 128.210735][ T3683] device sit0 entered promiscuous mode [ 128.585852][ T30] audit: type=1400 audit(1756882012.616:156): avc: denied { create } for pid=3685 comm="syz.3.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 129.019207][ T3718] device sit0 entered promiscuous mode [ 129.051204][ T30] audit: type=1400 audit(1756882013.076:157): avc: denied { create } for pid=3710 comm="syz.1.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 129.617219][ T3723] device sit0 left promiscuous mode [ 129.637249][ T3727] device sit0 entered promiscuous mode [ 132.440403][ T3799] device sit0 left promiscuous mode [ 132.556738][ T3809] device sit0 entered promiscuous mode [ 132.691317][ T3810] device veth0_vlan left promiscuous mode [ 132.717263][ T3810] device veth0_vlan entered promiscuous mode [ 132.771998][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.798181][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.883532][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.972529][ T3838] device pim6reg1 entered promiscuous mode [ 135.866635][ T3937] device pim6reg1 entered promiscuous mode [ 135.999627][ T3956] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.012655][ T3956] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.056048][ T3956] device bridge0 left promiscuous mode [ 136.176793][ T3949] device bridge_slave_1 left promiscuous mode [ 136.187762][ T3949] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.197608][ T3949] device bridge_slave_0 left promiscuous mode [ 136.208022][ T3949] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.263976][ T3966] bond_slave_1: mtu less than device minimum [ 136.444625][ T3972] device syzkaller0 entered promiscuous mode [ 137.906416][ T4038] device veth1_macvtap left promiscuous mode [ 137.952753][ T4038] device macsec0 entered promiscuous mode [ 138.903560][ T4103] device sit0 left promiscuous mode [ 138.937812][ T4103] device sit0 entered promiscuous mode [ 139.504487][ T4139] device sit0 left promiscuous mode [ 139.532573][ T4139] device sit0 entered promiscuous mode [ 139.562191][ T30] audit: type=1400 audit(1756882023.596:158): avc: denied { create } for pid=4146 comm="syz.3.1075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 139.594105][ T4131] device wg2 left promiscuous mode [ 140.426841][ T4179] device sit0 entered promiscuous mode [ 140.545941][ T4192] syz.0.1088[4192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.777419][ T4203] device syzkaller0 entered promiscuous mode [ 141.267301][ T4227] device sit0 left promiscuous mode [ 141.424167][ T4230] device sit0 entered promiscuous mode [ 141.443251][ T4237] device sit0 left promiscuous mode [ 141.524421][ T4245] syz.1.1104[4245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.524500][ T4245] syz.1.1104[4245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.555027][ T4241] device sit0 left promiscuous mode [ 141.642694][ T4255] syz.1.1104[4255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.642777][ T4255] syz.1.1104[4255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.718995][ T4249] device sit0 entered promiscuous mode [ 142.436265][ T4271] device sit0 left promiscuous mode [ 142.516440][ T4273] device sit0 left promiscuous mode [ 142.682000][ T4274] device sit0 entered promiscuous mode [ 144.284144][ T4333] device syzkaller0 entered promiscuous mode [ 148.192986][ T4378] device sit0 left promiscuous mode [ 148.212101][ T4381] device sit0 entered promiscuous mode [ 148.468435][ T4408] device pim6reg1 entered promiscuous mode [ 148.494779][ T4410] device pim6reg1 entered promiscuous mode [ 148.506138][ T4410] syz.4.1154[4410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.506226][ T4410] syz.4.1154[4410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.700381][ T4420] device wg2 left promiscuous mode [ 148.774798][ T4424] device sit0 left promiscuous mode [ 148.786763][ T4425] device wg2 entered promiscuous mode [ 148.802202][ T4426] device sit0 entered promiscuous mode [ 148.866059][ T4422] device pim6reg1 entered promiscuous mode [ 148.940318][ T4434] tap0: tun_chr_ioctl cmd 1074025677 [ 148.952999][ T4434] tap0: linktype set to 823 [ 149.341631][ T4470] device sit0 entered promiscuous mode [ 150.498441][ T4491] device sit0 left promiscuous mode [ 151.066737][ T4509] GPL: port 1(erspan0) entered blocking state [ 151.122675][ T4509] GPL: port 1(erspan0) entered disabled state [ 151.162272][ T4509] device erspan0 entered promiscuous mode [ 151.199375][ T4521] GPL: port 1(erspan0) entered blocking state [ 151.206342][ T4521] GPL: port 1(erspan0) entered forwarding state [ 153.087888][ T30] audit: type=1400 audit(1756882037.116:159): avc: denied { create } for pid=4548 comm="syz.0.1195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 153.230050][ T4553] ÿÿÿÿÿÿ: renamed from vlan1 [ 153.484040][ T4556] device syzkaller0 entered promiscuous mode [ 154.499082][ T4617] device sit0 left promiscuous mode [ 154.556522][ T4624] device sit0 entered promiscuous mode [ 154.821709][ T4631] device syzkaller0 entered promiscuous mode [ 155.394701][ T4660] device syzkaller0 entered promiscuous mode [ 155.531182][ T4664] device veth0_vlan left promiscuous mode [ 155.555799][ T4664] device veth0_vlan entered promiscuous mode [ 155.601607][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.643886][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.718126][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 155.742853][ T4681] device sit0 entered promiscuous mode [ 156.706285][ T4736] device sit0 left promiscuous mode [ 156.850707][ T4736] device sit0 entered promiscuous mode [ 157.196239][ T4746] device pim6reg1 entered promiscuous mode [ 157.795509][ T4786] device sit0 left promiscuous mode [ 157.894640][ T4786] device sit0 entered promiscuous mode [ 159.132463][ T4841] device sit0 left promiscuous mode [ 159.179482][ T4841] device sit0 entered promiscuous mode [ 160.034706][ T4861] FAULT_INJECTION: forcing a failure. [ 160.034706][ T4861] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 160.082865][ T4861] CPU: 0 PID: 4861 Comm: syz.2.1290 Tainted: G W syzkaller #0 [ 160.092419][ T4861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 160.103252][ T4861] Call Trace: [ 160.106642][ T4861] [ 160.109591][ T4861] __dump_stack+0x21/0x30 [ 160.114481][ T4861] dump_stack_lvl+0xee/0x150 [ 160.119717][ T4861] ? show_regs_print_info+0x20/0x20 [ 160.125416][ T4861] dump_stack+0x15/0x20 [ 160.130442][ T4861] should_fail+0x3c1/0x510 [ 160.135170][ T4861] should_fail_usercopy+0x1a/0x20 [ 160.140252][ T4861] _copy_from_user+0x20/0xd0 [ 160.144880][ T4861] sock_do_ioctl+0x175/0x300 [ 160.149507][ T4861] ? sock_show_fdinfo+0xa0/0xa0 [ 160.155132][ T4861] ? selinux_file_ioctl+0x377/0x480 [ 160.160486][ T4861] sock_ioctl+0x4bc/0x6b0 [ 160.164862][ T4861] ? sock_poll+0x3d0/0x3d0 [ 160.169785][ T4861] ? __fget_files+0x2c4/0x320 [ 160.175101][ T4861] ? security_file_ioctl+0x84/0xa0 [ 160.180466][ T4861] ? sock_poll+0x3d0/0x3d0 [ 160.185461][ T4861] __se_sys_ioctl+0x121/0x1a0 [ 160.190765][ T4861] __x64_sys_ioctl+0x7b/0x90 [ 160.196047][ T4861] x64_sys_call+0x2f/0x9a0 [ 160.201395][ T4861] do_syscall_64+0x4c/0xa0 [ 160.206098][ T4861] ? clear_bhb_loop+0x50/0xa0 [ 160.211122][ T4861] ? clear_bhb_loop+0x50/0xa0 [ 160.216626][ T4861] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 160.222865][ T4861] RIP: 0033:0x7ff5a553bbe9 [ 160.227508][ T4861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.248755][ T4861] RSP: 002b:00007ff5a3f83038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 160.257326][ T4861] RAX: ffffffffffffffda RBX: 00007ff5a5773090 RCX: 00007ff5a553bbe9 [ 160.265573][ T4861] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 160.273826][ T4861] RBP: 00007ff5a3f83090 R08: 0000000000000000 R09: 0000000000000000 [ 160.282315][ T4861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.291450][ T4861] R13: 00007ff5a5773128 R14: 00007ff5a5773090 R15: 00007ffe8a66e848 [ 160.300169][ T4861] [ 160.944066][ T4887] device sit0 left promiscuous mode [ 161.002453][ T4888] device sit0 entered promiscuous mode [ 161.447026][ T4904] FAULT_INJECTION: forcing a failure. [ 161.447026][ T4904] name failslab, interval 1, probability 0, space 0, times 1 [ 161.601879][ T4904] CPU: 0 PID: 4904 Comm: syz.0.1304 Tainted: G W syzkaller #0 [ 161.611537][ T4904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 161.622465][ T4904] Call Trace: [ 161.626222][ T4904] [ 161.629178][ T4904] __dump_stack+0x21/0x30 [ 161.633707][ T4904] dump_stack_lvl+0xee/0x150 [ 161.638783][ T4904] ? show_regs_print_info+0x20/0x20 [ 161.644237][ T4904] ? __kasan_check_write+0x14/0x20 [ 161.650178][ T4904] ? rwsem_read_trylock+0x29a/0x620 [ 161.656191][ T4904] dump_stack+0x15/0x20 [ 161.660551][ T4904] should_fail+0x3c1/0x510 [ 161.665797][ T4904] __should_failslab+0xa4/0xe0 [ 161.670928][ T4904] should_failslab+0x9/0x20 [ 161.675992][ T4904] slab_pre_alloc_hook+0x3b/0xe0 [ 161.681123][ T4904] ? __alloc_skb+0xe0/0x740 [ 161.686831][ T4904] kmem_cache_alloc+0x44/0x260 [ 161.692525][ T4904] ? br_netlink_fini+0x30/0x30 [ 161.697340][ T4904] __alloc_skb+0xe0/0x740 [ 161.701710][ T4904] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 161.707132][ T4904] rtnetlink_event+0xd2/0x1a0 [ 161.712167][ T4904] raw_notifier_call_chain+0x90/0x100 [ 161.717675][ T4904] dev_set_mac_address+0x318/0x420 [ 161.723160][ T4904] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 161.729059][ T4904] dev_set_mac_address_user+0x31/0x50 [ 161.734486][ T4904] dev_ifsioc+0x757/0xe70 [ 161.739273][ T4904] ? dev_ioctl+0xd10/0xd10 [ 161.743814][ T4904] ? __kasan_check_write+0x14/0x20 [ 161.748964][ T4904] ? mutex_lock+0x95/0x1a0 [ 161.753412][ T4904] ? wait_for_completion_killable_timeout+0x10/0x10 [ 161.760105][ T4904] ? dev_get_by_name_rcu+0xc8/0xf0 [ 161.765258][ T4904] dev_ioctl+0x560/0xd10 [ 161.769538][ T4904] sock_do_ioctl+0x22e/0x300 [ 161.774170][ T4904] ? sock_show_fdinfo+0xa0/0xa0 [ 161.779415][ T4904] ? selinux_file_ioctl+0x377/0x480 [ 161.784729][ T4904] sock_ioctl+0x4bc/0x6b0 [ 161.789231][ T4904] ? sock_poll+0x3d0/0x3d0 [ 161.793673][ T4904] ? __fget_files+0x2c4/0x320 [ 161.798495][ T4904] ? security_file_ioctl+0x84/0xa0 [ 161.803662][ T4904] ? sock_poll+0x3d0/0x3d0 [ 161.808387][ T4904] __se_sys_ioctl+0x121/0x1a0 [ 161.813309][ T4904] __x64_sys_ioctl+0x7b/0x90 [ 161.818368][ T4904] x64_sys_call+0x2f/0x9a0 [ 161.823082][ T4904] do_syscall_64+0x4c/0xa0 [ 161.827796][ T4904] ? clear_bhb_loop+0x50/0xa0 [ 161.833066][ T4904] ? clear_bhb_loop+0x50/0xa0 [ 161.837964][ T4904] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.844460][ T4904] RIP: 0033:0x7fe4e1d06be9 [ 161.849224][ T4904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.870793][ T4904] RSP: 002b:00007fe4e076f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.879346][ T4904] RAX: ffffffffffffffda RBX: 00007fe4e1f3dfa0 RCX: 00007fe4e1d06be9 [ 161.888402][ T4904] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 161.897600][ T4904] RBP: 00007fe4e076f090 R08: 0000000000000000 R09: 0000000000000000 [ 161.906518][ T4904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.915820][ T4904] R13: 00007fe4e1f3e038 R14: 00007fe4e1f3dfa0 R15: 00007ffc9b79f508 [ 161.924641][ T4904] [ 162.775287][ T4956] FAULT_INJECTION: forcing a failure. [ 162.775287][ T4956] name failslab, interval 1, probability 0, space 0, times 0 [ 162.788893][ T4956] CPU: 1 PID: 4956 Comm: syz.2.1320 Tainted: G W syzkaller #0 [ 162.797700][ T4956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 162.807793][ T4956] Call Trace: [ 162.811116][ T4956] [ 162.814065][ T4956] __dump_stack+0x21/0x30 [ 162.818516][ T4956] dump_stack_lvl+0xee/0x150 [ 162.823212][ T4956] ? show_regs_print_info+0x20/0x20 [ 162.828638][ T4956] dump_stack+0x15/0x20 [ 162.832815][ T4956] should_fail+0x3c1/0x510 [ 162.837367][ T4956] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 162.843142][ T4956] __should_failslab+0xa4/0xe0 [ 162.848126][ T4956] should_failslab+0x9/0x20 [ 162.852812][ T4956] slab_pre_alloc_hook+0x3b/0xe0 [ 162.857789][ T4956] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 162.863276][ T4956] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 162.868766][ T4956] __kmalloc_track_caller+0x6c/0x2c0 [ 162.874799][ T4956] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 162.880411][ T4956] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 162.885906][ T4956] __alloc_skb+0x21a/0x740 [ 162.890355][ T4956] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 162.896043][ T4956] rtnetlink_event+0xd2/0x1a0 [ 162.900796][ T4956] raw_notifier_call_chain+0x90/0x100 [ 162.906540][ T4956] dev_set_mac_address+0x318/0x420 [ 162.911781][ T4956] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 162.917706][ T4956] dev_set_mac_address_user+0x31/0x50 [ 162.923110][ T4956] dev_ifsioc+0x757/0xe70 [ 162.927494][ T4956] ? dev_ioctl+0xd10/0xd10 [ 162.932105][ T4956] ? __kasan_check_write+0x14/0x20 [ 162.937242][ T4956] ? mutex_lock+0x95/0x1a0 [ 162.941949][ T4956] ? wait_for_completion_killable_timeout+0x10/0x10 [ 162.949059][ T4956] ? dev_get_by_name_rcu+0xc8/0xf0 [ 162.954542][ T4956] dev_ioctl+0x560/0xd10 [ 162.959347][ T4956] sock_do_ioctl+0x22e/0x300 [ 162.964551][ T4956] ? sock_show_fdinfo+0xa0/0xa0 [ 162.969440][ T4956] ? selinux_file_ioctl+0x377/0x480 [ 162.974851][ T4956] sock_ioctl+0x4bc/0x6b0 [ 162.979233][ T4956] ? sock_poll+0x3d0/0x3d0 [ 162.983763][ T4956] ? __fget_files+0x2c4/0x320 [ 162.988609][ T4956] ? security_file_ioctl+0x84/0xa0 [ 162.993972][ T4956] ? sock_poll+0x3d0/0x3d0 [ 162.998430][ T4956] __se_sys_ioctl+0x121/0x1a0 [ 163.003185][ T4956] __x64_sys_ioctl+0x7b/0x90 [ 163.007826][ T4956] x64_sys_call+0x2f/0x9a0 [ 163.012711][ T4956] do_syscall_64+0x4c/0xa0 [ 163.017384][ T4956] ? clear_bhb_loop+0x50/0xa0 [ 163.022460][ T4956] ? clear_bhb_loop+0x50/0xa0 [ 163.027849][ T4956] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 163.034556][ T4956] RIP: 0033:0x7ff5a553bbe9 [ 163.039525][ T4956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.060930][ T4956] RSP: 002b:00007ff5a3fa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.069588][ T4956] RAX: ffffffffffffffda RBX: 00007ff5a5772fa0 RCX: 00007ff5a553bbe9 [ 163.077790][ T4956] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 163.086670][ T4956] RBP: 00007ff5a3fa4090 R08: 0000000000000000 R09: 0000000000000000 [ 163.095326][ T4956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.104385][ T4956] R13: 00007ff5a5773038 R14: 00007ff5a5772fa0 R15: 00007ffe8a66e848 [ 163.113403][ T4956] [ 163.824555][ T4994] FAULT_INJECTION: forcing a failure. [ 163.824555][ T4994] name failslab, interval 1, probability 0, space 0, times 0 [ 163.838696][ T4994] CPU: 1 PID: 4994 Comm: syz.2.1332 Tainted: G W syzkaller #0 [ 163.847935][ T4994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 163.859001][ T4994] Call Trace: [ 163.862586][ T4994] [ 163.865997][ T4994] __dump_stack+0x21/0x30 [ 163.870725][ T4994] dump_stack_lvl+0xee/0x150 [ 163.875714][ T4994] ? show_regs_print_info+0x20/0x20 [ 163.881507][ T4994] ? bpf_ringbuf_notify+0x30/0x30 [ 163.888759][ T4994] dump_stack+0x15/0x20 [ 163.894071][ T4994] should_fail+0x3c1/0x510 [ 163.899260][ T4994] __should_failslab+0xa4/0xe0 [ 163.904326][ T4994] should_failslab+0x9/0x20 [ 163.909027][ T4994] slab_pre_alloc_hook+0x3b/0xe0 [ 163.914235][ T4994] ? __alloc_skb+0xe0/0x740 [ 163.919188][ T4994] kmem_cache_alloc+0x44/0x260 [ 163.924532][ T4994] __alloc_skb+0xe0/0x740 [ 163.929119][ T4994] fdb_notify+0x78/0x130 [ 163.933583][ T4994] fdb_delete+0x896/0xb00 [ 163.938668][ T4994] fdb_delete_local+0x3c8/0x480 [ 163.943685][ T4994] br_fdb_changeaddr+0x1b3/0x1c0 [ 163.948731][ T4994] br_device_event+0x335/0x790 [ 163.953798][ T4994] ? br_boolopt_multi_get+0xf0/0xf0 [ 163.959625][ T4994] ? packet_notifier+0x8bc/0x8d0 [ 163.964583][ T4994] ? addrconf_notify+0x37b/0xde0 [ 163.970148][ T4994] raw_notifier_call_chain+0x90/0x100 [ 163.975911][ T4994] dev_set_mac_address+0x318/0x420 [ 163.981592][ T4994] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 163.988238][ T4994] dev_set_mac_address_user+0x31/0x50 [ 163.993892][ T4994] dev_ifsioc+0x757/0xe70 [ 163.998441][ T4994] ? dev_ioctl+0xd10/0xd10 [ 164.003039][ T4994] ? __kasan_check_write+0x14/0x20 [ 164.008765][ T4994] ? mutex_lock+0x95/0x1a0 [ 164.013575][ T4994] ? wait_for_completion_killable_timeout+0x10/0x10 [ 164.021086][ T4994] ? dev_get_by_name_rcu+0xc8/0xf0 [ 164.026600][ T4994] dev_ioctl+0x560/0xd10 [ 164.031479][ T4994] sock_do_ioctl+0x22e/0x300 [ 164.036479][ T4994] ? sock_show_fdinfo+0xa0/0xa0 [ 164.041881][ T4994] ? selinux_file_ioctl+0x377/0x480 [ 164.047180][ T4994] sock_ioctl+0x4bc/0x6b0 [ 164.051615][ T4994] ? sock_poll+0x3d0/0x3d0 [ 164.056127][ T4994] ? __fget_files+0x2c4/0x320 [ 164.060988][ T4994] ? security_file_ioctl+0x84/0xa0 [ 164.066326][ T4994] ? sock_poll+0x3d0/0x3d0 [ 164.071732][ T4994] __se_sys_ioctl+0x121/0x1a0 [ 164.077338][ T4994] __x64_sys_ioctl+0x7b/0x90 [ 164.082463][ T4994] x64_sys_call+0x2f/0x9a0 [ 164.087363][ T4994] do_syscall_64+0x4c/0xa0 [ 164.092168][ T4994] ? clear_bhb_loop+0x50/0xa0 [ 164.097490][ T4994] ? clear_bhb_loop+0x50/0xa0 [ 164.102273][ T4994] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 164.108875][ T4994] RIP: 0033:0x7ff5a553bbe9 [ 164.113430][ T4994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.134169][ T4994] RSP: 002b:00007ff5a3fa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.143057][ T4994] RAX: ffffffffffffffda RBX: 00007ff5a5772fa0 RCX: 00007ff5a553bbe9 [ 164.151963][ T4994] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 164.160136][ T4994] RBP: 00007ff5a3fa4090 R08: 0000000000000000 R09: 0000000000000000 [ 164.168201][ T4994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.177073][ T4994] R13: 00007ff5a5773038 R14: 00007ff5a5772fa0 R15: 00007ffe8a66e848 [ 164.186073][ T4994] [ 164.264075][ T4997] device sit0 left promiscuous mode [ 164.345054][ T4997] device sit0 entered promiscuous mode [ 165.519141][ T5021] device sit0 left promiscuous mode [ 165.645950][ T5021] device sit0 entered promiscuous mode [ 165.747322][ T5040] FAULT_INJECTION: forcing a failure. [ 165.747322][ T5040] name failslab, interval 1, probability 0, space 0, times 0 [ 165.760691][ T5040] CPU: 0 PID: 5040 Comm: syz.3.1344 Tainted: G W syzkaller #0 [ 165.770874][ T5040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 165.781491][ T5040] Call Trace: [ 165.784986][ T5040] [ 165.788048][ T5040] __dump_stack+0x21/0x30 [ 165.792605][ T5040] dump_stack_lvl+0xee/0x150 [ 165.797589][ T5040] ? show_regs_print_info+0x20/0x20 [ 165.802998][ T5040] dump_stack+0x15/0x20 [ 165.807366][ T5040] should_fail+0x3c1/0x510 [ 165.812366][ T5040] ? fdb_notify+0x78/0x130 [ 165.816811][ T5040] __should_failslab+0xa4/0xe0 [ 165.822040][ T5040] should_failslab+0x9/0x20 [ 165.826764][ T5040] slab_pre_alloc_hook+0x3b/0xe0 [ 165.832367][ T5040] ? fdb_notify+0x78/0x130 [ 165.836994][ T5040] ? fdb_notify+0x78/0x130 [ 165.841696][ T5040] __kmalloc_track_caller+0x6c/0x2c0 [ 165.848261][ T5040] ? fdb_notify+0x78/0x130 [ 165.853061][ T5040] ? fdb_notify+0x78/0x130 [ 165.857783][ T5040] __alloc_skb+0x21a/0x740 [ 165.862497][ T5040] fdb_notify+0x78/0x130 [ 165.866759][ T5040] fdb_delete+0x896/0xb00 [ 165.871100][ T5040] fdb_delete_local+0x3c8/0x480 [ 165.876063][ T5040] br_fdb_changeaddr+0x1b3/0x1c0 [ 165.881513][ T5040] br_device_event+0x335/0x790 [ 165.886479][ T5040] ? br_boolopt_multi_get+0xf0/0xf0 [ 165.891880][ T5040] ? packet_notifier+0x8bc/0x8d0 [ 165.897004][ T5040] ? addrconf_notify+0x37b/0xde0 [ 165.902121][ T5040] raw_notifier_call_chain+0x90/0x100 [ 165.907801][ T5040] dev_set_mac_address+0x318/0x420 [ 165.913026][ T5040] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 165.919228][ T5040] dev_set_mac_address_user+0x31/0x50 [ 165.924995][ T5040] dev_ifsioc+0x757/0xe70 [ 165.929342][ T5040] ? dev_ioctl+0xd10/0xd10 [ 165.933853][ T5040] ? __mutex_lock_slowpath+0xe/0x10 [ 165.939057][ T5040] ? mutex_lock+0x100/0x1a0 [ 165.943586][ T5040] ? wait_for_completion_killable_timeout+0x10/0x10 [ 165.950357][ T5040] ? dev_get_by_name_rcu+0xc8/0xf0 [ 165.955483][ T5040] dev_ioctl+0x560/0xd10 [ 165.959740][ T5040] sock_do_ioctl+0x22e/0x300 [ 165.964335][ T5040] ? sock_show_fdinfo+0xa0/0xa0 [ 165.969284][ T5040] ? selinux_file_ioctl+0x377/0x480 [ 165.974491][ T5040] sock_ioctl+0x4bc/0x6b0 [ 165.978856][ T5040] ? sock_poll+0x3d0/0x3d0 [ 165.983554][ T5040] ? __fget_files+0x2c4/0x320 [ 165.988696][ T5040] ? security_file_ioctl+0x84/0xa0 [ 165.993934][ T5040] ? sock_poll+0x3d0/0x3d0 [ 165.998581][ T5040] __se_sys_ioctl+0x121/0x1a0 [ 166.003631][ T5040] __x64_sys_ioctl+0x7b/0x90 [ 166.008229][ T5040] x64_sys_call+0x2f/0x9a0 [ 166.012833][ T5040] do_syscall_64+0x4c/0xa0 [ 166.017732][ T5040] ? clear_bhb_loop+0x50/0xa0 [ 166.022435][ T5040] ? clear_bhb_loop+0x50/0xa0 [ 166.027575][ T5040] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.034145][ T5040] RIP: 0033:0x7fde37a59be9 [ 166.039042][ T5040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.059122][ T5040] RSP: 002b:00007fde364c2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 166.068283][ T5040] RAX: ffffffffffffffda RBX: 00007fde37c90fa0 RCX: 00007fde37a59be9 [ 166.076819][ T5040] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 166.084894][ T5040] RBP: 00007fde364c2090 R08: 0000000000000000 R09: 0000000000000000 [ 166.093244][ T5040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.101411][ T5040] R13: 00007fde37c91038 R14: 00007fde37c90fa0 R15: 00007ffd2f648358 [ 166.110121][ T5040] [ 166.167903][ T5043] FAULT_INJECTION: forcing a failure. [ 166.167903][ T5043] name failslab, interval 1, probability 0, space 0, times 0 [ 166.181002][ T5043] CPU: 1 PID: 5043 Comm: syz.2.1355 Tainted: G W syzkaller #0 [ 166.189815][ T5043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 166.199976][ T5043] Call Trace: [ 166.203280][ T5043] [ 166.206227][ T5043] __dump_stack+0x21/0x30 [ 166.210577][ T5043] dump_stack_lvl+0xee/0x150 [ 166.215192][ T5043] ? show_regs_print_info+0x20/0x20 [ 166.220542][ T5043] dump_stack+0x15/0x20 [ 166.225163][ T5043] should_fail+0x3c1/0x510 [ 166.229606][ T5043] __should_failslab+0xa4/0xe0 [ 166.234514][ T5043] should_failslab+0x9/0x20 [ 166.239029][ T5043] slab_pre_alloc_hook+0x3b/0xe0 [ 166.244089][ T5043] ? fdb_create+0x37/0xdb0 [ 166.248609][ T5043] kmem_cache_alloc+0x44/0x260 [ 166.253380][ T5043] fdb_create+0x37/0xdb0 [ 166.257625][ T5043] ? br_fdb_find_rcu+0x30/0x30 [ 166.262394][ T5043] ? fdb_delete_local+0x3c8/0x480 [ 166.267440][ T5043] fdb_insert+0x140/0x260 [ 166.271873][ T5043] br_fdb_changeaddr+0x187/0x1c0 [ 166.276821][ T5043] br_device_event+0x335/0x790 [ 166.281863][ T5043] ? br_boolopt_multi_get+0xf0/0xf0 [ 166.287243][ T5043] ? packet_notifier+0x8bc/0x8d0 [ 166.292372][ T5043] ? addrconf_notify+0x37b/0xde0 [ 166.297492][ T5043] raw_notifier_call_chain+0x90/0x100 [ 166.302968][ T5043] dev_set_mac_address+0x318/0x420 [ 166.308087][ T5043] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 166.313901][ T5043] dev_set_mac_address_user+0x31/0x50 [ 166.319277][ T5043] dev_ifsioc+0x757/0xe70 [ 166.323729][ T5043] ? dev_ioctl+0xd10/0xd10 [ 166.328160][ T5043] ? __mutex_lock_slowpath+0xe/0x10 [ 166.333362][ T5043] ? mutex_lock+0x100/0x1a0 [ 166.337863][ T5043] ? wait_for_completion_killable_timeout+0x10/0x10 [ 166.344633][ T5043] ? dev_get_by_name_rcu+0xc8/0xf0 [ 166.349752][ T5043] dev_ioctl+0x560/0xd10 [ 166.354091][ T5043] sock_do_ioctl+0x22e/0x300 [ 166.358699][ T5043] ? sock_show_fdinfo+0xa0/0xa0 [ 166.363568][ T5043] ? selinux_file_ioctl+0x377/0x480 [ 166.368946][ T5043] sock_ioctl+0x4bc/0x6b0 [ 166.373313][ T5043] ? sock_poll+0x3d0/0x3d0 [ 166.377733][ T5043] ? __fget_files+0x2c4/0x320 [ 166.382515][ T5043] ? security_file_ioctl+0x84/0xa0 [ 166.387634][ T5043] ? sock_poll+0x3d0/0x3d0 [ 166.392333][ T5043] __se_sys_ioctl+0x121/0x1a0 [ 166.397029][ T5043] __x64_sys_ioctl+0x7b/0x90 [ 166.401813][ T5043] x64_sys_call+0x2f/0x9a0 [ 166.406388][ T5043] do_syscall_64+0x4c/0xa0 [ 166.410813][ T5043] ? clear_bhb_loop+0x50/0xa0 [ 166.415513][ T5043] ? clear_bhb_loop+0x50/0xa0 [ 166.420304][ T5043] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.426207][ T5043] RIP: 0033:0x7ff5a553bbe9 [ 166.430640][ T5043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.451014][ T5043] RSP: 002b:00007ff5a3fa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 166.459768][ T5043] RAX: ffffffffffffffda RBX: 00007ff5a5772fa0 RCX: 00007ff5a553bbe9 [ 166.467853][ T5043] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 166.475855][ T5043] RBP: 00007ff5a3fa4090 R08: 0000000000000000 R09: 0000000000000000 [ 166.484008][ T5043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.492360][ T5043] R13: 00007ff5a5773038 R14: 00007ff5a5772fa0 R15: 00007ffe8a66e848 [ 166.500693][ T5043] [ 166.623054][ T5045] device sit0 left promiscuous mode [ 166.665463][ T5051] device veth0_vlan left promiscuous mode [ 166.678421][ T5051] device veth0_vlan entered promiscuous mode [ 166.750814][ T5047] device sit0 entered promiscuous mode [ 166.811136][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.820376][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.860049][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 166.885489][ T5053] device sit0 left promiscuous mode [ 166.901023][ T5055] device sit0 entered promiscuous mode [ 166.929478][ T5056] device sit0 entered promiscuous mode [ 167.008074][ T5067] syz.2.1353[5067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.008181][ T5067] syz.2.1353[5067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.341176][ T5091] device sit0 left promiscuous mode [ 167.368225][ T5089] device sit0 left promiscuous mode [ 167.392205][ T5092] device sit0 entered promiscuous mode [ 167.420986][ T5091] device sit0 entered promiscuous mode [ 167.611481][ T5106] device sit0 left promiscuous mode [ 167.804521][ T5114] device sit0 entered promiscuous mode [ 168.142632][ T5131] device syzkaller0 entered promiscuous mode [ 168.497032][ T5155] ªªªªªª: renamed from vlan0 [ 168.688488][ T5169] bond_slave_1: mtu less than device minimum [ 168.765165][ T5173] device sit0 left promiscuous mode [ 168.876839][ T5175] device veth0_vlan left promiscuous mode [ 168.907607][ T5175] device veth0_vlan entered promiscuous mode [ 168.954693][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.970812][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 168.985343][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.193985][ T5197] device pim6reg1 entered promiscuous mode [ 169.420780][ T5210] device sit0 left promiscuous mode [ 169.819895][ T5222] device wg2 entered promiscuous mode [ 169.931546][ T5242] device sit0 left promiscuous mode [ 170.097076][ T5263] device pim6reg1 entered promiscuous mode [ 170.578866][ T5286] device sit0 left promiscuous mode [ 170.655600][ T5288] device sit0 entered promiscuous mode [ 170.912247][ T5296] bridge0: port 3(veth0) entered blocking state [ 170.926019][ T5296] bridge0: port 3(veth0) entered disabled state [ 170.945885][ T5296] device veth0 entered promiscuous mode [ 171.000488][ T5299] device veth0 left promiscuous mode [ 171.032076][ T5299] bridge0: port 3(veth0) entered disabled state [ 171.282715][ T5309] device syzkaller0 entered promiscuous mode [ 171.878949][ T5332] device sit0 entered promiscuous mode [ 175.622066][ T5424] device veth0_vlan left promiscuous mode [ 175.628198][ T5424] device veth0_vlan entered promiscuous mode [ 175.643179][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.662725][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 175.676217][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.802990][ T5450] syz.2.1468[5450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.803098][ T5450] syz.2.1468[5450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.841727][ T5457] device sit0 left promiscuous mode [ 175.902012][ T5463] device sit0 entered promiscuous mode [ 176.382719][ T5492] device pim6reg1 entered promiscuous mode [ 176.503259][ T5508] device sit0 left promiscuous mode [ 176.515138][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 176.628950][ T5508] device sit0 entered promiscuous mode [ 176.813251][ T5526] device sit0 left promiscuous mode [ 176.965180][ T5525] device sit0 entered promiscuous mode [ 178.103999][ T5555] device sit0 entered promiscuous mode [ 178.822569][ T5587] device sit0 entered promiscuous mode [ 179.562130][ T5626] device sit0 left promiscuous mode [ 179.645769][ T5630] device sit0 entered promiscuous mode [ 182.899177][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 183.382454][ T5766] device macsec0 entered promiscuous mode [ 183.657577][ T5810] GPL: port 2(veth1_macvtap) entered blocking state [ 183.692601][ T5810] GPL: port 2(veth1_macvtap) entered disabled state [ 186.221889][ C1] sched: RT throttling activated [ 186.469247][ T5882] device sit0 left promiscuous mode [ 186.601631][ T5882] device sit0 entered promiscuous mode [ 187.074658][ T5917] device pim6reg1 left promiscuous mode [ 187.299732][ T5925] device sit0 left promiscuous mode [ 187.436453][ T5925] device sit0 entered promiscuous mode [ 187.597367][ T5934] syzkaller0: tun_chr_ioctl cmd 21731 [ 187.954029][ T5958] device veth0_vlan left promiscuous mode [ 187.960620][ T5958] device veth0_vlan entered promiscuous mode [ 187.969966][ T5959] device veth0_vlan left promiscuous mode [ 187.985109][ T5959] device veth0_vlan entered promiscuous mode [ 188.028461][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.041099][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 188.049593][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.057804][ T5962] device sit0 left promiscuous mode [ 188.095882][ T5963] device sit0 entered promiscuous mode [ 188.204832][ T5970] device sit0 left promiscuous mode [ 188.264037][ T5970] device sit0 entered promiscuous mode [ 188.523428][ T5988] device sit0 left promiscuous mode [ 188.598823][ T5995] device sit0 entered promiscuous mode [ 188.745923][ T6005] syz.2.1632[6005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.746007][ T6005] syz.2.1632[6005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.804386][ T6011] syz.2.1632[6011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.854510][ T6008] device sit0 left promiscuous mode [ 188.882579][ T6012] device sit0 entered promiscuous mode [ 188.924567][ T6011] syz.2.1632[6011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.712881][ T6049] device sit0 left promiscuous mode [ 189.776423][ T6039] device pim6reg1 entered promiscuous mode [ 189.817018][ T6052] device sit0 entered promiscuous mode [ 190.038500][ T6056] device syzkaller0 entered promiscuous mode [ 190.110884][ T6068] device sit0 left promiscuous mode [ 190.307612][ T6071] device sit0 left promiscuous mode [ 190.344137][ T6072] device sit0 entered promiscuous mode [ 190.748286][ T6092] device sit0 entered promiscuous mode [ 193.406917][ T6146] syz.3.1676 uses obsolete (PF_INET,SOCK_PACKET) [ 194.265435][ T6155] device sit0 left promiscuous mode [ 194.292204][ T6155] device sit0 entered promiscuous mode [ 195.898613][ T6173] device pim6reg1 entered promiscuous mode [ 196.247054][ T6202] device sit0 left promiscuous mode [ 196.261438][ T6202] device sit0 entered promiscuous mode [ 197.087365][ T6246] device sit0 left promiscuous mode [ 197.106830][ T6246] device sit0 entered promiscuous mode [ 197.148634][ T6255] device pim6reg1 left promiscuous mode [ 197.330267][ T6266] device macsec0 left promiscuous mode [ 197.497250][ T6280] syz.3.1718[6280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.497325][ T6280] syz.3.1718[6280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.876354][ T6289] device sit0 left promiscuous mode [ 197.966218][ T6290] device sit0 entered promiscuous mode [ 198.208786][ T6306] device pim6reg1 entered promiscuous mode [ 198.715409][ T6335] device sit0 left promiscuous mode [ 198.807197][ T6335] device sit0 entered promiscuous mode [ 199.349066][ T6362] device wg2 entered promiscuous mode [ 199.726287][ T6375] device sit0 left promiscuous mode [ 200.099422][ T6394] device syzkaller0 entered promiscuous mode [ 200.295569][ T30] audit: type=1400 audit(1756882084.316:160): avc: denied { create } for pid=6399 comm="syz.3.1750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 200.363140][ T30] audit: type=1400 audit(1756882084.346:161): avc: denied { create } for pid=6399 comm="syz.3.1750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 200.616524][ T6421] bond_slave_1: mtu less than device minimum [ 200.840639][ T6427] device sit0 entered promiscuous mode [ 201.178651][ T6443] device syzkaller0 entered promiscuous mode [ 201.800780][ T6465] device syzkaller0 entered promiscuous mode [ 201.838166][ T6481] syz.2.1774[6481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.838239][ T6481] syz.2.1774[6481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.889396][ T6485] FAULT_INJECTION: forcing a failure. [ 201.889396][ T6485] name failslab, interval 1, probability 0, space 0, times 0 [ 201.948917][ T6485] CPU: 1 PID: 6485 Comm: syz.2.1774 Tainted: G W syzkaller #0 [ 201.957747][ T6485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 201.967883][ T6485] Call Trace: [ 201.971173][ T6485] [ 201.974107][ T6485] __dump_stack+0x21/0x30 [ 201.978443][ T6485] dump_stack_lvl+0xee/0x150 [ 201.983155][ T6485] ? show_regs_print_info+0x20/0x20 [ 201.988362][ T6485] dump_stack+0x15/0x20 [ 201.992527][ T6485] should_fail+0x3c1/0x510 [ 201.996949][ T6485] __should_failslab+0xa4/0xe0 [ 202.001724][ T6485] should_failslab+0x9/0x20 [ 202.006384][ T6485] slab_pre_alloc_hook+0x3b/0xe0 [ 202.011340][ T6485] ? prepare_creds+0x2f/0x640 [ 202.016031][ T6485] kmem_cache_alloc+0x44/0x260 [ 202.020847][ T6485] prepare_creds+0x2f/0x640 [ 202.025361][ T6485] copy_creds+0xe4/0x640 [ 202.029612][ T6485] copy_process+0x799/0x3210 [ 202.034215][ T6485] ? kstrtol_from_user+0x260/0x260 [ 202.039337][ T6485] ? __kasan_check_write+0x14/0x20 [ 202.044462][ T6485] ? proc_fail_nth_write+0x17a/0x1f0 [ 202.049905][ T6485] ? proc_fail_nth_read+0x210/0x210 [ 202.055120][ T6485] ? __pidfd_prepare+0x150/0x150 [ 202.060069][ T6485] ? security_file_permission+0x83/0xa0 [ 202.065628][ T6485] kernel_clone+0x23f/0x940 [ 202.070141][ T6485] ? create_io_thread+0x130/0x130 [ 202.075174][ T6485] ? __kasan_check_write+0x14/0x20 [ 202.080290][ T6485] ? mutex_unlock+0x89/0x220 [ 202.084910][ T6485] __x64_sys_clone+0x176/0x1d0 [ 202.089679][ T6485] ? __kasan_check_write+0x14/0x20 [ 202.094806][ T6485] ? __ia32_sys_vfork+0xf0/0xf0 [ 202.099666][ T6485] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 202.105735][ T6485] x64_sys_call+0x41f/0x9a0 [ 202.110349][ T6485] do_syscall_64+0x4c/0xa0 [ 202.114773][ T6485] ? clear_bhb_loop+0x50/0xa0 [ 202.119455][ T6485] ? clear_bhb_loop+0x50/0xa0 [ 202.124141][ T6485] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 202.130040][ T6485] RIP: 0033:0x7ff5a553bbe9 [ 202.134457][ T6485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.154166][ T6485] RSP: 002b:00007ff5a3f82fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 202.162591][ T6485] RAX: ffffffffffffffda RBX: 00007ff5a5773090 RCX: 00007ff5a553bbe9 [ 202.170568][ T6485] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 202.178626][ T6485] RBP: 00007ff5a3f83090 R08: 0000000000000000 R09: 0000000000000000 [ 202.186597][ T6485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 202.194658][ T6485] R13: 00007ff5a5773128 R14: 00007ff5a5773090 R15: 00007ffe8a66e848 [ 202.202646][ T6485] [ 202.360898][ T6504] device sit0 left promiscuous mode [ 202.417585][ T6507] device sit0 entered promiscuous mode [ 202.753633][ T6515] device sit0 left promiscuous mode [ 202.798777][ T6509] device wg2 entered promiscuous mode [ 203.054150][ T6525] device veth0_vlan left promiscuous mode [ 203.061168][ T6525] device veth0_vlan entered promiscuous mode [ 203.122623][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.151366][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.159584][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 203.180063][ T6541] syz.1.1789[6541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.180139][ T6541] syz.1.1789[6541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.268951][ T6546] syz.3.1791[6546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.288933][ T6543] FAULT_INJECTION: forcing a failure. [ 203.288933][ T6543] name failslab, interval 1, probability 0, space 0, times 0 [ 203.295472][ T6545] device veth0_vlan left promiscuous mode [ 203.336754][ T6543] CPU: 0 PID: 6543 Comm: syz.1.1789 Tainted: G W syzkaller #0 [ 203.345576][ T6543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 203.355649][ T6543] Call Trace: [ 203.358948][ T6543] [ 203.361893][ T6543] __dump_stack+0x21/0x30 [ 203.366251][ T6543] dump_stack_lvl+0xee/0x150 [ 203.370852][ T6543] ? show_regs_print_info+0x20/0x20 [ 203.376070][ T6543] dump_stack+0x15/0x20 [ 203.380340][ T6543] should_fail+0x3c1/0x510 [ 203.384773][ T6543] __should_failslab+0xa4/0xe0 [ 203.389558][ T6543] should_failslab+0x9/0x20 [ 203.394080][ T6543] slab_pre_alloc_hook+0x3b/0xe0 [ 203.399033][ T6543] __kmalloc+0x6d/0x2c0 [ 203.403206][ T6543] ? security_prepare_creds+0x4e/0x140 [ 203.408686][ T6543] security_prepare_creds+0x4e/0x140 [ 203.413987][ T6543] prepare_creds+0x456/0x640 [ 203.418594][ T6543] copy_creds+0xe4/0x640 [ 203.422857][ T6543] copy_process+0x799/0x3210 [ 203.427484][ T6543] ? kstrtol_from_user+0x260/0x260 [ 203.432618][ T6543] ? __kasan_check_write+0x14/0x20 [ 203.437753][ T6543] ? proc_fail_nth_write+0x17a/0x1f0 [ 203.443051][ T6543] ? proc_fail_nth_read+0x210/0x210 [ 203.448265][ T6543] ? __pidfd_prepare+0x150/0x150 [ 203.453219][ T6543] ? security_file_permission+0x83/0xa0 [ 203.458786][ T6543] kernel_clone+0x23f/0x940 [ 203.463306][ T6543] ? create_io_thread+0x130/0x130 [ 203.468352][ T6543] ? __kasan_check_write+0x14/0x20 [ 203.473481][ T6543] ? mutex_unlock+0x89/0x220 [ 203.478082][ T6543] __x64_sys_clone+0x176/0x1d0 [ 203.482863][ T6543] ? __kasan_check_write+0x14/0x20 [ 203.488000][ T6543] ? __ia32_sys_vfork+0xf0/0xf0 [ 203.492875][ T6543] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 203.498965][ T6543] x64_sys_call+0x41f/0x9a0 [ 203.503483][ T6543] do_syscall_64+0x4c/0xa0 [ 203.507914][ T6543] ? clear_bhb_loop+0x50/0xa0 [ 203.512698][ T6543] ? clear_bhb_loop+0x50/0xa0 [ 203.517389][ T6543] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 203.523296][ T6543] RIP: 0033:0x7fc44bdcabe9 [ 203.527727][ T6543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.547352][ T6543] RSP: 002b:00007fc44a811fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 203.555787][ T6543] RAX: ffffffffffffffda RBX: 00007fc44c002090 RCX: 00007fc44bdcabe9 [ 203.563772][ T6543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 203.571757][ T6543] RBP: 00007fc44a812090 R08: 0000000000000000 R09: 0000000000000000 [ 203.579745][ T6543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.587738][ T6543] R13: 00007fc44c002128 R14: 00007fc44c002090 R15: 00007ffea818bc78 [ 203.595733][ T6543] [ 203.609584][ T6545] device veth0_vlan entered promiscuous mode [ 203.631991][ T6546] syz.3.1791[6546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.697570][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.747304][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.762983][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.003894][ T6579] device sit0 left promiscuous mode [ 204.025157][ T6579] device sit0 entered promiscuous mode [ 204.538479][ T6599] syz.2.1806[6599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.538552][ T6599] syz.2.1806[6599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.551173][ T6599] FAULT_INJECTION: forcing a failure. [ 204.551173][ T6599] name failslab, interval 1, probability 0, space 0, times 0 [ 204.580804][ T6599] CPU: 1 PID: 6599 Comm: syz.2.1806 Tainted: G W syzkaller #0 [ 204.589621][ T6599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 204.599696][ T6599] Call Trace: [ 204.602991][ T6599] [ 204.605943][ T6599] __dump_stack+0x21/0x30 [ 204.610315][ T6599] dump_stack_lvl+0xee/0x150 [ 204.614935][ T6599] ? show_regs_print_info+0x20/0x20 [ 204.620293][ T6599] ? avc_has_perm_noaudit+0x2f4/0x460 [ 204.625690][ T6599] dump_stack+0x15/0x20 [ 204.629874][ T6599] should_fail+0x3c1/0x510 [ 204.634335][ T6599] __should_failslab+0xa4/0xe0 [ 204.639137][ T6599] should_failslab+0x9/0x20 [ 204.643668][ T6599] slab_pre_alloc_hook+0x3b/0xe0 [ 204.648631][ T6599] ? dup_fd+0x56/0xb20 [ 204.652730][ T6599] kmem_cache_alloc+0x44/0x260 [ 204.657526][ T6599] dup_fd+0x56/0xb20 [ 204.661443][ T6599] ? __mutex_init+0xcd/0x1a0 [ 204.666053][ T6599] ? perf_event_init_task+0x47b/0x4c0 [ 204.671494][ T6599] copy_files+0x76/0xe0 [ 204.675760][ T6599] copy_process+0x10ac/0x3210 [ 204.680461][ T6599] ? kstrtol_from_user+0x260/0x260 [ 204.685624][ T6599] ? __kasan_check_write+0x14/0x20 [ 204.690769][ T6599] ? __pidfd_prepare+0x150/0x150 [ 204.695733][ T6599] ? security_file_permission+0x83/0xa0 [ 204.701302][ T6599] kernel_clone+0x23f/0x940 [ 204.705892][ T6599] ? create_io_thread+0x130/0x130 [ 204.710948][ T6599] ? __kasan_check_write+0x14/0x20 [ 204.716088][ T6599] ? mutex_unlock+0x89/0x220 [ 204.720709][ T6599] __x64_sys_clone+0x176/0x1d0 [ 204.725501][ T6599] ? __kasan_check_write+0x14/0x20 [ 204.730651][ T6599] ? __ia32_sys_vfork+0xf0/0xf0 [ 204.735532][ T6599] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 204.741627][ T6599] x64_sys_call+0x41f/0x9a0 [ 204.746160][ T6599] do_syscall_64+0x4c/0xa0 [ 204.750603][ T6599] ? clear_bhb_loop+0x50/0xa0 [ 204.755308][ T6599] ? clear_bhb_loop+0x50/0xa0 [ 204.760013][ T6599] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.765941][ T6599] RIP: 0033:0x7ff5a553bbe9 [ 204.770386][ T6599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.790116][ T6599] RSP: 002b:00007ff5a3fa3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 204.798563][ T6599] RAX: ffffffffffffffda RBX: 00007ff5a5772fa0 RCX: 00007ff5a553bbe9 [ 204.806562][ T6599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 204.814561][ T6599] RBP: 00007ff5a3fa4090 R08: 0000000000000000 R09: 0000000000000000 [ 204.822602][ T6599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.830800][ T6599] R13: 00007ff5a5773038 R14: 00007ff5a5772fa0 R15: 00007ffe8a66e848 [ 204.838805][ T6599] [ 205.236705][ T6620] device sit0 left promiscuous mode [ 205.264009][ T6620] device sit0 entered promiscuous mode [ 205.432633][ T6626] bond_slave_1: mtu less than device minimum [ 205.438699][ T6627] bond_slave_1: mtu less than device minimum [ 205.569562][ T6637] syz.4.1819[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.569639][ T6637] syz.4.1819[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.596417][ T6637] FAULT_INJECTION: forcing a failure. [ 205.596417][ T6637] name failslab, interval 1, probability 0, space 0, times 0 [ 205.691936][ T6637] CPU: 1 PID: 6637 Comm: syz.4.1819 Tainted: G W syzkaller #0 [ 205.700767][ T6637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 205.710839][ T6637] Call Trace: [ 205.714132][ T6637] [ 205.717079][ T6637] __dump_stack+0x21/0x30 [ 205.721440][ T6637] dump_stack_lvl+0xee/0x150 [ 205.726153][ T6637] ? show_regs_print_info+0x20/0x20 [ 205.731381][ T6637] dump_stack+0x15/0x20 [ 205.735564][ T6637] should_fail+0x3c1/0x510 [ 205.740159][ T6637] __should_failslab+0xa4/0xe0 [ 205.744963][ T6637] should_failslab+0x9/0x20 [ 205.749493][ T6637] slab_pre_alloc_hook+0x3b/0xe0 [ 205.754468][ T6637] kmem_cache_alloc_trace+0x48/0x270 [ 205.759781][ T6637] ? alloc_fdtable+0xb4/0x2b0 [ 205.764570][ T6637] alloc_fdtable+0xb4/0x2b0 [ 205.769101][ T6637] ? _find_last_bit+0x7c/0x120 [ 205.773890][ T6637] dup_fd+0x870/0xb20 [ 205.777900][ T6637] copy_files+0x76/0xe0 [ 205.782072][ T6637] copy_process+0x10ac/0x3210 [ 205.786776][ T6637] ? kstrtol_from_user+0x260/0x260 [ 205.791906][ T6637] ? __kasan_check_write+0x14/0x20 [ 205.797040][ T6637] ? __pidfd_prepare+0x150/0x150 [ 205.802000][ T6637] ? security_file_permission+0x83/0xa0 [ 205.807664][ T6637] kernel_clone+0x23f/0x940 [ 205.812191][ T6637] ? create_io_thread+0x130/0x130 [ 205.817245][ T6637] ? __kasan_check_write+0x14/0x20 [ 205.822370][ T6637] ? mutex_unlock+0x89/0x220 [ 205.827162][ T6637] __x64_sys_clone+0x176/0x1d0 [ 205.831951][ T6637] ? __kasan_check_write+0x14/0x20 [ 205.837088][ T6637] ? __ia32_sys_vfork+0xf0/0xf0 [ 205.842167][ T6637] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 205.848247][ T6637] x64_sys_call+0x41f/0x9a0 [ 205.852761][ T6637] do_syscall_64+0x4c/0xa0 [ 205.857197][ T6637] ? clear_bhb_loop+0x50/0xa0 [ 205.861892][ T6637] ? clear_bhb_loop+0x50/0xa0 [ 205.866627][ T6637] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.872534][ T6637] RIP: 0033:0x7f1362b90be9 [ 205.876955][ T6637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.896760][ T6637] RSP: 002b:00007f13615f8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 205.905184][ T6637] RAX: ffffffffffffffda RBX: 00007f1362dc7fa0 RCX: 00007f1362b90be9 [ 205.913352][ T6637] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 205.921357][ T6637] RBP: 00007f13615f9090 R08: 0000000000000000 R09: 0000000000000000 [ 205.929340][ T6637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.937318][ T6637] R13: 00007f1362dc8038 R14: 00007f1362dc7fa0 R15: 00007ffce2ebd038 [ 205.945391][ T6637] [ 206.014859][ T6641] bond_slave_1: mtu less than device minimum [ 206.045800][ T6647] device sit0 left promiscuous mode [ 206.064910][ T6647] device sit0 entered promiscuous mode [ 206.135693][ T6651] device pim6reg1 entered promiscuous mode [ 213.293198][ T6707] device sit0 left promiscuous mode [ 213.944072][ T6710] device sit0 entered promiscuous mode [ 214.043702][ T6719] syz.0.1848[6719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.043778][ T6719] syz.0.1848[6719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.056842][ T6719] FAULT_INJECTION: forcing a failure. [ 214.056842][ T6719] name failslab, interval 1, probability 0, space 0, times 0 [ 214.122272][ T6716] device syzkaller0 entered promiscuous mode [ 214.145446][ T6719] CPU: 0 PID: 6719 Comm: syz.0.1848 Tainted: G W syzkaller #0 [ 214.154271][ T6719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 214.164343][ T6719] Call Trace: [ 214.167627][ T6719] [ 214.170569][ T6719] __dump_stack+0x21/0x30 [ 214.174918][ T6719] dump_stack_lvl+0xee/0x150 [ 214.179513][ T6719] ? show_regs_print_info+0x20/0x20 [ 214.184723][ T6719] ? __kasan_kmalloc+0xec/0x110 [ 214.189590][ T6719] ? kmem_cache_alloc_trace+0x119/0x270 [ 214.195329][ T6719] ? alloc_fdtable+0xb4/0x2b0 [ 214.200082][ T6719] ? dup_fd+0x870/0xb20 [ 214.204253][ T6719] ? copy_process+0x10ac/0x3210 [ 214.209117][ T6719] ? kernel_clone+0x23f/0x940 [ 214.213823][ T6719] ? __x64_sys_clone+0x176/0x1d0 [ 214.218768][ T6719] ? x64_sys_call+0x41f/0x9a0 [ 214.223461][ T6719] dump_stack+0x15/0x20 [ 214.227631][ T6719] should_fail+0x3c1/0x510 [ 214.232231][ T6719] __should_failslab+0xa4/0xe0 [ 214.237008][ T6719] should_failslab+0x9/0x20 [ 214.241534][ T6719] slab_pre_alloc_hook+0x3b/0xe0 [ 214.246480][ T6719] __kmalloc+0x6d/0x2c0 [ 214.250647][ T6719] ? kvmalloc_node+0x206/0x300 [ 214.255422][ T6719] kvmalloc_node+0x206/0x300 [ 214.260109][ T6719] ? vm_mmap+0xb0/0xb0 [ 214.264196][ T6719] ? kmem_cache_alloc_trace+0x119/0x270 [ 214.269750][ T6719] ? alloc_fdtable+0xb4/0x2b0 [ 214.274447][ T6719] alloc_fdtable+0xf2/0x2b0 [ 214.278954][ T6719] ? _find_last_bit+0x7c/0x120 [ 214.283728][ T6719] dup_fd+0x870/0xb20 [ 214.287727][ T6719] copy_files+0x76/0xe0 [ 214.291889][ T6719] copy_process+0x10ac/0x3210 [ 214.296577][ T6719] ? kstrtol_from_user+0x260/0x260 [ 214.301767][ T6719] ? __kasan_check_write+0x14/0x20 [ 214.306892][ T6719] ? __pidfd_prepare+0x150/0x150 [ 214.311842][ T6719] ? security_file_permission+0x83/0xa0 [ 214.317409][ T6719] kernel_clone+0x23f/0x940 [ 214.321922][ T6719] ? create_io_thread+0x130/0x130 [ 214.326957][ T6719] ? __kasan_check_write+0x14/0x20 [ 214.332075][ T6719] ? mutex_unlock+0x89/0x220 [ 214.336679][ T6719] __x64_sys_clone+0x176/0x1d0 [ 214.341458][ T6719] ? __kasan_check_write+0x14/0x20 [ 214.346574][ T6719] ? __ia32_sys_vfork+0xf0/0xf0 [ 214.351466][ T6719] ? debug_smp_processor_id+0x17/0x20 [ 214.356851][ T6719] ? perf_trace_sys_enter+0x30/0x150 [ 214.362156][ T6719] ? trace_sys_enter+0x3d/0x50 [ 214.366930][ T6719] x64_sys_call+0x41f/0x9a0 [ 214.371444][ T6719] do_syscall_64+0x4c/0xa0 [ 214.375949][ T6719] ? clear_bhb_loop+0x50/0xa0 [ 214.380636][ T6719] ? clear_bhb_loop+0x50/0xa0 [ 214.385323][ T6719] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.391232][ T6719] RIP: 0033:0x7fe4e1d06be9 [ 214.395655][ T6719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.415267][ T6719] RSP: 002b:00007fe4e076efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 214.423689][ T6719] RAX: ffffffffffffffda RBX: 00007fe4e1f3dfa0 RCX: 00007fe4e1d06be9 [ 214.431672][ T6719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 214.439650][ T6719] RBP: 00007fe4e076f090 R08: 0000000000000000 R09: 0000000000000000 [ 214.447628][ T6719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.455606][ T6719] R13: 00007fe4e1f3e038 R14: 00007fe4e1f3dfa0 R15: 00007ffc9b79f508 [ 214.463592][ T6719] [ 215.112663][ T6762] ip6_vti0: mtu greater than device maximum [ 215.308372][ T6774] syz.4.1864[6774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.308461][ T6774] syz.4.1864[6774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.359466][ T6775] FAULT_INJECTION: forcing a failure. [ 215.359466][ T6775] name failslab, interval 1, probability 0, space 0, times 0 [ 215.391983][ T6775] CPU: 0 PID: 6775 Comm: syz.4.1864 Tainted: G W syzkaller #0 [ 215.400817][ T6775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 215.410897][ T6775] Call Trace: [ 215.414196][ T6775] [ 215.417148][ T6775] __dump_stack+0x21/0x30 [ 215.421507][ T6775] dump_stack_lvl+0xee/0x150 [ 215.426124][ T6775] ? show_regs_print_info+0x20/0x20 [ 215.431365][ T6775] dump_stack+0x15/0x20 [ 215.435539][ T6775] should_fail+0x3c1/0x510 [ 215.439984][ T6775] __should_failslab+0xa4/0xe0 [ 215.444880][ T6775] should_failslab+0x9/0x20 [ 215.449407][ T6775] slab_pre_alloc_hook+0x3b/0xe0 [ 215.454417][ T6775] __kmalloc+0x6d/0x2c0 [ 215.458600][ T6775] ? __vmalloc_node_range+0x375/0xaf0 [ 215.464041][ T6775] __vmalloc_node_range+0x375/0xaf0 [ 215.469281][ T6775] dup_task_struct+0x3f2/0xc10 [ 215.474064][ T6775] ? copy_process+0x5a9/0x3210 [ 215.478848][ T6775] ? recalc_sigpending+0x1ac/0x230 [ 215.484147][ T6775] copy_process+0x5a9/0x3210 [ 215.488764][ T6775] ? kstrtol_from_user+0x260/0x260 [ 215.493900][ T6775] ? __kasan_check_write+0x14/0x20 [ 215.499043][ T6775] ? proc_fail_nth_write+0x17a/0x1f0 [ 215.504363][ T6775] ? proc_fail_nth_read+0x210/0x210 [ 215.509740][ T6775] ? __pidfd_prepare+0x150/0x150 [ 215.514706][ T6775] ? security_file_permission+0x83/0xa0 [ 215.520386][ T6775] kernel_clone+0x23f/0x940 [ 215.524948][ T6775] ? create_io_thread+0x130/0x130 [ 215.529998][ T6775] ? __kasan_check_write+0x14/0x20 [ 215.535294][ T6775] ? mutex_unlock+0x89/0x220 [ 215.539892][ T6775] __x64_sys_clone+0x176/0x1d0 [ 215.544663][ T6775] ? __kasan_check_write+0x14/0x20 [ 215.549783][ T6775] ? __ia32_sys_vfork+0xf0/0xf0 [ 215.554640][ T6775] ? debug_smp_processor_id+0x17/0x20 [ 215.560016][ T6775] ? perf_trace_sys_enter+0x30/0x150 [ 215.565304][ T6775] ? trace_sys_enter+0x3d/0x50 [ 215.570066][ T6775] x64_sys_call+0x41f/0x9a0 [ 215.574577][ T6775] do_syscall_64+0x4c/0xa0 [ 215.578990][ T6775] ? clear_bhb_loop+0x50/0xa0 [ 215.583669][ T6775] ? clear_bhb_loop+0x50/0xa0 [ 215.588365][ T6775] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.594256][ T6775] RIP: 0033:0x7f1362b90be9 [ 215.598668][ T6775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.618273][ T6775] RSP: 002b:00007f13615d7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 215.626778][ T6775] RAX: ffffffffffffffda RBX: 00007f1362dc8090 RCX: 00007f1362b90be9 [ 215.634763][ T6775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 215.642732][ T6775] RBP: 00007f13615d8090 R08: 0000000000000000 R09: 0000000000000000 [ 215.650702][ T6775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.658673][ T6775] R13: 00007f1362dc8128 R14: 00007f1362dc8090 R15: 00007ffce2ebd038 [ 215.666653][ T6775] [ 216.000633][ T6797] device syzkaller0 entered promiscuous mode [ 216.032924][ T6799] device pim6reg1 left promiscuous mode [ 216.221554][ T6804] device sit0 left promiscuous mode [ 216.359422][ T6807] device sit0 entered promiscuous mode [ 216.963134][ T6835] syz.4.1885[6835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.963206][ T6835] syz.4.1885[6835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.021205][ T6835] FAULT_INJECTION: forcing a failure. [ 217.021205][ T6835] name failslab, interval 1, probability 0, space 0, times 0 [ 217.045981][ T6835] CPU: 1 PID: 6835 Comm: syz.4.1885 Tainted: G W syzkaller #0 [ 217.054780][ T6835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.064855][ T6835] Call Trace: [ 217.068156][ T6835] [ 217.071096][ T6835] __dump_stack+0x21/0x30 [ 217.075436][ T6835] dump_stack_lvl+0xee/0x150 [ 217.080026][ T6835] ? show_regs_print_info+0x20/0x20 [ 217.085229][ T6835] ? kvmalloc_node+0x231/0x300 [ 217.089998][ T6835] ? vm_mmap+0xb0/0xb0 [ 217.094069][ T6835] dump_stack+0x15/0x20 [ 217.098229][ T6835] should_fail+0x3c1/0x510 [ 217.102650][ T6835] __should_failslab+0xa4/0xe0 [ 217.107423][ T6835] should_failslab+0x9/0x20 [ 217.111969][ T6835] slab_pre_alloc_hook+0x3b/0xe0 [ 217.116940][ T6835] ? copy_fs_struct+0x4c/0x220 [ 217.121706][ T6835] kmem_cache_alloc+0x44/0x260 [ 217.126472][ T6835] copy_fs_struct+0x4c/0x220 [ 217.131065][ T6835] copy_fs+0x6f/0x140 [ 217.135048][ T6835] copy_process+0x10d8/0x3210 [ 217.139734][ T6835] ? __kasan_check_write+0x14/0x20 [ 217.144845][ T6835] ? __pidfd_prepare+0x150/0x150 [ 217.149788][ T6835] ? security_file_permission+0x83/0xa0 [ 217.155337][ T6835] kernel_clone+0x23f/0x940 [ 217.159849][ T6835] ? create_io_thread+0x130/0x130 [ 217.164874][ T6835] ? __kasan_check_write+0x14/0x20 [ 217.169992][ T6835] ? mutex_unlock+0x89/0x220 [ 217.174581][ T6835] __x64_sys_clone+0x176/0x1d0 [ 217.179351][ T6835] ? __kasan_check_write+0x14/0x20 [ 217.184465][ T6835] ? __ia32_sys_vfork+0xf0/0xf0 [ 217.189323][ T6835] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 217.195397][ T6835] x64_sys_call+0x41f/0x9a0 [ 217.199903][ T6835] do_syscall_64+0x4c/0xa0 [ 217.204324][ T6835] ? clear_bhb_loop+0x50/0xa0 [ 217.209024][ T6835] ? clear_bhb_loop+0x50/0xa0 [ 217.213703][ T6835] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.219599][ T6835] RIP: 0033:0x7f1362b90be9 [ 217.224013][ T6835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.243629][ T6835] RSP: 002b:00007f13615f8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 217.252084][ T6835] RAX: ffffffffffffffda RBX: 00007f1362dc7fa0 RCX: 00007f1362b90be9 [ 217.260060][ T6835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 217.268032][ T6835] RBP: 00007f13615f9090 R08: 0000000000000000 R09: 0000000000000000 [ 217.276001][ T6835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.283970][ T6835] R13: 00007f1362dc8038 R14: 00007f1362dc7fa0 R15: 00007ffce2ebd038 [ 217.291975][ T6835] [ 217.400173][ T6841] device sit0 left promiscuous mode [ 217.464673][ T6841] device sit0 entered promiscuous mode [ 217.815715][ T6854] device syzkaller0 entered promiscuous mode [ 218.005739][ T6869] syz.4.1897[6869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.005830][ T6869] syz.4.1897[6869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.023152][ T6869] FAULT_INJECTION: forcing a failure. [ 218.023152][ T6869] name failslab, interval 1, probability 0, space 0, times 0 [ 218.061246][ T6876] device syzkaller0 entered promiscuous mode [ 218.067498][ T6869] CPU: 0 PID: 6869 Comm: syz.4.1897 Tainted: G W syzkaller #0 [ 218.076295][ T6869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 218.086356][ T6869] Call Trace: [ 218.089635][ T6869] [ 218.092564][ T6869] __dump_stack+0x21/0x30 [ 218.096901][ T6869] dump_stack_lvl+0xee/0x150 [ 218.101491][ T6869] ? show_regs_print_info+0x20/0x20 [ 218.106696][ T6869] dump_stack+0x15/0x20 [ 218.110855][ T6869] should_fail+0x3c1/0x510 [ 218.115291][ T6869] __should_failslab+0xa4/0xe0 [ 218.120073][ T6869] should_failslab+0x9/0x20 [ 218.124572][ T6869] slab_pre_alloc_hook+0x3b/0xe0 [ 218.129508][ T6869] ? copy_sighand+0x54/0x230 [ 218.134098][ T6869] kmem_cache_alloc+0x44/0x260 [ 218.138882][ T6869] copy_sighand+0x54/0x230 [ 218.143295][ T6869] ? copy_process+0x10e3/0x3210 [ 218.148145][ T6869] copy_process+0x1104/0x3210 [ 218.152824][ T6869] ? __kasan_check_write+0x14/0x20 [ 218.157935][ T6869] ? __pidfd_prepare+0x150/0x150 [ 218.162867][ T6869] ? security_file_permission+0x83/0xa0 [ 218.168417][ T6869] kernel_clone+0x23f/0x940 [ 218.172953][ T6869] ? create_io_thread+0x130/0x130 [ 218.177984][ T6869] ? __kasan_check_write+0x14/0x20 [ 218.183108][ T6869] ? mutex_unlock+0x89/0x220 [ 218.187703][ T6869] __x64_sys_clone+0x176/0x1d0 [ 218.192481][ T6869] ? __kasan_check_write+0x14/0x20 [ 218.197600][ T6869] ? __ia32_sys_vfork+0xf0/0xf0 [ 218.202465][ T6869] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 218.208540][ T6869] x64_sys_call+0x41f/0x9a0 [ 218.213050][ T6869] do_syscall_64+0x4c/0xa0 [ 218.217472][ T6869] ? clear_bhb_loop+0x50/0xa0 [ 218.222150][ T6869] ? clear_bhb_loop+0x50/0xa0 [ 218.226841][ T6869] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.232738][ T6869] RIP: 0033:0x7f1362b90be9 [ 218.237156][ T6869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.256764][ T6869] RSP: 002b:00007f13615f8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 218.265184][ T6869] RAX: ffffffffffffffda RBX: 00007f1362dc7fa0 RCX: 00007f1362b90be9 [ 218.273156][ T6869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 218.281136][ T6869] RBP: 00007f13615f9090 R08: 0000000000000000 R09: 0000000000000000 [ 218.289109][ T6869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.297086][ T6869] R13: 00007f1362dc8038 R14: 00007f1362dc7fa0 R15: 00007ffce2ebd038 [ 218.305073][ T6869] [ 218.345423][ T6880] device sit0 left promiscuous mode [ 218.383852][ T6880] device sit0 entered promiscuous mode [ 219.516665][ T6914] syz.3.1911[6914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.516736][ T6914] syz.3.1911[6914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.567451][ T6918] FAULT_INJECTION: forcing a failure. [ 219.567451][ T6918] name failslab, interval 1, probability 0, space 0, times 0 [ 219.608060][ T6916] device sit0 left promiscuous mode [ 219.640857][ T6916] device sit0 entered promiscuous mode [ 219.652074][ T6918] CPU: 0 PID: 6918 Comm: syz.3.1911 Tainted: G W syzkaller #0 [ 219.660890][ T6918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 219.670984][ T6918] Call Trace: [ 219.674290][ T6918] [ 219.677245][ T6918] __dump_stack+0x21/0x30 [ 219.681619][ T6918] dump_stack_lvl+0xee/0x150 [ 219.686245][ T6918] ? show_regs_print_info+0x20/0x20 [ 219.691507][ T6918] dump_stack+0x15/0x20 [ 219.695691][ T6918] should_fail+0x3c1/0x510 [ 219.700129][ T6918] __should_failslab+0xa4/0xe0 [ 219.704918][ T6918] should_failslab+0x9/0x20 [ 219.709672][ T6918] slab_pre_alloc_hook+0x3b/0xe0 [ 219.714643][ T6918] ? copy_signal+0x54/0x600 [ 219.719172][ T6918] kmem_cache_alloc+0x44/0x260 [ 219.723949][ T6918] copy_signal+0x54/0x600 [ 219.728314][ T6918] ? copy_process+0x110f/0x3210 [ 219.733198][ T6918] copy_process+0x1130/0x3210 [ 219.738009][ T6918] ? __kasan_check_write+0x14/0x20 [ 219.743157][ T6918] ? __pidfd_prepare+0x150/0x150 [ 219.748123][ T6918] ? security_file_permission+0x83/0xa0 [ 219.753695][ T6918] kernel_clone+0x23f/0x940 [ 219.758221][ T6918] ? create_io_thread+0x130/0x130 [ 219.763354][ T6918] ? __kasan_check_write+0x14/0x20 [ 219.768471][ T6918] ? mutex_unlock+0x89/0x220 [ 219.773087][ T6918] __x64_sys_clone+0x176/0x1d0 [ 219.778118][ T6918] ? __kasan_check_write+0x14/0x20 [ 219.783259][ T6918] ? __ia32_sys_vfork+0xf0/0xf0 [ 219.788207][ T6918] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 219.794276][ T6918] x64_sys_call+0x41f/0x9a0 [ 219.798786][ T6918] do_syscall_64+0x4c/0xa0 [ 219.803209][ T6918] ? clear_bhb_loop+0x50/0xa0 [ 219.808028][ T6918] ? clear_bhb_loop+0x50/0xa0 [ 219.812736][ T6918] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.818632][ T6918] RIP: 0033:0x7fde37a59be9 [ 219.823068][ T6918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.842680][ T6918] RSP: 002b:00007fde364a0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 219.851101][ T6918] RAX: ffffffffffffffda RBX: 00007fde37c91090 RCX: 00007fde37a59be9 [ 219.859081][ T6918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 219.867067][ T6918] RBP: 00007fde364a1090 R08: 0000000000000000 R09: 0000000000000000 [ 219.875065][ T6918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.883044][ T6918] R13: 00007fde37c91128 R14: 00007fde37c91090 R15: 00007ffd2f648358 [ 219.891038][ T6918] [ 220.113289][ T6938] device sit0 left promiscuous mode [ 220.215451][ T6949] device sit0 entered promiscuous mode [ 220.375533][ T6958] syz.2.1925[6958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.375596][ T6958] syz.2.1925[6958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.395296][ T6958] FAULT_INJECTION: forcing a failure. [ 220.395296][ T6958] name failslab, interval 1, probability 0, space 0, times 0 [ 220.420056][ T6958] CPU: 1 PID: 6958 Comm: syz.2.1925 Tainted: G W syzkaller #0 [ 220.428875][ T6958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 220.447884][ T6958] Call Trace: [ 220.451168][ T6958] [ 220.454103][ T6958] __dump_stack+0x21/0x30 [ 220.458438][ T6958] dump_stack_lvl+0xee/0x150 [ 220.463034][ T6958] ? show_regs_print_info+0x20/0x20 [ 220.468239][ T6958] ? slab_post_alloc_hook+0x4f/0x2b0 [ 220.473530][ T6958] ? copy_signal+0x54/0x600 [ 220.478040][ T6958] ? copy_process+0x1130/0x3210 [ 220.482891][ T6958] ? kernel_clone+0x23f/0x940 [ 220.487568][ T6958] ? x64_sys_call+0x41f/0x9a0 [ 220.492243][ T6958] ? do_syscall_64+0x4c/0xa0 [ 220.496839][ T6958] dump_stack+0x15/0x20 [ 220.501170][ T6958] should_fail+0x3c1/0x510 [ 220.505587][ T6958] __should_failslab+0xa4/0xe0 [ 220.510351][ T6958] should_failslab+0x9/0x20 [ 220.514970][ T6958] slab_pre_alloc_hook+0x3b/0xe0 [ 220.519909][ T6958] ? copy_mm+0x18c/0x1390 [ 220.524240][ T6958] kmem_cache_alloc+0x44/0x260 [ 220.529013][ T6958] copy_mm+0x18c/0x1390 [ 220.533169][ T6958] ? _raw_spin_lock+0x8e/0xe0 [ 220.537848][ T6958] ? _raw_spin_trylock_bh+0x130/0x130 [ 220.543242][ T6958] ? copy_signal+0x600/0x600 [ 220.547835][ T6958] ? __init_rwsem+0xfc/0x1d0 [ 220.552425][ T6958] ? copy_signal+0x4cb/0x600 [ 220.557020][ T6958] copy_process+0x115c/0x3210 [ 220.561716][ T6958] ? __kasan_check_write+0x14/0x20 [ 220.566836][ T6958] ? __pidfd_prepare+0x150/0x150 [ 220.571778][ T6958] ? security_file_permission+0x83/0xa0 [ 220.577335][ T6958] kernel_clone+0x23f/0x940 [ 220.581844][ T6958] ? create_io_thread+0x130/0x130 [ 220.586899][ T6958] ? __kasan_check_write+0x14/0x20 [ 220.592016][ T6958] ? mutex_unlock+0x89/0x220 [ 220.596610][ T6958] __x64_sys_clone+0x176/0x1d0 [ 220.601373][ T6958] ? __kasan_check_write+0x14/0x20 [ 220.606487][ T6958] ? __ia32_sys_vfork+0xf0/0xf0 [ 220.611342][ T6958] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 220.617415][ T6958] x64_sys_call+0x41f/0x9a0 [ 220.621924][ T6958] do_syscall_64+0x4c/0xa0 [ 220.626350][ T6958] ? clear_bhb_loop+0x50/0xa0 [ 220.631029][ T6958] ? clear_bhb_loop+0x50/0xa0 [ 220.635713][ T6958] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 220.641611][ T6958] RIP: 0033:0x7ff5a553bbe9 [ 220.646026][ T6958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.665632][ T6958] RSP: 002b:00007ff5a3fa3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 220.674054][ T6958] RAX: ffffffffffffffda RBX: 00007ff5a5772fa0 RCX: 00007ff5a553bbe9 [ 220.682026][ T6958] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 220.690006][ T6958] RBP: 00007ff5a3fa4090 R08: 0000000000000000 R09: 0000000000000000 [ 220.698197][ T6958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 220.706185][ T6958] R13: 00007ff5a5773038 R14: 00007ff5a5772fa0 R15: 00007ffe8a66e848 [ 220.714182][ T6958] [ 220.720861][ T6962] device sit0 left promiscuous mode [ 220.788981][ T6967] device sit0 entered promiscuous mode [ 221.148208][ T6986] device sit0 left promiscuous mode [ 221.534347][ T7004] device pim6reg1 entered promiscuous mode [ 221.559110][ T7009] device sit0 left promiscuous mode [ 221.597123][ T7009] device sit0 entered promiscuous mode [ 221.950130][ T7023] device syzkaller0 entered promiscuous mode [ 222.594541][ T7051] device sit0 left promiscuous mode [ 222.749855][ T7053] device sit0 entered promiscuous mode [ 222.916364][ T7061] device syzkaller0 entered promiscuous mode [ 223.076409][ T7082] syz.0.1962[7082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.076482][ T7082] syz.0.1962[7082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.111999][ T7082] FAULT_INJECTION: forcing a failure. [ 223.111999][ T7082] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 223.183972][ T7082] CPU: 0 PID: 7082 Comm: syz.0.1962 Tainted: G W syzkaller #0 [ 223.192808][ T7082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.202889][ T7082] Call Trace: [ 223.206185][ T7082] [ 223.209119][ T7082] __dump_stack+0x21/0x30 [ 223.213456][ T7082] dump_stack_lvl+0xee/0x150 [ 223.218053][ T7082] ? show_regs_print_info+0x20/0x20 [ 223.223255][ T7082] ? stack_trace_save+0x98/0xe0 [ 223.228113][ T7082] ? _find_next_bit+0x106/0x200 [ 223.232970][ T7082] dump_stack+0x15/0x20 [ 223.237135][ T7082] should_fail+0x3c1/0x510 [ 223.241559][ T7082] should_fail_alloc_page+0x55/0x80 [ 223.246760][ T7082] prepare_alloc_pages+0x156/0x600 [ 223.251879][ T7082] ? __alloc_pages_bulk+0xab0/0xab0 [ 223.257173][ T7082] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 223.263856][ T7082] __alloc_pages+0x10a/0x440 [ 223.268451][ T7082] ? prep_new_page+0x110/0x110 [ 223.273219][ T7082] __get_free_pages+0x10/0x30 [ 223.277923][ T7082] pgd_alloc+0x21/0x280 [ 223.282077][ T7082] mm_init+0x594/0x980 [ 223.286148][ T7082] copy_mm+0x1dd/0x1390 [ 223.290306][ T7082] ? _raw_spin_lock+0x8e/0xe0 [ 223.294984][ T7082] ? _raw_spin_trylock_bh+0x130/0x130 [ 223.300359][ T7082] ? copy_signal+0x600/0x600 [ 223.304948][ T7082] ? __init_rwsem+0xfc/0x1d0 [ 223.309541][ T7082] ? copy_signal+0x4cb/0x600 [ 223.314128][ T7082] copy_process+0x115c/0x3210 [ 223.318814][ T7082] ? __kasan_check_write+0x14/0x20 [ 223.323946][ T7082] ? __pidfd_prepare+0x150/0x150 [ 223.328888][ T7082] ? security_file_permission+0x83/0xa0 [ 223.334442][ T7082] kernel_clone+0x23f/0x940 [ 223.338955][ T7082] ? create_io_thread+0x130/0x130 [ 223.343982][ T7082] ? __kasan_check_write+0x14/0x20 [ 223.349092][ T7082] ? mutex_unlock+0x89/0x220 [ 223.353681][ T7082] __x64_sys_clone+0x176/0x1d0 [ 223.358450][ T7082] ? __kasan_check_write+0x14/0x20 [ 223.363565][ T7082] ? __ia32_sys_vfork+0xf0/0xf0 [ 223.368421][ T7082] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 223.374496][ T7082] x64_sys_call+0x41f/0x9a0 [ 223.379004][ T7082] do_syscall_64+0x4c/0xa0 [ 223.383473][ T7082] ? clear_bhb_loop+0x50/0xa0 [ 223.388173][ T7082] ? clear_bhb_loop+0x50/0xa0 [ 223.392854][ T7082] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.398753][ T7082] RIP: 0033:0x7fe4e1d06be9 [ 223.403171][ T7082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.422785][ T7082] RSP: 002b:00007fe4e076efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 223.431295][ T7082] RAX: ffffffffffffffda RBX: 00007fe4e1f3dfa0 RCX: 00007fe4e1d06be9 [ 223.439270][ T7082] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 223.447265][ T7082] RBP: 00007fe4e076f090 R08: 0000000000000000 R09: 0000000000000000 [ 223.455242][ T7082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.463233][ T7082] R13: 00007fe4e1f3e038 R14: 00007fe4e1f3dfa0 R15: 00007ffc9b79f508 [ 223.471219][ T7082] [ 224.055100][ T7112] device sit0 entered promiscuous mode [ 227.543218][ T7146] device wg2 left promiscuous mode [ 227.755699][ T7162] device sit0 left promiscuous mode [ 227.763752][ T7163] syz.4.1984[7163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.763822][ T7163] syz.4.1984[7163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.830340][ T7162] device sit0 entered promiscuous mode [ 227.892203][ T7167] device veth1_macvtap left promiscuous mode [ 228.093483][ T7157] device syzkaller0 entered promiscuous mode [ 228.482536][ T30] audit: type=1400 audit(1756882112.506:162): avc: denied { setattr } for pid=7182 comm="syz.3.1989" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 229.308380][ T7192] device syzkaller0 entered promiscuous mode [ 229.416747][ T7203] device sit0 left promiscuous mode [ 229.504890][ T7203] device sit0 entered promiscuous mode [ 230.333292][ T7232] device pim6reg1 entered promiscuous mode [ 230.543774][ T7248] device sit0 left promiscuous mode [ 230.592354][ T7248] device sit0 entered promiscuous mode [ 231.690483][ T7283] device sit0 left promiscuous mode [ 231.767174][ T7283] device sit0 entered promiscuous mode [ 233.144057][ T7325] device pim6reg1 entered promiscuous mode [ 233.175535][ T7327] device sit0 left promiscuous mode [ 233.250236][ T7327] device sit0 entered promiscuous mode [ 233.541307][ T7356] device pim6reg1 entered promiscuous mode [ 233.624197][ T7357] device pim6reg1 entered promiscuous mode [ 237.462470][ T7418] device sit0 left promiscuous mode [ 237.515101][ T7420] device sit0 entered promiscuous mode [ 238.150909][ T7456] device syzkaller0 entered promiscuous mode [ 240.647395][ T30] audit: type=1400 audit(1756882124.676:163): avc: denied { read } for pid=7524 comm="syz.2.2090" name="cgroup.subtree_control" dev="cgroup2" ino=280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 241.233931][ T7533] device sit0 left promiscuous mode [ 241.432543][ T7549] device sit0 entered promiscuous mode [ 241.469354][ T7551] device sit0 left promiscuous mode [ 241.482682][ T7552] device sit0 entered promiscuous mode [ 242.400386][ T7581] device pim6reg1 entered promiscuous mode [ 242.723316][ T7603] device sit0 left promiscuous mode [ 242.767106][ T7605] device sit0 entered promiscuous mode [ 243.309468][ T7638] device sit0 left promiscuous mode [ 243.552182][ T7643] device sit0 entered promiscuous mode [ 243.699676][ T7645] device pim6reg1 entered promiscuous mode [ 244.426376][ T7681] device syzkaller0 entered promiscuous mode [ 244.936200][ T7693] device wg2 left promiscuous mode [ 245.115858][ T7731] device veth0_vlan left promiscuous mode [ 245.175375][ T7731] device veth0_vlan entered promiscuous mode [ 245.303724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.313308][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 245.355933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.523660][ T7746] device pim6reg1 entered promiscuous mode [ 245.600353][ T7744] device syzkaller0 entered promiscuous mode [ 246.415987][ T7786] device wg2 entered promiscuous mode [ 248.236321][ T7865] device sit0 left promiscuous mode [ 248.328012][ T7871] device sit0 entered promiscuous mode [ 248.562635][ T7887] device syzkaller0 entered promiscuous mode [ 249.045092][ T7910] device sit0 left promiscuous mode [ 249.176412][ T7915] device sit0 entered promiscuous mode [ 249.995078][ T7956] device sit0 left promiscuous mode [ 250.066501][ T7956] device sit0 entered promiscuous mode [ 250.437665][ T7969] device pim6reg1 left promiscuous mode [ 251.618553][ T8003] device sit0 entered promiscuous mode [ 251.832039][ T8011] device pim6reg1 entered promiscuous mode [ 252.190987][ T8024] device syzkaller0 entered promiscuous mode [ 252.820559][ T8056] device pim6reg1 entered promiscuous mode [ 252.914400][ T8059] device sit0 left promiscuous mode [ 252.978010][ T8061] device sit0 entered promiscuous mode [ 253.956061][ T8098] device pim6reg1 entered promiscuous mode [ 253.963888][ T8099] device pim6reg1 entered promiscuous mode [ 254.901735][ T8129] device pim6reg1 entered promiscuous mode [ 255.246232][ T8138] device pim6reg1 entered promiscuous mode [ 255.695649][ T8168] device pim6reg1 entered promiscuous mode [ 256.309342][ T8185] device sit0 left promiscuous mode [ 256.388508][ T8185] device sit0 entered promiscuous mode [ 256.657741][ T8207] device wg2 left promiscuous mode [ 256.732179][ T8207] bridge0: port 3(veth0) entered blocking state [ 256.744588][ T8207] bridge0: port 3(veth0) entered disabled state [ 256.767925][ T8207] device veth0 entered promiscuous mode [ 256.882062][ T30] audit: type=1400 audit(1756882140.906:164): avc: denied { create } for pid=8198 comm="syz.2.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 256.977201][ T8218] device syzkaller0 entered promiscuous mode [ 257.011446][ T8216] device pim6reg1 entered promiscuous mode [ 257.034994][ T8228] device sit0 left promiscuous mode [ 257.066120][ T8231] device syzkaller0 entered promiscuous mode [ 257.181603][ T8250] device sit0 left promiscuous mode [ 257.254724][ T8250] device sit0 entered promiscuous mode [ 257.442134][ T8267] device pim6reg1 entered promiscuous mode [ 258.074057][ T8288] device sit0 left promiscuous mode [ 258.234556][ T8288] device sit0 entered promiscuous mode [ 258.676816][ T8299] device pim6reg1 entered promiscuous mode [ 258.802898][ T8303] device sit0 entered promiscuous mode [ 258.965758][ T8305] device pim6reg1 entered promiscuous mode [ 259.046357][ T8316] device syzkaller0 entered promiscuous mode [ 261.993276][ T8334] €Â0: renamed from pim6reg1 [ 262.006281][ T8347] device sit0 left promiscuous mode [ 262.026180][ T8349] device sit0 entered promiscuous mode [ 262.129115][ T8358] device pim6reg1 entered promiscuous mode [ 262.368938][ T8383] device sit0 left promiscuous mode [ 262.402174][ T8383] device sit0 entered promiscuous mode [ 265.337626][ T8496] device pim6reg1 left promiscuous mode [ 266.472139][ T8544] device sit0 left promiscuous mode [ 266.619023][ T8554] device sit0 entered promiscuous mode [ 270.106098][ T8651] device pim6reg1 entered promiscuous mode [ 271.726016][ T8702] cgroup: fork rejected by pids controller in /syz2 [ 271.774462][ T8708] syz.3.2445[8708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.774541][ T8708] syz.3.2445[8708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.588906][ T8722] device pim6reg1 left promiscuous mode [ 272.892727][ T8735] syz.1.2456[8735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.892803][ T8735] syz.1.2456[8735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.033138][ T8735] FAULT_INJECTION: forcing a failure. [ 273.033138][ T8735] name failslab, interval 1, probability 0, space 0, times 0 [ 273.110598][ T8735] CPU: 0 PID: 8735 Comm: syz.1.2456 Tainted: G W syzkaller #0 [ 273.119447][ T8735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 273.129520][ T8735] Call Trace: [ 273.132829][ T8735] [ 273.135769][ T8735] __dump_stack+0x21/0x30 [ 273.140126][ T8735] dump_stack_lvl+0xee/0x150 [ 273.144721][ T8735] ? show_regs_print_info+0x20/0x20 [ 273.149941][ T8735] dump_stack+0x15/0x20 [ 273.154122][ T8735] should_fail+0x3c1/0x510 [ 273.158554][ T8735] __should_failslab+0xa4/0xe0 [ 273.163332][ T8735] should_failslab+0x9/0x20 [ 273.167851][ T8735] slab_pre_alloc_hook+0x3b/0xe0 [ 273.172806][ T8735] ? vm_area_dup+0x26/0x210 [ 273.177329][ T8735] kmem_cache_alloc+0x44/0x260 [ 273.182104][ T8735] vm_area_dup+0x26/0x210 [ 273.186437][ T8735] copy_mm+0x93a/0x1390 [ 273.190615][ T8735] ? copy_signal+0x600/0x600 [ 273.195210][ T8735] ? __init_rwsem+0xfc/0x1d0 [ 273.199810][ T8735] ? copy_signal+0x4cb/0x600 [ 273.204407][ T8735] copy_process+0x115c/0x3210 [ 273.209106][ T8735] ? __kasan_check_write+0x14/0x20 [ 273.214240][ T8735] ? __pidfd_prepare+0x150/0x150 [ 273.219208][ T8735] ? security_file_permission+0x83/0xa0 [ 273.224768][ T8735] kernel_clone+0x23f/0x940 [ 273.229484][ T8735] ? create_io_thread+0x130/0x130 [ 273.234530][ T8735] ? __kasan_check_write+0x14/0x20 [ 273.239648][ T8735] ? mutex_unlock+0x89/0x220 [ 273.244252][ T8735] __x64_sys_clone+0x176/0x1d0 [ 273.249027][ T8735] ? __kasan_check_write+0x14/0x20 [ 273.254154][ T8735] ? __ia32_sys_vfork+0xf0/0xf0 [ 273.259019][ T8735] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 273.265094][ T8735] x64_sys_call+0x41f/0x9a0 [ 273.269604][ T8735] do_syscall_64+0x4c/0xa0 [ 273.274036][ T8735] ? clear_bhb_loop+0x50/0xa0 [ 273.278812][ T8735] ? clear_bhb_loop+0x50/0xa0 [ 273.283492][ T8735] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 273.289389][ T8735] RIP: 0033:0x7fc44bdcabe9 [ 273.293804][ T8735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 273.313422][ T8735] RSP: 002b:00007fc44a832fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 273.321841][ T8735] RAX: ffffffffffffffda RBX: 00007fc44c001fa0 RCX: 00007fc44bdcabe9 [ 273.329830][ T8735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 273.337809][ T8735] RBP: 00007fc44a833090 R08: 0000000000000000 R09: 0000000000000000 [ 273.345785][ T8735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.353759][ T8735] R13: 00007fc44c002038 R14: 00007fc44c001fa0 R15: 00007ffea818bc78 [ 273.361764][ T8735] [ 273.391974][ T284] syz-executor (284) used greatest stack depth: 21792 bytes left [ 273.643548][ T8751] device wg2 left promiscuous mode [ 273.673988][ T8765] device pim6reg1 entered promiscuous mode [ 273.699497][ T8769] device pim6reg1 entered promiscuous mode [ 273.718512][ T8754] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.725668][ T8754] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.733327][ T8754] device bridge_slave_0 entered promiscuous mode [ 273.742574][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.749677][ T8754] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.757677][ T8754] device bridge_slave_1 entered promiscuous mode [ 273.828973][ T345] device erspan0 left promiscuous mode [ 273.834664][ T345] GPL: port 1(erspan0) entered disabled state [ 273.847601][ T30] audit: type=1400 audit(1756882157.876:165): avc: denied { create } for pid=8754 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.875074][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.882198][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.889528][ T8754] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.896615][ T8754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.957100][ T30] audit: type=1400 audit(1756882157.876:166): avc: denied { write } for pid=8754 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 274.011788][ T30] audit: type=1400 audit(1756882157.876:167): avc: denied { read } for pid=8754 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 274.073163][ T8774] device sit0 left promiscuous mode [ 274.173620][ T8782] device sit0 entered promiscuous mode [ 274.213260][ T8789] syz.1.2471[8789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.213337][ T8789] syz.1.2471[8789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.238638][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.258227][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.266674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.291326][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.301592][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.310100][ T8791] FAULT_INJECTION: forcing a failure. [ 274.310100][ T8791] name failslab, interval 1, probability 0, space 0, times 0 [ 274.325419][ T8791] CPU: 0 PID: 8791 Comm: syz.1.2471 Tainted: G W syzkaller #0 [ 274.334273][ T8791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 274.341640][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.344373][ T8791] Call Trace: [ 274.344380][ T8791] [ 274.344388][ T8791] __dump_stack+0x21/0x30 [ 274.344416][ T8791] dump_stack_lvl+0xee/0x150 [ 274.365244][ T8754] device veth0_vlan entered promiscuous mode [ 274.367795][ T8791] ? show_regs_print_info+0x20/0x20 [ 274.374692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.378976][ T8791] dump_stack+0x15/0x20 [ 274.379002][ T8791] should_fail+0x3c1/0x510 [ 274.379022][ T8791] __should_failslab+0xa4/0xe0 [ 274.379043][ T8791] should_failslab+0x9/0x20 [ 274.379062][ T8791] slab_pre_alloc_hook+0x3b/0xe0 [ 274.379085][ T8791] ? anon_vma_fork+0x200/0x510 [ 274.379103][ T8791] kmem_cache_alloc+0x44/0x260 [ 274.379125][ T8791] anon_vma_fork+0x200/0x510 [ 274.379145][ T8791] copy_mm+0x9d1/0x1390 [ 274.379169][ T8791] ? copy_signal+0x600/0x600 [ 274.379187][ T8791] ? __init_rwsem+0xfc/0x1d0 [ 274.379207][ T8791] ? copy_signal+0x4cb/0x600 [ 274.379224][ T8791] copy_process+0x115c/0x3210 [ 274.379251][ T8791] ? __kasan_check_write+0x14/0x20 [ 274.389445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.391034][ T8791] ? __pidfd_prepare+0x150/0x150 [ 274.395832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.400204][ T8791] ? security_file_permission+0x83/0xa0 [ 274.400234][ T8791] kernel_clone+0x23f/0x940 [ 274.412426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.414529][ T8791] ? create_io_thread+0x130/0x130 [ 274.420764][ T8754] device veth1_macvtap entered promiscuous mode [ 274.423880][ T8791] ? __kasan_check_write+0x14/0x20 [ 274.423907][ T8791] ? mutex_unlock+0x89/0x220 [ 274.434444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.437225][ T8791] __x64_sys_clone+0x176/0x1d0 [ 274.522798][ T8791] ? __kasan_check_write+0x14/0x20 [ 274.527927][ T8791] ? __ia32_sys_vfork+0xf0/0xf0 [ 274.532877][ T8791] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 274.538965][ T8791] x64_sys_call+0x41f/0x9a0 [ 274.543467][ T8791] do_syscall_64+0x4c/0xa0 [ 274.547881][ T8791] ? clear_bhb_loop+0x50/0xa0 [ 274.552555][ T8791] ? clear_bhb_loop+0x50/0xa0 [ 274.557264][ T8791] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 274.563166][ T8791] RIP: 0033:0x7fc44bdcabe9 [ 274.567582][ T8791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.587294][ T8791] RSP: 002b:00007fc44a811fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 274.595722][ T8791] RAX: ffffffffffffffda RBX: 00007fc44c002090 RCX: 00007fc44bdcabe9 [ 274.603704][ T8791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 274.611681][ T8791] RBP: 00007fc44a812090 R08: 0000000000000000 R09: 0000000000000000 [ 274.619662][ T8791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 274.627630][ T8791] R13: 00007fc44c002128 R14: 00007fc44c002090 R15: 00007ffea818bc78 [ 274.635611][ T8791] [ 274.647082][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.657598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.675973][ T345] device bridge_slave_1 left promiscuous mode [ 274.689761][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.702479][ T345] device bridge_slave_0 left promiscuous mode [ 274.711608][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.726115][ T345] device veth0_vlan left promiscuous mode [ 274.972909][ T8799] device syzkaller0 entered promiscuous mode [ 275.847559][ T8873] device pim6reg1 left promiscuous mode [ 276.751963][ T8908] device sit0 left promiscuous mode [ 276.934570][ T8909] device sit0 entered promiscuous mode [ 277.930543][ T8963] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.937874][ T8963] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.163838][ T8963] device bridge_slave_1 left promiscuous mode [ 278.224830][ T8963] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.252411][ T8963] device bridge_slave_0 left promiscuous mode [ 278.258582][ T8963] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.011427][ T9007] syz.3.2537[9007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.011529][ T9007] syz.3.2537[9007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.294766][ T9014] device pim6reg1 entered promiscuous mode [ 280.181789][ T9045] device pim6reg1 entered promiscuous mode [ 280.782172][ T9056] device syzkaller0 entered promiscuous mode [ 280.922630][ T283] syz-executor (283) used greatest stack depth: 21760 bytes left [ 281.287545][ T9102] device syzkaller0 entered promiscuous mode [ 281.581448][ T9104] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.605959][ T9104] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.632575][ T9104] device bridge_slave_0 entered promiscuous mode [ 281.675068][ T9104] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.717146][ T9104] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.766226][ T9104] device bridge_slave_1 entered promiscuous mode [ 282.225889][ T9148] device veth0_vlan left promiscuous mode [ 282.239499][ T9148] device veth0_vlan entered promiscuous mode [ 282.674620][ T9161] device syzkaller0 entered promiscuous mode [ 282.925741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.948006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.992307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.041115][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.087194][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.094317][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.152017][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.161473][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.170024][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.177147][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.185237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.198481][ T345] GPL: port 1(erspan0) entered disabled state [ 283.223478][ T345] device erspan0 left promiscuous mode [ 283.228971][ T345] GPL: port 1(erspan0) entered disabled state [ 283.277192][ T9202] device sit0 left promiscuous mode [ 283.354452][ T9204] device sit0 entered promiscuous mode [ 283.453096][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.461695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.671483][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.680034][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.861267][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.872654][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.201762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.210786][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.223669][ T9104] device veth0_vlan entered promiscuous mode [ 284.267878][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.276588][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.293841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.302768][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.313464][ T9104] device veth1_macvtap entered promiscuous mode [ 284.337074][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.346139][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.356615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.424938][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.442895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.288949][ T9262] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.374887][ T9262] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.456355][ T9262] device bridge_slave_0 entered promiscuous mode [ 285.514623][ T9262] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.521800][ T9262] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.529701][ T9262] device bridge_slave_1 entered promiscuous mode [ 286.070682][ T9281] device pim6reg1 entered promiscuous mode [ 286.174940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.188445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.198980][ T345] device bridge_slave_1 left promiscuous mode [ 286.205684][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.213937][ T345] device bridge_slave_0 left promiscuous mode [ 286.220174][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.229200][ T345] device veth1_macvtap left promiscuous mode [ 286.238748][ T345] device veth0_vlan left promiscuous mode [ 286.422826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.438149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.449980][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.457034][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.464699][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.473577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.481769][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.488902][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.496293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.505600][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.513662][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.688968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.698418][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.806579][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.814702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.940953][ T9262] device veth0_vlan entered promiscuous mode [ 287.084172][ T9309] device sit0 left promiscuous mode [ 287.165718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.173428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.190099][ T9319] device sit0 entered promiscuous mode [ 287.317545][ T9262] device veth1_macvtap entered promiscuous mode [ 287.332740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 287.341515][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.349895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.416061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 287.424462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 287.490732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.508766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.528326][ T9335] device veth1_macvtap left promiscuous mode [ 288.117964][ T9366] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.125437][ T9366] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.133118][ T9366] device bridge_slave_0 entered promiscuous mode [ 288.161908][ T9366] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.169036][ T9366] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.176649][ T9366] device bridge_slave_1 entered promiscuous mode [ 288.567195][ T9366] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.574332][ T9366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.581647][ T9366] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.588718][ T9366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.492325][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.511974][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.728546][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.762355][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.799986][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.811274][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.820370][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.827468][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.843611][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.856480][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.870266][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.877622][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.908104][ T345] device bridge_slave_1 left promiscuous mode [ 289.942046][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.953380][ T345] device bridge_slave_0 left promiscuous mode [ 289.959574][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.979346][ T345] device veth1_macvtap left promiscuous mode [ 289.985463][ T345] device veth0_vlan left promiscuous mode [ 290.332047][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.340319][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.382646][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.446935][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.455326][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.464087][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.472998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.481024][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.489469][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.502714][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.536329][ T9366] device veth0_vlan entered promiscuous mode [ 290.603623][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.713234][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.763746][ T9366] device veth1_macvtap entered promiscuous mode [ 290.784843][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.800887][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.815432][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.865133][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.873767][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.929146][ T9437] ip6_vti0: mtu greater than device maximum [ 291.678195][ T9465] device veth0_vlan left promiscuous mode [ 291.707967][ T9465] device veth0_vlan entered promiscuous mode [ 291.959341][ T9469] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.966570][ T9469] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.974288][ T9469] device bridge_slave_0 entered promiscuous mode [ 292.004834][ T9469] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.012107][ T9469] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.019707][ T9469] device bridge_slave_1 entered promiscuous mode [ 292.204036][ T345] device bridge_slave_1 left promiscuous mode [ 292.210428][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.219242][ T345] device bridge_slave_0 left promiscuous mode [ 292.235421][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.252317][ T345] device veth1_macvtap left promiscuous mode [ 292.258431][ T345] device veth0_vlan left promiscuous mode [ 292.812331][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.820080][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.881078][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.896711][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.916774][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.923909][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.957812][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.982186][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.995540][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.002673][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.010529][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.019866][ T9538] device sit0 left promiscuous mode [ 293.031958][ T9542] device sit0 entered promiscuous mode [ 293.070779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.081425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.199454][ T9540] device syzkaller0 entered promiscuous mode [ 293.260870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.283861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.419313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.437754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.484321][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.515392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.544893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.557751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.616549][ T9469] device veth0_vlan entered promiscuous mode [ 293.723836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.744499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.806121][ T9469] device veth1_macvtap entered promiscuous mode [ 293.870392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.883062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.908702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.993857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.012466][ T30] audit: type=1400 audit(1756882178.046:168): avc: denied { read } for pid=9572 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 294.103268][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.208105][ T30] audit: type=1400 audit(1756882178.176:169): avc: denied { unmount } for pid=9469 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 294.237523][ T9584] device sit0 entered promiscuous mode Stopping sshd: stopped /usr/sbin/sshd (pid 192) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 294.483089][ T30] audit: type=1400 audit(1756882178.516:170): avc: denied { search } for pid=9601 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 294.572378][ T30] audit: type=1400 audit(1756882178.606:171): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 294.597481][ T30] audit: type=1400 audit(1756882178.606:172): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 294.639891][ T30] audit: type=1400 audit(1756882178.606:173): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 294.671205][ T30] audit: type=1400 audit(1756882178.656:174): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: [ 294.713939][ T30] audit: type=1400 audit(1756882178.746:175): avc: denied { search } for pid=9615 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 294.739175][ T30] audit: type=1400 audit(1756882178.746:176): avc: denied { write } for pid=9615 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping system [ 294.762559][ T30] audit: type=1400 audit(1756882178.746:177): avc: denied { add_name } for pid=9615 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 message bus: [ 294.884580][ T9622] device syzkaller0 entered promiscuous mode done [ 294.921137][ T9625] device pim6reg1 entered promiscuous mode [ 294.963491][ T9634] device syzkaller0 entered promiscuous mode killall: udevd: no process killed Stopping klogd: [ 295.316983][ T9641] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.351941][ T9641] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.392327][ T9641] device bridge_slave_0 entered promiscuous mode OK [ 295.475929][ T9641] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.487316][ T9641] bridge0: port 2(bridge_slave_1) entered disabled state Stopping acpid: [ 295.552404][ T9641] device bridge_slave_1 entered promiscuous mode [ 295.597785][ T9673] device sit0 left promiscuous mode [ 295.655836][ T9676] device sit0 entered promiscuous mode [ 295.944046][ T345] device bridge_slave_1 left promiscuous mode [ 295.950258][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.959060][ T345] device bridge_slave_0 left promiscuous mode [ 295.965470][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.974682][ T345] device veth1_macvtap left promiscuous mode [ 295.980839][ T345] device veth0_vlan left promiscuous mode [ 296.339638][ T9697] device syzkaller0 entered promiscuous mode [ 296.461605][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.471440][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.543097][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.582899][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.591931][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.600278][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.607381][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state OK [ 296.624685][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready Stopping syslogd: [ 296.638244][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready stopped /sbin/syslogd (pid 83) OK [ 296.658795][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.665886][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.685880][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.701805][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.736935][ T9730] device sit0 left promiscuous mode umount: can't re[ 296.820983][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready mount debugfs read-only [ 296.843538][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.880573][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.900607][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.917599][ T9730] device sit0 entered promiscuous mode Connection to 10.128.0.77 closed by remote host. [ 297.054887][ T9641] device veth0_vlan entered promiscuous mode umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: c[ 297.362633][ T282] syz-executor (282) used greatest stack depth: 21120 bytes left [ 298.103758][ T345] GPL: port 1(erspan0) entered disabled state [ 298.111418][ T345] device erspan0 left promiscuous mode [ 298.116925][ T345] GPL: port 1(erspan0) entered disabled state Sent SIGKILL to all processes Requesting system poweroff [ 298.423157][ T345] device bridge_slave_1 left promiscuous mode [ 298.429460][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.437058][ T345] device bridge_slave_0 left promiscuous mode [ 298.443374][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.451746][ T345] device bridge_slave_1 left promiscuous mode [ 298.457910][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.465526][ T345] device bridge_slave_0 left promiscuous mode [ 298.471637][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.480028][ T345] device veth0_vlan left promiscuous mode [ 298.486078][ T345] device veth0_vlan left promiscuous mode [ 299.170807][ T9734] kvm: exiting hardware virtualization [ 299.177880][ T9734] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 299.184643][ T9734] ACPI: PM: Preparing to enter system sleep state S5 [ 299.191695][ T9734] reboot: Power down serialport: VM disconnected.