last executing test programs: 12.485513452s ago: executing program 2 (id=3097): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES8=r0, @ANYRES16=r1, @ANYRESOCT=r1], 0x48) bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0000000400000004000000be3a000000000000", @ANYRES32=r2, @ANYBLOB="000272f85b00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f00000018c0)={0x0, 0xfffffffffffffe3d, 0x0, 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18, 0xf0c72eff9aa30eb4}, 0x0) close(r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="02"], 0x10) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000001180)=ANY=[@ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="02"], 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x2, 0x0, 0x0, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) 12.02198424s ago: executing program 2 (id=3099): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x800}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) 11.831484603s ago: executing program 2 (id=3104): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c250000000000202020609af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000000338b3ecfed23a5a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 8.453762106s ago: executing program 2 (id=3104): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c250000000000202020609af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000000338b3ecfed23a5a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.886548533s ago: executing program 4 (id=3170): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r7) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000180)="87057e28d4f34bc83c374df5198532c0774e69b67fec2cc5611664aa017cf91d199a76c0edda19531d23a7ea0cd49d245458c75be3a7e3d1b2c6a9b1983bb4a1e7e1467775d5e250f9e2e69fd71ab355e880e8b41771876027035e8855366b9fd5b21dd42aafb551ffb9250ef40a30b119b5e1a3e6d08495742bac74c08cd166e63322e3aea6fbe3010290efaf56f34c", 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r1, 0x4008744b, 0xf0ff1f00000000) 4.827251403s ago: executing program 2 (id=3104): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c250000000000202020609af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000000338b3ecfed23a5a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.506579239s ago: executing program 4 (id=3174): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000180), &(0x7f0000000200)='%pK \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f00000100000000", @ANYRES32, @ANYBLOB="da890000000000010000f75a00000000e6000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES8, @ANYRES8=r1, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x180, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000100000400"], 0x50) (fail_nth: 64) 4.296489132s ago: executing program 4 (id=3177): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r7) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000180)="87057e28d4f34bc83c374df5198532c0774e69b67fec2cc5611664aa017cf91d199a76c0edda19531d23a7ea0cd49d245458c75be3a7e3d1b2c6a9b1983bb4a1e7e1467775d5e250f9e2e69fd71ab355e880e8b41771876027035e8855366b9fd5b21dd42aafb551ffb9250ef40a30b119b5e1a3e6d08495742bac74c08cd166e63322e3aea6fbe3010290efaf56f34c", 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r1, 0x4008744b, 0xf0ff1f00000000) 4.250304013s ago: executing program 0 (id=3179): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x7f, 0xffffffff, 0x10000, 0xffffffffffffffff, 0x3a, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0xf, @void, @value, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000050000000000e10000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x7f, 0xffffffff, 0x10000, 0xffffffffffffffff, 0x3a, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0xf, @void, @value, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000050000000000e10000"], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) 4.180575864s ago: executing program 1 (id=3180): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x4b, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xee, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/147}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r5}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x3, &(0x7f0000000880)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xbd, &(0x7f000000cf3d)=""/189, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x28) write$cgroup_freezer_state(r4, &(0x7f0000000680)='FREEZING\x00', 0x9) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x592, 0x4, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.712786661s ago: executing program 4 (id=3182): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x200, 0x7, 0x0, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x20c82, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000500)=ANY=[@ANYRESDEC, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="4fdd37c7a85103b2d149d3d56c274110dc1a8512dc6fba75ab82c16c36e88e3c0ebe9716f6ab6db1dbb16d13241850e3c1cd12429c36261b2ba3266d30123829beb34dff2c4bebed663193c1d27071f927dcd9383675df3900d8a99b0bc74d443a46fa4d3300f103b69162821b96486cdd12d6c614f33f885727ab0def2492e8e67fafc60845dd86977e621b4ab395773c8fe571969994c226e53361f054eafc92ea1a8f8dbc1312d9571d5305494af2f61517c198d833cae0735dd6dcc35c43c26eb5ef0b56b12857beea0322416ab01861", @ANYBLOB="845280001ddd8d4bcc8f2ac80000fdffffffffffffffa0d4d8c5b0efbb000000"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 3.023008022s ago: executing program 0 (id=3186): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0x61, 0xb4, &(0x7f0000000000)="3e4e77b61129f215072e51e7e4d2d7e792f89e0d5a2d47471532709b516318086b595edc37e7314847b1ee550b079ecf95f1fc5c5e32881da99b5611b1d19a790de5fbff3997bc88dba3b100b140aeca94a0ea2c0720b9c34a5ab62a70031f54ca", &(0x7f00000002c0)=""/180, 0x80, 0x0, 0x1000, 0x13, &(0x7f0000001340)="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", &(0x7f00000001c0)="b24adf21932bf398e9488c1cd342be21dc575a", 0x2, 0x0, 0x1000}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) (async) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x13, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xbe9c06, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.006099573s ago: executing program 0 (id=3187): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.843531385s ago: executing program 3 (id=3188): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000180), &(0x7f0000000200)='%pK \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f00000100000000", @ANYRES32, @ANYBLOB="da890000000000010000f75a00000000e6000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES8, @ANYRES8=r1, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x180, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000100000400"], 0x50) (fail_nth: 65) 2.727463467s ago: executing program 3 (id=3189): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x6, 0x0, 0x4, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00"/14], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r2, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r2, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000100000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e000000000000000600000006"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.604744349s ago: executing program 4 (id=3190): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000005a28b40fe2ccd3d7bfe9b1cfa9", @ANYRES32=0x0], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000002c0)='rxrpc_tx_fail\x00', 0xffffffffffffffff, 0x0, 0x44}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a000000080000000200000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x89) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="15000000050000008100000084dc000001400000", @ANYRES32=r0, @ANYBLOB="8100"/20, @ANYRES32=0x0], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x802800, &(0x7f0000000400)="2b95437c8fcc2e4aa990cca08ce28396f565d29ed495c7bd6f4588079b4de23f82cb9eb7b1aba9ff702dadc132901e549ea331cbf5364346ad232d847911b837bb584682daecb7e2afe9b89e9f2f67e10a0183aafea12e6393e30fdeb76cb11286f4f6e6e6438e927d3a7f0b2f90c5bd25c0e9e2ff2f7065f60ffe868136188bd9a5671ffb4ab6aa890ac8bbd730ed5d14b4128724ae0888de82033340d6f161322f9ad31110c880a677618d7985374943dd0bddb128e8680c71e4e26eed", 0xbe, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)="8afa94691f1258413090c467c562d783b66dc0fe3f92") ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000990500000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000230000000000000000000000001000000000", @ANYRES32=0x0, @ANYRES32], 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000840)='cpuset.memory_spread_slab\x00', 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r5, 0x0, 0x1ba8847c99}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100001302000000e3"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 2.131588286s ago: executing program 0 (id=3191): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x808a, 0x7, 0x9, 0x9, 0x0, 0x200101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000540)='(pu&00\t||') 2.064443838s ago: executing program 3 (id=3192): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000005a28b40fe2ccd3d7bfe9b1cfa9", @ANYRES32=0x0], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000002c0)='rxrpc_tx_fail\x00', 0xffffffffffffffff, 0x0, 0x44}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a000000080000000200000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x89) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="15000000050000008100000084dc000001400000", @ANYRES32=r0, @ANYBLOB="8100"/20, @ANYRES32=0x0], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x802800, &(0x7f0000000400)="2b95437c8fcc2e4aa990cca08ce28396f565d29ed495c7bd6f4588079b4de23f82cb9eb7b1aba9ff702dadc132901e549ea331cbf5364346ad232d847911b837bb584682daecb7e2afe9b89e9f2f67e10a0183aafea12e6393e30fdeb76cb11286f4f6e6e6438e927d3a7f0b2f90c5bd25c0e9e2ff2f7065f60ffe868136188bd9a5671ffb4ab6aa890ac8bbd730ed5d14b4128724ae0888de82033340d6f161322f9ad31110c880a677618d7985374943dd0bddb128e8680c71e4e26eed", 0xbe, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)="8afa94691f1258413090c467c562d783b66dc0fe3f92") ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000990500000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000230000000000000000000000001000000000", @ANYRES32=0x0, @ANYRES32], 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000840)='cpuset.memory_spread_slab\x00', 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r5, 0x0, 0x1ba8847c99}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000013020000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.91154327s ago: executing program 4 (id=3193): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8, r1}, 0x18) write$cgroup_subtree(r3, &(0x7f00000014c0)=ANY=[@ANYBLOB="2b637075202d7074ab0000202b696f20"], 0xf) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x40) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000640)={r6}, 0xc) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f00000006c0)='./file0\x00'}, 0x18) ioctl$TUNSETFILTEREBPF(r7, 0x800454e1, &(0x7f0000000880)=r8) r9 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r9, r2, 0x0, 0x4, &(0x7f0000000280)='pids'}, 0x30) write$cgroup_subtree(r7, &(0x7f0000001200)=ANY=[@ANYRES64, @ANYRESDEC], 0xfdef) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x8, 0x0, 0xee, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001a00)={r10, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000480)="b9fb0307683a0600000000000000", 0x0, 0xfe, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32=r11, @ANYBLOB="050000"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000380)=""/9, 0x9}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000001240)=""/71, 0x47}, {&(0x7f0000000440)=""/15, 0xf}, {&(0x7f00000011c0)=""/25, 0x19}, {&(0x7f00000012c0)=""/67, 0x43}, {&(0x7f0000001340)=""/107, 0x6b}], 0x7, &(0x7f0000001440)=[@cred={{0x1c}}], 0x20}, 0x21) 1.648330764s ago: executing program 1 (id=3194): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x103, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x402002, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000080)=""/14) 1.475598147s ago: executing program 3 (id=3195): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000005a28b40fe2ccd3d7bf", @ANYRES32=0x0], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000002c0)='rxrpc_tx_fail\x00', 0xffffffffffffffff, 0x0, 0x44}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a000000080000000200000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x89) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="15000000050000008100000084dc00", @ANYRES32=r0, @ANYBLOB="8100"/20, @ANYRES32=0x0], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x802800, &(0x7f0000000400)="2b95437c8fcc2e4aa990cca08ce28396f565d29ed495c7bd6f4588079b4de23f82cb9eb7b1aba9ff702dadc132901e549ea331cbf5364346ad232d847911b837bb584682daecb7e2afe9b89e9f2f67e10a0183aafea12e6393e30fdeb76cb11286f4f6e6e6438e927d3a7f0b2f90c5bd25c0e9e2ff2f7065f60ffe868136188bd9a5671ffb4ab6aa890ac8bbd730ed5d14b4128724ae0888de82033340d6f161322f9ad31110c880a677618d7985374943dd0bddb128e8680c71e4e26eed", 0xbe, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)="8afa94691f1258413090c467c562d783b66dc0fe3f92") ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000990500000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000230000000000000000000000001000000000", @ANYRES32=0x0, @ANYRES32], 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000840)='cpuset.memory_spread_slab\x00', 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r5, 0x0, 0x1ba8847c99}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100001302000000e3ffffff00"/50], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 1.051833694s ago: executing program 1 (id=3196): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004effff4ff0000040000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.004200004s ago: executing program 0 (id=3197): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) write$cgroup_devices(r0, &(0x7f0000000000)=ANY=[@ANYRES8=r0, @ANYRES16=r0, @ANYRES32], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0xffffffff) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 954.670485ms ago: executing program 1 (id=3198): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='io_uring_fail_link\x00'}, 0x18) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000040000000300000005"], 0x50) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000611210000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r0}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_clone(0x8a2c0080, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) gettid() (rerun: 32) 953.864565ms ago: executing program 1 (id=3199): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @random="ada68a2f96c6"}) socketpair(0x28, 0x80000, 0x8e, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="19000000040000000400000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000540), &(0x7f0000000000)=""/7, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000080), 0x0}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000", @ANYRES32=r1, @ANYBLOB="0000000000000000b707000008000000850000006900000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000b40)=ANY=[@ANYBLOB="1100000004000000"], 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) openat$tun(0xffffff9c, &(0x7f0000000040), 0x80800, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB='\x00\x00', @ANYBLOB], 0x48) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}, 0x100) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 852.159117ms ago: executing program 3 (id=3200): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001800)={{r0}, &(0x7f00000016c0), &(0x7f00000017c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x2b, 0x80000, 0x200, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x800000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0xf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 418.888493ms ago: executing program 1 (id=3201): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 268.272436ms ago: executing program 0 (id=3202): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8902, &(0x7f00000013c0)) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085000000010000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x4, 0x0, 0x0, 0x4, 0x0, 0x1}]}, {0x0, [0x61, 0x0, 0x2e, 0x2e]}}, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='(pu\"\"\"\t&&') bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, &(0x7f0000000280), &(0x7f0000000300)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r9}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 23.43515ms ago: executing program 2 (id=3104): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c250000000000202020609af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000000338b3ecfed23a5a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 0s ago: executing program 3 (id=3203): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x12, 0x9, &(0x7f0000000380)=ANY=[@ANYBLOB="1808000000000000000000000002000085100000050000008500000056000000a70000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.94' (ED25519) to the list of known hosts. [ 24.866310][ T28] audit: type=1400 audit(1743795756.827:66): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.867695][ T283] cgroup: Unknown subsys name 'net' [ 24.888920][ T28] audit: type=1400 audit(1743795756.827:67): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.915784][ T28] audit: type=1400 audit(1743795756.867:68): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.915982][ T283] cgroup: Unknown subsys name 'devices' [ 25.061194][ T283] cgroup: Unknown subsys name 'hugetlb' [ 25.066642][ T283] cgroup: Unknown subsys name 'rlimit' [ 25.173300][ T28] audit: type=1400 audit(1743795757.137:69): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.196288][ T28] audit: type=1400 audit(1743795757.137:70): avc: denied { mounton } for pid=283 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.220815][ T28] audit: type=1400 audit(1743795757.137:71): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.230558][ T287] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.252957][ T28] audit: type=1400 audit(1743795757.227:72): avc: denied { relabelto } for pid=287 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.278241][ T28] audit: type=1400 audit(1743795757.227:73): avc: denied { write } for pid=287 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.307683][ T28] audit: type=1400 audit(1743795757.267:74): avc: denied { read } for pid=283 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.308160][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.333044][ T28] audit: type=1400 audit(1743795757.267:75): avc: denied { open } for pid=283 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.377211][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.384230][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.391796][ T294] device bridge_slave_0 entered promiscuous mode [ 26.419707][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.426564][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.433906][ T294] device bridge_slave_1 entered promiscuous mode [ 26.476848][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.483751][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.491118][ T295] device bridge_slave_0 entered promiscuous mode [ 26.511052][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.517907][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.525307][ T295] device bridge_slave_1 entered promiscuous mode [ 26.578351][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.585364][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.592691][ T296] device bridge_slave_0 entered promiscuous mode [ 26.609765][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.616617][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.624266][ T296] device bridge_slave_1 entered promiscuous mode [ 26.638502][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.645432][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.652667][ T297] device bridge_slave_0 entered promiscuous mode [ 26.671971][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.678819][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.686405][ T297] device bridge_slave_1 entered promiscuous mode [ 26.731561][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.738424][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.745777][ T298] device bridge_slave_0 entered promiscuous mode [ 26.768613][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.775620][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.782996][ T298] device bridge_slave_1 entered promiscuous mode [ 26.831368][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.838232][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.845396][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.852257][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.967378][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.974907][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.983477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.990843][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.021227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.029545][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.036393][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.061786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.069916][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.076749][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.089475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.116640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.143679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.153027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.170922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.179882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.187888][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.194767][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.202003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.210212][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.217038][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.241257][ T294] device veth0_vlan entered promiscuous mode [ 27.250328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.257936][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.267005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.274983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.283211][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.290072][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.297286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.305096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.313305][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.320166][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.327343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.335247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.344398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.352015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.359403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.384110][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.392353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.399755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.407899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.416232][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.423118][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.430446][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.438584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.446807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.455150][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.463186][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.470036][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.477368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.485412][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.493378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.501585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.509558][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.524836][ T294] device veth1_macvtap entered promiscuous mode [ 27.531842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.540012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.547315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.555718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.564180][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.571039][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.578444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.586693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.594766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.602203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.610193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.618004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.626066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.634023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.652196][ T295] device veth0_vlan entered promiscuous mode [ 27.660948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.669767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.677961][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.684835][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.692197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.701033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.709263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.717281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.729226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.737023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.760106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.767530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.775737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.784038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.792448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.800829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.808921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.817355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.825451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.833579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.841701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.849796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.861855][ T295] device veth1_macvtap entered promiscuous mode [ 27.870622][ T298] device veth0_vlan entered promiscuous mode [ 27.882383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.890495][ T294] request_module fs-gadgetfs succeeded, but still no fs? [ 27.891097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.905497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.913705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.921220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.932081][ T296] device veth0_vlan entered promiscuous mode [ 27.944952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.953373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.962379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.975700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.998091][ T298] device veth1_macvtap entered promiscuous mode [ 28.011634][ T296] device veth1_macvtap entered promiscuous mode [ 28.018989][ C1] hrtimer: interrupt took 48261 ns [ 28.020526][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.041487][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.050235][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.058923][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.067394][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.097560][ T297] device veth0_vlan entered promiscuous mode [ 28.104333][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.118612][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.127518][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.136125][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.144956][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.153878][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.162505][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.173693][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.182321][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.190745][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.198764][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.206379][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.242810][ T327] device sit0 entered promiscuous mode [ 28.320471][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.344934][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.405115][ T297] device veth1_macvtap entered promiscuous mode [ 28.431466][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.447288][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.499404][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.531899][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.569522][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.608334][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.661429][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.081649][ T350] device sit0 entered promiscuous mode [ 31.634912][ T417] device sit0 left promiscuous mode [ 31.771423][ T422] device sit0 entered promiscuous mode [ 32.211573][ T434] device sit0 left promiscuous mode [ 32.273811][ T434] device sit0 entered promiscuous mode [ 32.535132][ T443] device sit0 entered promiscuous mode [ 33.524187][ T462] device sit0 left promiscuous mode [ 33.621683][ T463] device sit0 entered promiscuous mode [ 34.028786][ T472] device sit0 entered promiscuous mode [ 34.286058][ T483] syz.1.51[483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.286141][ T483] syz.1.51[483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.517663][ T500] device veth1_macvtap left promiscuous mode [ 35.597349][ T505] device veth1_macvtap entered promiscuous mode [ 35.628340][ T505] device macsec0 entered promiscuous mode [ 36.206501][ T521] device veth0_to_bond entered promiscuous mode [ 38.136477][ T552] device sit0 left promiscuous mode [ 38.242060][ T552] device sit0 entered promiscuous mode [ 39.470710][ T583] device sit0 left promiscuous mode [ 39.490626][ T584] device sit0 entered promiscuous mode [ 40.093905][ T597] device veth1_macvtap left promiscuous mode [ 40.163882][ T605] device sit0 left promiscuous mode [ 40.177555][ T602] device veth1_macvtap entered promiscuous mode [ 40.187918][ T602] device macsec0 entered promiscuous mode [ 40.202520][ T605] device sit0 entered promiscuous mode [ 40.328712][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.364786][ T609] device sit0 entered promiscuous mode [ 41.065513][ T636] device sit0 left promiscuous mode [ 41.280163][ T636] device sit0 entered promiscuous mode [ 41.679060][ T650] device sit0 left promiscuous mode [ 41.728010][ T651] device sit0 entered promiscuous mode [ 42.100366][ T654] device sit0 left promiscuous mode [ 42.189199][ T662] device sit0 entered promiscuous mode [ 42.840694][ T686] device sit0 left promiscuous mode [ 42.934900][ T686] device sit0 entered promiscuous mode [ 43.269212][ T703] device sit0 left promiscuous mode [ 43.360442][ T704] device sit0 entered promiscuous mode [ 43.445042][ T707] device sit0 left promiscuous mode [ 43.467233][ T708] device sit0 entered promiscuous mode [ 44.406038][ T734] device sit0 left promiscuous mode [ 44.522776][ T734] device sit0 entered promiscuous mode [ 45.040604][ T759] device sit0 left promiscuous mode [ 45.125410][ T761] device sit0 entered promiscuous mode [ 46.214867][ T781] device sit0 left promiscuous mode [ 46.281025][ T783] device sit0 entered promiscuous mode [ 46.785758][ T803] device sit0 left promiscuous mode [ 46.841465][ T805] device sit0 entered promiscuous mode [ 47.586344][ T830] device sit0 left promiscuous mode [ 47.728728][ T833] device sit0 entered promiscuous mode [ 49.630396][ T879] device sit0 left promiscuous mode [ 49.716824][ T881] device sit0 entered promiscuous mode [ 50.779223][ T912] device sit0 left promiscuous mode [ 51.121323][ T917] device sit0 entered promiscuous mode [ 51.429134][ T923] device sit0 left promiscuous mode [ 51.478409][ T925] device sit0 entered promiscuous mode [ 52.323584][ T957] device sit0 left promiscuous mode [ 52.603170][ T959] device sit0 entered promiscuous mode [ 52.882487][ T970] device sit0 left promiscuous mode [ 53.017564][ T974] device sit0 entered promiscuous mode [ 53.630800][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 53.630818][ T28] audit: type=1400 audit(1743795785.597:115): avc: denied { tracepoint } for pid=1006 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 54.240321][ T28] audit: type=1400 audit(1743795786.197:116): avc: denied { create } for pid=1030 comm="syz.4.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 54.267049][ T1031] syz.4.231 uses obsolete (PF_INET,SOCK_PACKET) [ 54.309918][ T28] audit: type=1400 audit(1743795786.247:117): avc: denied { create } for pid=1030 comm="syz.4.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 54.387634][ T1033] device sit0 left promiscuous mode [ 54.482161][ T1038] device sit0 entered promiscuous mode [ 54.643242][ T28] audit: type=1400 audit(1743795786.607:118): avc: denied { create } for pid=1044 comm="syz.2.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 54.747120][ T1045] bond_slave_1: mtu less than device minimum [ 54.970612][ T28] audit: type=1400 audit(1743795786.937:119): avc: denied { ioctl } for pid=1050 comm="syz.0.239" path="pid:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.208480][ T28] audit: type=1400 audit(1743795787.167:120): avc: denied { create } for pid=1063 comm="syz.4.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 55.333251][ T28] audit: type=1400 audit(1743795787.257:121): avc: denied { create } for pid=1063 comm="syz.4.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 55.463023][ T28] audit: type=1400 audit(1743795787.357:122): avc: denied { write } for pid=1061 comm="syz.3.243" name="cgroup.subtree_control" dev="cgroup2" ino=222 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 55.749012][ T28] audit: type=1400 audit(1743795787.357:123): avc: denied { open } for pid=1061 comm="syz.3.243" path="" dev="cgroup2" ino=222 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 55.858881][ T1074] device pim6reg1 entered promiscuous mode [ 55.956166][ T1090] device sit0 left promiscuous mode [ 55.988672][ T1090] device sit0 entered promiscuous mode [ 56.990383][ T28] audit: type=1400 audit(1743795788.957:124): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 57.140449][ T1134] device syzkaller0 entered promiscuous mode [ 57.501315][ T1142] device veth1_macvtap left promiscuous mode [ 57.507603][ T1142] device macsec0 left promiscuous mode [ 58.384721][ T1175] device wg2 entered promiscuous mode [ 58.905711][ T1201] device sit0 left promiscuous mode [ 58.954151][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 58.954167][ T28] audit: type=1400 audit(1743795790.917:126): avc: denied { create } for pid=1202 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 59.017400][ T1204] device sit0 entered promiscuous mode [ 59.682311][ T1224] device syzkaller0 entered promiscuous mode [ 61.069662][ T1266] device sit0 left promiscuous mode [ 61.150786][ T1273] device sit0 entered promiscuous mode [ 61.351965][ T1274] device sit0 left promiscuous mode [ 61.455175][ T1280] device sit0 entered promiscuous mode [ 62.822106][ T1315] Illegal XDP return value 32768 on prog (id 250) dev N/A, expect packet loss! [ 63.079624][ T1330] device sit0 left promiscuous mode [ 63.152324][ T1330] device sit0 entered promiscuous mode [ 63.513485][ T1342] device veth0_vlan left promiscuous mode [ 63.561099][ T1342] device veth0_vlan entered promiscuous mode [ 63.886619][ T1356] device pim6reg1 entered promiscuous mode [ 64.493102][ T1386] device sit0 left promiscuous mode [ 64.576358][ T1387] device sit0 entered promiscuous mode [ 65.237950][ T1397] geneve1: tun_chr_ioctl cmd 1074025672 [ 65.335760][ T1397] geneve1: ignored: set checksum enabled [ 65.447680][ T1404] IPv6: ÿÿÿÿ: Disabled Multicast RS [ 67.179385][ T1445] device sit0 left promiscuous mode [ 67.201682][ T1445] device sit0 entered promiscuous mode [ 68.836403][ T1494] device sit0 left promiscuous mode [ 69.040119][ T1497] device sit0 entered promiscuous mode [ 69.921917][ T1534] device sit0 left promiscuous mode [ 70.205553][ T1551] device sit0 entered promiscuous mode [ 70.940726][ T1578] device pim6reg1 entered promiscuous mode [ 73.109079][ T28] audit: type=1400 audit(1743795805.067:127): avc: denied { create } for pid=1653 comm="syz.4.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 74.060670][ T28] audit: type=1400 audit(1743795806.027:128): avc: denied { create } for pid=1693 comm="syz.0.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 74.262269][ T1699] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.278600][ T1699] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.497317][ T1709] device bridge_slave_1 left promiscuous mode [ 74.526591][ T1709] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.559391][ T1709] device bridge_slave_0 left promiscuous mode [ 74.565404][ T1709] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.389297][ T28] audit: type=1400 audit(1743795808.347:129): avc: denied { create } for pid=1747 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 76.445293][ T1746] device sit0 left promiscuous mode [ 76.873758][ T1759] device sit0 entered promiscuous mode [ 77.212072][ T1765] device sit0 left promiscuous mode [ 77.272306][ T1765] device sit0 entered promiscuous mode [ 78.569114][ T1802] device sit0 left promiscuous mode [ 78.826391][ T1803] device sit0 entered promiscuous mode [ 79.888832][ T1857] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.902932][ T1857] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.121037][ T1863] device bridge_slave_1 left promiscuous mode [ 80.169720][ T1863] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.182400][ T1863] device bridge_slave_0 left promiscuous mode [ 80.190671][ T1863] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.240756][ T28] audit: type=1400 audit(1743795812.207:130): avc: denied { create } for pid=1872 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 80.336435][ T1893] device sit0 left promiscuous mode [ 80.355862][ T1894] device sit0 entered promiscuous mode [ 80.581384][ T1897] device sit0 left promiscuous mode [ 80.638411][ T1899] device sit0 left promiscuous mode [ 80.705870][ T1900] device sit0 entered promiscuous mode [ 80.903080][ T1901] device sit0 entered promiscuous mode [ 81.172325][ T1916] device veth0_vlan left promiscuous mode [ 81.211006][ T1916] device veth0_vlan entered promiscuous mode [ 81.287506][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 81.310212][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 81.329897][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.740485][ T1940] device sit0 left promiscuous mode [ 81.839791][ T1943] device sit0 entered promiscuous mode [ 82.138669][ T1960] device sit0 left promiscuous mode [ 82.334372][ T1960] device sit0 entered promiscuous mode [ 83.307693][ T1990] device sit0 left promiscuous mode [ 83.408053][ T1993] device sit0 entered promiscuous mode [ 84.171120][ T2017] device sit0 left promiscuous mode [ 84.242399][ T2017] device sit0 entered promiscuous mode [ 85.388818][ T2040] device sit0 left promiscuous mode [ 85.444497][ T2042] device sit0 entered promiscuous mode [ 85.663561][ T28] audit: type=1400 audit(1743795817.627:131): avc: denied { write } for pid=2055 comm="syz.1.527" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 85.804774][ T2053] device pim6reg1 entered promiscuous mode [ 85.891679][ T28] audit: type=1400 audit(1743795817.857:132): avc: denied { ioctl } for pid=2063 comm="syz.1.530" path="socket:[21256]" dev="sockfs" ino=21256 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.097126][ T2068] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.113535][ T2068] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.326775][ T2069] device bridge_slave_1 left promiscuous mode [ 86.354639][ T2069] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.375718][ T2069] device bridge_slave_0 left promiscuous mode [ 86.382004][ T2069] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.585238][ T2080] device sit0 left promiscuous mode [ 86.603006][ T2082] device sit0 entered promiscuous mode [ 87.399734][ T2096] FAULT_INJECTION: forcing a failure. [ 87.399734][ T2096] name failslab, interval 1, probability 0, space 0, times 1 [ 87.490112][ T2096] CPU: 0 PID: 2096 Comm: syz.3.541 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 87.499765][ T2096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.509760][ T2096] Call Trace: [ 87.512875][ T2096] [ 87.515745][ T2096] dump_stack_lvl+0x151/0x1b7 [ 87.520245][ T2096] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 87.525566][ T2096] ? avc_has_perm+0x16f/0x260 [ 87.530056][ T2096] dump_stack+0x15/0x18 [ 87.534044][ T2096] should_fail_ex+0x3d0/0x520 [ 87.538672][ T2096] __should_failslab+0xaf/0xf0 [ 87.543245][ T2096] should_failslab+0x9/0x20 [ 87.547589][ T2096] slab_pre_alloc_hook+0x2e/0x1b0 [ 87.552441][ T2096] kmem_cache_alloc_lru+0x49/0x270 [ 87.557387][ T2096] ? sock_alloc_inode+0x28/0xc0 [ 87.562084][ T2096] sock_alloc_inode+0x28/0xc0 [ 87.567396][ T2096] ? sockfs_init_fs_context+0xb0/0xb0 [ 87.572683][ T2096] new_inode_pseudo+0x65/0x1d0 [ 87.577409][ T2096] __sock_create+0x132/0x7e0 [ 87.581855][ T2096] __sys_socketpair+0x29f/0x6e0 [ 87.586522][ T2096] ? __ia32_sys_socket+0x90/0x90 [ 87.591294][ T2096] ? __ia32_sys_read+0x90/0x90 [ 87.595901][ T2096] ? debug_smp_processor_id+0x17/0x20 [ 87.601100][ T2096] __x64_sys_socketpair+0x9b/0xb0 [ 87.605963][ T2096] x64_sys_call+0x19b/0x9a0 [ 87.610302][ T2096] do_syscall_64+0x3b/0xb0 [ 87.614640][ T2096] ? clear_bhb_loop+0x55/0xb0 [ 87.619154][ T2096] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 87.624883][ T2096] RIP: 0033:0x7f853f38d169 [ 87.629142][ T2096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.648579][ T2096] RSP: 002b:00007f85402ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 87.656833][ T2096] RAX: ffffffffffffffda RBX: 00007f853f5a5fa0 RCX: 00007f853f38d169 [ 87.665072][ T2096] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 87.672886][ T2096] RBP: 00007f85402ce090 R08: 0000000000000000 R09: 0000000000000000 [ 87.681043][ T2096] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.688851][ T2096] R13: 0000000000000000 R14: 00007f853f5a5fa0 R15: 00007ffeed607498 [ 87.696707][ T2096] [ 87.710061][ T2096] socket: no more sockets [ 88.248604][ T2115] device sit0 left promiscuous mode [ 88.266582][ T2115] device sit0 entered promiscuous mode [ 91.188928][ C1] sched: RT throttling activated [ 92.010174][ T2172] device syzkaller0 entered promiscuous mode [ 92.637673][ T28] audit: type=1400 audit(1743795824.597:133): avc: denied { create } for pid=2205 comm="syz.4.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 92.879371][ T28] audit: type=1400 audit(1743795824.837:134): avc: denied { create } for pid=2210 comm="syz.3.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 93.017276][ T28] audit: type=1400 audit(1743795824.867:135): avc: denied { setopt } for pid=2210 comm="syz.3.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 93.338531][ T2227] device sit0 left promiscuous mode [ 93.494270][ T2227] device sit0 entered promiscuous mode [ 94.032483][ T2246] device wg2 left promiscuous mode [ 94.706872][ T2255] bond_slave_1: mtu less than device minimum [ 95.090226][ T2271] device sit0 left promiscuous mode [ 95.125631][ T2271] device sit0 entered promiscuous mode [ 96.252513][ T2325] device sit0 left promiscuous mode [ 96.380938][ T2328] device sit0 entered promiscuous mode [ 97.108257][ T2370] device sit0 left promiscuous mode [ 97.200385][ T2378] device sit0 entered promiscuous mode [ 98.055426][ T2402] device syzkaller0 entered promiscuous mode [ 98.166214][ T2417] device sit0 left promiscuous mode [ 98.180676][ T2419] syz.1.643[2419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.180764][ T2419] syz.1.643[2419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.206117][ T2417] device sit0 entered promiscuous mode [ 98.485994][ T28] audit: type=1400 audit(1743795830.447:136): avc: denied { read } for pid=2430 comm="syz.2.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 98.579540][ T28] audit: type=1400 audit(1743795830.497:137): avc: denied { write } for pid=2430 comm="syz.2.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 98.725397][ T2440] device sit0 left promiscuous mode [ 99.292366][ T2459] bond_slave_1: mtu less than device minimum [ 99.378045][ T2464] device sit0 left promiscuous mode [ 99.498164][ T2464] device sit0 entered promiscuous mode [ 101.474280][ T2509] device veth0_vlan left promiscuous mode [ 101.489871][ T2509] device veth0_vlan entered promiscuous mode [ 101.742701][ T2524] syz.2.671[2524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.742778][ T2524] syz.2.671[2524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.759159][ T2521] device syzkaller0 entered promiscuous mode [ 101.888723][ T28] audit: type=1400 audit(1743795833.847:138): avc: denied { relabelfrom } for pid=2518 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 101.889934][ T2521] syzkaller0: tun_net_xmit 1280 [ 101.939774][ T2521] syzkaller0: create flow: hash 3449122234 index 1 [ 101.993525][ T2518] syzkaller0: delete flow: hash 3449122234 index 1 [ 102.018344][ T28] audit: type=1400 audit(1743795833.847:139): avc: denied { relabelto } for pid=2518 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 102.466378][ T2536] device sit0 entered promiscuous mode [ 102.762007][ T2542] device syzkaller0 entered promiscuous mode [ 103.443734][ T2573] device sit0 left promiscuous mode [ 103.811945][ T2573] device sit0 entered promiscuous mode [ 104.525949][ T2609] device syzkaller0 entered promiscuous mode [ 104.702454][ T2626] device syzkaller0 entered promiscuous mode [ 104.715185][ T2633] device sit0 left promiscuous mode [ 104.803437][ T2638] device sit0 entered promiscuous mode [ 105.487119][ T2664] veth1_to_hsr: mtu less than device minimum [ 105.743058][ T2676] device pim6reg1 entered promiscuous mode [ 106.014654][ T2687] device sit0 left promiscuous mode [ 106.039566][ T2687] device sit0 entered promiscuous mode [ 106.725932][ T28] audit: type=1400 audit(1743795838.687:140): avc: denied { create } for pid=2718 comm="syz.1.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 107.175422][ T28] audit: type=1400 audit(1743795839.137:141): avc: denied { append } for pid=2743 comm="syz.3.736" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 107.223223][ T2747] device veth0_vlan left promiscuous mode [ 107.231605][ T2747] device veth0_vlan entered promiscuous mode [ 107.283618][ T2749] device sit0 left promiscuous mode [ 107.322284][ T2752] device sit0 entered promiscuous mode [ 108.437892][ T2803] device sit0 left promiscuous mode [ 108.488745][ T2797] syz.4.750 (2797) used greatest stack depth: 21000 bytes left [ 108.533766][ T2810] device sit0 entered promiscuous mode [ 109.579727][ T2863] device sit0 left promiscuous mode [ 109.638656][ T2863] device sit0 entered promiscuous mode [ 110.295259][ T2877] device syzkaller0 entered promiscuous mode [ 111.295002][ T2905] device sit0 left promiscuous mode [ 111.512488][ T2908] device sit0 entered promiscuous mode [ 112.088453][ T2943] device syzkaller0 entered promiscuous mode [ 112.278579][ T2960] device sit0 left promiscuous mode [ 112.431485][ T2960] device sit0 entered promiscuous mode [ 112.546924][ T28] audit: type=1400 audit(1743795844.507:142): avc: denied { create } for pid=2962 comm="syz.1.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 113.790514][ T3021] device sit0 left promiscuous mode [ 113.867468][ T3022] device sit0 entered promiscuous mode [ 114.797768][ T3044] device veth0_vlan left promiscuous mode [ 114.848440][ T3044] device veth0_vlan entered promiscuous mode [ 114.892426][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.915135][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.946683][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.012342][ T3077] device sit0 left promiscuous mode [ 115.111098][ T3078] device sit0 entered promiscuous mode [ 115.440524][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 115.808974][ T28] audit: type=1400 audit(1743795847.767:143): avc: denied { create } for pid=3109 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 115.997921][ T3125] FAULT_INJECTION: forcing a failure. [ 115.997921][ T3125] name failslab, interval 1, probability 0, space 0, times 0 [ 116.159478][ T3125] CPU: 1 PID: 3125 Comm: syz.3.853 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 116.170274][ T3125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 116.180825][ T3125] Call Trace: [ 116.184145][ T3125] [ 116.187741][ T3125] dump_stack_lvl+0x151/0x1b7 [ 116.192650][ T3125] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 116.198976][ T3125] dump_stack+0x15/0x18 [ 116.203151][ T3125] should_fail_ex+0x3d0/0x520 [ 116.208331][ T3125] __should_failslab+0xaf/0xf0 [ 116.213105][ T3125] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 116.218921][ T3125] should_failslab+0x9/0x20 [ 116.223357][ T3125] __kmem_cache_alloc_node+0x3d/0x2a0 [ 116.229369][ T3125] ? __kasan_slab_alloc+0x6c/0x80 [ 116.234390][ T3125] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 116.240157][ T3125] kmalloc_trace+0x2a/0xa0 [ 116.245309][ T3125] selinux_sk_alloc_security+0x7d/0x1a0 [ 116.250953][ T3125] security_sk_alloc+0x72/0xb0 [ 116.256206][ T3125] sk_prot_alloc+0x114/0x330 [ 116.261733][ T3125] sk_alloc+0x38/0x440 [ 116.265850][ T3125] ? _raw_spin_trylock_bh+0x190/0x190 [ 116.271122][ T3125] inet6_create+0x6b4/0x11a0 [ 116.275552][ T3125] __sock_create+0x3be/0x7e0 [ 116.280323][ T3125] __sys_socketpair+0x313/0x6e0 [ 116.285203][ T3125] ? __ia32_sys_socket+0x90/0x90 [ 116.290977][ T3125] ? __ia32_sys_read+0x90/0x90 [ 116.296077][ T3125] ? debug_smp_processor_id+0x17/0x20 [ 116.302584][ T3125] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 116.309868][ T3125] __x64_sys_socketpair+0x9b/0xb0 [ 116.315702][ T3125] x64_sys_call+0x19b/0x9a0 [ 116.320244][ T3125] do_syscall_64+0x3b/0xb0 [ 116.324666][ T3125] ? clear_bhb_loop+0x55/0xb0 [ 116.329966][ T3125] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 116.336165][ T3125] RIP: 0033:0x7f853f38d169 [ 116.340775][ T3125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.363017][ T3125] RSP: 002b:00007f85402ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 116.373496][ T3125] RAX: ffffffffffffffda RBX: 00007f853f5a5fa0 RCX: 00007f853f38d169 [ 116.381662][ T3125] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 116.390113][ T3125] RBP: 00007f85402ce090 R08: 0000000000000000 R09: 0000000000000000 [ 116.399419][ T3125] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.408356][ T3125] R13: 0000000000000000 R14: 00007f853f5a5fa0 R15: 00007ffeed607498 [ 116.416978][ T3125] [ 116.949717][ T3151] device pim6reg1 entered promiscuous mode [ 117.029951][ T3151] device sit0 left promiscuous mode [ 117.772545][ T3153] device sit0 entered promiscuous mode [ 118.014805][ T3170] device sit0 left promiscuous mode [ 119.131399][ T3213] device sit0 left promiscuous mode [ 119.164564][ T3213] device sit0 entered promiscuous mode [ 119.827524][ T3233] FAULT_INJECTION: forcing a failure. [ 119.827524][ T3233] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 119.849672][ T3233] CPU: 0 PID: 3233 Comm: syz.4.880 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 119.859859][ T3233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 119.870589][ T3233] Call Trace: [ 119.873984][ T3233] [ 119.876927][ T3233] dump_stack_lvl+0x151/0x1b7 [ 119.882385][ T3233] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 119.888153][ T3233] dump_stack+0x15/0x18 [ 119.892489][ T3233] should_fail_ex+0x3d0/0x520 [ 119.897655][ T3233] should_fail+0xb/0x10 [ 119.902139][ T3233] should_fail_usercopy+0x1a/0x20 [ 119.907428][ T3233] _copy_to_user+0x1e/0x90 [ 119.912825][ T3233] simple_read_from_buffer+0xc7/0x150 [ 119.918429][ T3233] proc_fail_nth_read+0x1a3/0x210 [ 119.923961][ T3233] ? proc_fault_inject_write+0x390/0x390 [ 119.929805][ T3233] ? fsnotify_perm+0x269/0x5b0 [ 119.934507][ T3233] ? security_file_permission+0x86/0xb0 [ 119.939966][ T3233] ? proc_fault_inject_write+0x390/0x390 [ 119.945942][ T3233] vfs_read+0x26c/0xae0 [ 119.950126][ T3233] ? kernel_read+0x1f0/0x1f0 [ 119.954737][ T3233] ? mutex_lock+0xb1/0x1e0 [ 119.959491][ T3233] ? bit_wait_io_timeout+0x120/0x120 [ 119.964633][ T3233] ? __fdget_pos+0x2e2/0x390 [ 119.969358][ T3233] ? ksys_read+0x77/0x2c0 [ 119.973834][ T3233] ksys_read+0x199/0x2c0 [ 119.978435][ T3233] ? vfs_write+0xed0/0xed0 [ 119.982672][ T3233] ? debug_smp_processor_id+0x17/0x20 [ 119.988592][ T3233] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 119.995160][ T3233] __x64_sys_read+0x7b/0x90 [ 120.000047][ T3233] x64_sys_call+0x28/0x9a0 [ 120.005004][ T3233] do_syscall_64+0x3b/0xb0 [ 120.010194][ T3233] ? clear_bhb_loop+0x55/0xb0 [ 120.016906][ T3233] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 120.024107][ T3233] RIP: 0033:0x7fe388f8bb7c [ 120.028768][ T3233] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 120.052502][ T3233] RSP: 002b:00007fe389d4d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 120.062054][ T3233] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8bb7c [ 120.075208][ T3233] RDX: 000000000000000f RSI: 00007fe389d4d0a0 RDI: 0000000000000006 [ 120.085081][ T3233] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 120.097091][ T3233] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.106174][ T3233] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 120.115350][ T3233] [ 120.137589][ T28] audit: type=1400 audit(1743795852.097:144): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 120.225010][ T28] audit: type=1400 audit(1743795852.097:145): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 120.731688][ T3261] device sit0 left promiscuous mode [ 120.771982][ T3261] device sit0 entered promiscuous mode [ 121.235361][ T3285] device sit0 left promiscuous mode [ 121.825622][ T3314] device sit0 left promiscuous mode [ 121.889354][ T3314] device sit0 entered promiscuous mode [ 122.329194][ T3347] device sit0 entered promiscuous mode [ 122.955976][ T3366] device syzkaller0 entered promiscuous mode [ 123.218497][ T3379] device sit0 left promiscuous mode [ 123.302074][ T3385] device sit0 entered promiscuous mode [ 124.297322][ T3428] device sit0 entered promiscuous mode [ 125.382488][ T3467] device sit0 left promiscuous mode [ 125.493361][ T3470] device sit0 entered promiscuous mode [ 126.222544][ T28] audit: type=1400 audit(1743795858.187:146): avc: denied { create } for pid=3498 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 126.266913][ T3499] device veth1_macvtap left promiscuous mode [ 126.683590][ T3520] device sit0 left promiscuous mode [ 126.801420][ T3524] device sit0 entered promiscuous mode [ 127.533881][ T3567] device sit0 left promiscuous mode [ 127.628101][ T3568] device sit0 entered promiscuous mode [ 128.488796][ T3602] device sit0 left promiscuous mode [ 128.511651][ T3602] device sit0 entered promiscuous mode [ 129.769229][ T3648] device pim6reg1 entered promiscuous mode [ 129.786092][ T3651] device sit0 left promiscuous mode [ 129.860793][ T3651] device sit0 entered promiscuous mode [ 130.926846][ T3698] device sit0 left promiscuous mode [ 131.205014][ T3700] device sit0 entered promiscuous mode [ 131.429191][ T3710] device sit0 left promiscuous mode [ 131.459411][ T3716] device sit0 entered promiscuous mode [ 132.761620][ T3764] device sit0 left promiscuous mode [ 132.820725][ T3764] device sit0 entered promiscuous mode [ 133.913657][ T3812] device sit0 left promiscuous mode [ 134.002206][ T3814] device sit0 entered promiscuous mode [ 135.167834][ T3863] device sit0 left promiscuous mode [ 135.193804][ T3869] device sit0 entered promiscuous mode [ 135.748553][ T3888] device wg2 entered promiscuous mode [ 136.347906][ T3914] device sit0 left promiscuous mode [ 136.589518][ T3918] device sit0 entered promiscuous mode [ 137.613232][ T3957] device sit0 left promiscuous mode [ 137.631435][ T3957] device sit0 entered promiscuous mode [ 138.010655][ T28] audit: type=1400 audit(1743795869.977:147): avc: denied { create } for pid=3965 comm="syz.4.1123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 138.567988][ T3990] device sit0 left promiscuous mode [ 138.608227][ T3990] device sit0 entered promiscuous mode [ 138.770808][ T3998] device wg2 entered promiscuous mode [ 139.473632][ T4026] device sit0 left promiscuous mode [ 139.584553][ T4026] device sit0 entered promiscuous mode [ 140.572093][ T4063] FAULT_INJECTION: forcing a failure. [ 140.572093][ T4063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.651242][ T4063] CPU: 1 PID: 4063 Comm: syz.0.1157 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 140.661704][ T4063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 140.672878][ T4063] Call Trace: [ 140.676779][ T4063] [ 140.679559][ T4063] dump_stack_lvl+0x151/0x1b7 [ 140.684067][ T4063] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 140.689365][ T4063] ? vfs_write+0x952/0xed0 [ 140.693617][ T4063] ? __kasan_slab_free+0x11/0x20 [ 140.698563][ T4063] dump_stack+0x15/0x18 [ 140.702556][ T4063] should_fail_ex+0x3d0/0x520 [ 140.707162][ T4063] should_fail+0xb/0x10 [ 140.711333][ T4063] should_fail_usercopy+0x1a/0x20 [ 140.716190][ T4063] _copy_from_user+0x1e/0xc0 [ 140.720977][ T4063] __sys_bpf+0x23b/0x7f0 [ 140.725245][ T4063] ? bpf_link_show_fdinfo+0x300/0x300 [ 140.730803][ T4063] ? __ia32_sys_read+0x90/0x90 [ 140.737315][ T4063] ? debug_smp_processor_id+0x17/0x20 [ 140.743734][ T4063] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.751520][ T4063] __x64_sys_bpf+0x7c/0x90 [ 140.756236][ T4063] x64_sys_call+0x87f/0x9a0 [ 140.760887][ T4063] do_syscall_64+0x3b/0xb0 [ 140.765780][ T4063] ? clear_bhb_loop+0x55/0xb0 [ 140.770475][ T4063] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 140.776953][ T4063] RIP: 0033:0x7f157098d169 [ 140.782809][ T4063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.804882][ T4063] RSP: 002b:00007f1571751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.814119][ T4063] RAX: ffffffffffffffda RBX: 00007f1570ba5fa0 RCX: 00007f157098d169 [ 140.822870][ T4063] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 140.831175][ T4063] RBP: 00007f1571751090 R08: 0000000000000000 R09: 0000000000000000 [ 140.839545][ T4063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.848696][ T4063] R13: 0000000000000000 R14: 00007f1570ba5fa0 R15: 00007ffc89e34998 [ 140.861873][ T4063] [ 141.233496][ T4075] device sit0 left promiscuous mode [ 141.390667][ T4076] device sit0 entered promiscuous mode [ 142.045765][ T4097] FAULT_INJECTION: forcing a failure. [ 142.045765][ T4097] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.154792][ T4097] CPU: 1 PID: 4097 Comm: syz.4.1170 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 142.165930][ T4097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 142.178434][ T4097] Call Trace: [ 142.182856][ T4097] [ 142.187226][ T4097] dump_stack_lvl+0x151/0x1b7 [ 142.193194][ T4097] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 142.198940][ T4097] ? vfs_write+0x952/0xed0 [ 142.203553][ T4097] dump_stack+0x15/0x18 [ 142.207942][ T4097] should_fail_ex+0x3d0/0x520 [ 142.213980][ T4097] should_fail+0xb/0x10 [ 142.218129][ T4097] should_fail_usercopy+0x1a/0x20 [ 142.224430][ T4097] _copy_from_user+0x1e/0xc0 [ 142.229289][ T4097] __sys_bpf+0x23b/0x7f0 [ 142.235062][ T4097] ? bpf_link_show_fdinfo+0x300/0x300 [ 142.240597][ T4097] ? __ia32_sys_read+0x90/0x90 [ 142.247636][ T4097] ? debug_smp_processor_id+0x17/0x20 [ 142.253093][ T4097] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 142.259307][ T4097] __x64_sys_bpf+0x7c/0x90 [ 142.263648][ T4097] x64_sys_call+0x87f/0x9a0 [ 142.267983][ T4097] do_syscall_64+0x3b/0xb0 [ 142.273159][ T4097] ? clear_bhb_loop+0x55/0xb0 [ 142.277872][ T4097] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 142.283903][ T4097] RIP: 0033:0x7fe388f8d169 [ 142.288408][ T4097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.312076][ T4097] RSP: 002b:00007fe389d4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.321922][ T4097] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8d169 [ 142.334292][ T4097] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 142.343180][ T4097] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 142.355241][ T4097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.365361][ T4097] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 142.374124][ T4097] [ 142.791762][ T4115] device sit0 left promiscuous mode [ 142.820376][ T4115] device sit0 entered promiscuous mode [ 143.813110][ T4150] device sit0 left promiscuous mode [ 143.968873][ T4152] device sit0 entered promiscuous mode [ 145.291980][ T4201] device sit0 left promiscuous mode [ 145.324315][ T4201] device sit0 entered promiscuous mode [ 146.765586][ T4249] device sit0 left promiscuous mode [ 146.782317][ T4250] device sit0 entered promiscuous mode [ 147.341213][ T4241] syz.4.1221 (4241) used greatest stack depth: 20872 bytes left [ 147.481330][ T4274] FAULT_INJECTION: forcing a failure. [ 147.481330][ T4274] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 147.609041][ T4274] CPU: 0 PID: 4274 Comm: syz.1.1233 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 147.618798][ T4274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 147.629790][ T4274] Call Trace: [ 147.633275][ T4274] [ 147.636023][ T4274] dump_stack_lvl+0x151/0x1b7 [ 147.640925][ T4274] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 147.646581][ T4274] dump_stack+0x15/0x18 [ 147.650913][ T4274] should_fail_ex+0x3d0/0x520 [ 147.655928][ T4274] should_fail_alloc_page+0x68/0x90 [ 147.661963][ T4274] prepare_alloc_pages+0x13b/0x6d0 [ 147.668863][ T4274] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 147.674114][ T4274] ? slab_post_alloc_hook+0x53/0x2c0 [ 147.680335][ T4274] ? kmem_cache_alloc_node+0x188/0x330 [ 147.687443][ T4274] ? alloc_vmap_area+0x1a5/0x1aa0 [ 147.694807][ T4274] ? __get_vm_area_node+0x171/0x370 [ 147.700544][ T4274] ? __vmalloc_node_range+0x338/0x1560 [ 147.708731][ T4274] __alloc_pages+0x162/0x610 [ 147.714204][ T4274] ? prep_new_page+0x110/0x110 [ 147.719066][ T4274] ? irqentry_exit+0x30/0x40 [ 147.724221][ T4274] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 147.730068][ T4274] __get_free_pages+0xe/0x30 [ 147.734847][ T4274] kasan_populate_vmalloc_pte+0x39/0x130 [ 147.741030][ T4274] ? __apply_to_page_range+0x8ca/0xbe0 [ 147.746477][ T4274] __apply_to_page_range+0x8dd/0xbe0 [ 147.752354][ T4274] ? kasan_populate_vmalloc+0x70/0x70 [ 147.759190][ T4274] ? kasan_populate_vmalloc+0x70/0x70 [ 147.764843][ T4274] apply_to_page_range+0x3b/0x50 [ 147.770365][ T4274] kasan_populate_vmalloc+0x65/0x70 [ 147.776656][ T4274] alloc_vmap_area+0x1961/0x1aa0 [ 147.781661][ T4274] ? vm_map_ram+0x940/0x940 [ 147.786792][ T4274] ? __kasan_kmalloc+0x9c/0xb0 [ 147.791777][ T4274] ? kmalloc_node_trace+0x3d/0xb0 [ 147.796707][ T4274] __get_vm_area_node+0x171/0x370 [ 147.801854][ T4274] __vmalloc_node_range+0x338/0x1560 [ 147.808443][ T4274] ? xsk_map_alloc+0x164/0x270 [ 147.813706][ T4274] ? selinux_capable+0x2f1/0x430 [ 147.819029][ T4274] ? selinux_capset+0xf0/0xf0 [ 147.823921][ T4274] ? vmap+0x2b0/0x2b0 [ 147.828005][ T4274] ? cap_capable+0x4d/0x270 [ 147.832326][ T4274] bpf_map_area_alloc+0xdc/0xf0 [ 147.837716][ T4274] ? xsk_map_alloc+0x164/0x270 [ 147.842811][ T4274] xsk_map_alloc+0x164/0x270 [ 147.847808][ T4274] map_create+0x44a/0xcf0 [ 147.852039][ T4274] __sys_bpf+0x2e6/0x7f0 [ 147.856220][ T4274] ? bpf_link_show_fdinfo+0x300/0x300 [ 147.862117][ T4274] ? __ia32_sys_read+0x90/0x90 [ 147.866934][ T4274] ? debug_smp_processor_id+0x17/0x20 [ 147.872613][ T4274] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.879711][ T4274] __x64_sys_bpf+0x7c/0x90 [ 147.884937][ T4274] x64_sys_call+0x87f/0x9a0 [ 147.889745][ T4274] do_syscall_64+0x3b/0xb0 [ 147.894323][ T4274] ? clear_bhb_loop+0x55/0xb0 [ 147.899382][ T4274] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 147.905545][ T4274] RIP: 0033:0x7fc102f8d169 [ 147.910207][ T4274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.932953][ T4274] RSP: 002b:00007fc103dab038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.942313][ T4274] RAX: ffffffffffffffda RBX: 00007fc1031a5fa0 RCX: 00007fc102f8d169 [ 147.950700][ T4274] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 147.959138][ T4274] RBP: 00007fc103dab090 R08: 0000000000000000 R09: 0000000000000000 [ 147.967892][ T4274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.976878][ T4274] R13: 0000000000000000 R14: 00007fc1031a5fa0 R15: 00007ffca063d598 [ 147.985285][ T4274] [ 148.294143][ T4292] device sit0 left promiscuous mode [ 148.411447][ T4293] device sit0 entered promiscuous mode [ 148.702051][ T4301] device syzkaller0 entered promiscuous mode [ 148.896990][ T4307] syz.1.1245[4307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.897079][ T4307] syz.1.1245[4307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.612026][ T4327] device sit0 left promiscuous mode [ 149.771434][ T4340] device syzkaller0 entered promiscuous mode [ 149.794432][ T4341] FAULT_INJECTION: forcing a failure. [ 149.794432][ T4341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 149.830262][ T4341] CPU: 0 PID: 4341 Comm: syz.3.1255 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 149.840465][ T4341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 149.850876][ T4341] Call Trace: [ 149.854084][ T4341] [ 149.856863][ T4341] dump_stack_lvl+0x151/0x1b7 [ 149.861856][ T4341] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 149.867768][ T4341] dump_stack+0x15/0x18 [ 149.872664][ T4341] should_fail_ex+0x3d0/0x520 [ 149.878008][ T4341] should_fail_alloc_page+0x68/0x90 [ 149.883381][ T4341] prepare_alloc_pages+0x13b/0x6d0 [ 149.889002][ T4341] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 149.894914][ T4341] ? slab_post_alloc_hook+0x53/0x2c0 [ 149.900133][ T4341] ? alloc_vmap_area+0x1a5/0x1aa0 [ 149.905468][ T4341] ? __get_vm_area_node+0x171/0x370 [ 149.911809][ T4341] ? __vmalloc_node_range+0x338/0x1560 [ 149.918004][ T4341] __alloc_pages+0x162/0x610 [ 149.922665][ T4341] ? prep_new_page+0x110/0x110 [ 149.929354][ T4341] ? _raw_spin_trylock_bh+0x190/0x190 [ 149.935168][ T4341] __get_free_pages+0xe/0x30 [ 149.939845][ T4341] kasan_populate_vmalloc_pte+0x39/0x130 [ 149.945954][ T4341] ? __apply_to_page_range+0x8ca/0xbe0 [ 149.953246][ T4341] __apply_to_page_range+0x8dd/0xbe0 [ 149.958652][ T4341] ? kasan_populate_vmalloc+0x70/0x70 [ 149.965348][ T4341] ? kasan_populate_vmalloc+0x70/0x70 [ 149.971133][ T4341] apply_to_page_range+0x3b/0x50 [ 149.976592][ T4341] kasan_populate_vmalloc+0x65/0x70 [ 149.981959][ T4341] alloc_vmap_area+0x1961/0x1aa0 [ 149.988453][ T4341] ? vm_map_ram+0x940/0x940 [ 149.994638][ T4341] ? __kasan_kmalloc+0x9c/0xb0 [ 150.000654][ T4341] ? kmalloc_node_trace+0x3d/0xb0 [ 150.006259][ T4341] __get_vm_area_node+0x171/0x370 [ 150.013536][ T4341] __vmalloc_node_range+0x338/0x1560 [ 150.020146][ T4341] ? xsk_map_alloc+0x164/0x270 [ 150.025702][ T4341] ? selinux_capable+0x2f1/0x430 [ 150.031710][ T4341] ? selinux_capset+0xf0/0xf0 [ 150.036662][ T4341] ? vmap+0x2b0/0x2b0 [ 150.040811][ T4341] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 150.047286][ T4341] bpf_map_area_alloc+0xdc/0xf0 [ 150.052896][ T4341] ? xsk_map_alloc+0x164/0x270 [ 150.058965][ T4341] xsk_map_alloc+0x164/0x270 [ 150.064263][ T4341] map_create+0x44a/0xcf0 [ 150.069652][ T4341] __sys_bpf+0x2e6/0x7f0 [ 150.074336][ T4341] ? clockevents_program_event+0x22f/0x300 [ 150.080894][ T4341] ? bpf_link_show_fdinfo+0x300/0x300 [ 150.087563][ T4341] ? __sched_clock_gtod_offset+0x100/0x100 [ 150.093468][ T4341] ? debug_smp_processor_id+0x17/0x20 [ 150.099277][ T4341] __x64_sys_bpf+0x7c/0x90 [ 150.103923][ T4341] x64_sys_call+0x87f/0x9a0 [ 150.108217][ T4341] do_syscall_64+0x3b/0xb0 [ 150.112571][ T4341] ? clear_bhb_loop+0x55/0xb0 [ 150.117563][ T4341] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 150.124165][ T4341] RIP: 0033:0x7f853f38d169 [ 150.128848][ T4341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.149652][ T4341] RSP: 002b:00007f85402ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.158383][ T4341] RAX: ffffffffffffffda RBX: 00007f853f5a5fa0 RCX: 00007f853f38d169 [ 150.167704][ T4341] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 150.176134][ T4341] RBP: 00007f85402ce090 R08: 0000000000000000 R09: 0000000000000000 [ 150.184238][ T4341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.192323][ T4341] R13: 0000000000000000 R14: 00007f853f5a5fa0 R15: 00007ffeed607498 [ 150.200924][ T4341] [ 150.247236][ T4346] FAULT_INJECTION: forcing a failure. [ 150.247236][ T4346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.271007][ T4346] CPU: 1 PID: 4346 Comm: syz.3.1258 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 150.282668][ T4346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 150.294395][ T4346] Call Trace: [ 150.297709][ T4346] [ 150.300967][ T4346] dump_stack_lvl+0x151/0x1b7 [ 150.305572][ T4346] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 150.310864][ T4346] dump_stack+0x15/0x18 [ 150.315405][ T4346] should_fail_ex+0x3d0/0x520 [ 150.320148][ T4346] should_fail_alloc_page+0x68/0x90 [ 150.325284][ T4346] prepare_alloc_pages+0x13b/0x6d0 [ 150.330701][ T4346] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 150.336453][ T4346] ? slab_post_alloc_hook+0x53/0x2c0 [ 150.342013][ T4346] ? kmem_cache_alloc_node+0x188/0x330 [ 150.347529][ T4346] ? alloc_vmap_area+0x1a5/0x1aa0 [ 150.353142][ T4346] ? __get_vm_area_node+0x171/0x370 [ 150.358593][ T4346] ? __vmalloc_node_range+0x338/0x1560 [ 150.364955][ T4346] __alloc_pages+0x162/0x610 [ 150.370522][ T4346] ? prep_new_page+0x110/0x110 [ 150.376374][ T4346] __get_free_pages+0xe/0x30 [ 150.383021][ T4346] kasan_populate_vmalloc_pte+0x39/0x130 [ 150.390568][ T4346] ? __apply_to_page_range+0x8ca/0xbe0 [ 150.397955][ T4346] __apply_to_page_range+0x8dd/0xbe0 [ 150.405281][ T4346] ? kasan_populate_vmalloc+0x70/0x70 [ 150.411616][ T4346] ? kasan_populate_vmalloc+0x70/0x70 [ 150.418308][ T4346] apply_to_page_range+0x3b/0x50 [ 150.425718][ T4346] kasan_populate_vmalloc+0x65/0x70 [ 150.431861][ T4346] alloc_vmap_area+0x1961/0x1aa0 [ 150.437967][ T4346] ? vm_map_ram+0x940/0x940 [ 150.444948][ T4346] ? __kasan_kmalloc+0x9c/0xb0 [ 150.450522][ T4346] ? kmalloc_node_trace+0x3d/0xb0 [ 150.457066][ T4346] __get_vm_area_node+0x171/0x370 [ 150.462411][ T4346] __vmalloc_node_range+0x338/0x1560 [ 150.469987][ T4346] ? prealloc_init+0x136/0x830 [ 150.476237][ T4346] ? __alloc_percpu_gfp+0x27/0x30 [ 150.482078][ T4346] ? perf_trace_percpu_destroy_chunk+0x380/0x380 [ 150.489938][ T4346] ? __traceiter_percpu_alloc_percpu+0xd9/0x100 [ 150.496434][ T4346] ? vmap+0x2b0/0x2b0 [ 150.500677][ T4346] ? __alloc_percpu_gfp+0x27/0x30 [ 150.506614][ T4346] ? __kasan_check_write+0x14/0x20 [ 150.512792][ T4346] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 150.520174][ T4346] bpf_map_area_alloc+0xdc/0xf0 [ 150.525551][ T4346] ? prealloc_init+0x136/0x830 [ 150.530478][ T4346] prealloc_init+0x136/0x830 [ 150.535074][ T4346] htab_map_alloc+0xb1f/0xf80 [ 150.539847][ T4346] map_create+0x44a/0xcf0 [ 150.545114][ T4346] __sys_bpf+0x2e6/0x7f0 [ 150.550429][ T4346] ? bpf_link_show_fdinfo+0x300/0x300 [ 150.557390][ T4346] ? __ia32_sys_read+0x90/0x90 [ 150.563022][ T4346] ? debug_smp_processor_id+0x17/0x20 [ 150.569687][ T4346] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 150.577843][ T4346] __x64_sys_bpf+0x7c/0x90 [ 150.583897][ T4346] x64_sys_call+0x87f/0x9a0 [ 150.589508][ T4346] do_syscall_64+0x3b/0xb0 [ 150.594701][ T4346] ? clear_bhb_loop+0x55/0xb0 [ 150.599921][ T4346] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 150.606810][ T4346] RIP: 0033:0x7f853f38d169 [ 150.611615][ T4346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.635130][ T4346] RSP: 002b:00007f85402ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.644291][ T4346] RAX: ffffffffffffffda RBX: 00007f853f5a5fa0 RCX: 00007f853f38d169 [ 150.652629][ T4346] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 150.660750][ T4346] RBP: 00007f85402ce090 R08: 0000000000000000 R09: 0000000000000000 [ 150.670714][ T4346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.679969][ T4346] R13: 0000000000000000 R14: 00007f853f5a5fa0 R15: 00007ffeed607498 [ 150.688998][ T4346] [ 150.815610][ T4359] device sit0 left promiscuous mode [ 150.855621][ T4359] device sit0 entered promiscuous mode [ 151.264008][ T4374] FAULT_INJECTION: forcing a failure. [ 151.264008][ T4374] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.287820][ T4374] CPU: 1 PID: 4374 Comm: syz.2.1269 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 151.298651][ T4374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 151.309973][ T4374] Call Trace: [ 151.314528][ T4374] [ 151.317819][ T4374] dump_stack_lvl+0x151/0x1b7 [ 151.322675][ T4374] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 151.328236][ T4374] dump_stack+0x15/0x18 [ 151.332584][ T4374] should_fail_ex+0x3d0/0x520 [ 151.337567][ T4374] should_fail_alloc_page+0x68/0x90 [ 151.343970][ T4374] prepare_alloc_pages+0x13b/0x6d0 [ 151.349034][ T4374] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 151.354162][ T4374] ? slab_post_alloc_hook+0x53/0x2c0 [ 151.359738][ T4374] ? alloc_vmap_area+0x1a5/0x1aa0 [ 151.365208][ T4374] ? __get_vm_area_node+0x171/0x370 [ 151.370679][ T4374] ? __vmalloc_node_range+0x338/0x1560 [ 151.377129][ T4374] __alloc_pages+0x162/0x610 [ 151.382660][ T4374] ? prep_new_page+0x110/0x110 [ 151.387884][ T4374] ? _raw_spin_trylock_bh+0x190/0x190 [ 151.394233][ T4374] __get_free_pages+0xe/0x30 [ 151.399285][ T4374] kasan_populate_vmalloc_pte+0x39/0x130 [ 151.405190][ T4374] ? __apply_to_page_range+0x8ca/0xbe0 [ 151.411154][ T4374] __apply_to_page_range+0x8dd/0xbe0 [ 151.416881][ T4374] ? kasan_populate_vmalloc+0x70/0x70 [ 151.422144][ T4374] ? kasan_populate_vmalloc+0x70/0x70 [ 151.428049][ T4374] apply_to_page_range+0x3b/0x50 [ 151.433158][ T4374] kasan_populate_vmalloc+0x65/0x70 [ 151.438638][ T4374] alloc_vmap_area+0x1961/0x1aa0 [ 151.443732][ T4374] ? vm_map_ram+0x940/0x940 [ 151.448320][ T4374] ? __kasan_kmalloc+0x9c/0xb0 [ 151.453112][ T4374] ? kmalloc_node_trace+0x3d/0xb0 [ 151.457976][ T4374] __get_vm_area_node+0x171/0x370 [ 151.463324][ T4374] __vmalloc_node_range+0x338/0x1560 [ 151.469007][ T4374] ? xsk_map_alloc+0x164/0x270 [ 151.474470][ T4374] ? selinux_capable+0x2f1/0x430 [ 151.479298][ T4374] ? selinux_capset+0xf0/0xf0 [ 151.484975][ T4374] ? vmap+0x2b0/0x2b0 [ 151.489437][ T4374] bpf_map_area_alloc+0xdc/0xf0 [ 151.494529][ T4374] ? xsk_map_alloc+0x164/0x270 [ 151.499773][ T4374] xsk_map_alloc+0x164/0x270 [ 151.504657][ T4374] map_create+0x44a/0xcf0 [ 151.509708][ T4374] __sys_bpf+0x2e6/0x7f0 [ 151.514459][ T4374] ? bpf_link_show_fdinfo+0x300/0x300 [ 151.519658][ T4374] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 151.526364][ T4374] __x64_sys_bpf+0x7c/0x90 [ 151.531015][ T4374] x64_sys_call+0x87f/0x9a0 [ 151.535345][ T4374] do_syscall_64+0x3b/0xb0 [ 151.539704][ T4374] ? clear_bhb_loop+0x55/0xb0 [ 151.544345][ T4374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.550759][ T4374] RIP: 0033:0x7fe91e98d169 [ 151.555385][ T4374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.576841][ T4374] RSP: 002b:00007fe91f84a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.586946][ T4374] RAX: ffffffffffffffda RBX: 00007fe91eba5fa0 RCX: 00007fe91e98d169 [ 151.595855][ T4374] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 151.604438][ T4374] RBP: 00007fe91f84a090 R08: 0000000000000000 R09: 0000000000000000 [ 151.613969][ T4374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.623635][ T4374] R13: 0000000000000000 R14: 00007fe91eba5fa0 R15: 00007ffec72c5df8 [ 151.632789][ T4374] [ 151.757565][ T4394] FAULT_INJECTION: forcing a failure. [ 151.757565][ T4394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.839191][ T4394] CPU: 0 PID: 4394 Comm: syz.1.1275 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 151.850356][ T4394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 151.861601][ T4394] Call Trace: [ 151.864802][ T4394] [ 151.867868][ T4394] dump_stack_lvl+0x151/0x1b7 [ 151.872940][ T4394] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 151.878759][ T4394] dump_stack+0x15/0x18 [ 151.882878][ T4394] should_fail_ex+0x3d0/0x520 [ 151.888050][ T4394] should_fail_alloc_page+0x68/0x90 [ 151.893611][ T4394] prepare_alloc_pages+0x13b/0x6d0 [ 151.899050][ T4394] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 151.905269][ T4394] ? slab_post_alloc_hook+0x53/0x2c0 [ 151.910895][ T4394] ? alloc_vmap_area+0x1a5/0x1aa0 [ 151.916237][ T4394] ? __get_vm_area_node+0x171/0x370 [ 151.922193][ T4394] __alloc_pages+0x162/0x610 [ 151.927092][ T4394] ? prep_new_page+0x110/0x110 [ 151.932426][ T4394] ? _raw_spin_trylock_bh+0x190/0x190 [ 151.938239][ T4394] __get_free_pages+0xe/0x30 [ 151.944248][ T4394] kasan_populate_vmalloc_pte+0x39/0x130 [ 151.950691][ T4394] ? __apply_to_page_range+0x8ca/0xbe0 [ 151.956328][ T4394] __apply_to_page_range+0x8dd/0xbe0 [ 151.961827][ T4394] ? kasan_populate_vmalloc+0x70/0x70 [ 151.967823][ T4394] ? kasan_populate_vmalloc+0x70/0x70 [ 151.973194][ T4394] apply_to_page_range+0x3b/0x50 [ 151.978281][ T4394] kasan_populate_vmalloc+0x65/0x70 [ 151.983849][ T4394] alloc_vmap_area+0x1961/0x1aa0 [ 151.989162][ T4394] ? vm_map_ram+0x940/0x940 [ 151.993821][ T4394] ? __kasan_kmalloc+0x9c/0xb0 [ 151.998630][ T4394] ? kmalloc_node_trace+0x3d/0xb0 [ 152.004625][ T4394] __get_vm_area_node+0x171/0x370 [ 152.010362][ T4394] __vmalloc_node_range+0x338/0x1560 [ 152.015660][ T4394] ? prealloc_init+0x136/0x830 [ 152.020726][ T4394] ? vmap+0x2b0/0x2b0 [ 152.024906][ T4394] ? __bitmap_weight+0xb9/0x110 [ 152.029795][ T4394] ? __kasan_check_write+0x14/0x20 [ 152.035100][ T4394] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 152.040682][ T4394] bpf_map_area_alloc+0xdc/0xf0 [ 152.045690][ T4394] ? prealloc_init+0x136/0x830 [ 152.051006][ T4394] prealloc_init+0x136/0x830 [ 152.055682][ T4394] htab_map_alloc+0xb1f/0xf80 [ 152.060284][ T4394] map_create+0x44a/0xcf0 [ 152.064855][ T4394] __sys_bpf+0x2e6/0x7f0 [ 152.070066][ T4394] ? bpf_link_show_fdinfo+0x300/0x300 [ 152.075606][ T4394] ? __ia32_sys_read+0x90/0x90 [ 152.080768][ T4394] ? debug_smp_processor_id+0x17/0x20 [ 152.086639][ T4394] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 152.093270][ T4394] __x64_sys_bpf+0x7c/0x90 [ 152.097761][ T4394] x64_sys_call+0x87f/0x9a0 [ 152.102448][ T4394] do_syscall_64+0x3b/0xb0 [ 152.107602][ T4394] ? clear_bhb_loop+0x55/0xb0 [ 152.112646][ T4394] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.118837][ T4394] RIP: 0033:0x7fc102f8d169 [ 152.123179][ T4394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.143609][ T4394] RSP: 002b:00007fc103dab038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 152.152716][ T4394] RAX: ffffffffffffffda RBX: 00007fc1031a5fa0 RCX: 00007fc102f8d169 [ 152.161049][ T4394] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 152.170655][ T4394] RBP: 00007fc103dab090 R08: 0000000000000000 R09: 0000000000000000 [ 152.179750][ T4394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.188076][ T4394] R13: 0000000000000000 R14: 00007fc1031a5fa0 R15: 00007ffca063d598 [ 152.197030][ T4394] [ 152.286672][ T4400] device sit0 left promiscuous mode [ 152.325517][ T4400] device sit0 entered promiscuous mode [ 152.842270][ T4420] FAULT_INJECTION: forcing a failure. [ 152.842270][ T4420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.856358][ T4420] CPU: 0 PID: 4420 Comm: syz.0.1283 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 152.867377][ T4420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 152.878031][ T4420] Call Trace: [ 152.881317][ T4420] [ 152.884551][ T4420] dump_stack_lvl+0x151/0x1b7 [ 152.889678][ T4420] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 152.895134][ T4420] dump_stack+0x15/0x18 [ 152.899360][ T4420] should_fail_ex+0x3d0/0x520 [ 152.905182][ T4420] should_fail_alloc_page+0x68/0x90 [ 152.910848][ T4420] prepare_alloc_pages+0x13b/0x6d0 [ 152.916907][ T4420] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 152.922193][ T4420] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 152.928248][ T4420] __alloc_pages+0x162/0x610 [ 152.932742][ T4420] ? queued_write_lock_slowpath+0x460/0x547 [ 152.938579][ T4420] ? prep_new_page+0x110/0x110 [ 152.943918][ T4420] ? _raw_spin_trylock_bh+0x190/0x190 [ 152.950017][ T4420] __get_free_pages+0xe/0x30 [ 152.955294][ T4420] kasan_populate_vmalloc_pte+0x39/0x130 [ 152.961631][ T4420] ? __apply_to_page_range+0x8ca/0xbe0 [ 152.967749][ T4420] __apply_to_page_range+0x8dd/0xbe0 [ 152.973088][ T4420] ? kasan_populate_vmalloc+0x70/0x70 [ 152.978689][ T4420] ? kasan_populate_vmalloc+0x70/0x70 [ 152.984413][ T4420] apply_to_page_range+0x3b/0x50 [ 152.989436][ T4420] kasan_populate_vmalloc+0x65/0x70 [ 152.995161][ T4420] alloc_vmap_area+0x1961/0x1aa0 [ 153.000145][ T4420] ? vm_map_ram+0x940/0x940 [ 153.004750][ T4420] ? __kasan_kmalloc+0x9c/0xb0 [ 153.010768][ T4420] ? kmalloc_node_trace+0x3d/0xb0 [ 153.016214][ T4420] __get_vm_area_node+0x171/0x370 [ 153.021974][ T4420] __vmalloc_node_range+0x338/0x1560 [ 153.027538][ T4420] ? xsk_map_alloc+0x164/0x270 [ 153.032882][ T4420] ? selinux_capable+0x2f1/0x430 [ 153.038243][ T4420] ? selinux_capset+0xf0/0xf0 [ 153.043285][ T4420] ? vmap+0x2b0/0x2b0 [ 153.047300][ T4420] bpf_map_area_alloc+0xdc/0xf0 [ 153.052205][ T4420] ? xsk_map_alloc+0x164/0x270 [ 153.056964][ T4420] xsk_map_alloc+0x164/0x270 [ 153.061434][ T4420] map_create+0x44a/0xcf0 [ 153.066136][ T4420] __sys_bpf+0x2e6/0x7f0 [ 153.070594][ T4420] ? clockevents_program_event+0x22f/0x300 [ 153.077649][ T4420] ? bpf_link_show_fdinfo+0x300/0x300 [ 153.083784][ T4420] ? __sched_clock_gtod_offset+0x100/0x100 [ 153.090542][ T4420] ? debug_smp_processor_id+0x17/0x20 [ 153.097557][ T4420] __x64_sys_bpf+0x7c/0x90 [ 153.102159][ T4420] x64_sys_call+0x87f/0x9a0 [ 153.107372][ T4420] do_syscall_64+0x3b/0xb0 [ 153.112138][ T4420] ? clear_bhb_loop+0x55/0xb0 [ 153.117371][ T4420] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 153.124546][ T4420] RIP: 0033:0x7f157098d169 [ 153.129270][ T4420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.150183][ T4420] RSP: 002b:00007f1571751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 153.161481][ T4420] RAX: ffffffffffffffda RBX: 00007f1570ba5fa0 RCX: 00007f157098d169 [ 153.171497][ T4420] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 153.180070][ T4420] RBP: 00007f1571751090 R08: 0000000000000000 R09: 0000000000000000 [ 153.188469][ T4420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.197930][ T4420] R13: 0000000000000000 R14: 00007f1570ba5fa0 R15: 00007ffc89e34998 [ 153.206633][ T4420] [ 154.011997][ T4451] device sit0 left promiscuous mode [ 154.033580][ T4451] device sit0 entered promiscuous mode [ 154.169664][ T4457] FAULT_INJECTION: forcing a failure. [ 154.169664][ T4457] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.257197][ T4457] CPU: 0 PID: 4457 Comm: syz.0.1295 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 154.268312][ T4457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 154.280028][ T4457] Call Trace: [ 154.283986][ T4457] [ 154.286968][ T4457] dump_stack_lvl+0x151/0x1b7 [ 154.292674][ T4457] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 154.298244][ T4457] dump_stack+0x15/0x18 [ 154.302227][ T4457] should_fail_ex+0x3d0/0x520 [ 154.308197][ T4457] should_fail_alloc_page+0x68/0x90 [ 154.313748][ T4457] prepare_alloc_pages+0x13b/0x6d0 [ 154.320011][ T4457] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 154.325863][ T4457] ? slab_post_alloc_hook+0x53/0x2c0 [ 154.331312][ T4457] ? alloc_vmap_area+0x1a5/0x1aa0 [ 154.337034][ T4457] ? __get_vm_area_node+0x171/0x370 [ 154.343139][ T4457] ? __vmalloc_node_range+0x338/0x1560 [ 154.348869][ T4457] __alloc_pages+0x162/0x610 [ 154.353665][ T4457] ? prep_new_page+0x110/0x110 [ 154.358759][ T4457] ? _raw_spin_trylock_bh+0x190/0x190 [ 154.364705][ T4457] __get_free_pages+0xe/0x30 [ 154.369343][ T4457] kasan_populate_vmalloc_pte+0x39/0x130 [ 154.375255][ T4457] ? __apply_to_page_range+0x8ca/0xbe0 [ 154.381998][ T4457] __apply_to_page_range+0x8dd/0xbe0 [ 154.388041][ T4457] ? kasan_populate_vmalloc+0x70/0x70 [ 154.396098][ T4457] ? kasan_populate_vmalloc+0x70/0x70 [ 154.403265][ T4457] apply_to_page_range+0x3b/0x50 [ 154.408415][ T4457] kasan_populate_vmalloc+0x65/0x70 [ 154.414466][ T4457] alloc_vmap_area+0x1961/0x1aa0 [ 154.421385][ T4457] ? vm_map_ram+0x940/0x940 [ 154.426492][ T4457] ? __kasan_kmalloc+0x9c/0xb0 [ 154.431995][ T4457] ? kmalloc_node_trace+0x3d/0xb0 [ 154.438085][ T4457] __get_vm_area_node+0x171/0x370 [ 154.443909][ T4457] __vmalloc_node_range+0x338/0x1560 [ 154.450731][ T4457] ? xsk_map_alloc+0x164/0x270 [ 154.458347][ T4457] ? selinux_capable+0x2f1/0x430 [ 154.463805][ T4457] ? selinux_capset+0xf0/0xf0 [ 154.468821][ T4457] ? vmap+0x2b0/0x2b0 [ 154.473722][ T4457] bpf_map_area_alloc+0xdc/0xf0 [ 154.479315][ T4457] ? xsk_map_alloc+0x164/0x270 [ 154.485045][ T4457] xsk_map_alloc+0x164/0x270 [ 154.490609][ T4457] map_create+0x44a/0xcf0 [ 154.496220][ T4457] __sys_bpf+0x2e6/0x7f0 [ 154.500932][ T4457] ? bpf_link_show_fdinfo+0x300/0x300 [ 154.507389][ T4457] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 154.514137][ T4457] __x64_sys_bpf+0x7c/0x90 [ 154.520041][ T4457] x64_sys_call+0x87f/0x9a0 [ 154.525444][ T4457] do_syscall_64+0x3b/0xb0 [ 154.531238][ T4457] ? clear_bhb_loop+0x55/0xb0 [ 154.537516][ T4457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.544082][ T4457] RIP: 0033:0x7f157098d169 [ 154.548951][ T4457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.571051][ T4457] RSP: 002b:00007f1571751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 154.580265][ T4457] RAX: ffffffffffffffda RBX: 00007f1570ba5fa0 RCX: 00007f157098d169 [ 154.589180][ T4457] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 154.597726][ T4457] RBP: 00007f1571751090 R08: 0000000000000000 R09: 0000000000000000 [ 154.606798][ T4457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.614609][ T4457] R13: 0000000000000000 R14: 00007f1570ba5fa0 R15: 00007ffc89e34998 [ 154.622856][ T4457] [ 154.934171][ T4471] device veth1_macvtap left promiscuous mode [ 155.486469][ T4490] device sit0 left promiscuous mode [ 155.505703][ T4490] device sit0 entered promiscuous mode [ 155.635127][ T4496] FAULT_INJECTION: forcing a failure. [ 155.635127][ T4496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 155.730282][ T4496] CPU: 0 PID: 4496 Comm: syz.4.1309 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 155.741033][ T4496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 155.752238][ T4496] Call Trace: [ 155.755910][ T4496] [ 155.759311][ T4496] dump_stack_lvl+0x151/0x1b7 [ 155.763975][ T4496] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 155.770400][ T4496] dump_stack+0x15/0x18 [ 155.774568][ T4496] should_fail_ex+0x3d0/0x520 [ 155.779596][ T4496] should_fail_alloc_page+0x68/0x90 [ 155.785337][ T4496] prepare_alloc_pages+0x13b/0x6d0 [ 155.790555][ T4496] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 155.795783][ T4496] ? slab_post_alloc_hook+0x53/0x2c0 [ 155.801476][ T4496] ? alloc_vmap_area+0x1a5/0x1aa0 [ 155.806840][ T4496] ? __get_vm_area_node+0x171/0x370 [ 155.812413][ T4496] ? __vmalloc_node_range+0x338/0x1560 [ 155.818216][ T4496] __alloc_pages+0x162/0x610 [ 155.823114][ T4496] ? prep_new_page+0x110/0x110 [ 155.827792][ T4496] ? _raw_spin_trylock_bh+0x190/0x190 [ 155.833490][ T4496] __get_free_pages+0xe/0x30 [ 155.838301][ T4496] kasan_populate_vmalloc_pte+0x39/0x130 [ 155.844217][ T4496] ? __apply_to_page_range+0x8ca/0xbe0 [ 155.850107][ T4496] __apply_to_page_range+0x8dd/0xbe0 [ 155.855496][ T4496] ? kasan_populate_vmalloc+0x70/0x70 [ 155.861465][ T4496] ? kasan_populate_vmalloc+0x70/0x70 [ 155.867031][ T4496] apply_to_page_range+0x3b/0x50 [ 155.872317][ T4496] kasan_populate_vmalloc+0x65/0x70 [ 155.877964][ T4496] alloc_vmap_area+0x1961/0x1aa0 [ 155.884234][ T4496] ? vm_map_ram+0x940/0x940 [ 155.888895][ T4496] ? __kasan_kmalloc+0x9c/0xb0 [ 155.893477][ T4496] ? kmalloc_node_trace+0x3d/0xb0 [ 155.898513][ T4496] __get_vm_area_node+0x171/0x370 [ 155.903915][ T4496] __vmalloc_node_range+0x338/0x1560 [ 155.909926][ T4496] ? xsk_map_alloc+0x164/0x270 [ 155.915917][ T4496] ? __sanitizer_cov_trace_pc+0x36/0x60 [ 155.921819][ T4496] ? selinux_capable+0x2f1/0x430 [ 155.926863][ T4496] ? selinux_capset+0xf0/0xf0 [ 155.931462][ T4496] ? vmap+0x2b0/0x2b0 [ 155.935948][ T4496] bpf_map_area_alloc+0xdc/0xf0 [ 155.941136][ T4496] ? xsk_map_alloc+0x164/0x270 [ 155.946013][ T4496] xsk_map_alloc+0x164/0x270 [ 155.951124][ T4496] map_create+0x44a/0xcf0 [ 155.956205][ T4496] __sys_bpf+0x2e6/0x7f0 [ 155.960518][ T4496] ? bpf_link_show_fdinfo+0x300/0x300 [ 155.966159][ T4496] ? irqentry_exit+0x30/0x40 [ 155.971313][ T4496] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 155.978191][ T4496] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 155.985292][ T4496] __x64_sys_bpf+0x7c/0x90 [ 155.991291][ T4496] x64_sys_call+0x87f/0x9a0 [ 155.996120][ T4496] do_syscall_64+0x3b/0xb0 [ 156.001060][ T4496] ? clear_bhb_loop+0x55/0xb0 [ 156.006695][ T4496] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 156.012691][ T4496] RIP: 0033:0x7fe388f8d169 [ 156.017995][ T4496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.039385][ T4496] RSP: 002b:00007fe389d4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.049588][ T4496] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8d169 [ 156.058263][ T4496] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 156.066595][ T4496] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 156.075338][ T4496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.083599][ T4496] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 156.091971][ T4496] [ 156.532655][ T4512] device syzkaller0 entered promiscuous mode [ 157.029256][ T4530] device sit0 left promiscuous mode [ 157.123235][ T4532] device sit0 entered promiscuous mode [ 157.417508][ T4541] FAULT_INJECTION: forcing a failure. [ 157.417508][ T4541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.627319][ T4541] CPU: 1 PID: 4541 Comm: syz.3.1325 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 157.639945][ T4541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 157.650798][ T4541] Call Trace: [ 157.654192][ T4541] [ 157.657223][ T4541] dump_stack_lvl+0x151/0x1b7 [ 157.662300][ T4541] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 157.668369][ T4541] dump_stack+0x15/0x18 [ 157.672979][ T4541] should_fail_ex+0x3d0/0x520 [ 157.678091][ T4541] should_fail_alloc_page+0x68/0x90 [ 157.684035][ T4541] prepare_alloc_pages+0x13b/0x6d0 [ 157.689740][ T4541] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 157.695189][ T4541] ? kasan_check_range+0x48/0x2a0 [ 157.700591][ T4541] __alloc_pages+0x162/0x610 [ 157.705871][ T4541] ? prep_new_page+0x110/0x110 [ 157.710745][ T4541] ? _raw_spin_trylock_bh+0x190/0x190 [ 157.716556][ T4541] __get_free_pages+0xe/0x30 [ 157.721436][ T4541] kasan_populate_vmalloc_pte+0x39/0x130 [ 157.727395][ T4541] ? __apply_to_page_range+0x8ca/0xbe0 [ 157.732688][ T4541] __apply_to_page_range+0x8dd/0xbe0 [ 157.738064][ T4541] ? kasan_populate_vmalloc+0x70/0x70 [ 157.743771][ T4541] ? kasan_populate_vmalloc+0x70/0x70 [ 157.749181][ T4541] apply_to_page_range+0x3b/0x50 [ 157.754228][ T4541] kasan_populate_vmalloc+0x65/0x70 [ 157.759261][ T4541] alloc_vmap_area+0x1961/0x1aa0 [ 157.764327][ T4541] ? vm_map_ram+0x940/0x940 [ 157.769019][ T4541] ? __kasan_kmalloc+0x9c/0xb0 [ 157.774187][ T4541] ? kmalloc_node_trace+0x3d/0xb0 [ 157.779001][ T4541] __get_vm_area_node+0x171/0x370 [ 157.783950][ T4541] __vmalloc_node_range+0x338/0x1560 [ 157.789071][ T4541] ? xsk_map_alloc+0x164/0x270 [ 157.793693][ T4541] ? selinux_capable+0x2f1/0x430 [ 157.798531][ T4541] ? selinux_capset+0xf0/0xf0 [ 157.803079][ T4541] ? vmap+0x2b0/0x2b0 [ 157.807325][ T4541] ? irqentry_exit+0x30/0x40 [ 157.812342][ T4541] bpf_map_area_alloc+0xdc/0xf0 [ 157.818350][ T4541] ? xsk_map_alloc+0x164/0x270 [ 157.823108][ T4541] xsk_map_alloc+0x164/0x270 [ 157.827704][ T4541] map_create+0x44a/0xcf0 [ 157.832278][ T4541] __sys_bpf+0x2e6/0x7f0 [ 157.836535][ T4541] ? bpf_link_show_fdinfo+0x300/0x300 [ 157.842305][ T4541] ? __ia32_sys_read+0x90/0x90 [ 157.847139][ T4541] ? debug_smp_processor_id+0x17/0x20 [ 157.852912][ T4541] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 157.859587][ T4541] __x64_sys_bpf+0x7c/0x90 [ 157.864167][ T4541] x64_sys_call+0x87f/0x9a0 [ 157.868842][ T4541] do_syscall_64+0x3b/0xb0 [ 157.873285][ T4541] ? clear_bhb_loop+0x55/0xb0 [ 157.877888][ T4541] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 157.883983][ T4541] RIP: 0033:0x7f853f38d169 [ 157.888949][ T4541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.909790][ T4541] RSP: 002b:00007f85402ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 157.918590][ T4541] RAX: ffffffffffffffda RBX: 00007f853f5a5fa0 RCX: 00007f853f38d169 [ 157.926676][ T4541] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 157.935004][ T4541] RBP: 00007f85402ce090 R08: 0000000000000000 R09: 0000000000000000 [ 157.942823][ T4541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 157.951127][ T4541] R13: 0000000000000000 R14: 00007f853f5a5fa0 R15: 00007ffeed607498 [ 157.959151][ T4541] [ 158.316123][ T4560] device pim6reg1 entered promiscuous mode [ 158.492234][ T4573] device sit0 left promiscuous mode [ 158.511643][ T4573] device sit0 entered promiscuous mode [ 158.820782][ T4587] FAULT_INJECTION: forcing a failure. [ 158.820782][ T4587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 158.866071][ T4587] CPU: 1 PID: 4587 Comm: syz.4.1343 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 158.876458][ T4587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 158.887504][ T4587] Call Trace: [ 158.891176][ T4587] [ 158.894040][ T4587] dump_stack_lvl+0x151/0x1b7 [ 158.899446][ T4587] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 158.906027][ T4587] dump_stack+0x15/0x18 [ 158.910302][ T4587] should_fail_ex+0x3d0/0x520 [ 158.915489][ T4587] should_fail_alloc_page+0x68/0x90 [ 158.920779][ T4587] prepare_alloc_pages+0x13b/0x6d0 [ 158.926380][ T4587] ? irqentry_exit+0x30/0x40 [ 158.931524][ T4587] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 158.938040][ T4587] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 158.943788][ T4587] ? __set_page_owner_handle+0x96/0x3d0 [ 158.951366][ T4587] __alloc_pages+0x162/0x610 [ 158.957529][ T4587] ? prep_new_page+0x110/0x110 [ 158.963415][ T4587] ? _raw_spin_trylock_bh+0x190/0x190 [ 158.970377][ T4587] __get_free_pages+0xe/0x30 [ 158.975631][ T4587] kasan_populate_vmalloc_pte+0x39/0x130 [ 158.981802][ T4587] ? __apply_to_page_range+0x8ca/0xbe0 [ 158.988396][ T4587] __apply_to_page_range+0x8dd/0xbe0 [ 158.994329][ T4587] ? kasan_populate_vmalloc+0x70/0x70 [ 159.000968][ T4587] ? kasan_populate_vmalloc+0x70/0x70 [ 159.006702][ T4587] apply_to_page_range+0x3b/0x50 [ 159.011569][ T4587] kasan_populate_vmalloc+0x65/0x70 [ 159.018617][ T4587] alloc_vmap_area+0x1961/0x1aa0 [ 159.024306][ T4587] ? vm_map_ram+0x940/0x940 [ 159.029134][ T4587] ? __kasan_kmalloc+0x9c/0xb0 [ 159.033718][ T4587] ? kmalloc_node_trace+0x3d/0xb0 [ 159.040834][ T4587] __get_vm_area_node+0x171/0x370 [ 159.045735][ T4587] __vmalloc_node_range+0x338/0x1560 [ 159.051315][ T4587] ? xsk_map_alloc+0x164/0x270 [ 159.056151][ T4587] ? selinux_capable+0x2f1/0x430 [ 159.062035][ T4587] ? vmap+0x2b0/0x2b0 [ 159.066640][ T4587] bpf_map_area_alloc+0xdc/0xf0 [ 159.071554][ T4587] ? xsk_map_alloc+0x164/0x270 [ 159.076419][ T4587] xsk_map_alloc+0x164/0x270 [ 159.081279][ T4587] map_create+0x44a/0xcf0 [ 159.085747][ T4587] __sys_bpf+0x2e6/0x7f0 [ 159.090702][ T4587] ? clockevents_program_event+0x22f/0x300 [ 159.096710][ T4587] ? bpf_link_show_fdinfo+0x300/0x300 [ 159.102378][ T4587] ? __sched_clock_gtod_offset+0x100/0x100 [ 159.108800][ T4587] ? debug_smp_processor_id+0x17/0x20 [ 159.114770][ T4587] __x64_sys_bpf+0x7c/0x90 [ 159.119833][ T4587] x64_sys_call+0x87f/0x9a0 [ 159.124807][ T4587] do_syscall_64+0x3b/0xb0 [ 159.129641][ T4587] ? clear_bhb_loop+0x55/0xb0 [ 159.135032][ T4587] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 159.141270][ T4587] RIP: 0033:0x7fe388f8d169 [ 159.146474][ T4587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.169672][ T4587] RSP: 002b:00007fe389d4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 159.178965][ T4587] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8d169 [ 159.189043][ T4587] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 159.197266][ T4587] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 159.207666][ T4587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.216370][ T4587] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 159.225653][ T4587] [ 159.840400][ T4614] device sit0 left promiscuous mode [ 159.971845][ T4620] device sit0 entered promiscuous mode [ 160.777544][ T4640] FAULT_INJECTION: forcing a failure. [ 160.777544][ T4640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.809355][ T4640] CPU: 0 PID: 4640 Comm: syz.1.1360 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 160.820562][ T4640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 160.831124][ T4640] Call Trace: [ 160.834258][ T4640] [ 160.837551][ T4640] dump_stack_lvl+0x151/0x1b7 [ 160.842795][ T4640] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 160.850264][ T4640] dump_stack+0x15/0x18 [ 160.854661][ T4640] should_fail_ex+0x3d0/0x520 [ 160.861104][ T4640] should_fail_alloc_page+0x68/0x90 [ 160.867177][ T4640] prepare_alloc_pages+0x13b/0x6d0 [ 160.872839][ T4640] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 160.878479][ T4640] ? slab_post_alloc_hook+0x53/0x2c0 [ 160.883776][ T4640] ? alloc_vmap_area+0x1a5/0x1aa0 [ 160.889319][ T4640] ? __get_vm_area_node+0x171/0x370 [ 160.895331][ T4640] ? __vmalloc_node_range+0x338/0x1560 [ 160.900844][ T4640] __alloc_pages+0x162/0x610 [ 160.905906][ T4640] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 160.912287][ T4640] ? prep_new_page+0x110/0x110 [ 160.917674][ T4640] ? _raw_spin_trylock_bh+0x190/0x190 [ 160.923512][ T4640] ? kasan_check_range+0x17a/0x2a0 [ 160.928799][ T4640] __get_free_pages+0xe/0x30 [ 160.933357][ T4640] kasan_populate_vmalloc_pte+0x39/0x130 [ 160.939331][ T4640] ? __apply_to_page_range+0x8ca/0xbe0 [ 160.945567][ T4640] __apply_to_page_range+0x8dd/0xbe0 [ 160.951686][ T4640] ? kasan_populate_vmalloc+0x70/0x70 [ 160.957572][ T4640] ? kasan_populate_vmalloc+0x70/0x70 [ 160.963199][ T4640] apply_to_page_range+0x3b/0x50 [ 160.968839][ T4640] kasan_populate_vmalloc+0x65/0x70 [ 160.974397][ T4640] alloc_vmap_area+0x1961/0x1aa0 [ 160.979776][ T4640] ? vm_map_ram+0x940/0x940 [ 160.984855][ T4640] ? __kasan_kmalloc+0x9c/0xb0 [ 160.990460][ T4640] ? kmalloc_node_trace+0x3d/0xb0 [ 160.995564][ T4640] __get_vm_area_node+0x171/0x370 [ 161.000943][ T4640] __vmalloc_node_range+0x338/0x1560 [ 161.006212][ T4640] ? xsk_map_alloc+0x164/0x270 [ 161.011344][ T4640] ? selinux_capable+0x2f1/0x430 [ 161.016715][ T4640] ? selinux_capset+0xf0/0xf0 [ 161.021525][ T4640] ? vmap+0x2b0/0x2b0 [ 161.026031][ T4640] bpf_map_area_alloc+0xdc/0xf0 [ 161.031692][ T4640] ? xsk_map_alloc+0x164/0x270 [ 161.036309][ T4640] xsk_map_alloc+0x164/0x270 [ 161.040837][ T4640] map_create+0x44a/0xcf0 [ 161.045497][ T4640] __sys_bpf+0x2e6/0x7f0 [ 161.050280][ T4640] ? clockevents_program_event+0x22f/0x300 [ 161.056238][ T4640] ? bpf_link_show_fdinfo+0x300/0x300 [ 161.062145][ T4640] ? __sched_clock_gtod_offset+0x100/0x100 [ 161.068396][ T4640] ? debug_smp_processor_id+0x17/0x20 [ 161.073976][ T4640] __x64_sys_bpf+0x7c/0x90 [ 161.078399][ T4640] x64_sys_call+0x87f/0x9a0 [ 161.083781][ T4640] do_syscall_64+0x3b/0xb0 [ 161.088394][ T4640] ? clear_bhb_loop+0x55/0xb0 [ 161.093908][ T4640] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 161.100710][ T4640] RIP: 0033:0x7fc102f8d169 [ 161.105986][ T4640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.126614][ T4640] RSP: 002b:00007fc103dab038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.135198][ T4640] RAX: ffffffffffffffda RBX: 00007fc1031a5fa0 RCX: 00007fc102f8d169 [ 161.143280][ T4640] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 161.151348][ T4640] RBP: 00007fc103dab090 R08: 0000000000000000 R09: 0000000000000000 [ 161.160510][ T4640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.168913][ T4640] R13: 0000000000000000 R14: 00007fc1031a5fa0 R15: 00007ffca063d598 [ 161.177097][ T4640] [ 161.509356][ T4656] device sit0 left promiscuous mode [ 161.707887][ T4662] device sit0 entered promiscuous mode [ 162.036612][ T4676] FAULT_INJECTION: forcing a failure. [ 162.036612][ T4676] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.149308][ T4676] CPU: 0 PID: 4676 Comm: syz.4.1373 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 162.160030][ T4676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 162.171501][ T4676] Call Trace: [ 162.174706][ T4676] [ 162.177609][ T4676] dump_stack_lvl+0x151/0x1b7 [ 162.182557][ T4676] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 162.188045][ T4676] dump_stack+0x15/0x18 [ 162.192813][ T4676] should_fail_ex+0x3d0/0x520 [ 162.198003][ T4676] should_fail_alloc_page+0x68/0x90 [ 162.203881][ T4676] prepare_alloc_pages+0x13b/0x6d0 [ 162.208956][ T4676] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 162.214275][ T4676] __alloc_pages+0x162/0x610 [ 162.219282][ T4676] ? prep_new_page+0x110/0x110 [ 162.224425][ T4676] ? _raw_spin_trylock_bh+0x190/0x190 [ 162.230523][ T4676] __get_free_pages+0xe/0x30 [ 162.236155][ T4676] kasan_populate_vmalloc_pte+0x39/0x130 [ 162.243225][ T4676] ? __apply_to_page_range+0x8ca/0xbe0 [ 162.250078][ T4676] __apply_to_page_range+0x8dd/0xbe0 [ 162.256246][ T4676] ? kasan_populate_vmalloc+0x70/0x70 [ 162.262138][ T4676] ? kasan_populate_vmalloc+0x70/0x70 [ 162.268664][ T4676] apply_to_page_range+0x3b/0x50 [ 162.274762][ T4676] kasan_populate_vmalloc+0x65/0x70 [ 162.281201][ T4676] alloc_vmap_area+0x1961/0x1aa0 [ 162.287369][ T4676] ? vm_map_ram+0x940/0x940 [ 162.291844][ T4676] ? __kasan_kmalloc+0x9c/0xb0 [ 162.297117][ T4676] ? kmalloc_node_trace+0x3d/0xb0 [ 162.303028][ T4676] __get_vm_area_node+0x171/0x370 [ 162.309169][ T4676] __vmalloc_node_range+0x338/0x1560 [ 162.314728][ T4676] ? xsk_map_alloc+0x164/0x270 [ 162.320066][ T4676] ? selinux_capable+0x2f1/0x430 [ 162.325226][ T4676] ? selinux_capset+0xf0/0xf0 [ 162.329845][ T4676] ? vmap+0x2b0/0x2b0 [ 162.333752][ T4676] bpf_map_area_alloc+0xdc/0xf0 [ 162.338809][ T4676] ? xsk_map_alloc+0x164/0x270 [ 162.343418][ T4676] xsk_map_alloc+0x164/0x270 [ 162.348170][ T4676] map_create+0x44a/0xcf0 [ 162.353282][ T4676] __sys_bpf+0x2e6/0x7f0 [ 162.358069][ T4676] ? clockevents_program_event+0x22f/0x300 [ 162.364682][ T4676] ? bpf_link_show_fdinfo+0x300/0x300 [ 162.370501][ T4676] ? __sched_clock_gtod_offset+0x100/0x100 [ 162.376604][ T4676] ? debug_smp_processor_id+0x17/0x20 [ 162.382321][ T4676] __x64_sys_bpf+0x7c/0x90 [ 162.387668][ T4676] x64_sys_call+0x87f/0x9a0 [ 162.392946][ T4676] do_syscall_64+0x3b/0xb0 [ 162.397192][ T4676] ? clear_bhb_loop+0x55/0xb0 [ 162.402137][ T4676] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 162.408961][ T4676] RIP: 0033:0x7fe388f8d169 [ 162.413330][ T4676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.435302][ T4676] RSP: 002b:00007fe389d4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 162.444414][ T4676] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8d169 [ 162.453829][ T4676] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 162.462261][ T4676] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 162.470654][ T4676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 162.479860][ T4676] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 162.488347][ T4676] [ 163.224348][ T4705] device sit0 left promiscuous mode [ 163.243014][ T4706] device sit0 entered promiscuous mode [ 163.530770][ T4718] FAULT_INJECTION: forcing a failure. [ 163.530770][ T4718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.598891][ T4718] CPU: 1 PID: 4718 Comm: syz.0.1388 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 163.609980][ T4718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 163.620121][ T4718] Call Trace: [ 163.623509][ T4718] [ 163.626650][ T4718] dump_stack_lvl+0x151/0x1b7 [ 163.631638][ T4718] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 163.637332][ T4718] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 163.644346][ T4718] dump_stack+0x15/0x18 [ 163.648942][ T4718] should_fail_ex+0x3d0/0x520 [ 163.653965][ T4718] should_fail_alloc_page+0x68/0x90 [ 163.659618][ T4718] prepare_alloc_pages+0x13b/0x6d0 [ 163.665168][ T4718] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 163.670318][ T4718] __alloc_pages+0x162/0x610 [ 163.674950][ T4718] ? prep_new_page+0x110/0x110 [ 163.679962][ T4718] ? _raw_spin_trylock_bh+0x190/0x190 [ 163.685232][ T4718] __get_free_pages+0xe/0x30 [ 163.689940][ T4718] kasan_populate_vmalloc_pte+0x39/0x130 [ 163.695689][ T4718] ? __apply_to_page_range+0x8ca/0xbe0 [ 163.701158][ T4718] __apply_to_page_range+0x8dd/0xbe0 [ 163.707163][ T4718] ? kasan_populate_vmalloc+0x70/0x70 [ 163.712894][ T4718] ? kasan_populate_vmalloc+0x70/0x70 [ 163.718553][ T4718] apply_to_page_range+0x3b/0x50 [ 163.723614][ T4718] kasan_populate_vmalloc+0x65/0x70 [ 163.728733][ T4718] alloc_vmap_area+0x1961/0x1aa0 [ 163.733968][ T4718] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 163.740356][ T4718] ? vm_map_ram+0x940/0x940 [ 163.745227][ T4718] __get_vm_area_node+0x171/0x370 [ 163.750300][ T4718] __vmalloc_node_range+0x338/0x1560 [ 163.756028][ T4718] ? xsk_map_alloc+0x164/0x270 [ 163.760855][ T4718] ? selinux_capable+0x2f1/0x430 [ 163.766059][ T4718] ? selinux_capset+0xf0/0xf0 [ 163.770797][ T4718] ? vmap+0x2b0/0x2b0 [ 163.774854][ T4718] bpf_map_area_alloc+0xdc/0xf0 [ 163.780770][ T4718] ? xsk_map_alloc+0x164/0x270 [ 163.786109][ T4718] xsk_map_alloc+0x164/0x270 [ 163.790998][ T4718] map_create+0x44a/0xcf0 [ 163.795476][ T4718] __sys_bpf+0x2e6/0x7f0 [ 163.799726][ T4718] ? bpf_link_show_fdinfo+0x300/0x300 [ 163.805198][ T4718] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 163.811883][ T4718] __x64_sys_bpf+0x7c/0x90 [ 163.816935][ T4718] x64_sys_call+0x87f/0x9a0 [ 163.821623][ T4718] do_syscall_64+0x3b/0xb0 [ 163.826758][ T4718] ? clear_bhb_loop+0x55/0xb0 [ 163.831524][ T4718] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 163.837823][ T4718] RIP: 0033:0x7f157098d169 [ 163.842871][ T4718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.864098][ T4718] RSP: 002b:00007f1571751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 163.872401][ T4718] RAX: ffffffffffffffda RBX: 00007f1570ba5fa0 RCX: 00007f157098d169 [ 163.880339][ T4718] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 163.888391][ T4718] RBP: 00007f1571751090 R08: 0000000000000000 R09: 0000000000000000 [ 163.896580][ T4718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.904563][ T4718] R13: 0000000000000000 R14: 00007f1570ba5fa0 R15: 00007ffc89e34998 [ 163.912915][ T4718] [ 164.836771][ T4750] device sit0 left promiscuous mode [ 164.900254][ T4754] device sit0 entered promiscuous mode [ 165.339472][ T4765] FAULT_INJECTION: forcing a failure. [ 165.339472][ T4765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 165.424008][ T4765] CPU: 1 PID: 4765 Comm: syz.4.1404 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 165.434109][ T4765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 165.444270][ T4765] Call Trace: [ 165.447535][ T4765] [ 165.450316][ T4765] dump_stack_lvl+0x151/0x1b7 [ 165.455443][ T4765] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 165.460846][ T4765] dump_stack+0x15/0x18 [ 165.465178][ T4765] should_fail_ex+0x3d0/0x520 [ 165.469702][ T4765] should_fail_alloc_page+0x68/0x90 [ 165.475113][ T4765] prepare_alloc_pages+0x13b/0x6d0 [ 165.480282][ T4765] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 165.485923][ T4765] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 165.491627][ T4765] __alloc_pages+0x162/0x610 [ 165.496814][ T4765] ? prep_new_page+0x110/0x110 [ 165.502178][ T4765] ? _raw_spin_trylock_bh+0x190/0x190 [ 165.507954][ T4765] __get_free_pages+0xe/0x30 [ 165.512522][ T4765] kasan_populate_vmalloc_pte+0x39/0x130 [ 165.518869][ T4765] ? __apply_to_page_range+0x8ca/0xbe0 [ 165.524679][ T4765] __apply_to_page_range+0x8dd/0xbe0 [ 165.530236][ T4765] ? kasan_populate_vmalloc+0x70/0x70 [ 165.535745][ T4765] ? kasan_populate_vmalloc+0x70/0x70 [ 165.541436][ T4765] apply_to_page_range+0x3b/0x50 [ 165.547013][ T4765] kasan_populate_vmalloc+0x65/0x70 [ 165.554021][ T4765] alloc_vmap_area+0x1961/0x1aa0 [ 165.559163][ T4765] ? vm_map_ram+0x940/0x940 [ 165.564950][ T4765] ? __kasan_kmalloc+0x9c/0xb0 [ 165.570527][ T4765] ? kmalloc_node_trace+0x3d/0xb0 [ 165.575967][ T4765] __get_vm_area_node+0x171/0x370 [ 165.581846][ T4765] __vmalloc_node_range+0x338/0x1560 [ 165.589257][ T4765] ? xsk_map_alloc+0x164/0x270 [ 165.594115][ T4765] ? selinux_capable+0x2f1/0x430 [ 165.600465][ T4765] ? selinux_capset+0xf0/0xf0 [ 165.605251][ T4765] ? vmap+0x2b0/0x2b0 [ 165.609668][ T4765] ? irqentry_exit+0x30/0x40 [ 165.615329][ T4765] bpf_map_area_alloc+0xdc/0xf0 [ 165.620715][ T4765] ? xsk_map_alloc+0x164/0x270 [ 165.625836][ T4765] xsk_map_alloc+0x164/0x270 [ 165.630360][ T4765] map_create+0x44a/0xcf0 [ 165.635054][ T4765] __sys_bpf+0x2e6/0x7f0 [ 165.639249][ T4765] ? bpf_link_show_fdinfo+0x300/0x300 [ 165.645013][ T4765] ? __ia32_sys_read+0x90/0x90 [ 165.649853][ T4765] ? debug_smp_processor_id+0x17/0x20 [ 165.655742][ T4765] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 165.662129][ T4765] __x64_sys_bpf+0x7c/0x90 [ 165.666560][ T4765] x64_sys_call+0x87f/0x9a0 [ 165.671500][ T4765] do_syscall_64+0x3b/0xb0 [ 165.676517][ T4765] ? clear_bhb_loop+0x55/0xb0 [ 165.681471][ T4765] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 165.687284][ T4765] RIP: 0033:0x7fe388f8d169 [ 165.691708][ T4765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.713648][ T4765] RSP: 002b:00007fe389d4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.722146][ T4765] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8d169 [ 165.729962][ T4765] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0800000000000000 [ 165.737973][ T4765] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 165.746301][ T4765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.754285][ T4765] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 165.762106][ T4765] [ 165.980243][ T4783] device pim6reg1 entered promiscuous mode [ 166.365532][ T4800] device sit0 entered promiscuous mode [ 167.343718][ T4829] tun0: tun_chr_ioctl cmd 1074025675 [ 167.429001][ T4829] tun0: persist enabled [ 167.972464][ T4854] device sit0 left promiscuous mode [ 168.225064][ T4857] device sit0 entered promiscuous mode [ 169.581293][ T4900] device sit0 left promiscuous mode [ 169.671939][ T4900] device sit0 entered promiscuous mode [ 171.085571][ T4963] device sit0 left promiscuous mode [ 171.238213][ T4968] device sit0 entered promiscuous mode [ 171.865064][ T4994] device syzkaller0 entered promiscuous mode [ 174.133838][ T5084] device sit0 left promiscuous mode [ 174.150141][ T5086] device sit0 entered promiscuous mode [ 176.243397][ T5136] device sit0 left promiscuous mode [ 176.373497][ T5136] device sit0 entered promiscuous mode [ 176.783032][ T5152] device pim6reg1 entered promiscuous mode [ 177.515220][ T5178] device sit0 left promiscuous mode [ 177.759715][ T5181] device sit0 entered promiscuous mode [ 178.167964][ T5198] syz.1.1547[5198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.168063][ T5198] syz.1.1547[5198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.672979][ T5234] device sit0 left promiscuous mode [ 179.757354][ T5236] device sit0 entered promiscuous mode [ 180.068407][ T5249] syz.0.1563[5249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.098090][ T5253] device sit0 left promiscuous mode [ 180.285210][ T5261] device sit0 entered promiscuous mode [ 180.913676][ T5281] device veth0_vlan left promiscuous mode [ 180.955122][ T5281] device veth0_vlan entered promiscuous mode [ 180.992024][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.015362][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.054012][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.505475][ T28] audit: type=1400 audit(1743795913.467:148): avc: denied { create } for pid=5302 comm="syz.2.1581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 183.365925][ T5344] device veth1_macvtap left promiscuous mode [ 183.771003][ T5366] device sit0 left promiscuous mode [ 183.850265][ T5367] device sit0 entered promiscuous mode [ 185.498007][ T5414] device sit0 left promiscuous mode [ 185.638577][ T5418] device sit0 entered promiscuous mode [ 185.824139][ T5429] device blkio.throttle. entered promiscuous mode [ 186.144161][ T5440] device sit0 left promiscuous mode [ 186.231613][ T5440] device sit0 entered promiscuous mode [ 187.057101][ T5462] device sit0 left promiscuous mode [ 187.176102][ T5464] device sit0 entered promiscuous mode [ 187.668128][ T28] audit: type=1400 audit(1743795919.627:149): avc: denied { create } for pid=5483 comm="syz.0.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 188.403552][ T5510] device sit0 left promiscuous mode [ 188.502420][ T5510] device sit0 entered promiscuous mode [ 188.861172][ T5537] device sit0 left promiscuous mode [ 188.882787][ T5536] device sit0 left promiscuous mode [ 188.933495][ T5537] device sit0 entered promiscuous mode [ 189.215290][ T5536] device sit0 entered promiscuous mode [ 189.817087][ T5556] device syzkaller0 entered promiscuous mode [ 190.174170][ T5579] FAULT_INJECTION: forcing a failure. [ 190.174170][ T5579] name failslab, interval 1, probability 0, space 0, times 0 [ 190.243235][ T5579] CPU: 0 PID: 5579 Comm: syz.4.1665 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 190.254251][ T5579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 190.264913][ T5579] Call Trace: [ 190.268210][ T5579] [ 190.270996][ T5579] dump_stack_lvl+0x151/0x1b7 [ 190.275896][ T5579] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 190.281804][ T5579] ? avc_has_perm+0x16f/0x260 [ 190.286739][ T5579] dump_stack+0x15/0x18 [ 190.291045][ T5579] should_fail_ex+0x3d0/0x520 [ 190.296221][ T5579] __should_failslab+0xaf/0xf0 [ 190.301360][ T5579] should_failslab+0x9/0x20 [ 190.305869][ T5579] slab_pre_alloc_hook+0x2e/0x1b0 [ 190.311064][ T5579] kmem_cache_alloc_lru+0x49/0x270 [ 190.316096][ T5579] ? sock_alloc_inode+0x28/0xc0 [ 190.321589][ T5579] sock_alloc_inode+0x28/0xc0 [ 190.326822][ T5579] ? sockfs_init_fs_context+0xb0/0xb0 [ 190.332196][ T5579] new_inode_pseudo+0x65/0x1d0 [ 190.337031][ T5579] __sock_create+0x132/0x7e0 [ 190.341668][ T5579] __sys_socketpair+0x29f/0x6e0 [ 190.346635][ T5579] ? __ia32_sys_socket+0x90/0x90 [ 190.351674][ T5579] ? __ia32_sys_read+0x90/0x90 [ 190.356653][ T5579] ? debug_smp_processor_id+0x17/0x20 [ 190.363066][ T5579] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 190.369217][ T5579] __x64_sys_socketpair+0x9b/0xb0 [ 190.374247][ T5579] x64_sys_call+0x19b/0x9a0 [ 190.378719][ T5579] do_syscall_64+0x3b/0xb0 [ 190.383244][ T5579] ? clear_bhb_loop+0x55/0xb0 [ 190.387928][ T5579] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 190.393660][ T5579] RIP: 0033:0x7fe388f8d169 [ 190.398268][ T5579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.419610][ T5579] RSP: 002b:00007fe389d4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 190.428475][ T5579] RAX: ffffffffffffffda RBX: 00007fe3891a5fa0 RCX: 00007fe388f8d169 [ 190.436777][ T5579] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 190.444966][ T5579] RBP: 00007fe389d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 190.453277][ T5579] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.461626][ T5579] R13: 0000000000000000 R14: 00007fe3891a5fa0 R15: 00007ffd63c8c908 [ 190.470009][ T5579] [ 190.477235][ T5579] socket: no more sockets [ 190.601418][ T28] audit: type=1400 audit(1743795922.557:150): avc: denied { create } for pid=5583 comm="syz.3.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 190.761309][ T102] udevd[102]: worker [844] terminated by signal 33 (Unknown signal 33) [ 190.788752][ T102] udevd[102]: worker [844] failed while handling '/devices/virtual/block/loop0' [ 191.056440][ T102] udevd[102]: worker [318] terminated by signal 33 (Unknown signal 33) [ 191.153543][ T102] udevd[102]: worker [318] failed while handling '/devices/virtual/block/loop4' [ 191.404765][ T5605] device pim6reg1 entered promiscuous mode [ 192.056711][ T5621] FAULT_INJECTION: forcing a failure. [ 192.056711][ T5621] name failslab, interval 1, probability 0, space 0, times 0 [ 192.093542][ T5621] CPU: 1 PID: 5621 Comm: syz.0.1678 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 192.103701][ T5621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 192.113999][ T5621] Call Trace: [ 192.117162][ T5621] [ 192.119947][ T5621] dump_stack_lvl+0x151/0x1b7 [ 192.124583][ T5621] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 192.130577][ T5621] dump_stack+0x15/0x18 [ 192.135210][ T5621] should_fail_ex+0x3d0/0x520 [ 192.140613][ T5621] ? security_inode_alloc+0x29/0x120 [ 192.146072][ T5621] __should_failslab+0xaf/0xf0 [ 192.151158][ T5621] should_failslab+0x9/0x20 [ 192.155741][ T5621] kmem_cache_alloc+0x3b/0x320 [ 192.161033][ T5621] security_inode_alloc+0x29/0x120 [ 192.166523][ T5621] inode_init_always+0x720/0x970 [ 192.171767][ T5621] ? sockfs_init_fs_context+0xb0/0xb0 [ 192.177169][ T5621] new_inode_pseudo+0x98/0x1d0 [ 192.182368][ T5621] __sock_create+0x132/0x7e0 [ 192.187523][ T5621] __sys_socketpair+0x29f/0x6e0 [ 192.192289][ T5621] ? __ia32_sys_socket+0x90/0x90 [ 192.197587][ T5621] ? fpregs_restore_userregs+0x130/0x290 [ 192.203509][ T5621] __x64_sys_socketpair+0x9b/0xb0 [ 192.208545][ T5621] x64_sys_call+0x19b/0x9a0 [ 192.213152][ T5621] do_syscall_64+0x3b/0xb0 [ 192.217410][ T5621] ? clear_bhb_loop+0x55/0xb0 [ 192.221919][ T5621] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 192.227740][ T5621] RIP: 0033:0x7f157098d169 [ 192.231999][ T5621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.252596][ T5621] RSP: 002b:00007f1571751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 192.261636][ T5621] RAX: ffffffffffffffda RBX: 00007f1570ba5fa0 RCX: 00007f157098d169 [ 192.269419][ T5621] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 192.277221][ T5621] RBP: 00007f1571751090 R08: 0000000000000000 R09: 0000000000000000 [ 192.285035][ T5621] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.292860][ T5621] R13: 0000000000000000 R14: 00007f1570ba5fa0 R15: 00007ffc89e34998 [ 192.300847][ T5621] [ 192.800614][ T5621] socket: no more sockets [ 193.582711][ T5653] device syzkaller0 entered promiscuous mode [ 194.190166][ T5677] FAULT_INJECTION: forcing a failure. [ 194.190166][ T5677] name failslab, interval 1, probability 0, space 0, times 0 [ 194.205075][ T5677] CPU: 0 PID: 5677 Comm: syz.0.1696 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 194.216020][ T5677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 194.226558][ T5677] Call Trace: [ 194.229813][ T5677] [ 194.233009][ T5677] dump_stack_lvl+0x151/0x1b7 [ 194.237854][ T5677] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 194.243407][ T5677] dump_stack+0x15/0x18 [ 194.247519][ T5677] should_fail_ex+0x3d0/0x520 [ 194.252601][ T5677] ? sk_prot_alloc+0x5f/0x330 [ 194.257835][ T5677] __should_failslab+0xaf/0xf0 [ 194.263435][ T5677] should_failslab+0x9/0x20 [ 194.268405][ T5677] kmem_cache_alloc+0x3b/0x320 [ 194.274051][ T5677] ? slab_post_alloc_hook+0x72/0x2c0 [ 194.280268][ T5677] ? security_inode_alloc+0x29/0x120 [ 194.285927][ T5677] sk_prot_alloc+0x5f/0x330 [ 194.291137][ T5677] sk_alloc+0x38/0x440 [ 194.295396][ T5677] ? _raw_spin_trylock_bh+0x190/0x190 [ 194.302012][ T5677] inet6_create+0x6b4/0x11a0 [ 194.308855][ T5677] __sock_create+0x3be/0x7e0 [ 194.315721][ T5677] __sys_socketpair+0x29f/0x6e0 [ 194.320953][ T5677] ? __ia32_sys_socket+0x90/0x90 [ 194.326708][ T5677] ? __ia32_sys_read+0x90/0x90 [ 194.333296][ T5677] ? debug_smp_processor_id+0x17/0x20 [ 194.339188][ T5677] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 194.346079][ T5677] __x64_sys_socketpair+0x9b/0xb0 [ 194.352085][ T5677] x64_sys_call+0x19b/0x9a0 [ 194.357102][ T5677] do_syscall_64+0x3b/0xb0 [ 194.362229][ T5677] ? clear_bhb_loop+0x55/0xb0 [ 194.367456][ T5677] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 194.374950][ T5677] RIP: 0033:0x7f157098d169 [ 194.379538][ T5677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.403227][ T5677] RSP: 002b:00007f1571751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 194.411917][ T5677] RAX: ffffffffffffffda RBX: 00007f1570ba5fa0 RCX: 00007f157098d169 [ 194.420838][ T5677] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 194.429089][ T5677] RBP: 00007f1571751090 R08: 0000000000000000 R09: 0000000000000000 [ 194.437695][ T5677] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.446528][ T5677] R13: 0000000000000000 R14: 00007f1570ba5fa0 R15: 00007ffc89e34998 [ 194.455474][ T5677] [ 197.727157][ T5779] device veth0_vlan left promiscuous mode [ 197.947975][ T5779] device veth0_vlan entered promiscuous mode [ 198.963657][ T5823] device sit0 left promiscuous mode [ 199.313442][ T5827] device sit0 entered promiscuous mode [ 200.342863][ T5867] device sit0 left promiscuous mode [ 200.370658][ T5867] device sit0 entered promiscuous mode [ 200.714124][ T5885] device sit0 left promiscuous mode [ 200.838459][ T5889] device sit0 entered promiscuous mode [ 202.152651][ T5941] device sit0 left promiscuous mode [ 202.241764][ T5941] device sit0 entered promiscuous mode [ 202.421230][ T5949] device sit0 left promiscuous mode [ 202.471450][ T5949] device sit0 entered promiscuous mode [ 203.307455][ T5978] device veth0_vlan left promiscuous mode [ 203.414832][ T5978] device veth0_vlan entered promiscuous mode [ 203.642561][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.660754][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.675568][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.720886][ T6004] device sit0 left promiscuous mode [ 203.751075][ T6004] device sit0 entered promiscuous mode [ 204.342516][ T6049] syz.4.1806[6049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.342604][ T6049] syz.4.1806[6049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.405305][ T6045] device syzkaller0 entered promiscuous mode [ 204.452055][ T6048] Â: renamed from pim6reg1 [ 204.462325][ T6052] FAULT_INJECTION: forcing a failure. [ 204.462325][ T6052] name failslab, interval 1, probability 0, space 0, times 0 [ 204.476297][ T6052] CPU: 1 PID: 6052 Comm: syz.3.1808 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 204.486689][ T6052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 204.497377][ T6052] Call Trace: [ 204.500822][ T6052] [ 204.503592][ T6052] dump_stack_lvl+0x151/0x1b7 [ 204.508293][ T6052] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 204.514662][ T6052] dump_stack+0x15/0x18 [ 204.518622][ T6052] should_fail_ex+0x3d0/0x520 [ 204.524034][ T6052] __should_failslab+0xaf/0xf0 [ 204.529163][ T6052] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 204.535338][ T6052] should_failslab+0x9/0x20 [ 204.540252][ T6052] __kmem_cache_alloc_node+0x3d/0x2a0 [ 204.547023][ T6052] ? __kasan_slab_alloc+0x6c/0x80 [ 204.552218][ T6052] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 204.558650][ T6052] kmalloc_trace+0x2a/0xa0 [ 204.563053][ T6052] selinux_sk_alloc_security+0x7d/0x1a0 [ 204.569205][ T6052] security_sk_alloc+0x72/0xb0 [ 204.574416][ T6052] sk_prot_alloc+0x114/0x330 [ 204.579862][ T6052] sk_alloc+0x38/0x440 [ 204.584046][ T6052] ? _raw_spin_trylock_bh+0x190/0x190 [ 204.589464][ T6052] inet6_create+0x6b4/0x11a0 [ 204.594080][ T6052] __sock_create+0x3be/0x7e0 [ 204.599244][ T6052] __sys_socketpair+0x313/0x6e0 [ 204.604634][ T6052] ? __ia32_sys_socket+0x90/0x90 [ 204.610084][ T6052] ? __ia32_sys_read+0x90/0x90 [ 204.615209][ T6052] ? debug_smp_processor_id+0x17/0x20 [ 204.622102][ T6052] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 204.629877][ T6052] __x64_sys_socketpair+0x9b/0xb0 [ 204.635884][ T6052] x64_sys_call+0x19b/0x9a0 [ 204.641290][ T6052] do_syscall_64+0x3b/0xb0 [ 204.647203][ T6052] ? clear_bhb_loop+0x55/0xb0 [ 204.652883][ T6052] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 204.661699][ T6052] RIP: 0033:0x7f853f38d169 [ 204.667955][ T6052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.692044][ T6052] RSP: 002b:00007f85402ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 204.702482][ T6052] RAX: ffffffffffffffda RBX: 00007f853f5a5fa0 RCX: 00007f853f38d169 [ 204.711672][ T6052] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 204.721099][ T6052] RBP: 00007f85402ce090 R08: 0000000000000000 R09: 0000000000000000 [ 204.729144][ T6052] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.738140][ T6052] R13: 0000000000000000 R14: 00007f853f5a5fa0 R15: 00007ffeed607498 [ 204.747407][ T6052] [ 204.949648][ T6060] device syzkaller0 entered promiscuous mode [ 205.171113][ T6064] device sit0 left promiscuous mode [ 205.323298][ T6068] device sit0 entered promiscuous mode [ 205.354083][ T6067] device sit0 left promiscuous mode [ 205.370098][ T6070] device sit0 entered promiscuous mode [ 208.471988][ T6160] device sit0 left promiscuous mode [ 208.593851][ T6160] device sit0 entered promiscuous mode [ 208.685980][ T6115] syz.2.1826 (6115) used greatest stack depth: 20840 bytes left [ 208.849729][ T6162] device sit0 left promiscuous mode [ 209.204340][ T6180] device sit0 left promiscuous mode [ 209.355114][ T6186] device sit0 left promiscuous mode [ 209.467101][ T6185] device sit0 entered promiscuous mode [ 210.115818][ T6221] device sit0 left promiscuous mode [ 210.427568][ T6222] device sit0 entered promiscuous mode [ 212.981575][ T6308] device sit0 left promiscuous mode [ 213.234632][ T6309] device sit0 entered promiscuous mode [ 213.655737][ T6326] device sit0 left promiscuous mode [ 213.803826][ T6327] device sit0 entered promiscuous mode [ 214.436836][ T6358] device sit0 left promiscuous mode [ 214.520564][ T6358] device sit0 entered promiscuous mode [ 214.932946][ T6380] device sit0 left promiscuous mode [ 214.978081][ T6380] device sit0 entered promiscuous mode [ 215.512324][ T6401] Â: renamed from pim6reg1 [ 215.807657][ T6413] device sit0 left promiscuous mode [ 215.897713][ T6413] device sit0 entered promiscuous mode [ 216.355549][ T28] audit: type=1400 audit(1743795948.317:151): avc: denied { create } for pid=6431 comm="syz.4.1923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 216.552218][ T6445] bridge0: port 3(veth0) entered blocking state [ 216.606813][ T6445] bridge0: port 3(veth0) entered disabled state [ 216.614587][ T6445] device veth0 entered promiscuous mode [ 216.628691][ T6445] bridge0: port 3(veth0) entered blocking state [ 216.635118][ T6445] bridge0: port 3(veth0) entered forwarding state [ 217.421461][ T6474] device sit0 entered promiscuous mode [ 218.369909][ T6509] device sit0 left promiscuous mode [ 218.457352][ T6509] device sit0 entered promiscuous mode [ 219.805477][ T6559] device sit0 left promiscuous mode [ 219.822080][ T6559] device sit0 entered promiscuous mode [ 220.929451][ T6599] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 221.034456][ T6599] syzkaller0: linktype set to 804 [ 221.548031][ T6611] device sit0 left promiscuous mode [ 221.594901][ T6613] device sit0 entered promiscuous mode [ 222.574522][ T6658] device sit0 left promiscuous mode [ 222.600763][ T6658] device sit0 entered promiscuous mode [ 223.720155][ T6696] device sit0 left promiscuous mode [ 223.886366][ T6702] device sit0 entered promiscuous mode [ 223.971395][ T6694] device veth0_vlan left promiscuous mode [ 224.002973][ T6694] device veth0_vlan entered promiscuous mode [ 224.113138][ T3917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.129852][ T3917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.137540][ T3917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.212094][ T6743] device wg2 entered promiscuous mode [ 225.329974][ T28] audit: type=1400 audit(1743795957.247:152): avc: denied { create } for pid=6746 comm="syz.4.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 226.657061][ T6767] device pim6reg1 entered promiscuous mode [ 226.752846][ T28] audit: type=1400 audit(1743795958.717:153): avc: denied { create } for pid=6775 comm="syz.2.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 227.814944][ T28] audit: type=1400 audit(1743795959.777:154): avc: denied { create } for pid=6809 comm="syz.3.2030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 228.203419][ T6821] syzkaller0: create flow: hash 2947674703 index 1 [ 228.293711][ T6811] device syzkaller0 entered promiscuous mode [ 228.320648][ T464] syzkaller0: tun_net_xmit 76 [ 228.327898][ T464] syzkaller0: tun_net_xmit 48 [ 228.333977][ T6818] syzkaller0: delete flow: hash 2947674703 index 1 [ 228.433226][ T6826] bond_slave_1: mtu less than device minimum [ 229.300562][ T6855] device veth0_vlan left promiscuous mode [ 229.306981][ T6855] device veth0_vlan entered promiscuous mode [ 232.960188][ T6991] device syzkaller0 entered promiscuous mode [ 233.126146][ T7003] device veth0_vlan left promiscuous mode [ 233.153340][ T7003] device veth0_vlan entered promiscuous mode [ 234.741778][ T7058] syz.4.2092[7058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.741862][ T7058] syz.4.2092[7058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.451870][ T7110] device sit0 left promiscuous mode [ 236.586714][ T7114] device sit0 entered promiscuous mode [ 237.380114][ T7135] device wg2 left promiscuous mode [ 237.411633][ T7135] syz.0.2112[7135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.411719][ T7135] syz.0.2112[7135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.531935][ T7135] device wg2 entered promiscuous mode [ 237.988409][ T7154] device syzkaller0 entered promiscuous mode [ 238.260156][ T7160] device sit0 left promiscuous mode [ 238.287014][ T7163] device sit0 entered promiscuous mode [ 238.450170][ T7165] FAULT_INJECTION: forcing a failure. [ 238.450170][ T7165] name failslab, interval 1, probability 0, space 0, times 0 [ 238.504913][ T7165] CPU: 0 PID: 7165 Comm: syz.1.2121 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 238.516734][ T7165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 238.528043][ T7165] Call Trace: [ 238.537331][ T7165] [ 238.540976][ T7165] dump_stack_lvl+0x151/0x1b7 [ 238.545496][ T7165] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 238.551097][ T7165] dump_stack+0x15/0x18 [ 238.555436][ T7165] should_fail_ex+0x3d0/0x520 [ 238.560213][ T7165] __should_failslab+0xaf/0xf0 [ 238.564973][ T7165] should_failslab+0x9/0x20 [ 238.569763][ T7165] kmem_cache_alloc_node+0x42/0x330 [ 238.574789][ T7165] ? __alloc_skb+0xcc/0x2d0 [ 238.579310][ T7165] __alloc_skb+0xcc/0x2d0 [ 238.583983][ T7165] tipc_msg_create+0x4c/0x530 [ 238.588821][ T7165] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 238.595624][ T7165] tipc_group_proto_xmit+0x14a/0x890 [ 238.601051][ T7165] tipc_group_delete+0x123/0x430 [ 238.606173][ T7165] ? kfree_skbmem+0x104/0x170 [ 238.612644][ T7165] ? kfree_skb_reason+0xdb/0x250 [ 238.618321][ T7165] ? tipc_group_update_member+0x3f0/0x3f0 [ 238.624411][ T7165] ? __tipc_shutdown+0x1241/0x1520 [ 238.629872][ T7165] ? tipc_group_self+0x27/0x1d0 [ 238.634544][ T7165] tipc_sk_leave+0x1b8/0x700 [ 238.639929][ T7165] ? sock_init_data+0xc0/0xc0 [ 238.645225][ T7165] ? __tipc_shutdown+0x1520/0x1520 [ 238.652780][ T7165] tipc_release+0x110/0x1310 [ 238.658534][ T7165] ? rwsem_write_trylock+0x153/0x340 [ 238.664272][ T7165] ? tipc_sock_destruct+0x190/0x190 [ 238.670320][ T7165] sock_close+0xdf/0x270 [ 238.674710][ T7165] ? sock_mmap+0xa0/0xa0 [ 238.679090][ T7165] __fput+0x1e5/0x870 [ 238.683139][ T7165] ____fput+0x15/0x20 [ 238.687410][ T7165] task_work_run+0x24d/0x2e0 [ 238.691993][ T7165] ? task_work_cancel+0x2e0/0x2e0 [ 238.697225][ T7165] ? filp_close+0x105/0x150 [ 238.702021][ T7165] exit_to_user_mode_loop+0x94/0xa0 [ 238.707823][ T7165] exit_to_user_mode_prepare+0x5a/0xa0 [ 238.713736][ T7165] syscall_exit_to_user_mode+0x26/0x130 [ 238.719145][ T7165] do_syscall_64+0x47/0xb0 [ 238.723403][ T7165] ? clear_bhb_loop+0x55/0xb0 [ 238.727995][ T7165] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 238.733836][ T7165] RIP: 0033:0x7fc102f8d169 [ 238.738093][ T7165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.758378][ T7165] RSP: 002b:00007fc103dab038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 238.766870][ T7165] RAX: 0000000000000000 RBX: 00007fc1031a5fa0 RCX: 00007fc102f8d169 [ 238.775173][ T7165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 238.783681][ T7165] RBP: 00007fc103dab090 R08: 0000000000000000 R09: 0000000000000000 [ 238.791712][ T7165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.799529][ T7165] R13: 0000000000000000 R14: 00007fc1031a5fa0 R15: 00007ffca063d598 [ 238.808066][ T7165] [ 238.921937][ T7177] device pim6reg1 entered promiscuous mode [ 240.099146][ T7204] device macsec0 entered promiscuous mode [ 241.505887][ T7243] device syzkaller0 entered promiscuous mode [ 241.781982][ T7266] device sit0 entered promiscuous mode [ 241.979835][ T7272] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 242.146179][ T7272] device syzkaller0 entered promiscuous mode [ 243.538620][ T7312] device sit0 left promiscuous mode [ 243.676404][ T7317] device sit0 entered promiscuous mode [ 243.803000][ T28] audit: type=1400 audit(1743795975.767:155): avc: denied { create } for pid=7327 comm="syz.2.2166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 244.980343][ T28] audit: type=1400 audit(1743795976.947:156): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 245.182367][ T28] audit: type=1400 audit(1743795976.947:157): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 245.309895][ T28] audit: type=1400 audit(1743795976.947:158): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 245.405066][ T7375] device sit0 left promiscuous mode [ 245.541998][ T7378] device sit0 entered promiscuous mode [ 246.298386][ T7424] device sit0 left promiscuous mode [ 246.340861][ T7426] device sit0 left promiscuous mode [ 246.366014][ T7424] device sit0 entered promiscuous mode [ 246.616260][ T7426] device sit0 entered promiscuous mode [ 247.817144][ T7500] FAULT_INJECTION: forcing a failure. [ 247.817144][ T7500] name failslab, interval 1, probability 0, space 0, times 0 [ 247.830429][ T7500] CPU: 0 PID: 7500 Comm: syz.1.2207 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 247.840539][ T7500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 247.850440][ T7500] Call Trace: [ 247.853678][ T7500] [ 247.856456][ T7500] dump_stack_lvl+0x151/0x1b7 [ 247.861067][ T7500] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 247.866344][ T7500] dump_stack+0x15/0x18 [ 247.870448][ T7500] should_fail_ex+0x3d0/0x520 [ 247.874935][ T7500] __should_failslab+0xaf/0xf0 [ 247.879537][ T7500] should_failslab+0x9/0x20 [ 247.883974][ T7500] kmem_cache_alloc_node+0x42/0x330 [ 247.889799][ T7500] ? __alloc_skb+0xcc/0x2d0 [ 247.894303][ T7500] ? __kasan_check_write+0x14/0x20 [ 247.899440][ T7500] __alloc_skb+0xcc/0x2d0 [ 247.904227][ T7500] tipc_buf_acquire+0x2b/0xe0 [ 247.908992][ T7500] tipc_named_withdraw+0x208/0x7f0 [ 247.913971][ T7500] tipc_nametbl_withdraw+0x18a/0x390 [ 247.919226][ T7500] tipc_sk_leave+0x51e/0x700 [ 247.923760][ T7500] ? __tipc_shutdown+0x1520/0x1520 [ 247.928689][ T7500] ? lock_sock_nested+0xbb/0x300 [ 247.934072][ T7500] ? tipc_release+0xca/0x1310 [ 247.939131][ T7500] tipc_release+0x110/0x1310 [ 247.943808][ T7500] ? rwsem_write_trylock+0x153/0x340 [ 247.949882][ T7500] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 247.955907][ T7500] ? tipc_sock_destruct+0x190/0x190 [ 247.967427][ T7500] ? __fput+0x17c/0x870 [ 247.971669][ T7500] ? sock_close+0x23/0x270 [ 247.976097][ T7500] sock_close+0xdf/0x270 [ 247.980819][ T7500] ? sock_mmap+0xa0/0xa0 [ 247.984889][ T7500] __fput+0x1e5/0x870 [ 247.989333][ T7500] ____fput+0x15/0x20 [ 247.993215][ T7500] task_work_run+0x24d/0x2e0 [ 247.997820][ T7500] ? task_work_cancel+0x2e0/0x2e0 [ 248.002801][ T7500] ? filp_close+0x108/0x150 [ 248.007539][ T7500] exit_to_user_mode_loop+0x94/0xa0 [ 248.013168][ T7500] exit_to_user_mode_prepare+0x5a/0xa0 [ 248.018544][ T7500] syscall_exit_to_user_mode+0x26/0x130 [ 248.024009][ T7500] do_syscall_64+0x47/0xb0 [ 248.029387][ T7500] ? clear_bhb_loop+0x55/0xb0 [ 248.034452][ T7500] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 248.040216][ T7500] RIP: 0033:0x7fc102f8d169 [ 248.044442][ T7500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.064757][ T7500] RSP: 002b:00007fc103dab038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 248.073104][ T7500] RAX: 0000000000000000 RBX: 00007fc1031a5fa0 RCX: 00007fc102f8d169 [ 248.081676][ T7500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 248.090525][ T7500] RBP: 00007fc103dab090 R08: 0000000000000000 R09: 0000000000000000 [ 248.098346][ T7500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.108679][ T7500] R13: 0000000000000000 R14: 00007fc1031a5fa0 R15: 00007ffca063d598 [ 248.119790][ T7500] [ 248.123043][ T7500] tipc: Withdrawal distribution failure [ 250.613199][ T7558] device sit0 left promiscuous mode [ 251.114086][ T7558] device sit0 entered promiscuous mode [ 253.590702][ T7630] device wg2 left promiscuous mode [ 253.647093][ T7631] device wg2 entered promiscuous mode [ 254.375322][ T7657] device syzkaller0 entered promiscuous mode [ 254.382550][ T7657] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 255.034819][ T7677] device sit0 left promiscuous mode [ 255.321673][ T7687] device sit0 left promiscuous mode [ 255.466583][ T7689] device sit0 entered promiscuous mode [ 255.676472][ T7688] device veth1_macvtap left promiscuous mode [ 255.693580][ T7688] device macsec0 left promiscuous mode [ 255.916927][ T7701] device sit0 entered promiscuous mode [ 256.116306][ T7702] device sit0 left promiscuous mode [ 256.186550][ T7706] device sit0 entered promiscuous mode [ 257.253639][ T7730] syz.3.2262[7730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.253728][ T7730] syz.3.2262[7730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.663506][ T28] audit: type=1400 audit(1743795989.627:159): avc: denied { create } for pid=7735 comm="syz.1.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 257.813530][ T28] audit: type=1400 audit(1743795989.697:160): avc: denied { create } for pid=7739 comm="syz.0.2265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 257.934877][ T7750] device sit0 left promiscuous mode [ 258.966739][ T7777] device veth0_vlan left promiscuous mode [ 258.981871][ T7777] device veth0_vlan entered promiscuous mode [ 259.035482][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.058090][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.108738][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.071542][ T7804] device sit0 left promiscuous mode [ 260.136109][ T7804] device sit0 entered promiscuous mode [ 260.398688][ T7814] ip6_vti0: mtu greater than device maximum [ 260.412401][ T7811] ip6_vti0: mtu greater than device maximum [ 260.730814][ T7832] device sit0 left promiscuous mode [ 261.572243][ T7877] device sit0 left promiscuous mode [ 261.599947][ T7877] device sit0 entered promiscuous mode [ 262.123399][ T7894] device sit0 left promiscuous mode [ 262.184400][ T7894] device sit0 entered promiscuous mode [ 262.208351][ T7904] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 262.208873][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 262.319684][ T7905] device pim6reg1 entered promiscuous mode [ 263.191307][ T7948] device sit0 entered promiscuous mode [ 263.757185][ T7984] device pim6reg1 entered promiscuous mode [ 263.783511][ T7987] device sit0 left promiscuous mode [ 263.829521][ T7987] device sit0 entered promiscuous mode [ 264.556911][ T8017] syz.1.2346[8017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.556999][ T8017] syz.1.2346[8017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.840562][ T8063] bridge0: port 3(veth0) entered disabled state [ 265.865145][ T8063] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.873249][ T8063] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.021226][ T28] audit: type=1400 audit(1743795997.987:161): avc: denied { create } for pid=8075 comm="syz.1.2360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 266.030906][ T8071] device veth0 left promiscuous mode [ 266.079543][ T8071] bridge0: port 3(veth0) entered disabled state [ 266.169858][ T8071] device bridge_slave_1 left promiscuous mode [ 266.176414][ T8071] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.189567][ T8071] device bridge_slave_0 left promiscuous mode [ 266.200599][ T8071] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.252194][ T8115] device macsec0 entered promiscuous mode [ 268.618578][ T8163] device pim6reg1 entered promiscuous mode [ 269.184466][ T8175] device sit0 left promiscuous mode [ 269.749261][ T8190] device sit0 left promiscuous mode [ 269.871217][ T8192] device sit0 entered promiscuous mode [ 270.499819][ T8207] device wg2 entered promiscuous mode [ 270.594030][ T8216] device sit0 entered promiscuous mode [ 271.241284][ T8227] device pim6reg1 entered promiscuous mode [ 272.085596][ T8269] device sit0 left promiscuous mode [ 272.414865][ T8269] device sit0 entered promiscuous mode [ 273.486912][ T8311] device sit0 left promiscuous mode [ 273.635664][ T8312] device sit0 entered promiscuous mode [ 273.759272][ T8316] device sit0 left promiscuous mode [ 273.813919][ T8317] device sit0 entered promiscuous mode [ 274.201779][ T8339] device sit0 left promiscuous mode [ 274.291549][ T8343] device sit0 entered promiscuous mode [ 276.410311][ T8405] device sit0 left promiscuous mode [ 276.632738][ T8408] device sit0 entered promiscuous mode [ 277.585989][ T8439] device sit0 entered promiscuous mode [ 278.266459][ T8462] device sit0 left promiscuous mode [ 278.593672][ T8464] device sit0 entered promiscuous mode [ 278.768649][ T8465] device veth0_vlan left promiscuous mode [ 278.784713][ T8465] device veth0_vlan entered promiscuous mode [ 278.861620][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.870990][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.889286][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.909866][ T8507] device sit0 left promiscuous mode [ 279.955274][ T8507] device sit0 entered promiscuous mode [ 280.782238][ T8540] device sit0 left promiscuous mode [ 281.030362][ T8542] device sit0 entered promiscuous mode [ 282.093840][ T8563] device sit0 left promiscuous mode [ 282.135417][ T8563] device sit0 entered promiscuous mode [ 282.686500][ T8583] device veth0_vlan left promiscuous mode [ 282.693605][ T8583] device veth0_vlan entered promiscuous mode [ 282.718967][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.772625][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.793116][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.283665][ T28] audit: type=1400 audit(1743796015.247:162): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 283.412400][ T28] audit: type=1400 audit(1743796015.247:163): avc: denied { unlink } for pid=84 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 283.550695][ T28] audit: type=1400 audit(1743796015.247:164): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 284.032452][ T8647] device macsec0 left promiscuous mode [ 284.079756][ T8647] device veth1_macvtap entered promiscuous mode [ 284.127838][ T8647] device macsec0 entered promiscuous mode [ 284.169765][ T3915] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.589078][ T8664] device macsec0 entered promiscuous mode [ 285.503374][ T8704] device sit0 left promiscuous mode [ 285.618453][ T8706] device sit0 entered promiscuous mode [ 286.170334][ T8722] device wg2 left promiscuous mode [ 286.243736][ T8723] device wg2 entered promiscuous mode [ 288.103746][ T28] audit: type=1400 audit(1743796020.067:165): avc: denied { create } for pid=8762 comm="syz.2.2546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 288.926019][ T8781] device sit0 left promiscuous mode [ 289.086215][ T8795] device pim6reg1 entered promiscuous mode [ 289.744294][ T8828] device sit0 left promiscuous mode [ 290.567915][ T8867] device sit0 entered promiscuous mode [ 290.760884][ T8871] device sit0 left promiscuous mode [ 290.790201][ T8873] device sit0 entered promiscuous mode [ 291.921304][ T8908] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.932615][ T8908] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.173236][ T8917] device bridge_slave_1 left promiscuous mode [ 292.226924][ T8917] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.235058][ T8917] device bridge_slave_0 left promiscuous mode [ 292.241795][ T8917] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.297810][ T8919] ÿ: renamed from bond_slave_0 [ 292.714745][ T8944] device sit0 left promiscuous mode [ 292.817063][ T8947] device sit0 entered promiscuous mode [ 293.800940][ T8976] device veth0_vlan left promiscuous mode [ 293.859101][ T8976] device veth0_vlan entered promiscuous mode [ 296.626962][ T9048] device sit0 entered promiscuous mode [ 297.428629][ T9064] device veth0_vlan left promiscuous mode [ 297.471099][ T9064] device veth0_vlan entered promiscuous mode [ 297.573965][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.609877][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.669491][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.938155][ T9078] device sit0 left promiscuous mode [ 298.440023][ T9093] device sit0 left promiscuous mode [ 298.630842][ T9101] device sit0 entered promiscuous mode [ 299.508457][ T9131] device pim6reg1 entered promiscuous mode [ 299.665251][ T9138] device sit0 entered promiscuous mode [ 299.975237][ T9148] syz.0.2656[9148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.975325][ T9148] syz.0.2656[9148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.997927][ T9151] device wg2 left promiscuous mode [ 300.050072][ T9155] device wg2 left promiscuous mode [ 300.071977][ T9148] device wg2 entered promiscuous mode [ 300.099971][ T9155] device wg2 entered promiscuous mode [ 301.955311][ T9193] device sit0 left promiscuous mode [ 302.025599][ T9193] device sit0 entered promiscuous mode [ 303.367587][ T9245] device syzkaller0 entered promiscuous mode [ 303.470114][ T9256] device sit0 left promiscuous mode [ 303.599661][ T9260] device sit0 entered promiscuous mode [ 303.880296][ T9268] device sit0 left promiscuous mode [ 303.929281][ T9269] device sit0 entered promiscuous mode [ 304.533538][ T9282] device syzkaller0 entered promiscuous mode [ 304.730305][ T9308] device sit0 left promiscuous mode [ 304.906183][ T9308] device sit0 entered promiscuous mode [ 306.361123][ T9370] !€ÿÿÿ: renamed from bond_slave_0 [ 309.146229][ T9465] device macsec0 left promiscuous mode [ 309.155900][ T9472] device veth1_macvtap entered promiscuous mode [ 309.164623][ T9472] device macsec0 entered promiscuous mode [ 309.188113][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 309.249492][ T9480] device sit0 left promiscuous mode [ 309.271378][ T9480] device sit0 entered promiscuous mode [ 312.815172][ T9566] device sit0 left promiscuous mode [ 312.934033][ T9574] device sit0 entered promiscuous mode [ 313.367411][ T9581] device sit0 left promiscuous mode [ 313.464255][ T9591] device sit0 left promiscuous mode [ 313.527168][ T9594] device sit0 entered promiscuous mode [ 314.012561][ T28] audit: type=1400 audit(1743796045.977:166): avc: denied { ioctl } for pid=9615 comm="syz.1.2782" path="" dev="cgroup2" ino=157 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 314.161367][ T9623] device wg2 left promiscuous mode [ 314.483449][ T9640] device sit0 entered promiscuous mode [ 314.713637][ T9628] device wg2 entered promiscuous mode [ 314.755009][ T9649] device sit0 left promiscuous mode [ 314.864945][ T9649] device sit0 entered promiscuous mode [ 315.559637][ T9674] device pim6reg1 entered promiscuous mode [ 316.066088][ T9707] device veth0_vlan left promiscuous mode [ 316.088260][ T9707] device veth0_vlan entered promiscuous mode [ 318.199981][ T9810] device syzkaller0 entered promiscuous mode [ 318.354224][ T9812] device sit0 left promiscuous mode [ 318.375715][ T9815] device sit0 entered promiscuous mode [ 318.887911][ T28] audit: type=1400 audit(1743796050.847:167): avc: denied { attach_queue } for pid=9825 comm="syz.4.2840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 318.970724][ T9839] device sit0 left promiscuous mode [ 319.062786][ T9839] device sit0 entered promiscuous mode [ 319.325720][ T9853] pimreg0: tun_chr_ioctl cmd 1074812118 [ 319.338687][ T9852] pimreg0: tun_chr_ioctl cmd 1074025673 [ 319.434096][ T9867] device sit0 left promiscuous mode [ 319.566979][ T9871] IPv6: …: Disabled Multicast RS [ 320.628183][ T28] audit: type=1400 audit(1743796052.587:168): avc: denied { create } for pid=9916 comm="syz.2.2864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 320.927923][ T9921] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.996535][ T9921] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.007862][ T28] audit: type=1400 audit(1743796052.977:169): avc: denied { create } for pid=9944 comm="syz.4.2872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 321.052604][ T9921] device bridge_slave_0 entered promiscuous mode [ 321.104904][ T9921] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.124119][ T9921] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.149648][ T9921] device bridge_slave_1 entered promiscuous mode [ 321.378628][ T7459] device veth0_vlan left promiscuous mode [ 321.876712][ T28] audit: type=1400 audit(1743796053.837:170): avc: denied { create } for pid=9921 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 321.957326][ T28] audit: type=1400 audit(1743796053.917:171): avc: denied { write } for pid=9921 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 321.979312][ T28] audit: type=1400 audit(1743796053.917:172): avc: denied { read } for pid=9921 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.100005][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.120767][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.170107][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.221726][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.254914][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.261931][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.294113][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.316949][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.339075][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.346101][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.425614][T10006] device syzkaller0 entered promiscuous mode [ 322.468942][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.482021][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.512478][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.535594][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.558584][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.601865][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.617209][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.643583][ T9921] device veth0_vlan entered promiscuous mode [ 322.655079][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.673386][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.717205][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.750658][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.779980][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.804642][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.832492][ T9921] device veth1_macvtap entered promiscuous mode [ 322.860076][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.877808][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.909139][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.944976][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.985330][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.038690][ T28] audit: type=1400 audit(1743796054.997:173): avc: denied { mounton } for pid=9921 comm="syz-executor" path="/root/syzkaller.eOqoQL/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 323.230834][ T28] audit: type=1400 audit(1743796055.037:174): avc: denied { mount } for pid=9921 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 323.357783][ T28] audit: type=1400 audit(1743796055.047:175): avc: denied { mounton } for pid=9921 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 323.427205][T10032] device lo entered promiscuous mode [ 324.115166][T10040] device syzkaller0 entered promiscuous mode [ 324.190193][ T294] syz-executor (294) used greatest stack depth: 20328 bytes left [ 324.430534][T10042] device veth0_vlan left promiscuous mode [ 324.451457][T10042] device veth0_vlan entered promiscuous mode [ 324.524599][T10048] device sit0 left promiscuous mode [ 325.260077][T10051] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.268929][T10051] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.276667][T10051] device bridge_slave_0 entered promiscuous mode [ 325.304137][T10051] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.316291][T10051] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.327423][T10051] device bridge_slave_1 entered promiscuous mode [ 325.431223][T10074] device pim6reg1 entered promiscuous mode [ 325.892997][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.929301][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.993190][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.031003][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.067988][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.075555][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.164504][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.178576][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.216614][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.236075][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.243023][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.261918][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.274541][ T7459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.335114][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 326.355496][T10051] device veth0_vlan entered promiscuous mode [ 326.385011][T10097] device syzkaller0 entered promiscuous mode [ 326.398094][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.406602][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.414129][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.456919][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 326.727196][T10051] device veth1_macvtap entered promiscuous mode [ 326.905421][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 326.914191][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 326.948386][T10118] device sit0 entered promiscuous mode [ 327.071445][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 327.102611][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.208618][T10131] device sit0 left promiscuous mode [ 327.251326][ T405] device veth0_vlan left promiscuous mode [ 327.437925][T10131] device sit0 entered promiscuous mode [ 328.010183][T10153] device sit0 left promiscuous mode [ 328.273087][T10157] device sit0 entered promiscuous mode [ 329.108033][T10174] device sit0 left promiscuous mode [ 329.399689][T10176] device sit0 entered promiscuous mode [ 329.718278][T10196] device veth0_vlan left promiscuous mode [ 329.726536][T10196] device veth0_vlan entered promiscuous mode [ 329.794213][T10209] device sit0 left promiscuous mode [ 329.818200][T10209] device sit0 entered promiscuous mode [ 330.233785][T10213] device pim6reg1 entered promiscuous mode [ 331.644482][T10254] device sit0 left promiscuous mode [ 331.747068][T10256] device sit0 entered promiscuous mode [ 332.386871][T10255] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.399498][T10255] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.407342][T10255] device bridge_slave_0 entered promiscuous mode [ 332.421124][T10255] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.438181][T10255] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.448815][T10255] device bridge_slave_1 entered promiscuous mode [ 332.488634][ T28] audit: type=1400 audit(1743796064.447:176): avc: denied { create } for pid=10286 comm="syz.0.2960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 332.777619][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.785437][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.814755][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.823845][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.841906][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.848940][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.856693][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.866359][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.874948][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.881851][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.905958][T10299] device sit0 left promiscuous mode [ 332.925741][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.944565][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.952905][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.962857][T10299] device sit0 entered promiscuous mode [ 333.135254][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.181057][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.205698][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.216530][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.227519][T10255] device veth0_vlan entered promiscuous mode [ 333.240453][T10304] device sit0 left promiscuous mode [ 333.280007][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.299723][ T405] device veth1_macvtap left promiscuous mode [ 333.309209][ T405] device veth0_vlan left promiscuous mode [ 333.514502][T10304] device sit0 entered promiscuous mode [ 333.748969][T10255] device veth1_macvtap entered promiscuous mode [ 333.827655][T10313] device pim6reg1 entered promiscuous mode [ 333.905543][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.919596][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.959601][ T7459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.980288][ T7459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.904448][T10370] device team_slave_0 entered promiscuous mode [ 334.930993][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.946746][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 335.172996][T10375] device syzkaller0 entered promiscuous mode [ 337.165076][T10399] device syzkaller0 entered promiscuous mode [ 340.748899][T10466] device sit0 left promiscuous mode [ 340.794515][T10467] device sit0 entered promiscuous mode [ 346.024499][T10559] device sit0 entered promiscuous mode [ 346.142780][T10563] device sit0 left promiscuous mode [ 346.173037][T10569] device sit0 entered promiscuous mode [ 346.398865][T10568] device veth0_vlan left promiscuous mode [ 346.404943][T10568] device veth0_vlan entered promiscuous mode [ 346.500164][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.524375][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.532472][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.613328][T10596] device syzkaller0 entered promiscuous mode [ 346.858583][T10613] device pim6reg1 entered promiscuous mode [ 347.349925][T10632] device wg2 left promiscuous mode [ 347.777111][T10642] device sit0 left promiscuous mode [ 347.874622][T10645] device sit0 entered promiscuous mode [ 349.409167][T10700] device sit0 left promiscuous mode [ 349.450491][T10700] device sit0 entered promiscuous mode [ 349.808330][T10678] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.836393][T10678] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.854593][T10678] device bridge_slave_0 entered promiscuous mode [ 350.064247][T10678] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.089053][T10678] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.159724][T10678] device bridge_slave_1 entered promiscuous mode [ 350.324781][T10736] device veth1_macvtap left promiscuous mode [ 350.332635][T10736] device macsec0 entered promiscuous mode [ 350.393782][T10746] device sit0 entered promiscuous mode [ 350.567700][T10751] device sit0 left promiscuous mode [ 350.619448][T10757] device sit0 entered promiscuous mode [ 350.824442][T10678] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.831462][T10678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.838954][T10678] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.846087][T10678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.873014][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.880629][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.004222][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 351.024237][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.083209][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 351.119236][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.155726][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.162681][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.201757][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 351.259237][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.279004][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.286742][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.356993][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.367586][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.493988][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.555678][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.605593][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 351.627899][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.653604][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 351.663350][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.697503][T10803] device sit0 left promiscuous mode [ 351.713500][T10801] device sit0 left promiscuous mode [ 351.739047][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.746859][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.858744][T10804] device sit0 entered promiscuous mode [ 352.077677][T10805] device sit0 entered promiscuous mode [ 352.363204][T10678] device veth0_vlan entered promiscuous mode [ 352.371284][ T7459] device veth0_vlan left promiscuous mode [ 352.488819][T10818] device veth1_macvtap left promiscuous mode [ 352.495431][T10818] device macsec0 left promiscuous mode [ 352.574458][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 352.583026][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.610621][T10678] device veth1_macvtap entered promiscuous mode [ 352.646616][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.675374][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.688548][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.733294][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.769957][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.853150][T10844] device sit0 left promiscuous mode [ 352.897640][T10848] device sit0 entered promiscuous mode [ 353.352331][T10857] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.368563][T10857] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.387658][T10857] device bridge_slave_0 entered promiscuous mode [ 353.446251][T10857] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.459864][T10857] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.467281][T10857] device bridge_slave_1 entered promiscuous mode [ 353.520206][T10891] device veth0_vlan left promiscuous mode [ 353.538457][T10891] device veth0_vlan entered promiscuous mode [ 353.580852][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.589953][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.597371][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.958266][T10915] bond_slave_1: mtu less than device minimum [ 354.449804][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.507579][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.745083][T10947] device sit0 left promiscuous mode [ 354.761674][T10950] device sit0 entered promiscuous mode [ 354.975160][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.992707][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.001126][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.008094][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.058891][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.066963][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 355.075896][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.084618][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.091534][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.099863][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 355.107919][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.116180][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.124580][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.178059][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 355.186770][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.265967][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 355.296507][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.319691][T10857] device veth0_vlan entered promiscuous mode [ 355.326683][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.347014][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.392970][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 355.409847][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.437492][T10857] device veth1_macvtap entered promiscuous mode [ 355.473419][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 355.482246][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 355.949598][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 355.958329][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 356.803414][T10975] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.826175][T10975] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.846595][T10975] device bridge_slave_0 entered promiscuous mode [ 356.875618][T10975] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.902965][T10975] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.930266][T10975] device bridge_slave_1 entered promiscuous mode [ 357.430059][T10975] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.436959][T10975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.444121][T10975] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.451086][T10975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.549262][ T3926] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.579098][ T3926] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.268373][ T3926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.278049][ T3926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.316624][ T3926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.349333][ T3926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.377926][ T3926] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.384857][ T3926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.459253][ T3926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.467873][ T3926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.499520][ T3926] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.506415][ T3926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.556142][T11036] device sit0 entered promiscuous mode [ 358.704542][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.713477][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.731352][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.739822][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.757852][T10975] device veth0_vlan entered promiscuous mode [ 358.770009][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 358.778581][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.787390][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 358.812856][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.846921][T10975] device veth1_macvtap entered promiscuous mode [ 358.875793][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.900657][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.910598][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 358.920005][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.936497][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.959718][T11044] bridge0: port 3(dummy0) entered blocking state [ 358.966327][T11044] bridge0: port 3(dummy0) entered disabled state [ 358.993982][T11044] device dummy0 entered promiscuous mode [ 359.001841][T11044] bridge0: port 3(dummy0) entered blocking state [ 359.008363][T11044] bridge0: port 3(dummy0) entered forwarding state [ 359.027861][T11045] device dummy0 left promiscuous mode [ 359.033825][T11045] bridge0: port 3(dummy0) entered disabled state [ 359.044482][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.052738][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.142833][T11065] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 359.148612][T11065] syzkaller0: linktype set to 804 [ 359.200675][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.210588][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 359.465517][T11068] device syzkaller0 entered promiscuous mode [ 359.508761][ T7459] device bridge_slave_1 left promiscuous mode [ 359.519190][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.527741][ T7459] device bridge_slave_0 left promiscuous mode [ 359.534476][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.543123][ T7459] device veth1_macvtap left promiscuous mode [ 359.549477][ T7459] device veth0_vlan left promiscuous mode [ 360.299004][T11099] device veth0_vlan left promiscuous mode [ 360.309016][T11099] device veth0_vlan entered promiscuous mode [ 360.431472][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.461987][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.521238][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.835790][T11095] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.896668][T11095] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.941331][T11095] device bridge_slave_0 entered promiscuous mode [ 361.321947][T11095] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.338891][T11095] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.346383][T11095] device bridge_slave_1 entered promiscuous mode [ 361.982093][T11148] device sit0 left promiscuous mode [ 362.049483][ T7459] device bridge_slave_1 left promiscuous mode [ 362.055476][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.102886][ T7459] device bridge_slave_0 left promiscuous mode [ 362.159691][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.209066][ T7459] device veth1_macvtap left promiscuous mode [ 362.235590][ T7459] device veth0_vlan left promiscuous mode [ 362.394207][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.404475][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.427283][T11148] device sit0 entered promiscuous mode [ 362.658970][T11155] device sit0 left promiscuous mode [ 362.796064][T11156] device sit0 entered promiscuous mode [ 363.073028][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.082262][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.098690][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.106019][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.114983][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.123893][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.133155][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.140202][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.148715][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.158714][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.167703][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.176349][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.185626][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.226865][T11166] device sit0 left promiscuous mode [ 363.250127][T11167] device sit0 entered promiscuous mode [ 363.464990][T11170] device sit0 left promiscuous mode [ 363.487174][T11171] device sit0 entered promiscuous mode [ 363.704334][T11184] device sit0 left promiscuous mode [ 363.729232][T11187] device sit0 entered promiscuous mode [ 364.195268][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.204863][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.271340][T11095] device veth0_vlan entered promiscuous mode [ 364.281354][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 364.290560][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.308624][T11095] device veth1_macvtap entered promiscuous mode [ 364.317855][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.325986][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.335127][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.345463][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.354720][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.396309][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.415932][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.443135][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.469660][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready Connection to 10.128.1.94 closed by remote host. [ 366.364099][ T7459] device bridge_slave_1 left promiscuous mode [ 366.370324][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.377833][ T7459] device bridge_slave_0 left promiscuous mode [ 366.384439][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.393498][ T7459] device bridge_slave_1 left promiscuous mode [ 366.408974][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.417859][ T7459] device bridge_slave_0 left promiscuous mode [ 366.424891][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.434013][ T7459] device bridge_slave_1 left promiscuous mode [ 366.443407][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.459086][ T7459] device bridge_slave_0 left promiscuous mode [ 366.465689][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.490634][ T7459] device veth1_macvtap left promiscuous mode [ 366.496626][ T7459] device veth0_vlan left promiscuous mode [ 366.503493][ T7459] device veth1_macvtap left promiscuous mode [ 366.509727][ T7459] device veth0_vlan left promiscuous mode [ 366.515995][ T7459] device veth1_macvtap left promiscuous mode [ 366.522378][ T7459] device veth0_vlan left promiscuous mode [ 368.239743][ T7459] device bridge_slave_1 left promiscuous mode [ 368.245851][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.253753][ T7459] device bridge_slave_0 left promiscuous mode [ 368.259807][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.268055][ T7459] device bridge_slave_1 left promiscuous mode [ 368.274474][ T7459] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.282559][ T7459] device bridge_slave_0 left promiscuous mode [ 368.288642][ T7459] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.297062][ T7459] device veth1_macvtap left promiscuous mode [ 368.303745][ T7459] device veth0_vlan left promiscuous mode [ 368.310097][ T7459] device veth0_vlan left promiscuous mode