last executing test programs: 6.163599344s ago: executing program 1 (id=7368): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8, 0x7}, 0x100100, 0x0, 0xffffffff, 0x0, 0x0, 0x2004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000060953eb54590b200deffffff00000000850000000500000095"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x3, 0x18}, 0xc) (async, rerun: 64) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) (rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r4, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x0, 0x2f, &(0x7f0000000ec0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x27, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x1ffffffffffffdf4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b40)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0900000000000000090000000900000040a60000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB="020000000200000003000000000d000000000000", @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00'], 0x50) (async) sendmsg$inet(r3, &(0x7f0000000c00)={&(0x7f00000007c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000a80)=[{&(0x7f0000000900)="248dc342a0841d1f1b50706858ca5a350f09875691cde2901fa229981304986fec9fa85a02123261477489ff7e06ec097cee02fdfd076f48c458964d7ad542c5e059b48ab368435deb69ba2455d1c6333a77022dbf34070a5103033a58380f5c58cc7a8d8419a55a9ea0c98cc43915c64c2b4cf88c453b5cb043b71dac07a0e230ccca79778b66e3ee2b866709295cd1da8be9", 0x93}, {&(0x7f00000009c0)="f3cb738b433468c15868e484dd509225967c725f31e21a63c63574f112930a931ed1114af51c4d64efc8db9f37f5ea5568d4e82e8a0acf11d64dcac916a8d8e2065d1fe0df0df0e0cf9b092a6b4f1cf6415b", 0x52}], 0x2, &(0x7f0000000b80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @private=0xa010102, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x70}, 0x4000804) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x6, [@func={0x1, 0x0, 0x0, 0xc, 0x3}, @fwd={0x8}, @float={0xf, 0x0, 0x0, 0x10, 0x4}, @const={0x8, 0x0, 0x0, 0xa, 0x2}, @decl_tag={0xa, 0x0, 0x0, 0x11, 0x5, 0x8000}, @union={0xb, 0x0, 0x0, 0x5, 0x1, 0x1c000000}]}, {0x0, [0x30, 0x0, 0x2e, 0x61]}}, &(0x7f0000000240)=""/155, 0x6a, 0x9b, 0x0, 0xbb20}, 0x28) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x8001, 0x0}, 0x8) (async, rerun: 32) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="19000000040000000400000005", @ANYRESOCT=r8], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)=r1}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x19, 0x4, 0x3, 0x0, 0xa0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) (async) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="ffff09000000f800"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x6, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0xc, 0x5, 0x0, 0x7}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x6, 0x1, 0x0, r2}], &(0x7f0000000080)='GPL\x00', 0x5, 0x74, &(0x7f00000000c0)=""/116, 0x20880, 0xd, '\x00', r5, @fallback=0x20, r9, 0x8, &(0x7f0000000340)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x5, 0x4}, 0x10, r10, r1, 0x4, &(0x7f00000005c0)=[r11, 0x1, r12, r13, r14], &(0x7f0000000600)=[{0x5, 0x4, 0x8}, {0x1, 0x5, 0x7, 0x7}, {0x4, 0x3, 0x9, 0x9}, {0x1, 0x4, 0x6, 0x8}], 0x10, 0x6}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r15}, 0x10) 6.116037898s ago: executing program 1 (id=7369): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0700000004000000080200002100000000000000", @ANYRES32, @ANYBLOB="0000d96cfeefd8c16d6b00"/25, @ANYRES32=0x0, @ANYRES32], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async) close(r2) (async) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000e00000040000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) close(0x3) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x230}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x881) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000ec0000020000000080110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000400), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_procs(r10, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f0000000380), 0x12) 3.036037111s ago: executing program 1 (id=7408): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r2, &(0x7f0000000640)="b2ff188c58589f52d8e398e1c20c487ea506e830e931d9c496b044b29a9136bc3e5e6b269d2fa6578ae254ab0fd582c65b1c459a57d1453afbd9eacd4a4ede12c80a", &(0x7f00000006c0)=""/249}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd24}, {0x0, 0x4000}, {0x0, 0x21}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000008000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x4810) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.388670332s ago: executing program 1 (id=7410): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$ENABLE_STATS(0x20, 0x0, 0x0) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.371551514s ago: executing program 3 (id=7411): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001240)={{0x1, 0xffffffffffffffff}, &(0x7f00000011c0), &(0x7f0000001200)='%pI4 \x00'}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001280)={&(0x7f0000000000)="a76452496882d82429d00a1394135e3631d9b7e728f7ff3b682d95e61c309a8c9d5081783dd0068f95b9b67e23b7d3b3ad8f231e4d83b9be75bcf29eb7086f5cc32f8c3c54c8377ecb08cebbd876e670fb814623419c54ba76e219785c0f63bde99ed5bfd9163339f32cb12b4f1beaf8e2862bf0b900b77492d863a9f18a4306ef44a62b987e7a404ebbd52c813928e5b696af3f0c6b0d04835825b3dc9d3e74b1122578adc152e2", &(0x7f00000000c0)=""/18, &(0x7f0000000100)="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", &(0x7f0000001100)="7ab7db04be3902cc56f12c21a1bc7a14d3237c4f40bc0b34177064fff0acf2857260e63164d88fb29b8a85ce768f638d0224e700d466d098c5a9f860ae354644b2457e97bfdf06a1ade3d06e10d3108e081dcb46e6e5208fc633b7b17170687d3d17b6cdb8e213aac92421f9745e4b3ad3d04341faa6d457802e2513c596b4933636ac7456d7a0d9b1df2d560f9c", 0x2, r0, 0x4}, 0x38) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000012c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001300)={[{0x2b, 'io'}, {0x2b, 'net_cls'}, {0x2b, 'blkio'}]}, 0x14) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001340), 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000013c0)=@generic={&(0x7f0000001380)='./file0\x00', 0x0, 0x30}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001500)={@cgroup=0xffffffffffffffff, 0x34, 0x0, 0x1000, &(0x7f0000001400)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001580)={0x7, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001540)={@map=r0, r2, 0x1c, 0x20, 0x0, @void, @void, @void, @value=r5, r4}, 0x20) r6 = syz_clone(0x80000, &(0x7f00000015c0)="471ed455f78e135e3958f44da50eee54a8905a974a91d31a1071f2e2d000810cc2b7dc243f0ee197c7021a33558e973a36dc1fae8e94f229cc17e728f10004175d069aa0311a60109c471e2114d3fa9e3c18d288099a5cff2611374b2458dde912d3eb", 0x63, &(0x7f0000001640), &(0x7f0000001680), &(0x7f00000016c0)="e159d1729cb2ec9185155243954ca46018fb8df25cd40a27d2cef22144a72b0451169a1acd46cb684ebfd50d0a76a33176b9751c45ddeae1") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001740)={r6, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001700)='{)@\\][-\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001780)={0x0, 0xfffffff7, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r7, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001900)={{r7, 0xffffffffffffffff}, &(0x7f0000001880), &(0x7f00000018c0)=r7}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001a00)={&(0x7f00000019c0)='bcache_btree_write\x00', r2, 0x0, 0x6}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = openat$cgroup_freezer_state(r3, &(0x7f0000001d80), 0x2, 0x0) sendmsg$unix(r12, &(0x7f0000001e00)={&(0x7f0000001a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001b00)="ec234439c9dbba496b7139e7c5e17a1811bd8772972de96d41dc5eec4af31bef87ee19227a4f65ab55a2727680d71e2dbf9d54517217291720ca4f85565247179213c96df187a33d3238d1f63aa4cf542cdc1838c45664137853f8fb71d3b47d1e79fe53b462662fb51e39166fc3fe7541729a63fc61dd4f252d108ff5904bc17bfc2a5ff35f280e073ccab1655512f5ab0f4565d064b6d81afe617b9c797ea03280e829f24c1536b4fcbf32aec6b0ebc4536ff30d56c0", 0xb7}, {&(0x7f0000001bc0)="d849177fbb21f5805760fbc763f6eff0579433ad36e6ff76a9d628c82f4486847887e35140b7f9e40ed51f19ecbc9c5e9d78e6b9a2afa01b476ece74f213015796186bed6509780da07e272a8a12b9b7d6385ef1281d657ab8376396f2a1715d713dfe23e815b842d7e7823375088f56b0588a860bee7790887622a0619cf779fa505f92aa0af6f87fad23e5b3dc03b24f65d79ae893bbf32cc4fae4e378485a0a", 0xa1}, {&(0x7f0000001c80)="e9767f312e2fd3de23aadfe0a2b8d17fde2b2150f0b8c9d0a744199698acc87d672a1f712ed916e2af99f4d1461cbf249272db5bf18e9136db972af7f133b39045af970ca15cd997c6e2e1655d369b8ac683f623439142a2ccd06799", 0x5c}, {&(0x7f0000001d00)="d6a9a51554c16bc799599570c2", 0xd}], 0x4, &(0x7f0000001dc0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r13]}}], 0x38, 0x40004}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002040)={&(0x7f0000001e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x6, [@ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0xd}]}, @ptr={0xa, 0x0, 0x0, 0x2, 0x1}, @type_tag={0xc, 0x0, 0x0, 0x12, 0x2}, @func={0x3, 0x0, 0x0, 0xc, 0x3}, @union={0xe, 0xa, 0x0, 0x5, 0x1, 0x6, [{0x8, 0x1, 0x4c}, {0x5, 0x2, 0xb998}, {0x1, 0x4, 0xadf}, {0x5, 0x1, 0xec7}, {0xe, 0x1, 0x1}, {0xa, 0x3, 0x8000}, {0x9, 0x3, 0x6}, {0x7, 0x1, 0x3ff}, {0x2, 0x3, 0x4}, {0xa, 0x1, 0x8}]}, @enum64={0x4, 0x1, 0x0, 0x13, 0x0, 0x5, [{0x8, 0x6, 0x44}]}]}, {0x0, [0x5f, 0x30, 0x30, 0x0]}}, &(0x7f0000001f40)=""/246, 0xfe, 0xf6, 0x1, 0x2}, 0x28) close(r11) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002080)={0x2, 0x4, 0x8, 0x1, 0x80, r10, 0x4, '\x00', r8, 0xffffffffffffffff, 0x4, 0x3, 0x3}, 0x50) write$cgroup_subtree(r1, &(0x7f0000002100)={[{0x2d, 'cpu'}, {0x2b, 'perf_event'}, {0x2d, 'hugetlb'}, {0x2b, 'devices'}, {0x2b, 'blkio'}, {0x2d, 'rdma'}, {0x3cf644f84f3178b, 'rlimit'}, {0x2d, 'rdma'}]}, 0x3e) r15 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002480)=@bpf_lsm={0x1d, 0x26, &(0x7f0000002140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x401}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r14}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, @call={0x85, 0x0, 0x0, 0xcf}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x7, 0x0, 0xa, 0x0, 0x5, 0xfffffffffffffff4, 0xfffffffffffffffc}], &(0x7f0000002280)='syzkaller\x00', 0x7, 0x9a, &(0x7f00000022c0)=""/154, 0x41100, 0x28, '\x00', r8, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000002380)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000023c0)={0x4, 0x4, 0x3, 0x9}, 0x10, 0xffffffffffffffff, 0x0, 0x7, 0x0, &(0x7f0000002400)=[{0x0, 0x4, 0x8, 0xb}, {0x4, 0x1, 0x7, 0x3}, {0x5, 0x1, 0xc, 0x3}, {0x1, 0x3, 0xe, 0xc}, {0x1, 0x1, 0xc, 0x8}, {0x3, 0x1c5, 0xa, 0x6}, {0x5, 0x4, 0xd, 0x6}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002640)={@map=0x1, 0x36, 0x0, 0x3, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000002580)=[0x0, 0x0], &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002600)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002680)={@ifindex=r8, 0xffffffffffffffff, 0x1, 0x1, r15, @void, @value=r2, @void, @void, r16}, 0x20) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f00000026c0)={'\x00', @broadcast}) recvmsg(r11, &(0x7f0000002d40)={&(0x7f0000002700)=@alg, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002780)=""/44, 0x2c}, {&(0x7f00000027c0)=""/200, 0xc8}, {&(0x7f00000028c0)=""/85, 0x55}, {&(0x7f0000002940)=""/131, 0x83}, {&(0x7f0000002a00)=""/56, 0x38}, {&(0x7f0000002a40)=""/113, 0x71}, {&(0x7f0000002ac0)=""/125, 0x7d}, {&(0x7f0000002b40)=""/150, 0x96}], 0x8, &(0x7f0000002c80)=""/166, 0xa6}, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r17, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="a35c7b3b8b7d9b7ec6bf16306f39ba60bc2c8bdba9de2ab97058075ed66b3a2b1229d7669103ab3d2b2224e15838c75995d2c3b608ee6ad3ebff083fb109811f57b3a65d23c4b40b3eb36668e830d88d56402619e05ea4f461d343a75808a89896733e77cd061f2d84535bf27948eb3d8924c05e2083e4a2636baefd69bc30fe676b896ad6988fc71b88d8e87386be19d8604db83c22f47baa0f5d9e", 0x9c}], 0x1, &(0x7f0000002ec0)="5b92a562fec72a823523e4c3b923627522a3f99d69d571f87dc82033197615cc05c54cb2295cad3d8e62b686e03c5d9df51baf65ee42fbe0d3f5a3295994743245a1e95d445df757e16deed9363b0b934b23b026edb3dfd73f54f64f4c920859c86adbc7dbbe76c79e8c94578d9d89eb11196a416f17e816ccb65144beff0062f4d66b1acad6a97111a770", 0x8b, 0x41}, 0x24004000) 2.357367945s ago: executing program 1 (id=7412): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x3d}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x46, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x3d}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x46, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x3b81}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) 2.282633952s ago: executing program 3 (id=7413): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x15, 0x10, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x6c}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r4}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x15, 0x10, 0x2}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x6c}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) 2.281349683s ago: executing program 1 (id=7415): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb001c00000006000000040000000200000604400000030000000100000005000000000000000000005f7217c1f64f950221404ecca2767b6312b75de97a77553f57ebce21891a10946bc3dd1700b1"], &(0x7f0000003680)=""/4096, 0x3a, 0x1000, 0x1}, 0x28) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f00000015c0)=""/4086, 0x26, 0xff6, 0x1}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000400), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000380), 0x12) r11 = openat$cgroup_procs(r7, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f00000001c0)=r6, 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 1.807342218s ago: executing program 3 (id=7417): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000800)='GPL\x00', 0x80000000, 0xc9, &(0x7f0000000880)=""/201, 0x41000, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x3, 0x5, 0x7f, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000a00)=[r1, r0, r1, r0], &(0x7f0000000a40)=[{0x5, 0x4, 0x10, 0x1}, {0x0, 0x4, 0x6, 0x6}, {0x1, 0x1, 0x9, 0x2}, {0x0, 0x5, 0xe, 0x3}, {0x2, 0x2, 0x9, 0x5}, {0x2, 0x1, 0x9, 0x4}], 0x10, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0b0000000600000004000000a703000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001f600"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r11 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x66) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000022c0)=ANY=[@ANYBLOB="1800000000000000000000000800000018110000", @ANYRES8=r10, @ANYBLOB="0000000000000000b70200001400d163b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095", @ANYRES16=r10], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000500)=r13, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='hrtimer_start\x00', r14}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r6) 1.299120306s ago: executing program 3 (id=7419): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f00000004c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xf, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0xd}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @cgroup_device, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x40, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, @perf_config_ext={0x5e, 0x1}, 0x4b0, 0xc8, 0x0, 0x2, 0x1000000000003}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, 0x0, 0x2000fdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f3, &(0x7f0000000080)) 1.231244663s ago: executing program 3 (id=7423): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='svc_xprt_create_err\x00', r1}, 0x31) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000000001000000"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.171683298s ago: executing program 2 (id=7426): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/1421], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/1421], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r0, 0x0, 0xe, 0x0, &(0x7f0000000f80)="dd7e7bc2300823a04347f02db2c6", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.171327688s ago: executing program 4 (id=7427): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0900000008000000040000000940"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0900000008000000040000000940"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000007900480000000000180000000000000000000000000000009500edffffffffffd40a0000100000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000007900480000000000180000000000000000000000000000009500edffffffffffd40a0000100000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) 1.069583558s ago: executing program 2 (id=7428): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x50) r3 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r3, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r3, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r8, 0x0, 0x0) close(0x3) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x6, 0x4, 0x65bf, 0x9, 0x0, 0x1, 0xcb00}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9, r2}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r10, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x18) 1.066796298s ago: executing program 4 (id=7429): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000040), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="ecbb922347b6c9a95f949834b2dca68bfe86d1999cf684c3981796e93e91de5fca67338c3424bee83645282ca0646380664030198d12e3293d648e95ba5d699e6e41ad73dbab46e679335f1c9ffa1efa5ff687992ae99ff18fb2f62f249e0d90da4e2be69e71252ad1f9ca06dc5982e469184d4a91acf10901371c5f937fd25a39c1abb584b62179ea3ff16a8904d5b1eea255f8d44e286ead4c67848688d8a651aff194954e4d8eff83cec52ccddaedeb8585500d67eef1a7361083db702a0286d5c1540a9d87c7dd08d5ae4584e153541f4fe0387320064665f6985260ba13a6d5f831a87c4b4d375dc456fb10e40a", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000900000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000006ae3500000000000000000000000000010000", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000001c0), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0f000008000000000000f4ff0000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) 1.004626544s ago: executing program 2 (id=7430): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000009c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="000000000000000000ad34ac6200000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) (async) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) write$cgroup_devices(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef289a630182700008"], 0xffdd) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="00158000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, r0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x100002, 0x0) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$TUNSETVNETLE(r9, 0xb702, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r7}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 975.851997ms ago: executing program 2 (id=7431): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x7, 0xff, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000008c0), 0x4}, 0x207a02, 0xc8, 0xffffffbf, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0xa9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000400"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1e0000009898000005000000000010005480c1b4", @ANYRES32, @ANYBLOB='o\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000001000000040000000e00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbe, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xe5, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000100)=r6, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="150000000300000000000000090000f3cbf85800", @ANYRESHEX=r5, @ANYBLOB='/\x00'/20, @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="05000000050000000400"/24, @ANYRES32=r0, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b000000bfa100000000000107ffffb702000000000000b70300000000010a8500000004000000951dbd7f9bf47ef0fc6598560aa0255266830bcb577889514e7eaa35a2afca80b1a553484fba5f437168eaa9040135e6cadacab6854ba02ca298915ad0870e2f9d00000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6f, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) socketpair(0x26, 0xa, 0x80000000, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r9, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r8}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r12, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b0000000080000000b6f30286a26abda4360000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r13, @ANYRES32, @ANYRESOCT=r13], 0x48) 917.612642ms ago: executing program 4 (id=7432): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@ptr={0x2, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}, {0x0, [0x5f, 0x5f, 0x0]}}, &(0x7f0000001300)=""/91, 0x41, 0x5b, 0x1, 0x0, 0x10000}, 0x28) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r1, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x5b, &(0x7f00000014c0), 0x0, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x11, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@jmp={0x5, 0x1, 0xb, 0x1, 0x5, 0xffffffffffffffc0}, @jmp={0x5, 0x0, 0x8, 0xa, 0x3, 0x40, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='syzkaller\x00', 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, r2, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001780), 0x0, 0x10, 0x6}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYRESDEC=r2, @ANYRESDEC=r4], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r5}, &(0x7f0000000400), &(0x7f0000000440)='%ps \x00'}, 0x20) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) bpf$TOKEN_CREATE(0x24, &(0x7f00000003c0)={0x0, r5}, 0x8) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r8}, 0x10) (async) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) 903.988573ms ago: executing program 4 (id=7433): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x3, 0x4, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000008a0000009500000000000000f1f7a27069b2c18bf5fda6c00aad32b59ee61d34206745e1d1f07f28cfb512e86365851e26b9905b6e3cf84459a8abe99122063c8720558583d1967547f9b0864d93fb5895bd521e7bd27d20aa81decf98852ba76068332d81b48e698dcee064aaaee0f0c3c7c4e2c4aaa4811bb26bd4a3466d0751753c893e1fb69ec981eabb1bc966d50bd0f44aa8ce86bf16c3684cc4eb63f303cec9a557"], &(0x7f0000000900)='GPL\x00', 0x3, 0x8a, &(0x7f00000000c0)=""/138, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xc40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000008c243eb7c1ed835ca5c78f6e05dd3a6a950fcf0f3c6f1af157997ffd621e6315b72feb5687d20d1bb781b21febe7bfcfdb0082db164abd0bc3afe52c88e86c449eff121cd261869ddddd03c7673b2e021e5ade86be9db85d440b86641f1e86b8b7e9053a6375bfed2db4cadbe4ab2724e79806132d69f07134723c0076403d4e247b9c3e58a0694b44836b9589822fd542af30d2cc50cc94d13ef90a20e57516a044696db5c74ca7100633eabf7cbeaafe656f7e6798ea00b77ebd6751df81e8a21e241134fab933c524f5676ea74bb3800185506703bd93ed28ca4faa894113ec4e2ee5e107574c87d05725305dd1ad", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, 0x0, &(0x7f0000000600)=""/169}, 0x3d) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x1b, 0x8, &(0x7f0000000200)=ANY=[@ANYRES8=r2], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffd}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 886.311445ms ago: executing program 0 (id=7434): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x28, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6d}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 649.614618ms ago: executing program 0 (id=7435): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='\a\x00'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000a00000040"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x5, 0x2, 0x4}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff21}, 0x0) close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="d4b1010018000000000000002400000024000000021e00000000000000000004000000030000020000000009000000000000deeea5c3d0ed22aa97338984ed7a17f31f2c"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x40010) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x7, '\x00', 0x0, r11, 0x4, 0x5}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r9}, 0x3d) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) 598.550813ms ago: executing program 0 (id=7436): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000000100000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0\x00', 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000808500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000012008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x7d2ccc1a8cedb015}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpuset'}]}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r7, 0x0, 0xe40, 0x0, &(0x7f0000000100)="5c71f91b05c413550230b4c817a628", 0x0, 0x0, 0x0, 0x330, 0x0, &(0x7f0000000180)='\x00', 0x0}, 0x48) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffe49) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair(0xf, 0x3, 0x8, &(0x7f0000000500)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r3) 592.706693ms ago: executing program 2 (id=7437): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x18) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0xe08dbdc782d5df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x20, 0x12, &(0x7f0000000980)=ANY=[@ANYBLOB="18080000d0ff0000000000000000000085100000060000002a240000", @ANYRES32, @ANYBLOB="00000000ff0f0000180000000400000000000000000000008520000004000000a60a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00007cf8000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0xd6, &(0x7f0000000340)=""/214, 0x0, 0x8}, 0x94) (async, rerun: 32) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000022c0)="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", 0x800}, {&(0x7f0000000480)="98394755849309c480bfe4d40fdf45226dd7e2c5bc8d33c4c6544b7e033b9362065e0d967c99e7b40911fd8c2363ce70339f149b9536076be177b5605f3c30f4b483eaf594719aea8e9669235978c074000b221c10e9d7d87f3b95fc0592aeac9b62aff9161b528f7d976f542c03f40b3a0e499696b37dbab00c17a264d4587abe7c9922442d9c4a503676ef93c5492ad6aae064f97e62d77b36b6ef0ef942d6adb1765230c1b49b39b2bf0c890d3720958b05b44ea6bec04aa37a998aae00c798aeb617343cc59f5e91e0d1", 0xcc}, {&(0x7f0000000400)="b3d6559e56f50325c4611062a5c3cb8e790f756ecd08f649c9dd362b37d358d9903a1127b0ad0ffae3e4c85e22c8d9c129a5e6c1df138663a0aed9b245e81dce08e8b9210912b34361", 0x49}, {&(0x7f0000000700)="d67154b3319046c876543a1821d18d5499df58e42924f4a7a3a13c275e5073130b8dd5b3b61f85ce6d920207894e3855eab7615de69ff1ef72930bd952cb20c3b519f9fec024", 0x46}, {&(0x7f0000000780)="fc9500b122857b2594df250bd9faed30f25d734d38d53f3065d30241e9421ea7557310d2e074f7f06cc4369ef00d2b646eb104f10884d0ceb9bffc114ae6bfceb042ad3c6d033b70fb86d8097beb4243338bb795ab6c25596ed9cac943a276e1c1729ddf3e1c1a4c021873bfec72def061", 0x71}, {&(0x7f00000032c0)="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", 0x1000}], 0x6, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000008c0)='signal_deliver\x00'}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000900)=ANY=[@ANYBLOB="0a00000016000000b400000003000000000000007520d47fb3dd84c053887098a4cc0d4d9b9f1512fc88ffd4a9420cb715cdf76d28fe3fd7a8385944a71547", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) (rerun: 32) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 535.722138ms ago: executing program 2 (id=7438): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x800}, 0x100001, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000003000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, 0x0, 0xfdef) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 525.82882ms ago: executing program 4 (id=7439): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 401.515311ms ago: executing program 4 (id=7440): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x3ba, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x5, 0x4, 0x8, 0x5, 0x3a410, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc, 0x0, @value=r1, @void, @value=r1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x2000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r8, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000cfb0c225d007de9023803a9bf33467fa286a8bc593235fd7e006032e5aba617f525e51c6f03bf61a15794b5aaa"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 205.47838ms ago: executing program 0 (id=7441): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='X\x00'/20, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="000000000000000000003ea15fffa5e0dd284a00008c0bc72524626ea9f32ff32d5b75cc283790a2cd2bcdbbcea9ec86fec214a5"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000005000000850000002e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r2}, &(0x7f0000000440), &(0x7f0000000480)=r4}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x20000014) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYRES64], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x53b09c97cbd156e2, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x25c, 0x0, &(0x7f0000000bc0)="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", 0x0, 0x2f, 0xe8034000, 0x0, 0x90, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5d8}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000005000000000000000000000d00000000000000000000000b05000000000000000000000300000000e40000000200000000000036002e613000add03c024c6a4cf739e6961b7d5efc03a61c420ae2"], 0x0, 0x4d}, 0xfffffd5d) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 203.62494ms ago: executing program 3 (id=7442): socketpair(0x6, 0x1, 0x1, &(0x7f0000000040)={0x0, 0x0}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0xf1, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x6a, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = gettid() syz_open_procfs$namespace(r3, &(0x7f0000000240)='ns/user\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, &(0x7f0000001080), &(0x7f00000001c0)=r2}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x18) close(r7) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x4, 0x0, 0x80000001, 0xca0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0xfffffffc}, 0x50) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r11}, 0x10) unlink(0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000880)=@bloom_filter={0x1e, 0x7, 0x1ff, 0xa, 0x60c1, 0x1, 0x7, '\x00', r1, r6, 0x1, 0xfffffffe, 0x1, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 111.286339ms ago: executing program 0 (id=7443): openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010c00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYRES8=r0], 0xe) 0s ago: executing program 0 (id=7444): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000fffffffffffffffffffffffd2e2e"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x80002000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x684, 0x7, 0x0, 0x0, 0x4}, r7, 0x0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.29' (ED25519) to the list of known hosts. [ 21.159841][ T24] audit: type=1400 audit(1766778182.870:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.160922][ T267] cgroup: Unknown subsys name 'net' [ 21.182783][ T24] audit: type=1400 audit(1766778182.870:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.210171][ T24] audit: type=1400 audit(1766778182.910:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.210384][ T267] cgroup: Unknown subsys name 'devices' [ 21.388061][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.393749][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.531026][ T24] audit: type=1400 audit(1766778183.240:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.554719][ T24] audit: type=1400 audit(1766778183.240:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.560071][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.579770][ T24] audit: type=1400 audit(1766778183.240:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.611360][ T24] audit: type=1400 audit(1766778183.310:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.636984][ T24] audit: type=1400 audit(1766778183.310:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.670644][ T24] audit: type=1400 audit(1766778183.390:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.696382][ T24] audit: type=1400 audit(1766778183.390:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.722863][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.331561][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.339027][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.346680][ T275] device bridge_slave_0 entered promiscuous mode [ 22.355579][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.362727][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.370052][ T275] device bridge_slave_1 entered promiscuous mode [ 22.379613][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.386789][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.394207][ T277] device bridge_slave_0 entered promiscuous mode [ 22.402135][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.409328][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.416857][ T277] device bridge_slave_1 entered promiscuous mode [ 22.435478][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.442585][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.449966][ T276] device bridge_slave_0 entered promiscuous mode [ 22.458583][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.465798][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.473270][ T276] device bridge_slave_1 entered promiscuous mode [ 22.505639][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.512783][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.520337][ T281] device bridge_slave_0 entered promiscuous mode [ 22.527349][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.534377][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.542032][ T281] device bridge_slave_1 entered promiscuous mode [ 22.646986][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.654304][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.662019][ T278] device bridge_slave_0 entered promiscuous mode [ 22.670424][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.677818][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.685314][ T278] device bridge_slave_1 entered promiscuous mode [ 22.701607][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.708667][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.716039][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.723303][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.757738][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.765082][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.772846][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.780178][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.796322][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.803485][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.810888][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.818000][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.850237][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.857391][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.864920][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.872075][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.884173][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.891231][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.898517][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.905533][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.918731][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.926022][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.933345][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.941110][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.948383][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.955682][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.962948][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.970491][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.977730][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.985246][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.992707][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.009922][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.017450][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.024897][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.033712][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.040994][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.048674][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.057020][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.064235][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.077531][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.085536][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.093933][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.100972][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.109103][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.117409][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.124860][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.132233][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.140623][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.147764][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.167648][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.176032][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.183075][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.190839][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.198888][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.207372][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.215203][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.238157][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.246198][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.259986][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.268188][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.276282][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.283402][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.291098][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.298653][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.306893][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.313892][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.324615][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.333050][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.341398][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.348517][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.356372][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.364888][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.373230][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.380620][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.393654][ T281] device veth0_vlan entered promiscuous mode [ 23.402446][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.410895][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.419482][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.427990][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.437294][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.444851][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.459547][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.468306][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.476418][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.484997][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.494198][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.502589][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.514406][ T281] device veth1_macvtap entered promiscuous mode [ 23.525310][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.533642][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.542187][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.549975][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.558379][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.566249][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.574446][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.582436][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.590604][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.598583][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.605976][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.618256][ T275] device veth0_vlan entered promiscuous mode [ 23.628475][ T277] device veth0_vlan entered promiscuous mode [ 23.635716][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.644133][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.653130][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.661191][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.669835][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.678323][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.687046][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.694730][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.712413][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.720538][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.728961][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.738367][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.747361][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.755680][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.764218][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.771956][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.780835][ T276] device veth0_vlan entered promiscuous mode [ 23.792560][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.801079][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.809995][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.818530][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.827306][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.835543][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.845344][ T277] device veth1_macvtap entered promiscuous mode [ 23.852784][ T275] device veth1_macvtap entered promiscuous mode [ 23.864690][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.872573][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.880315][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.888642][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.899847][ T276] device veth1_macvtap entered promiscuous mode [ 23.917697][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.925505][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 23.925592][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.941087][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.949325][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.957890][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.966324][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.974849][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.983190][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.991710][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.000492][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.009265][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.018204][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.025724][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.034532][ T278] device veth0_vlan entered promiscuous mode [ 24.043147][ T281] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.047939][ T278] device veth1_macvtap entered promiscuous mode [ 24.064894][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.075463][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.084360][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.122069][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.134960][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.144073][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.152820][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.161707][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.170516][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.176473][ C0] hrtimer: interrupt took 26084 ns [ 24.660984][ T335] device pim6reg1 entered promiscuous mode [ 24.874804][ T327] cgroup: syz.1.8 (327) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.901219][ T327] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.431439][ T391] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 25.437869][ T391] syzkaller0: linktype set to 823 [ 25.640667][ T398] bridge0: port 3(gretap0) entered blocking state [ 25.683525][ T398] bridge0: port 3(gretap0) entered disabled state [ 25.731465][ T398] device gretap0 entered promiscuous mode [ 25.750225][ T398] bridge0: port 3(gretap0) entered blocking state [ 25.757127][ T398] bridge0: port 3(gretap0) entered forwarding state [ 26.335424][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 26.335434][ T24] audit: type=1400 audit(1766778188.020:114): avc: denied { setopt } for pid=425 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.457198][ T402] device syzkaller0 entered promiscuous mode [ 26.599672][ T24] audit: type=1400 audit(1766778188.310:115): avc: denied { create } for pid=439 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.614974][ T24] audit: type=1400 audit(1766778189.320:116): avc: denied { create } for pid=465 comm="syz.3.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.665875][ T472] device sit0 entered promiscuous mode [ 28.378453][ T489] p: renamed from pim6reg1 [ 28.655414][ T24] audit: type=1400 audit(1766778190.360:117): avc: denied { create } for pid=503 comm="syz.3.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 29.486493][ T24] audit: type=1400 audit(1766778191.190:118): avc: denied { write } for pid=531 comm="syz.3.63" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.958721][ T24] audit: type=1400 audit(1766778191.660:119): avc: denied { tracepoint } for pid=529 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.320884][ T558] device sit0 entered promiscuous mode [ 31.372423][ T24] audit: type=1400 audit(1766778193.080:120): avc: denied { read } for pid=563 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.690287][ T24] audit: type=1400 audit(1766778193.400:121): avc: denied { relabelfrom } for pid=579 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.776829][ T24] audit: type=1400 audit(1766778193.420:122): avc: denied { relabelto } for pid=579 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.817010][ T580] device sit0 entered promiscuous mode [ 32.608148][ T626] device pim6reg1 entered promiscuous mode [ 32.633393][ T631] device sit0 left promiscuous mode [ 33.419796][ T657] device syzkaller0 entered promiscuous mode [ 33.435201][ T24] audit: type=1400 audit(1766778195.140:123): avc: denied { create } for pid=658 comm="syz.2.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 33.466643][ T662] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.473905][ T662] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.487591][ T661] device bridge_slave_1 left promiscuous mode [ 33.494089][ T661] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.507832][ T661] device bridge_slave_0 left promiscuous mode [ 33.522298][ T661] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.573676][ T24] audit: type=1400 audit(1766778195.280:124): avc: denied { create } for pid=668 comm="syz.3.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 33.798787][ T694] device sit0 entered promiscuous mode [ 34.999161][ T732] device veth0_vlan left promiscuous mode [ 35.049436][ T732] device veth0_vlan entered promiscuous mode [ 35.201631][ T730] device macsec0 entered promiscuous mode [ 35.356626][ T740] device veth1_macvtap left promiscuous mode [ 37.726884][ T24] audit: type=1400 audit(1766778199.440:125): avc: denied { create } for pid=891 comm="syz.3.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 37.753652][ T24] audit: type=1400 audit(1766778199.460:126): avc: denied { create } for pid=891 comm="syz.3.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 38.071351][ T904] ------------[ cut here ]------------ [ 38.098238][ T904] trace type BPF program uses run-time allocation [ 38.196616][ T904] WARNING: CPU: 0 PID: 904 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 38.367205][ T904] Modules linked in: [ 38.448160][ T904] CPU: 0 PID: 904 Comm: syz.3.166 Not tainted syzkaller #0 [ 38.554925][ T904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 38.597097][ T904] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 38.604205][ T904] Code: 85 e9 14 fe ff ff e8 19 fa ef ff 31 c0 e9 15 fe ff ff e8 0d fa ef ff c6 05 a4 d1 2c 05 01 48 c7 c7 a0 7f 05 85 e8 7a db fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 38.703825][ T24] audit: type=1400 audit(1766778200.410:127): avc: denied { create } for pid=921 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 38.708417][ T904] RSP: 0018:ffffc90001297468 EFLAGS: 00010246 [ 38.823779][ T904] RAX: 8a0f0ff2a877fb00 RBX: 0000000000000001 RCX: 0000000000080000 [ 38.846681][ T904] RDX: ffffc90003d24000 RSI: 0000000000002cc3 RDI: 0000000000002cc4 [ 38.866599][ T904] RBP: ffffc900012974b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 38.875005][ T904] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88810ce60000 [ 38.986558][ T904] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888127c01800 [ 39.054098][ T904] FS: 00007fd5a0e536c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 39.166965][ T904] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.252782][ T24] audit: type=1400 audit(1766778200.960:128): avc: denied { create } for pid=930 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 39.254656][ T904] CR2: 0000000100000000 CR3: 0000000128023000 CR4: 00000000003506a0 [ 39.303643][ T904] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.353697][ T904] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 39.436503][ T904] Call Trace: [ 39.439973][ T904] ? __fdget+0x1a1/0x230 [ 39.446667][ T904] resolve_pseudo_ldimm64+0x526/0x1020 [ 39.452578][ T904] ? bpf_check+0xd680/0xd680 [ 39.473836][ T904] ? kvmalloc_node+0x88/0x130 [ 39.546558][ T904] bpf_check+0x8d4b/0xd680 [ 39.551097][ T904] ? bpf_get_btf_vmlinux+0x60/0x60 [ 39.566351][ T904] ? is_bpf_text_address+0x177/0x190 [ 39.578773][ T904] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.637556][ T904] ? __kernel_text_address+0xa0/0x100 [ 39.642975][ T904] ? unwind_get_return_address+0x4d/0x90 [ 39.846553][ T904] ? stack_trace_save+0xe0/0xe0 [ 39.851477][ T904] ? arch_stack_walk+0xee/0x140 [ 39.866593][ T904] ? stack_trace_save+0x98/0xe0 [ 39.871803][ T904] ? stack_trace_snprint+0xf0/0xf0 [ 39.900204][ T904] ? __kasan_slab_alloc+0x69/0xf0 [ 39.946551][ T904] ? pcpu_block_update+0x4f5/0x900 [ 39.964939][ T904] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.980786][ T904] ? __kasan_kmalloc+0xec/0x110 [ 39.985672][ T904] ? __kasan_kmalloc+0xda/0x110 [ 39.998181][ T904] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 40.004246][ T904] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.010249][ T904] ? security_bpf_prog_alloc+0x62/0x90 [ 40.015800][ T904] ? bpf_prog_load+0x949/0x1420 [ 40.021442][ T904] ? __se_sys_bpf+0x442/0x680 [ 40.026289][ T904] ? __x64_sys_bpf+0x7b/0x90 [ 40.040936][ T904] ? do_syscall_64+0x31/0x40 [ 40.047544][ T904] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.053913][ T904] ? memset+0x35/0x40 [ 40.058094][ T904] ? bpf_obj_name_cpy+0x193/0x1e0 [ 40.063122][ T904] bpf_prog_load+0xf5a/0x1420 [ 40.068268][ T904] ? map_freeze+0x320/0x320 [ 40.072784][ T904] ? selinux_bpf+0xc7/0xf0 [ 40.077509][ T904] ? security_bpf+0x82/0xa0 [ 40.082071][ T904] __se_sys_bpf+0x442/0x680 [ 40.086614][ T904] ? __x64_sys_bpf+0x90/0x90 [ 40.091226][ T904] ? __kasan_check_read+0x11/0x20 [ 40.096755][ T904] __x64_sys_bpf+0x7b/0x90 [ 40.101309][ T904] do_syscall_64+0x31/0x40 [ 40.105761][ T904] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.112085][ T904] RIP: 0033:0x7fd5a23eb749 [ 40.116681][ T904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.136541][ T904] RSP: 002b:00007fd5a0e53038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.145232][ T904] RAX: ffffffffffffffda RBX: 00007fd5a2641fa0 RCX: 00007fd5a23eb749 [ 40.154151][ T904] RDX: 0000000000000090 RSI: 0000200000000200 RDI: 0000000000000005 [ 40.162765][ T904] RBP: 00007fd5a246ff91 R08: 0000000000000000 R09: 0000000000000000 [ 40.171179][ T904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.179311][ T904] R13: 00007fd5a2642038 R14: 00007fd5a2641fa0 R15: 00007fffae937438 [ 40.193196][ T904] ---[ end trace c479d389226144bb ]--- [ 40.511910][ T967] syz.1.183 uses obsolete (PF_INET,SOCK_PACKET) [ 40.583696][ T24] audit: type=1400 audit(1766778202.290:129): avc: denied { create } for pid=966 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.839594][ T998] device macsec0 left promiscuous mode [ 44.314021][ T24] audit: type=1400 audit(1766778206.020:130): avc: denied { create } for pid=1088 comm="syz.3.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 44.626308][ T24] audit: type=1400 audit(1766778206.250:131): avc: denied { write } for pid=1100 comm="syz.4.220" name="cgroup.subtree_control" dev="cgroup2" ino=274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 44.765631][ T24] audit: type=1400 audit(1766778206.290:132): avc: denied { open } for pid=1100 comm="syz.4.220" path="" dev="cgroup2" ino=274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 44.885733][ T1132] device veth0_vlan left promiscuous mode [ 44.892129][ T1132] device veth0_vlan entered promiscuous mode [ 45.041811][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.061276][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.080276][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.514948][ T24] audit: type=1400 audit(1766778207.220:133): avc: denied { append } for pid=1157 comm="syz.2.232" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.576449][ T24] audit: type=1400 audit(1766778207.250:134): avc: denied { create } for pid=1157 comm="syz.2.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 45.835975][ T1186] geneve1: tun_chr_ioctl cmd 1074025672 [ 45.866632][ T1186] geneve1: ignored: set checksum enabled [ 46.078367][ T24] audit: type=1400 audit(1766778207.790:135): avc: denied { create } for pid=1188 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 46.275673][ T1192] device pim6reg1 entered promiscuous mode [ 47.538983][ T1266] device pim6reg1 entered promiscuous mode [ 48.056270][ T1297] device sit0 left promiscuous mode [ 48.165855][ T1304] device sit0 entered promiscuous mode [ 48.554647][ T24] audit: type=1400 audit(1766778210.260:136): avc: denied { create } for pid=1315 comm="syz.4.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 49.442520][ T1331] device syzkaller0 entered promiscuous mode [ 51.213405][ C1] Illegal XDP return value 16128, expect packet loss! [ 51.247586][ T1400] device wg2 entered promiscuous mode [ 51.502053][ T1406] device sit0 left promiscuous mode [ 51.796984][ T1410] device sit0 entered promiscuous mode [ 51.924515][ T24] audit: type=1400 audit(1766778213.630:137): avc: denied { create } for pid=1418 comm="syz.4.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 52.856201][ T1449] device veth1_macvtap left promiscuous mode [ 53.147082][ T1454] device veth1_macvtap entered promiscuous mode [ 53.169339][ T1454] device macsec0 entered promiscuous mode [ 53.896642][ T1482] syzkaller1: tun_chr_ioctl cmd 1074812118 [ 54.050181][ T1487] device sit0 left promiscuous mode [ 54.103651][ T1495] device sit0 entered promiscuous mode [ 54.958899][ T1532] syz.1.330[1532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.958961][ T1532] syz.1.330[1532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.229099][ T24] audit: type=1400 audit(1766778216.940:138): avc: denied { create } for pid=1541 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 56.459673][ T1619] device ip6gretap0 entered promiscuous mode [ 57.578157][ T1764] device pim6reg1 entered promiscuous mode [ 58.669574][ T24] audit: type=1400 audit(1766778220.380:139): avc: denied { create } for pid=1809 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 59.201779][ T1828] device sit0 left promiscuous mode [ 60.367200][ T1877] device sit0 left promiscuous mode [ 60.770500][ T1879] device sit0 entered promiscuous mode [ 62.511034][ T24] audit: type=1400 audit(1766778224.220:140): avc: denied { create } for pid=1976 comm="syz.1.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 62.550384][ T24] audit: type=1400 audit(1766778224.250:141): avc: denied { create } for pid=1979 comm="syz.4.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 62.735570][ T1992] device syzkaller0 entered promiscuous mode [ 63.884023][ T2024] device wg2 entered promiscuous mode [ 64.673854][ T2064] device wg2 entered promiscuous mode [ 64.951277][ T2086] syz.0.473[2086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.951354][ T2086] syz.0.473[2086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.211689][ T24] audit: type=1400 audit(1766778226.920:142): avc: denied { associate } for pid=2079 comm="syz.2.471" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 65.505864][ T2103] device sit0 left promiscuous mode [ 65.530453][ T2104] device sit0 entered promiscuous mode [ 65.762708][ T2126] device sit0 entered promiscuous mode [ 67.514192][ T24] audit: type=1400 audit(1766778229.220:143): avc: denied { create } for pid=2207 comm="syz.3.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 69.938973][ T2282] device lo entered promiscuous mode [ 72.784252][ T2464] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 75.865248][ T24] audit: type=1400 audit(1766778237.570:144): avc: denied { ioctl } for pid=2567 comm="syz.4.602" path="socket:[22651]" dev="sockfs" ino=22651 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 76.187609][ T2577] device syzkaller0 entered promiscuous mode [ 77.472409][ T2611] syz.4.614[2611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.472460][ T2611] syz.4.614[2611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.584068][ T2620] syz.0.617[2620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.607743][ T2620] syz.0.617[2620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.662624][ T24] audit: type=1400 audit(1766778240.370:145): avc: denied { create } for pid=2660 comm="syz.2.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 79.048185][ T2671] cgroup: fork rejected by pids controller in /syz3 [ 80.365797][ T2688] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.378504][ T2688] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.391454][ T2688] device bridge_slave_0 entered promiscuous mode [ 80.446553][ T2688] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.467015][ T2688] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.482325][ T2688] device bridge_slave_1 entered promiscuous mode [ 81.421267][ T24] audit: type=1400 audit(1766778243.130:146): avc: denied { create } for pid=2688 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.472022][ T2719] syz.4.642[2719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.472076][ T2719] syz.4.642[2719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.537214][ T24] audit: type=1400 audit(1766778243.180:147): avc: denied { write } for pid=2688 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.577768][ T2719] syz.4.642[2719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.577828][ T2719] syz.4.642[2719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.592623][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.614158][ T2723] syz.0.644[2723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.614237][ T2723] syz.0.644[2723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.634715][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.674781][ T24] audit: type=1400 audit(1766778243.180:148): avc: denied { read } for pid=2688 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.752726][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.769362][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.778028][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.785148][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.792717][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.801980][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.810538][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.817933][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.896798][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 81.913176][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 81.930158][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 81.978435][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 82.004184][ T2688] device veth0_vlan entered promiscuous mode [ 82.076162][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.157134][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.185102][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.204565][ T345] bridge0: port 3(gretap0) entered disabled state [ 82.229634][ T345] device gretap0 left promiscuous mode [ 82.246532][ T345] bridge0: port 3(gretap0) entered disabled state [ 82.313950][ T2688] device veth1_macvtap entered promiscuous mode [ 82.410788][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 82.445187][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 82.560888][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 82.812333][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 82.907474][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 82.969926][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.043173][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.802682][ T345] device bridge_slave_1 left promiscuous mode [ 83.823108][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.907360][ T345] device bridge_slave_0 left promiscuous mode [ 83.950271][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.959291][ T345] device veth1_macvtap left promiscuous mode [ 84.172049][ T2837] ÿÿÿÿÿÿ: renamed from vlan1 [ 84.354655][ T2868] device syzkaller0 entered promiscuous mode [ 84.835174][ T2910] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.842468][ T2910] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.054673][ T2918] device syzkaller0 entered promiscuous mode [ 85.966946][ T2963] device syzkaller0 entered promiscuous mode [ 86.027871][ T2969] device pim6reg1 entered promiscuous mode [ 90.192937][ T3167] device syzkaller0 entered promiscuous mode [ 90.481010][ T3190] device pim6reg1 entered promiscuous mode [ 90.576868][ T3195] syz.4.775[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.576911][ T3195] syz.4.775[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.803140][ T94] udevd[94]: worker [297] terminated by signal 33 (Unknown signal 33) [ 90.867788][ T94] udevd[94]: worker [297] failed while handling '/devices/virtual/block/loop0' [ 91.547543][ T3250] device pim6reg1 entered promiscuous mode [ 91.780599][ T3262] device pim6reg1 entered promiscuous mode [ 92.223307][ T3303] ªªªªªª: renamed from vlan0 [ 92.612447][ T3305] ªªªªªª: renamed from vlan0 [ 92.843547][ T3328] device veth0_vlan left promiscuous mode [ 92.948837][ T3328] device veth0_vlan entered promiscuous mode [ 93.162784][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.208602][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 93.253179][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.508772][ T3369] device sit0 left promiscuous mode [ 94.601512][ T3369] device sit0 entered promiscuous mode [ 95.738573][ T3417] device sit0 entered promiscuous mode [ 95.900713][ T24] audit: type=1400 audit(1766778257.610:149): avc: denied { create } for pid=3427 comm="syz.2.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 96.006155][ T3447] device veth0_vlan left promiscuous mode [ 96.012829][ T3447] device veth0_vlan entered promiscuous mode [ 96.062362][ T1498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.070543][ T1498] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.082598][ T1498] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.123505][ T3450] device veth0_vlan left promiscuous mode [ 96.136305][ T3450] device veth0_vlan entered promiscuous mode [ 96.155402][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.165037][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 96.173034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.294577][ T3475] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 96.303839][ T3475] syzkaller0: linktype set to 774 [ 96.309507][ T3474] device veth0_vlan left promiscuous mode [ 96.323154][ T3474] device veth0_vlan entered promiscuous mode [ 96.384280][ T3473] syz.4.846[3473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.384334][ T3473] syz.4.846[3473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.173009][ T3522] device sit0 left promiscuous mode [ 97.206894][ T24] audit: type=1400 audit(1766778258.920:150): avc: denied { create } for pid=3529 comm="syz.0.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 97.271291][ T3522] device sit0 entered promiscuous mode [ 98.061881][ T24] audit: type=1400 audit(1766778259.770:151): avc: denied { create } for pid=3575 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 98.102852][ T3579] device wg2 left promiscuous mode [ 98.117031][ T3578] syz.1.875[3578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.117106][ T3578] syz.1.875[3578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.153077][ T3578] syz.1.875[3578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.165097][ T3578] syz.1.875[3578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.276826][ T3629] lo: mtu less than device minimum [ 99.304015][ T3630] lo: mtu less than device minimum [ 100.388140][ T3674] device veth1_macvtap entered promiscuous mode [ 100.396640][ T3674] device macsec0 entered promiscuous mode [ 100.404798][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.740476][ T3703] device pim6reg1 entered promiscuous mode [ 102.772988][ T3797] gretap0: refused to change device tx_queue_len [ 103.286576][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 103.852426][ T3838] device syzkaller0 entered promiscuous mode [ 105.139808][ T3887] device syzkaller0 entered promiscuous mode [ 107.253903][ T3952] -1: renamed from syzkaller0 [ 107.548220][ T3959] device syzkaller0 entered promiscuous mode [ 107.633516][ T3973] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 108.958421][ T4014] device syzkaller0 entered promiscuous mode [ 108.975261][ T4020] device syzkaller0 entered promiscuous mode [ 108.982162][ T4032] device sit0 left promiscuous mode [ 109.026875][ T4032] device sit0 entered promiscuous mode [ 110.121128][ T4070] cgroup: fork rejected by pids controller in /syz0 [ 110.266036][ T4073] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.273299][ T4073] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.774697][ T4192] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.860997][ T4192] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.868631][ T4192] device bridge_slave_0 entered promiscuous mode [ 110.875800][ T4192] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.883279][ T4192] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.891500][ T4192] device bridge_slave_1 entered promiscuous mode [ 110.932450][ T24] audit: type=1400 audit(1766778272.640:152): avc: denied { create } for pid=4202 comm="syz.2.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 110.965266][ T4188] device sit0 entered promiscuous mode [ 111.240548][ T4209] device pim6reg1 entered promiscuous mode [ 111.299850][ T4192] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.307012][ T4192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.314354][ T4192] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.321389][ T4192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.689620][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.738404][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.812193][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.826810][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.836120][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.845258][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.853925][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.861192][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.953641][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.972383][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.992502][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.999852][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.052680][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.078027][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.106743][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.125331][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.154524][ T4192] device veth0_vlan entered promiscuous mode [ 112.181185][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.201350][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.221536][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.241764][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.262065][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.271978][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.308758][ T4192] device veth1_macvtap entered promiscuous mode [ 112.325832][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.334460][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.352859][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.381123][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.389537][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.398366][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.407615][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.515433][ T4237] device syzkaller0 entered promiscuous mode [ 112.657619][ T296] device veth1_macvtap left promiscuous mode [ 113.515234][ T4276] bridge0: port 3(gretap0) entered blocking state [ 113.522719][ T4276] bridge0: port 3(gretap0) entered disabled state [ 113.606494][ T4276] device gretap0 entered promiscuous mode [ 113.614958][ T4296] syz.2.1044[4296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.615038][ T4296] syz.2.1044[4296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.625383][ T4276] bridge0: port 3(gretap0) entered blocking state [ 113.644642][ T4276] bridge0: port 3(gretap0) entered forwarding state [ 113.700605][ T4303] device sit0 entered promiscuous mode [ 115.938123][ T4405] device syzkaller0 entered promiscuous mode [ 116.279017][ T4425] device veth0_vlan left promiscuous mode [ 116.285377][ T4425] device veth0_vlan entered promiscuous mode [ 116.487795][ T4440] device sit0 left promiscuous mode [ 116.501489][ T4440] device sit0 entered promiscuous mode [ 117.042547][ T4476] syz.4.1090[4476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.042625][ T4476] syz.4.1090[4476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.068907][ T4479] device syzkaller0 entered promiscuous mode [ 117.119543][ T4486] device sit0 left promiscuous mode [ 117.151393][ T4486] device sit0 entered promiscuous mode [ 118.875579][ T4514] device syzkaller0 entered promiscuous mode [ 118.913344][ T4536] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 118.921577][ T4537] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 119.191227][ T4546] device syzkaller0 entered promiscuous mode [ 119.606565][ T4564] device sit0 left promiscuous mode [ 119.630870][ T4571] device veth1_macvtap left promiscuous mode [ 119.638287][ T4572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.976767][ T4598] device wg2 left promiscuous mode [ 119.993321][ T4599] device wg2 entered promiscuous mode [ 120.002622][ T24] audit: type=1400 audit(1766778281.710:153): avc: denied { create } for pid=4600 comm="syz.4.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.143482][ T24] audit: type=1400 audit(1766778281.850:154): avc: denied { create } for pid=4610 comm="syz.3.1129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 120.957480][ T4611] device syzkaller0 entered promiscuous mode [ 121.597394][ T4636] syz.0.1134 (4636) used obsolete PPPIOCDETACH ioctl [ 122.357554][ T4709] syz.4.1153[4709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.357608][ T4709] syz.4.1153[4709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.572554][ T4711] device syzkaller0 entered promiscuous mode [ 123.269924][ T4772] cgroup: fork rejected by pids controller in /syz4 [ 124.639635][ T4914] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.666519][ T4914] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.675041][ T4914] device bridge_slave_0 entered promiscuous mode [ 124.682408][ T4914] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.689793][ T4914] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.697255][ T4914] device bridge_slave_1 entered promiscuous mode [ 124.896998][ T4914] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.904280][ T4914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.911806][ T4914] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.919045][ T4914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.153411][ T7] device bridge_slave_1 left promiscuous mode [ 125.169967][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.314505][ T7] device bridge_slave_0 left promiscuous mode [ 125.430161][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.440136][ T7] device veth1_macvtap left promiscuous mode [ 125.550667][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.567558][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.601562][ T4950] device wg2 left promiscuous mode [ 125.618502][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.637720][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.690547][ T4949] device wg2 entered promiscuous mode [ 125.737007][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.751597][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.763608][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.770809][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.789035][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.798189][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.807402][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.814570][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.874898][ T4966] device veth0_vlan left promiscuous mode [ 125.895891][ T4966] device veth0_vlan entered promiscuous mode [ 126.013464][ T4966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.194430][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.256935][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.318213][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.412855][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.530606][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.539004][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.546423][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.571366][ T4914] device veth0_vlan entered promiscuous mode [ 126.589225][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.618164][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.628972][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.637343][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.645507][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.653171][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.667003][ T4914] device veth1_macvtap entered promiscuous mode [ 126.691885][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.706343][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.714880][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.731808][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.747021][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.755716][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.765431][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.060129][ T4991] device syzkaller0 entered promiscuous mode [ 128.668225][ T5063] device sit0 left promiscuous mode [ 130.497296][ T5128] device sit0 left promiscuous mode [ 130.508045][ T5128] device sit0 entered promiscuous mode [ 130.612777][ T5136] device veth0_vlan left promiscuous mode [ 130.714268][ T5136] device veth0_vlan entered promiscuous mode [ 130.752799][ T5148] device syzkaller0 entered promiscuous mode [ 131.613521][ T5230] device macsec0 left promiscuous mode [ 131.658477][ T5230] device veth1_macvtap entered promiscuous mode [ 131.668937][ T5230] device macsec0 entered promiscuous mode [ 131.802831][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.841726][ T5249] device syzkaller0 entered promiscuous mode [ 131.916871][ T5267] device pim6reg1 entered promiscuous mode [ 136.457867][ T5371] cgroup: fork rejected by pids controller in /syz2 [ 136.793790][ T24] audit: type=1400 audit(1766778298.500:155): avc: denied { create } for pid=5390 comm="syz.3.1323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 137.075587][ T5408] syz.1.1330[5408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.075642][ T5408] syz.1.1330[5408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.158407][ T24] audit: type=1400 audit(1766778298.870:156): avc: denied { read } for pid=5416 comm="syz-executor" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.218387][ T24] audit: type=1400 audit(1766778298.870:157): avc: denied { open } for pid=5416 comm="syz-executor" path="net:[4026531999]" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.322152][ T5416] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.426781][ T5416] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.434351][ T5416] device bridge_slave_0 entered promiscuous mode [ 137.660512][ T5416] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.682766][ T5416] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.758381][ T5416] device bridge_slave_1 entered promiscuous mode [ 138.048820][ T5449] -1: renamed from syzkaller0 [ 138.188680][ T5464] device pim6reg1 entered promiscuous mode [ 138.271509][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.355303][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.464702][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.492887][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.551204][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.558327][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.576111][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.595176][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.603898][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.611066][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.628701][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.646828][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.672020][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.951960][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.024494][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.066290][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.294237][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.304318][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.312859][ T5416] device veth0_vlan entered promiscuous mode [ 139.374132][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.406122][ T5512] syz.4.1355[5512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.406344][ T5512] syz.4.1355[5512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.419624][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.458923][ T5512] syz.4.1355[5512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.460521][ T5416] device veth1_macvtap entered promiscuous mode [ 139.642119][ T5502] device veth1_macvtap left promiscuous mode [ 139.672378][ T5502] device macsec0 left promiscuous mode [ 139.695710][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.727119][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.767354][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.798592][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.808868][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.129525][ T296] device bridge_slave_1 left promiscuous mode [ 140.149374][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.164416][ T296] device bridge_slave_0 left promiscuous mode [ 140.171678][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.180801][ T296] device veth0_vlan left promiscuous mode [ 140.248091][ T5563] bridge0: port 3(gretap0) entered disabled state [ 140.254724][ T5563] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.262020][ T5563] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.376100][ T5556] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.415316][ T5556] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.439407][ T5556] device bridge_slave_0 entered promiscuous mode [ 140.624034][ T5556] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.631209][ T5556] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.639329][ T5556] device bridge_slave_1 entered promiscuous mode [ 140.989127][ T5556] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.996324][ T5556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.003637][ T5556] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.010777][ T5556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.084187][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.116011][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.228414][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.239020][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.287434][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.296214][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.307975][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.315119][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.323572][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.331998][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.340771][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.347848][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.519921][ T24] audit: type=1400 audit(1766778303.230:158): avc: denied { ioctl } for pid=5621 comm="syz.1.1384" path="" dev="cgroup2" ino=202 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 141.565769][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.574694][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.588874][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.597822][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.606134][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 141.615165][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.623795][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 141.632489][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.660043][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.667604][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.692309][ T5556] device veth0_vlan entered promiscuous mode [ 141.921040][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.957036][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.021178][ T5556] device veth1_macvtap entered promiscuous mode [ 142.066341][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.087179][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.146781][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.212520][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.267062][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.507294][ T296] device bridge_slave_1 left promiscuous mode [ 142.514066][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.606669][ T296] device bridge_slave_0 left promiscuous mode [ 142.612940][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.696569][ T296] device veth1_macvtap left promiscuous mode [ 142.702756][ T296] device veth0_vlan left promiscuous mode [ 144.657047][ T5643] device pim6reg1 entered promiscuous mode [ 144.668424][ T94] udevd[94]: worker [302] terminated by signal 33 (Unknown signal 33) [ 144.683857][ T94] udevd[94]: worker [302] failed while handling '/devices/virtual/block/loop2' [ 145.665711][ T5688] device veth0_vlan left promiscuous mode [ 145.812792][ T5688] device veth0_vlan entered promiscuous mode [ 147.426510][ T5731] device sit0 left promiscuous mode [ 147.534394][ T5732] device sit0 entered promiscuous mode [ 149.272945][ T5779] device sit0 left promiscuous mode [ 150.391984][ T5855] device macsec0 entered promiscuous mode [ 150.907184][ T5880] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.914391][ T5880] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.922225][ T5880] device bridge_slave_0 entered promiscuous mode [ 150.932444][ T5880] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.939657][ T5880] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.947554][ T5880] device bridge_slave_1 entered promiscuous mode [ 151.221476][ T5880] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.228758][ T5880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.236137][ T5880] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.243203][ T5880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.251119][ T5900] device macsec0 left promiscuous mode [ 151.257036][ T5902] device veth1_macvtap entered promiscuous mode [ 151.263711][ T5902] device macsec0 entered promiscuous mode [ 151.351195][ T5538] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.359253][ T5538] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.367483][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.750988][ T5913] device veth1_macvtap left promiscuous mode [ 151.758898][ T5913] device macsec0 left promiscuous mode [ 151.867723][ T5915] device veth1_macvtap entered promiscuous mode [ 151.876597][ T5915] device macsec0 entered promiscuous mode [ 151.898975][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.914848][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.975622][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.984188][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.992538][ T5538] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.999943][ T5538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.007764][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.017799][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.026006][ T5538] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.033180][ T5538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.068068][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.076812][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.085189][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.095008][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.205820][ T5880] device veth0_vlan entered promiscuous mode [ 152.224534][ T5929] device sit0 entered promiscuous mode [ 152.271919][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.280629][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.289221][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.297357][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.305334][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.313046][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.362970][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.373013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.438004][ T5880] device veth1_macvtap entered promiscuous mode [ 152.457756][ T5945] device syzkaller0 entered promiscuous mode [ 152.464685][ T5952] device sit0 left promiscuous mode [ 152.478131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.486967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.495715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.506989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.530692][ T5952] device sit0 entered promiscuous mode [ 152.898945][ T5984] device syzkaller0 entered promiscuous mode [ 154.050321][ T296] device bridge_slave_1 left promiscuous mode [ 154.066737][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.083941][ T296] device bridge_slave_0 left promiscuous mode [ 154.090693][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.100016][ T296] device veth1_macvtap left promiscuous mode [ 154.106215][ T296] device veth0_vlan left promiscuous mode [ 154.312652][ T6036] device syzkaller0 entered promiscuous mode [ 155.802630][ T24] audit: type=1400 audit(1766778317.510:159): avc: denied { create } for pid=6087 comm="syz.3.1505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 157.425352][ T6118] device syzkaller0 entered promiscuous mode [ 159.247806][ T6174] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.255425][ T6174] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.717365][ T6212] syz.4.1537[6212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.717420][ T6212] syz.4.1537[6212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.274615][ T6343] device macsec0 entered promiscuous mode [ 166.398680][ T6355] device sit0 left promiscuous mode [ 166.452644][ T6352] device syzkaller0 entered promiscuous mode [ 166.832910][ T24] audit: type=1400 audit(1766778328.540:160): avc: denied { ioctl } for pid=6376 comm="syz.0.1580" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 168.310421][ T6482] device sit0 entered promiscuous mode [ 168.459633][ T24] audit: type=1400 audit(1766778330.160:161): avc: denied { create } for pid=6490 comm="syz.2.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 169.623584][ T6536] device sit0 entered promiscuous mode [ 170.775079][ T6552] device syzkaller0 entered promiscuous mode [ 170.809571][ T6581] device sit0 left promiscuous mode [ 174.076421][ T6717] device pim6reg1 entered promiscuous mode [ 175.076023][ T6764] device sit0 left promiscuous mode [ 175.089816][ T6765] device sit0 entered promiscuous mode [ 175.714257][ T6810] device syzkaller0 entered promiscuous mode [ 176.056619][ T6846] device sit0 entered promiscuous mode [ 176.968542][ T6913] device sit0 left promiscuous mode [ 176.981194][ T6913] device sit0 entered promiscuous mode [ 177.114969][ T6917] syz.0.1723[6917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.115041][ T6917] syz.0.1723[6917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.204404][ T6923] device syzkaller0 entered promiscuous mode [ 177.222752][ T6917] tun0: tun_chr_ioctl cmd 1074025692 [ 177.796157][ T6979] device veth0_vlan left promiscuous mode [ 177.922133][ T6979] device veth0_vlan entered promiscuous mode [ 179.441645][ T7045] device sit0 left promiscuous mode [ 180.017290][ T7076] device syzkaller0 entered promiscuous mode [ 180.367281][ T7100] device syzkaller0 entered promiscuous mode [ 181.130553][ T7190] Â: renamed from pim6reg1 [ 181.229151][ T7196] device macsec0 entered promiscuous mode [ 181.950506][ T7229] device syzkaller0 entered promiscuous mode [ 184.008246][ T7295] device syzkaller0 entered promiscuous mode [ 185.022243][ T7339] syz.2.1845[7339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.022317][ T7339] syz.2.1845[7339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.893463][ T7370] device pim6reg1 entered promiscuous mode [ 188.438292][ T7518] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.445884][ T7518] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.537140][ T7519] device veth1_macvtap left promiscuous mode [ 188.545423][ T7519] device macsec0 left promiscuous mode [ 188.818247][ T7518] device bridge_slave_1 left promiscuous mode [ 188.824743][ T7518] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.832445][ T7518] device bridge_slave_0 left promiscuous mode [ 188.838632][ T7518] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.016218][ T7552] device pim6reg1 entered promiscuous mode [ 189.031363][ T7559] device veth1_macvtap left promiscuous mode [ 189.037808][ T7559] device macsec0 left promiscuous mode [ 189.833436][ T7639] device gretap0 left promiscuous mode [ 189.911258][ T7639] bridge0: port 3(gretap0) entered disabled state [ 189.997737][ T7639] device bridge_slave_1 left promiscuous mode [ 190.006760][ T7639] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.065906][ T7639] device bridge_slave_0 left promiscuous mode [ 190.087477][ T7639] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.520757][ T7674] device sit0 entered promiscuous mode [ 194.094640][ T7816] device syzkaller0 entered promiscuous mode [ 194.548896][ T7869] syz.4.1985[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.548952][ T7869] syz.4.1985[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.811596][ T7894] device veth0_vlan left promiscuous mode [ 194.841402][ T7894] device veth0_vlan entered promiscuous mode [ 194.849408][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.858177][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 194.867015][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.280997][ T7926] device pim6reg1 entered promiscuous mode [ 195.780649][ T7933] device veth1_macvtap left promiscuous mode [ 196.059421][ T7944] device sit0 left promiscuous mode [ 196.134315][ T7945] device sit0 entered promiscuous mode [ 196.893327][ T7948] device sit0 left promiscuous mode [ 196.904647][ T7949] device sit0 entered promiscuous mode [ 197.871972][ T8029] device pim6reg1 entered promiscuous mode [ 198.719248][ T8041] device syzkaller0 entered promiscuous mode [ 199.155539][ T8087] device sit0 left promiscuous mode [ 199.764957][ T8141] device pim6reg1 entered promiscuous mode [ 200.268383][ T8153] device sit0 left promiscuous mode [ 200.886283][ T8169] device sit0 left promiscuous mode [ 201.243639][ T8169] device sit0 entered promiscuous mode [ 204.976975][ T8228] device syzkaller0 entered promiscuous mode [ 205.600915][ T8253] device bridge_slave_1 left promiscuous mode [ 205.637998][ T8253] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.765640][ T8253] device bridge_slave_0 left promiscuous mode [ 205.960707][ T8253] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.547100][ T8283] device pim6reg1 entered promiscuous mode [ 209.780452][ T8351] device syzkaller0 entered promiscuous mode [ 211.775400][ T8406] device syzkaller0 entered promiscuous mode [ 211.929273][ T8406] device syzkaller0 left promiscuous mode [ 212.958825][ T24] audit: type=1400 audit(1766778374.670:162): avc: denied { attach_queue } for pid=8447 comm="syz.3.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 214.314901][ T8494] syz.4.2150[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.314954][ T8494] syz.4.2150[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.361653][ T8494] syz.4.2150[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.458457][ T8494] syz.4.2150[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.701455][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.635278][ T8614] device pim6reg1 entered promiscuous mode [ 220.208269][ T8639] device sit0 left promiscuous mode [ 220.734425][ T8650] device sit0 entered promiscuous mode [ 221.145894][ T8681] device pim6reg1 entered promiscuous mode [ 221.268985][ T8687] device veth1_macvtap entered promiscuous mode [ 221.275543][ T8687] device macsec0 entered promiscuous mode [ 221.335467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.503034][ T8696] bridge0: port 3(veth0) entered blocking state [ 221.514132][ T8696] bridge0: port 3(veth0) entered disabled state [ 221.521411][ T8696] device veth0 entered promiscuous mode [ 221.560096][ T8698] device pim6reg1 entered promiscuous mode [ 221.848080][ T8710] tap0: tun_chr_ioctl cmd 1074812118 [ 221.919323][ T8717] tap0: tun_chr_ioctl cmd 2147767506 [ 221.937738][ T24] audit: type=1400 audit(1766778383.650:163): avc: denied { create } for pid=8714 comm="syz.2.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 222.975054][ T8772] device syzkaller0 entered promiscuous mode [ 223.020198][ T8781] device syzkaller0 entered promiscuous mode [ 224.244250][ T8818] device pim6reg1 entered promiscuous mode [ 224.334815][ T8822] device sit0 left promiscuous mode [ 226.309200][ T8955] device sit0 left promiscuous mode [ 226.350374][ T8936] device wg2 entered promiscuous mode [ 226.459432][ T8949] device sit0 entered promiscuous mode [ 227.896001][ T9031] device syzkaller0 entered promiscuous mode [ 228.680388][ T9069] ªªªªªª: renamed from vlan0 [ 230.491330][ T9164] device ip6tnl0 entered promiscuous mode [ 231.009891][ T9206] device pim6reg1 entered promiscuous mode [ 233.652524][ T9300] syz.3.2375[9300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.652582][ T9300] syz.3.2375[9300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.253867][ T9320] device pim6reg1 entered promiscuous mode [ 235.570286][ T9340] syz.4.2383[9340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.570341][ T9340] syz.4.2383[9340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.790618][ T9348] device pim6reg1 entered promiscuous mode [ 238.932878][ T9393] device syzkaller0 entered promiscuous mode [ 240.233213][ T24] audit: type=1400 audit(1766778401.940:164): avc: denied { create } for pid=9483 comm="syz.0.2422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 240.295649][ T24] audit: type=1400 audit(1766778401.940:165): avc: denied { create } for pid=9483 comm="syz.0.2422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 241.000390][ T9524] device wg2 left promiscuous mode [ 241.107375][ T9529] device sit0 entered promiscuous mode [ 241.525162][ T9552] device xfrm0 entered promiscuous mode [ 241.690766][ T9567] device pim6reg1 entered promiscuous mode [ 241.832769][ T24] audit: type=1400 audit(1766778403.540:166): avc: denied { create } for pid=9574 comm="syz.4.2448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 242.365111][ T9608] -1: renamed from syzkaller0 [ 242.886523][ T9658] device veth0_vlan left promiscuous mode [ 243.080322][ T9658] device veth0_vlan entered promiscuous mode [ 243.106686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.115138][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 243.123094][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.149388][ T9655] GPL: port 1(erspan0) entered blocking state [ 243.160390][ T9655] GPL: port 1(erspan0) entered disabled state [ 243.285018][ T9655] device erspan0 entered promiscuous mode [ 243.433935][ T9663] GPL: port 1(erspan0) entered blocking state [ 243.440259][ T9663] GPL: port 1(erspan0) entered forwarding state [ 243.514799][ T9675] device syzkaller0 entered promiscuous mode [ 243.627919][ T9691] device sit0 left promiscuous mode [ 244.532282][ T9703] device veth0_vlan left promiscuous mode [ 244.571311][ T9703] device veth0_vlan entered promiscuous mode [ 244.667928][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.676056][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 244.684039][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.747686][ T9709] device erspan0 left promiscuous mode [ 244.753954][ T9709] GPL: port 1(erspan0) entered disabled state [ 245.378736][ T9722] device syzkaller0 entered promiscuous mode [ 245.599398][ T9766] device veth0_vlan left promiscuous mode [ 245.605863][ T9766] device veth0_vlan entered promiscuous mode [ 246.263230][ T9819] syz.1.2514[9819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.263282][ T9819] syz.1.2514[9819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.371041][ T9823] syz.1.2514[9823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.520245][ T9823] syz.1.2514[9823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.054422][ T9819] device wg2 entered promiscuous mode [ 247.139791][ T9838] device sit0 entered promiscuous mode [ 247.907034][ T9840] device wg2 left promiscuous mode [ 247.918089][ T9846] device wg2 entered promiscuous mode [ 248.386085][ T9872] device syzkaller0 entered promiscuous mode [ 248.905883][ T9900] device syzkaller0 entered promiscuous mode [ 249.366689][ T9915] device veth0_vlan left promiscuous mode [ 249.372989][ T9915] device veth0_vlan entered promiscuous mode [ 249.391153][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.410762][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 249.436910][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.510481][ T9936] device veth0_vlan left promiscuous mode [ 249.536388][ T9936] device veth0_vlan entered promiscuous mode [ 249.546393][ T9947] syz.0.2548[9947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.551398][ T9947] syz.0.2548[9947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.587278][ T9936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.615303][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.623944][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.632526][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 250.198921][ T9965] device wg2 left promiscuous mode [ 250.999018][ T9988] device syzkaller0 entered promiscuous mode [ 251.129877][T10038] device wg2 entered promiscuous mode [ 251.431779][T10064] device veth0_vlan left promiscuous mode [ 251.464117][T10064] device veth0_vlan entered promiscuous mode [ 252.289442][T10105] device sit0 left promiscuous mode [ 252.311421][T10109] device sit0 entered promiscuous mode [ 253.011537][T10132] device syzkaller0 entered promiscuous mode [ 253.145868][T10134] : renamed from bond_slave_0 [ 253.391093][T10145] syz.2.2604[10145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.391149][T10145] syz.2.2604[10145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.107165][T10145] device veth0_vlan left promiscuous mode [ 254.193912][T10145] device veth0_vlan entered promiscuous mode [ 254.344805][T10145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.404895][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.433156][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.441563][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 255.461589][T10184] device syzkaller0 entered promiscuous mode [ 256.027027][T10209] device veth0_vlan left promiscuous mode [ 256.038249][T10209] device veth0_vlan entered promiscuous mode [ 256.045672][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.055617][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.063727][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.086315][T10199] device wg2 entered promiscuous mode [ 257.353887][T10306] syz.2.2647[10306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.353933][T10306] syz.2.2647[10306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.175745][T10333] device veth0_vlan left promiscuous mode [ 258.246470][T10333] device veth0_vlan entered promiscuous mode [ 258.486953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.510178][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 258.532120][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.108929][T10344] device syzkaller0 entered promiscuous mode [ 259.485247][T10376] device pim6reg1 entered promiscuous mode [ 261.780878][T10473] device veth0_vlan left promiscuous mode [ 261.867322][T10473] device veth0_vlan entered promiscuous mode [ 262.045029][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.058925][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.083109][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.502263][T10509] syz.1.2704[10509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.502316][T10509] syz.1.2704[10509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.537585][T10516] syz.0.2705[10516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.616201][T10516] syz.0.2705[10516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.177546][T10539] device pim6reg1 entered promiscuous mode [ 265.078955][T10626] device sit0 entered promiscuous mode [ 266.855795][T10678] device bridge0 entered promiscuous mode [ 270.598818][T10852] device veth0_vlan left promiscuous mode [ 270.605436][T10852] device veth0_vlan entered promiscuous mode [ 270.636217][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.646746][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 270.655637][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.836231][T10878] device wg2 entered promiscuous mode [ 271.505114][T10928] device syzkaller0 entered promiscuous mode [ 271.697575][T10933] device syzkaller0 entered promiscuous mode [ 272.412528][T10984] device sit0 left promiscuous mode [ 272.481435][T10987] device sit0 entered promiscuous mode [ 274.033580][T11033] device sit0 left promiscuous mode [ 276.908302][ T24] audit: type=1400 audit(1766778438.540:167): avc: denied { create } for pid=11174 comm="syz.1.2879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 276.948126][T11187] device sit0 left promiscuous mode [ 277.669185][T11189] device syzkaller0 entered promiscuous mode [ 279.778856][T11243] device wg2 entered promiscuous mode [ 281.056276][T11302] device pim6reg1 entered promiscuous mode [ 281.085758][T11295] device syzkaller0 entered promiscuous mode [ 281.155354][T11311] syz.4.2921[11311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.155410][T11311] syz.4.2921[11311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.180579][T11306] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.199213][T11306] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.206638][T11306] device bridge_slave_0 entered promiscuous mode [ 281.215850][T11306] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.223015][T11306] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.230942][T11306] device bridge_slave_1 entered promiscuous mode [ 281.409457][T11317] device veth1_macvtap left promiscuous mode [ 281.415526][T11317] device macsec0 left promiscuous mode [ 281.566925][T11330] device pim6reg1 entered promiscuous mode [ 281.682396][T11306] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.689774][T11306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.697148][T11306] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.704254][T11306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.784130][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.793724][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.806887][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.816106][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.871629][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.944279][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.957240][T11344] device wg2 entered promiscuous mode [ 281.992007][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 282.077715][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.100829][T11306] device veth0_vlan entered promiscuous mode [ 282.301411][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.310265][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.349622][T11367] device syzkaller0 entered promiscuous mode [ 282.372128][T11368] device syzkaller0 entered promiscuous mode [ 282.402545][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.410951][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.441947][T11306] device veth1_macvtap entered promiscuous mode [ 282.452423][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 282.462097][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.475252][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.510100][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.520350][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.906193][ T7] device veth0 left promiscuous mode [ 282.912894][ T7] bridge0: port 3(veth0) entered disabled state [ 282.980429][ T7] device bridge_slave_1 left promiscuous mode [ 283.046794][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.121055][ T7] device bridge_slave_0 left promiscuous mode [ 283.187143][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.286854][ T7] device veth1_macvtap left promiscuous mode [ 283.365982][ T7] device veth0_vlan left promiscuous mode [ 285.293467][T11476] -1: renamed from syzkaller0 [ 288.723699][T11640] device wg2 left promiscuous mode [ 288.895256][T11640] device wg2 entered promiscuous mode [ 289.052715][T11646] device wg2 left promiscuous mode [ 289.081830][T11646] device wg2 entered promiscuous mode [ 290.248287][T11686] device pim6reg1 entered promiscuous mode [ 290.393159][T11702] device sit0 entered promiscuous mode [ 295.221818][T11868] device pim6reg1 entered promiscuous mode [ 295.768251][T11906] device wg2 left promiscuous mode [ 296.113294][ T24] audit: type=1400 audit(1766778457.820:168): avc: denied { setattr } for pid=11930 comm="syz.3.3087" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 297.227881][T11976] device sit0 entered promiscuous mode [ 298.449067][T11999] device sit0 left promiscuous mode [ 298.505816][T11994] device syzkaller0 entered promiscuous mode [ 298.552236][T11999] device sit0 entered promiscuous mode [ 302.454813][T12104] device pim6reg1 entered promiscuous mode [ 302.627656][T12119] device pim6reg1 entered promiscuous mode [ 303.524842][T12144] device pim6reg1 entered promiscuous mode [ 303.866214][T12142] device syzkaller0 entered promiscuous mode [ 303.904827][T12150] bridge0: port 3(veth0) entered blocking state [ 303.911727][T12150] bridge0: port 3(veth0) entered disabled state [ 303.935542][T12150] device veth0 entered promiscuous mode [ 303.947287][T12150] bridge0: port 3(veth0) entered blocking state [ 303.953919][T12150] bridge0: port 3(veth0) entered forwarding state [ 304.454884][T12183] device sit0 entered promiscuous mode [ 304.553652][T12187] syz.1.3157[12187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.553708][T12187] syz.1.3157[12187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.352711][T12199] device pim6reg1 entered promiscuous mode [ 305.554563][T12224] device wg2 left promiscuous mode [ 306.187549][T12271] device sit0 left promiscuous mode [ 307.098835][T12330] device syzkaller0 entered promiscuous mode [ 307.219316][T12333] device sit0 left promiscuous mode [ 307.890558][T12375] device pim6reg1 entered promiscuous mode [ 308.639067][T12403] ªªªªªª™™: renamed from vlan0 [ 310.010231][T12438] tap0: tun_chr_ioctl cmd 2147767506 [ 314.366489][T12535] device sit0 entered promiscuous mode [ 315.360049][ T24] audit: type=1400 audit(1766778477.060:169): avc: denied { create } for pid=12556 comm="syz.4.3254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 315.719328][T12569] device pim6reg1 entered promiscuous mode [ 316.417034][T12574] device pim6reg1 entered promiscuous mode [ 318.481223][T12630] device sit0 entered promiscuous mode [ 318.674404][T12642] device sit0 left promiscuous mode [ 318.932190][T12642] device sit0 entered promiscuous mode [ 320.133605][T12684] device sit0 left promiscuous mode [ 320.639785][T12697] device syzkaller0 entered promiscuous mode [ 320.731085][T12714] device sit0 entered promiscuous mode [ 321.406603][T12732] device syzkaller0 entered promiscuous mode [ 322.738852][T12856] device syzkaller0 entered promiscuous mode [ 325.761883][T13024] device sit0 entered promiscuous mode [ 325.860943][T13023] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 326.006502][T13023] device syzkaller0 entered promiscuous mode [ 326.036283][T13035] device sit0 left promiscuous mode [ 326.105226][T13040] device syzkaller0 entered promiscuous mode [ 326.433054][T13055] syz.4.3402[13055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.433129][T13055] syz.4.3402[13055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.238769][T13077] device pim6reg1 entered promiscuous mode [ 327.388973][T13080] device wg2 left promiscuous mode [ 328.247993][T13124] device wg2 left promiscuous mode [ 328.729644][T13148] device veth0_vlan left promiscuous mode [ 328.776481][T13148] device veth0_vlan entered promiscuous mode [ 328.998983][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.019384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 329.053370][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.137657][T13168] device pim6reg1 entered promiscuous mode [ 329.683597][T13184] device wg2 entered promiscuous mode [ 330.142986][T13219] ÿÿÿÿÿÿÿÿ: renamed from vlan1 [ 330.604568][T13340] device pim6reg1 entered promiscuous mode [ 330.781523][ T24] audit: type=1400 audit(1766778492.490:170): avc: denied { mounton } for pid=13351 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 331.142217][T13351] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.151133][T13351] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.158930][T13351] device bridge_slave_0 entered promiscuous mode [ 331.166271][T13351] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.173369][T13351] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.180886][T13351] device bridge_slave_1 entered promiscuous mode [ 331.237899][T13362] device syzkaller0 entered promiscuous mode [ 331.282740][T13351] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.290043][T13351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.297337][T13351] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.304472][T13351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.338766][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.353158][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.361534][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.374135][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.382791][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.390131][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.403184][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.414897][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.421973][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.434884][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.444454][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.461465][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.474762][T13351] device veth0_vlan entered promiscuous mode [ 331.481475][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.491909][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.506912][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.587109][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.678343][T13351] device veth1_macvtap entered promiscuous mode [ 331.699562][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.956949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.084892][ T24] audit: type=1400 audit(1766778493.790:171): avc: denied { unmount } for pid=13351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 332.177436][T13381] device sit0 left promiscuous mode [ 332.382663][T13395] device bridge0 entered promiscuous mode [ 332.535938][T13401] device sit0 entered promiscuous mode [ 333.192183][T13403] device pim6reg1 entered promiscuous mode [ 337.197936][T13537] device pim6reg1 entered promiscuous mode [ 338.210626][T13565] device pim6reg1 entered promiscuous mode [ 338.748948][T13599] device sit0 entered promiscuous mode [ 340.258479][T13673] device veth0_vlan left promiscuous mode [ 340.264555][T13673] device veth0_vlan entered promiscuous mode [ 342.504100][T13741] device syzkaller0 entered promiscuous mode [ 344.557277][T13796] batadv0: tun_chr_ioctl cmd 2147767521 [ 344.617223][T13796] batadv0: tun_chr_ioctl cmd 1074025692 [ 344.912125][T13823] device sit0 left promiscuous mode [ 344.951580][T13823] device sit0 entered promiscuous mode [ 344.966940][ T24] audit: type=1400 audit(1766778506.660:172): avc: denied { create } for pid=13826 comm="syz.2.3584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 345.934726][T13846] syz.4.3588[13846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.934803][T13846] syz.4.3588[13846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.009051][T13863] device veth0_vlan left promiscuous mode [ 347.042557][T13863] device veth0_vlan entered promiscuous mode [ 347.438799][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.483741][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 347.521296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.225246][T13913] device syzkaller0 entered promiscuous mode [ 350.407264][T13927] syz.0.3611[13927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.407318][T13927] syz.0.3611[13927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.556969][T13968] device sit0 left promiscuous mode [ 351.611014][T13969] device sit0 entered promiscuous mode [ 352.436079][T13973] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.486655][T13973] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.494092][T13973] device bridge_slave_0 entered promiscuous mode [ 352.525055][T13983] device syzkaller0 entered promiscuous mode [ 352.572397][T13973] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.587750][T13973] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.595346][T13973] device bridge_slave_1 entered promiscuous mode [ 352.968523][T13973] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.975578][T13973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.982991][T13973] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.990156][T13973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.477892][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.487273][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.495884][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.503983][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.553560][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.562572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.584985][T14021] device sit0 entered promiscuous mode [ 353.772860][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.781186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.923268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.936923][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.948929][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.957303][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.030695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.107726][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.151667][T14046] device syzkaller0 entered promiscuous mode [ 354.242168][T13973] device veth0_vlan entered promiscuous mode [ 354.404763][T13973] device veth1_macvtap entered promiscuous mode [ 354.415858][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.430305][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.443540][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.483919][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.492628][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.501284][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.511695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.875107][T14075] device sit0 left promiscuous mode [ 357.968024][T14157] device pim6reg1 entered promiscuous mode [ 360.625056][T14382] device sit0 entered promiscuous mode [ 360.939647][T14400] device wg2 left promiscuous mode [ 360.983280][T14397] device pim6reg1 entered promiscuous mode [ 360.993875][T14389] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.001121][T14389] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.008756][T14389] device bridge_slave_0 entered promiscuous mode [ 361.055496][T14389] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.062920][T14389] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.070628][T14389] device bridge_slave_1 entered promiscuous mode [ 361.163504][T14389] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.170677][T14389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.178227][T14389] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.185262][T14389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.345168][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.352695][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.374930][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.385131][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.400792][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.410978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.419456][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.426844][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.448650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.461285][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.471313][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.478751][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.553931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.562797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.571093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.580851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.595620][T14389] device veth0_vlan entered promiscuous mode [ 361.603210][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.612048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.622245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.631915][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.648429][T14389] device veth1_macvtap entered promiscuous mode [ 361.658899][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.669172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.677765][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.686344][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.695477][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.718900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.728554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.737524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.746351][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 361.882268][T14426] device veth0_vlan left promiscuous mode [ 361.950954][T14426] device veth0_vlan entered promiscuous mode [ 362.722887][T14477] device syzkaller0 entered promiscuous mode [ 363.356080][T14502] device syzkaller0 entered promiscuous mode [ 363.523282][ T296] device bridge_slave_1 left promiscuous mode [ 363.530756][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.545787][ T296] device bridge_slave_0 left promiscuous mode [ 363.556428][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.588745][ T296] device veth0_vlan left promiscuous mode [ 363.838047][T14528] device syzkaller0 entered promiscuous mode [ 363.891196][T14528] device syzkaller0 left promiscuous mode [ 364.697231][T14545] device pim6reg1 entered promiscuous mode [ 366.021782][T14590] batadv0: tun_chr_ioctl cmd 2148553947 [ 366.850008][T14602] device sit0 left promiscuous mode [ 366.952520][T14602] device sit0 entered promiscuous mode [ 368.085602][T14648] syz.4.3770[14648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.085662][T14648] syz.4.3770[14648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.964294][T14725] device veth1_macvtap left promiscuous mode [ 370.158408][T14725] device macsec0 entered promiscuous mode [ 370.230883][T14725] tun0: tun_chr_ioctl cmd 1074025692 [ 372.381061][T14786] device veth1_macvtap left promiscuous mode [ 372.476106][T14775] device veth1_macvtap entered promiscuous mode [ 372.494149][T14775] device macsec0 entered promiscuous mode [ 372.507407][T14790] syz.2.3812[14790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.507466][T14790] syz.2.3812[14790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.931455][T14876] device sit0 entered promiscuous mode [ 375.859375][T14924] device pim6reg1 entered promiscuous mode [ 375.933152][T14941] syz.0.3854[14941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.933206][T14941] syz.0.3854[14941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.947068][T14941] syz.0.3854[14941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.959296][T14941] syz.0.3854[14941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.466144][T14965] device veth1_macvtap left promiscuous mode [ 377.520281][T15005] device syzkaller0 entered promiscuous mode [ 380.814243][T15126] syz.3.3903[15126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.465976][T15167] device sit0 left promiscuous mode [ 382.482969][ T24] audit: type=1400 audit(1766778544.180:173): avc: denied { create } for pid=15168 comm="syz.1.3913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 382.588261][T15166] device sit0 left promiscuous mode [ 386.547704][T15365] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 386.581557][T15365] device syzkaller0 entered promiscuous mode [ 387.380079][T15386] device veth0_vlan left promiscuous mode [ 387.453330][T15386] device veth0_vlan entered promiscuous mode [ 390.507901][T15526] device sit0 left promiscuous mode [ 390.762270][T15527] device sit0 entered promiscuous mode [ 391.899508][T15532] device sit0 entered promiscuous mode [ 393.875384][T15593] device syzkaller0 entered promiscuous mode [ 394.113642][T15620] device veth0_vlan left promiscuous mode [ 394.142802][T15620] device veth0_vlan entered promiscuous mode [ 394.169686][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.188842][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.203910][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.684874][T15646] device pim6reg1 entered promiscuous mode [ 395.594182][T15660] device pim6reg1 entered promiscuous mode [ 396.575896][T15716] device pim6reg1 entered promiscuous mode [ 398.267030][T15739] syz.2.4062[15739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.267090][T15739] syz.2.4062[15739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.917719][T15794] device syzkaller0 entered promiscuous mode [ 400.210574][T15831] device pim6reg1 entered promiscuous mode [ 400.619437][T15856] device sit0 left promiscuous mode [ 401.648546][T15894] device syzkaller0 entered promiscuous mode [ 402.375460][T15922] device wg2 entered promiscuous mode [ 402.451763][T15928] : renamed from bond_slave_0 [ 403.035084][T15949] device syzkaller0 entered promiscuous mode [ 403.743691][T15983] device sit0 entered promiscuous mode [ 404.263347][T16010] device syzkaller0 entered promiscuous mode [ 404.482519][T16017] device ip6tnl0 entered promiscuous mode [ 405.346506][T16048] GPL: port 1(erspan0) entered blocking state [ 405.378837][T16048] GPL: port 1(erspan0) entered disabled state [ 405.441019][T16048] device erspan0 entered promiscuous mode [ 405.451636][T16049] GPL: port 1(erspan0) entered blocking state [ 405.457900][T16049] GPL: port 1(erspan0) entered forwarding state [ 405.716813][T16084] device veth0_vlan left promiscuous mode [ 405.723540][T16084] device veth0_vlan entered promiscuous mode [ 405.764317][T16087] device sit0 left promiscuous mode [ 406.348879][T16105] device macsec0 left promiscuous mode [ 406.354895][T16106] device veth1_macvtap entered promiscuous mode [ 406.361631][T16106] device macsec0 entered promiscuous mode [ 406.374124][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 407.087451][T16148] bridge0: port 3(veth0) entered disabled state [ 407.093900][T16148] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.101113][T16148] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.108572][T16148] device bridge0 left promiscuous mode [ 407.245768][T16175] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 408.115620][T16243] device pim6reg1 entered promiscuous mode [ 408.180897][T16245] device syzkaller0 entered promiscuous mode [ 408.568446][T16278] device syzkaller0 entered promiscuous mode [ 411.309443][T16390] device syzkaller0 entered promiscuous mode [ 415.077866][T16557] 7B’ç÷ï: renamed from syzkaller0 [ 415.296170][T16580] device syzkaller0 entered promiscuous mode [ 415.457113][T16582] device pim6reg1 entered promiscuous mode [ 416.548238][T16645] device pim6reg1 entered promiscuous mode [ 417.519529][T16698] device veth0_vlan left promiscuous mode [ 417.525672][T16698] device veth0_vlan entered promiscuous mode [ 417.626872][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.637117][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.644855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.972719][T16716] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.980418][T16716] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.988733][T16716] device bridge_slave_0 entered promiscuous mode [ 418.017944][T16716] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.024986][T16716] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.032899][T16716] device bridge_slave_1 entered promiscuous mode [ 418.075782][T16716] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.083032][T16716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.090437][T16716] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.097483][T16716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.219651][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.256003][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.288877][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.450489][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.469317][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.476689][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.590012][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.619570][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.626641][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.681718][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 418.719744][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.759275][T16738] syz.2.4339[16738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.759360][T16738] syz.2.4339[16738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.768887][T16716] device veth0_vlan entered promiscuous mode [ 418.823931][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 418.858941][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 418.882479][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 418.944791][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 419.325042][T16739] device syzkaller0 entered promiscuous mode [ 419.602063][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 419.652342][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 419.745183][T16716] device veth1_macvtap entered promiscuous mode [ 419.918523][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 419.957025][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 419.998329][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 420.121903][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 420.172905][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 420.666989][T16778] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.674462][T16778] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.920591][T16778] device bridge_slave_1 left promiscuous mode [ 420.933592][T16778] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.941581][T16778] device bridge_slave_0 left promiscuous mode [ 420.947810][T16778] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.104676][T16783] ÿÿÿÿÿÿ: renamed from vlan1 [ 421.457326][ T112] device veth1_macvtap left promiscuous mode [ 421.475798][ T112] device veth0_vlan left promiscuous mode [ 423.437203][T16862] device veth0_vlan left promiscuous mode [ 423.443211][T16862] device veth0_vlan entered promiscuous mode [ 423.529932][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.577748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.638378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 424.138631][T16911] device wg2 entered promiscuous mode [ 424.793314][T16927] device pim6reg1 entered promiscuous mode [ 424.817844][T16936] device pim6reg1 entered promiscuous mode [ 425.070555][T16938] device pim6reg1 entered promiscuous mode [ 425.736130][T16982] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.744459][T16982] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.856332][T16991] device bridge_slave_1 left promiscuous mode [ 425.862866][T16991] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.870598][T16991] device bridge_slave_0 left promiscuous mode [ 425.880987][T16991] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.086249][T17007] device sit0 left promiscuous mode [ 426.299534][T17021] device sit0 entered promiscuous mode [ 426.536707][T17039] device wg2 left promiscuous mode [ 426.631016][T17059] device wg2 entered promiscuous mode [ 427.828319][T17108] device syzkaller0 entered promiscuous mode [ 428.233176][T17116] device pim6reg1 entered promiscuous mode [ 429.836271][T17186] device xfrm0 entered promiscuous mode [ 430.987974][T17226] device syzkaller0 entered promiscuous mode [ 432.541689][T17280] device pim6reg1 entered promiscuous mode [ 434.209937][T17324] device veth1_macvtap left promiscuous mode [ 434.215965][T17324] device macsec0 entered promiscuous mode [ 435.798252][T17397] device GPL entered promiscuous mode [ 437.069012][T17442] device sit0 left promiscuous mode [ 438.325974][T17520] device veth0_vlan left promiscuous mode [ 438.349472][T17520] device veth0_vlan entered promiscuous mode [ 438.356719][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.369655][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 438.378388][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.741173][T17615] syz.0.4570[17615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.741250][T17615] syz.0.4570[17615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.863075][T17628] device wg2 entered promiscuous mode [ 439.902728][T17628] device pim6reg1 entered promiscuous mode [ 440.792394][T17680] device wg2 left promiscuous mode [ 440.960378][T17685] device wg2 entered promiscuous mode [ 441.759259][T17714] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.766814][T17714] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.825654][T17715] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.832844][T17715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.840245][T17715] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.847312][T17715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.896575][T17715] device bridge0 entered promiscuous mode [ 442.814349][T17765] device sit0 entered promiscuous mode [ 443.916886][T17885] device pim6reg1 entered promiscuous mode [ 446.586944][T18010] device macsec0 entered promiscuous mode [ 447.906025][T18045] device veth1_macvtap left promiscuous mode [ 447.912617][T18045] device macsec0 left promiscuous mode [ 447.919066][T18046] device veth1_macvtap entered promiscuous mode [ 447.926011][T18046] device macsec0 entered promiscuous mode [ 447.935462][T18046] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 447.963260][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 448.189912][T18049] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.202390][T18049] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.435921][T18057] device bridge_slave_1 left promiscuous mode [ 448.442944][T18057] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.500427][T18057] device bridge_slave_0 left promiscuous mode [ 448.622196][T18057] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.010174][T18080] device veth0_vlan left promiscuous mode [ 449.016388][T18080] device veth0_vlan entered promiscuous mode [ 449.023276][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.033020][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 449.068945][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.375780][T18159] syz.0.4700[18159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.375834][T18159] syz.0.4700[18159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.050787][T18196] device sit0 entered promiscuous mode [ 453.915716][T18194] device wg2 entered promiscuous mode [ 454.018045][T18204] device veth0_vlan left promiscuous mode [ 454.047299][T18204] device veth0_vlan entered promiscuous mode [ 454.997727][T18251] device sit0 left promiscuous mode [ 455.122685][T18257] device sit0 entered promiscuous mode [ 455.879466][T18270] device syzkaller0 entered promiscuous mode [ 457.369278][T18348] device pim6reg1 entered promiscuous mode [ 459.056511][T18444] device wg2 left promiscuous mode [ 460.249687][T18504] ÿ: renamed from bond_slave_0 [ 461.046719][T18519] device syzkaller0 entered promiscuous mode [ 463.718134][T18639] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 463.794547][T18639] syzkaller0: linktype set to 1 [ 463.897372][T18640] syzkaller0: tun_chr_ioctl cmd 35108 [ 464.530437][T18661] syz.1.4835[18661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.530494][T18661] syz.1.4835[18661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.540493][T18658] syz.1.4835[18658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.584320][T18658] syz.1.4835[18658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.816065][T18671] device veth1_macvtap left promiscuous mode [ 465.069065][T18674] device sit0 left promiscuous mode [ 465.112839][T18671] device veth1_macvtap entered promiscuous mode [ 465.126946][T18671] device macsec0 entered promiscuous mode [ 465.136638][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 465.154439][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 466.337197][T18767] device veth1_macvtap left promiscuous mode [ 467.660345][T18827] device wg2 left promiscuous mode [ 467.909133][T18839] device syzkaller0 entered promiscuous mode [ 469.592251][T18876] device syzkaller0 entered promiscuous mode [ 471.598793][T18929] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 471.713661][T18929] syzkaller0: linktype set to 1 [ 471.765010][T18933] device wg2 entered promiscuous mode [ 471.788154][T18936] syzkaller0: tun_chr_ioctl cmd 35108 [ 471.793920][T18929] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 472.461269][T18960] device macsec0 left promiscuous mode [ 475.547369][T19087] syz.3.4951[19087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.547444][T19087] syz.3.4951[19087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.838055][T19101] syz.0.4955[19101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.842270][T19100] syz.0.4955[19100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.849726][T19101] syz.0.4955[19101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.917752][T19100] syz.0.4955[19100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.625102][T19139] device sit0 left promiscuous mode [ 476.989417][T19160] device wg2 entered promiscuous mode [ 477.023805][T19163] device veth0_vlan left promiscuous mode [ 477.033198][T19163] device veth0_vlan entered promiscuous mode [ 477.209027][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.219755][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.227921][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.321351][T19202] device syzkaller0 entered promiscuous mode [ 478.652808][T19216] device sit0 entered promiscuous mode [ 481.800861][T19310] device veth0_vlan left promiscuous mode [ 481.923178][T19310] device veth0_vlan entered promiscuous mode [ 482.170707][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 482.190405][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 482.220918][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 484.395845][T19401] device syzkaller0 entered promiscuous mode [ 484.447050][T19404] ªªªªªª: renamed from vlan0 [ 484.644204][T19425] device pim6reg1 entered promiscuous mode [ 484.775708][T19431] tap0: tun_chr_ioctl cmd 1074025677 [ 484.781383][T19431] tap0: linktype set to 24 [ 485.917783][T19472] syz.2.5058[19472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.917875][T19472] syz.2.5058[19472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.356572][T19485] device xfrm0 entered promiscuous mode [ 487.294372][T19512] device veth0_vlan left promiscuous mode [ 487.301071][T19512] device veth0_vlan entered promiscuous mode [ 487.439966][T19521] device syzkaller0 entered promiscuous mode [ 488.175309][T19567] device pim6reg1 entered promiscuous mode [ 488.693048][T19590] device veth0_vlan left promiscuous mode [ 488.719297][T19590] device veth0_vlan entered promiscuous mode [ 488.744023][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 488.756153][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 488.771503][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.903621][T19673] @ÿ: renamed from bond_slave_0 [ 492.317529][T19743] syz.1.5131[19743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.317585][T19743] syz.1.5131[19743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.540495][T19747] device veth1_macvtap left promiscuous mode [ 492.566823][T19747] device macsec0 left promiscuous mode [ 494.396593][T19798] device sit0 entered promiscuous mode [ 495.355598][T19834] device veth1_macvtap entered promiscuous mode [ 495.373800][T19834] device macsec0 entered promiscuous mode [ 495.450173][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 498.062856][T19957] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.080723][T19957] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.164902][T19957] device bridge_slave_0 entered promiscuous mode [ 498.205926][T19957] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.215944][T19957] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.224765][T19957] device bridge_slave_1 entered promiscuous mode [ 499.109639][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 499.117426][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 499.134084][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 499.143467][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 499.152354][ T5538] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.159632][ T5538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 499.167970][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 499.176649][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 499.185197][ T5538] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.192372][ T5538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 499.214826][ T296] device veth1_macvtap left promiscuous mode [ 499.355274][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 499.369824][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 499.429434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 499.471510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 499.482428][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 499.504249][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 499.520346][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.533948][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 499.547790][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 499.557325][T19957] device veth0_vlan entered promiscuous mode [ 499.571446][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 499.580201][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 499.590453][T19957] device veth1_macvtap entered promiscuous mode [ 499.608579][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 499.630622][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 499.644126][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 499.693679][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 499.730840][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 499.998523][T20034] device syzkaller0 entered promiscuous mode [ 500.018620][T20051] device veth0_vlan left promiscuous mode [ 500.024956][T20051] device veth0_vlan entered promiscuous mode [ 500.248455][T20057] device veth0_vlan left promiscuous mode [ 500.313018][T20057] device veth0_vlan entered promiscuous mode [ 500.463627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 500.497010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 500.515515][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 501.200178][T20116] device macsec0 entered promiscuous mode [ 501.212210][T20116] device veth1_macvtap entered promiscuous mode [ 501.282599][T20123] device macsec0 left promiscuous mode [ 501.323587][T20123] device veth1_macvtap entered promiscuous mode [ 501.341734][T20123] device macsec0 entered promiscuous mode [ 501.374609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 501.747227][T20154] device wg2 entered promiscuous mode [ 503.046152][T20207] syzkaller0: refused to change device tx_queue_len [ 503.129707][T20222] device veth0_vlan left promiscuous mode [ 503.164725][T20222] device veth0_vlan entered promiscuous mode [ 503.177159][T20222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.193991][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.206742][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 503.214442][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 503.498452][T20265] device syzkaller0 entered promiscuous mode [ 507.080170][T20338] device sit0 left promiscuous mode [ 507.851060][T20356] device wg2 left promiscuous mode [ 507.885748][T20362] device pim6reg1 entered promiscuous mode [ 508.059121][T20364] device wg2 left promiscuous mode [ 508.070239][T20360] device veth1_to_team entered promiscuous mode [ 508.375068][T20417] device pim6reg1 entered promiscuous mode [ 508.995719][T20481] device syzkaller0 entered promiscuous mode [ 509.411018][T20512] device wg2 left promiscuous mode [ 509.455926][T20512] device wg2 entered promiscuous mode [ 509.784953][T20531] device sit0 left promiscuous mode [ 509.857512][T20535] device sit0 entered promiscuous mode [ 513.067780][T20685] device syzkaller0 entered promiscuous mode [ 514.217416][T20711] device wg2 entered promiscuous mode [ 514.709667][T20725] device syzkaller0 entered promiscuous mode [ 517.841046][T20749] device sit0 left promiscuous mode [ 518.014947][T20750] device sit0 entered promiscuous mode [ 518.894079][T20770] device wg2 left promiscuous mode [ 518.901471][T20771] device wg2 entered promiscuous mode [ 518.972523][T20779] device wg2 left promiscuous mode [ 518.984179][T20779] device wg2 entered promiscuous mode [ 519.126841][T20787] device pim6reg1 entered promiscuous mode [ 520.427843][T20820] bridge0: port 1(veth1) entered blocking state [ 520.434226][T20820] bridge0: port 1(veth1) entered disabled state [ 520.576138][T20820] device veth1 entered promiscuous mode [ 521.419983][T20844] device veth1_macvtap left promiscuous mode [ 521.554915][T20844] device macsec0 left promiscuous mode [ 524.390049][T20969] device vlan0 entered promiscuous mode [ 524.408388][T20973] device pim6reg1 entered promiscuous mode [ 524.763119][T20984] IPv6: pim6reg1: Disabled Multicast RS [ 525.052974][T21014] device syzkaller0 entered promiscuous mode [ 525.438953][T21023] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 525.455823][T21023] syzkaller0: linktype set to 774 [ 525.657171][T21023] device pim6reg1 entered promiscuous mode [ 525.820325][T21032] ªªªªªª: renamed from vlan0 [ 526.783065][T21054] device syzkaller0 entered promiscuous mode [ 527.243944][T21060] device veth0_vlan left promiscuous mode [ 527.321092][T21060] device veth0_vlan entered promiscuous mode [ 527.579967][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 527.610790][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 527.631931][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 527.738181][T21078] device wg2 left promiscuous mode [ 527.758259][T21081] device pim6reg1 entered promiscuous mode [ 528.984481][T21144] device pim6reg1 entered promiscuous mode [ 529.225596][T21169] ±ÿ: renamed from team_slave_1 [ 531.077437][T21284] syz.4.5575[21284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.077487][T21284] syz.4.5575[21284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.245441][T21295] device pim6reg1 entered promiscuous mode [ 535.824589][T21395] syz.2.5603[21395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.833173][T21395] syz.2.5603[21395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.981023][T21392] device veth0_vlan left promiscuous mode [ 536.001789][T21392] device veth0_vlan entered promiscuous mode [ 536.015197][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.072520][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 536.082744][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 536.170996][T21405] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.186014][T21405] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.197777][T21405] device bridge_slave_0 entered promiscuous mode [ 536.212290][T21405] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.219403][T21405] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.234002][T21405] device bridge_slave_1 entered promiscuous mode [ 536.280258][T21414] device sit0 entered promiscuous mode [ 536.345953][T21405] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.353234][T21405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 536.360934][T21405] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.368361][T21405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 536.408063][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 536.417157][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.444641][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.470388][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 536.489021][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 536.515525][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.523042][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 536.538883][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 536.553964][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 536.562870][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.570156][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 536.600542][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 536.611682][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 536.620219][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 536.629375][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 536.644891][T21405] device veth0_vlan entered promiscuous mode [ 536.655741][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 536.664840][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 536.674371][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 536.699338][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.714191][T21405] device veth1_macvtap entered promiscuous mode [ 536.723249][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 536.736359][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 536.744280][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 536.754264][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 536.763633][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 536.791040][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 536.800441][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 536.838051][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 536.871109][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 537.005261][T20618] GPL: port 1(erspan0) entered disabled state [ 537.020410][T20618] device erspan0 left promiscuous mode [ 537.074148][T20618] GPL: port 1(erspan0) entered disabled state [ 537.819462][T21469] device syzkaller0 entered promiscuous mode [ 537.961790][T20618] device veth0 left promiscuous mode [ 537.972160][T20618] bridge0: port 3(veth0) entered disabled state [ 538.109845][T20618] device bridge_slave_1 left promiscuous mode [ 538.211257][T20618] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.304036][T20618] device bridge_slave_0 left promiscuous mode [ 538.366654][T20618] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.375522][T20618] device veth0_vlan left promiscuous mode [ 539.283962][T21544] device vlan0 left promiscuous mode [ 539.801315][T21565] device veth0_vlan left promiscuous mode [ 539.818406][T21565] device veth0_vlan entered promiscuous mode [ 539.843344][T21572] device pim6reg1 entered promiscuous mode [ 540.739878][T21629] device sit0 entered promiscuous mode [ 541.730615][T21691] device syzkaller0 entered promiscuous mode [ 542.317103][ T94] udevd[94]: worker [8450] terminated by signal 33 (Unknown signal 33) [ 542.325547][ T94] udevd[94]: worker [8450] failed while handling '/devices/virtual/block/loop3' [ 542.487034][ T94] udevd[94]: worker [3224] terminated by signal 33 (Unknown signal 33) [ 542.495535][ T94] udevd[94]: worker [3224] failed while handling '/devices/virtual/block/loop1' [ 542.548086][T21715] device syzkaller0 entered promiscuous mode [ 544.527011][T21777] device syzkaller0 entered promiscuous mode [ 544.746074][T21795] device syzkaller0 entered promiscuous mode [ 546.372824][T21877] device wg2 left promiscuous mode [ 546.968187][T21904] device sit0 entered promiscuous mode [ 547.931944][T21932] syz.3.5751[21932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.932003][T21932] syz.3.5751[21932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 548.074801][T21937] device syzkaller0 entered promiscuous mode [ 548.255370][T21975] device syzkaller0 entered promiscuous mode [ 548.369587][T22004] device sit0 entered promiscuous mode [ 548.552483][T22002] device sit0 left promiscuous mode [ 548.986672][T22029] device sit0 left promiscuous mode [ 549.197935][T22036] device sit0 entered promiscuous mode [ 549.586102][T22043] device syzkaller0 entered promiscuous mode [ 550.352489][T22094] tap0: tun_chr_ioctl cmd 1074025675 [ 550.470349][T22094] tap0: persist enabled [ 550.474592][T22099] tap0: tun_chr_ioctl cmd 1074025675 [ 550.560239][T22099] tap0: persist enabled [ 551.081586][T22112] device pim6reg1 entered promiscuous mode [ 552.519201][T22152] device syzkaller0 entered promiscuous mode [ 552.664430][T22157] device syzkaller0 entered promiscuous mode [ 555.932227][T22353] device pim6reg1 entered promiscuous mode [ 556.186491][T22356] device pim6reg1 entered promiscuous mode [ 556.854322][T22358] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.861628][T22358] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.869060][T22358] device bridge_slave_0 entered promiscuous mode [ 556.945941][T22358] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.954363][T22358] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.964711][T22358] device bridge_slave_1 entered promiscuous mode [ 557.191486][T22358] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.198736][T22358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.206695][T22358] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.213725][T22358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.237762][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.245738][ T5538] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.259343][ T5538] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.440683][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.449137][ T5538] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.456168][ T5538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.463682][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.472594][ T5538] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.479658][ T5538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.548184][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 557.559115][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.568588][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 557.577218][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.585543][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 557.594567][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 557.638704][T22358] device veth0_vlan entered promiscuous mode [ 557.645436][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 557.653783][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 557.789080][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 557.797326][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 557.809115][T22358] device veth1_macvtap entered promiscuous mode [ 557.918190][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 557.927465][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 557.936956][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 558.060998][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 558.147153][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 558.231069][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 558.271372][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 558.707552][T20618] device veth1 left promiscuous mode [ 558.713088][T20618] bridge0: port 1(veth1) entered disabled state [ 560.665795][T22443] device veth0_vlan left promiscuous mode [ 560.774440][T22443] device veth0_vlan entered promiscuous mode [ 561.117228][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 561.125624][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 561.141009][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 561.946607][T22504] device pim6reg1 entered promiscuous mode [ 561.995577][T22518] device veth1_to_team entered promiscuous mode [ 562.469641][T22540] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.477746][T22540] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.486135][T22540] device bridge0 left promiscuous mode [ 562.513890][T22540] device bridge_slave_1 left promiscuous mode [ 562.521263][T22540] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.530613][T22540] device bridge_slave_0 left promiscuous mode [ 562.539240][T22540] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.825645][T22674] device syzkaller0 entered promiscuous mode [ 566.930295][T22717] device veth1_macvtap left promiscuous mode [ 568.666933][T22778] syz.2.5973[22778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.666992][T22778] syz.2.5973[22778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.917885][T22818] bridge0: port 3(gretap0) entered blocking state [ 570.018479][T22818] bridge0: port 3(gretap0) entered disabled state [ 570.092089][T22818] device gretap0 entered promiscuous mode [ 570.126690][T22818] bridge0: port 3(gretap0) entered blocking state [ 570.133348][T22818] bridge0: port 3(gretap0) entered forwarding state [ 570.652720][T22851] device pim6reg1 entered promiscuous mode [ 572.625591][T22972] pimreg: tun_chr_ioctl cmd 1074025677 [ 572.682894][T22972] pimreg: linktype set to 805 [ 573.466150][T22985] device wg2 entered promiscuous mode [ 574.759432][T23058] device syzkaller0 entered promiscuous mode [ 574.822464][T23060] device syzkaller0 entered promiscuous mode [ 574.929578][T23067] device sit0 left promiscuous mode [ 574.952412][T23067] device sit0 entered promiscuous mode [ 574.961095][T23074] syz.1.6053[23074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.961151][T23074] syz.1.6053[23074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.359193][T23200] device veth0_vlan left promiscuous mode [ 578.398922][T23200] device veth0_vlan entered promiscuous mode [ 578.679688][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 578.704981][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 578.719428][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.502196][T23241] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.509590][T23241] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.625285][T23241] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.632549][T23241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.640025][T23241] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.647086][T23241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.688015][T23241] device bridge0 entered promiscuous mode [ 581.283540][T23295] syz.3.6107[23295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.500607][T23278] device pim6reg1 entered promiscuous mode [ 584.394989][T23384] device wg2 entered promiscuous mode [ 587.297667][T23526] device syzkaller0 entered promiscuous mode [ 587.755586][T23542] device syzkaller0 entered promiscuous mode [ 588.648024][T23581] device wg2 left promiscuous mode [ 588.836849][T23581] device wg2 entered promiscuous mode [ 590.946574][T23735] device pim6reg1 entered promiscuous mode [ 591.245142][T23737] device syzkaller0 entered promiscuous mode [ 591.262915][T23738] device syzkaller0 entered promiscuous mode [ 591.953831][T23782] syz.3.6243[23782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.959296][T23782] syz.3.6243[23782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.480107][T23821] device sit0 left promiscuous mode [ 593.802358][T23823] device veth1_to_bond entered promiscuous mode [ 594.028799][T23825] device pim6reg1 entered promiscuous mode [ 595.784519][T23849] device veth0_vlan left promiscuous mode [ 595.797007][T23849] device veth0_vlan entered promiscuous mode [ 595.812258][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 595.857239][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 595.914273][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.030455][T23856] device wg2 left promiscuous mode [ 596.408102][T23867] tun0: tun_chr_ioctl cmd 1074812118 [ 596.616519][T23863] ªªªªªª: renamed from vlan0 [ 596.898199][T23890] device macsec0 entered promiscuous mode [ 598.607285][T23947] device ip6tnl0 entered promiscuous mode [ 602.516360][T24096] bridge0: port 3(gretap0) entered disabled state [ 602.522916][T24096] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.530141][T24096] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.619261][T24100] device pim6reg1 entered promiscuous mode [ 602.742254][T24096] device gretap0 left promiscuous mode [ 602.776455][T24096] bridge0: port 3(gretap0) entered disabled state [ 602.800406][T24096] device bridge_slave_1 left promiscuous mode [ 602.825252][T24096] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.852066][T24096] device bridge_slave_0 left promiscuous mode [ 602.858779][T24096] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.178827][T24187] device pim6reg1 entered promiscuous mode [ 604.342959][T24215] syz.1.6367[24215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.342999][T24215] syz.1.6367[24215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.450463][T24223] device wg2 entered promiscuous mode [ 604.582702][T24235] device veth0_vlan left promiscuous mode [ 604.674479][T24235] device veth0_vlan entered promiscuous mode [ 604.730061][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 604.768159][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 604.870101][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.710690][T24297] device syzkaller0 entered promiscuous mode [ 607.371713][T24338] device syzkaller0 entered promiscuous mode [ 608.807903][T24379] device veth1_macvtap left promiscuous mode [ 611.439975][T24462] ±ÿ: renamed from team_slave_1 [ 612.286786][T24483] device syzkaller0 entered promiscuous mode [ 614.706172][T24615] device sit0 entered promiscuous mode [ 614.823267][T24628] device syzkaller0 entered promiscuous mode [ 615.338314][T24650] device veth1_macvtap left promiscuous mode [ 615.345440][T24650] device veth1_macvtap entered promiscuous mode [ 615.352957][T24650] device macsec0 entered promiscuous mode [ 615.359515][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 615.367433][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 615.399930][T24665] device pim6reg1 entered promiscuous mode [ 615.580322][T24687] device pim6reg1 entered promiscuous mode [ 616.322334][T24710] device veth0_vlan left promiscuous mode [ 616.336261][T24710] device veth0_vlan entered promiscuous mode [ 616.971566][T24736] device wg2 entered promiscuous mode [ 617.052234][T24738] device sit0 left promiscuous mode [ 617.427872][T24743] device sit0 entered promiscuous mode [ 617.924548][T24765] syz.2.6522[24765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.924623][T24765] syz.2.6522[24765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.968824][T24761] device macsec0 entered promiscuous mode [ 618.082321][T24788] device veth0_vlan left promiscuous mode [ 618.090754][T24788] device veth0_vlan entered promiscuous mode [ 618.731848][T24821] device sit0 entered promiscuous mode [ 620.951313][T24938] device sit0 left promiscuous mode [ 621.053428][T24942] device sit0 entered promiscuous mode [ 621.845734][T24957] device syzkaller0 entered promiscuous mode [ 622.197495][T24959] device pim6reg1 entered promiscuous mode [ 622.837175][T24986] device sit0 left promiscuous mode [ 623.440076][T24998] device sit0 left promiscuous mode [ 623.464987][T24998] device sit0 entered promiscuous mode [ 624.886412][T25030] device dummy0 entered promiscuous mode [ 624.912392][T25030] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 625.868547][T25053] syz.3.6598[25053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.868603][T25053] syz.3.6598[25053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.580691][T25055] device veth0_vlan left promiscuous mode [ 626.817195][T25055] device veth0_vlan entered promiscuous mode [ 626.851099][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 626.877158][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 626.895237][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 627.098796][T25080] device wg2 left promiscuous mode [ 627.800097][T25196] device pim6reg1 entered promiscuous mode [ 627.809863][T25196] device wg2 entered promiscuous mode [ 628.271266][T25223] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.278659][T25223] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.286160][T25223] device bridge_slave_0 entered promiscuous mode [ 628.301731][T25223] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.309265][T25223] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.317304][T25223] device bridge_slave_1 entered promiscuous mode [ 628.453991][T25248] device pim6reg1 entered promiscuous mode [ 628.619527][T25223] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.626621][T25223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.634080][T25223] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.641119][T25223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 628.996047][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.010246][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.021577][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.060597][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.119836][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.127023][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.220410][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.229021][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.236071][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.244003][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.352854][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.394507][T25275] syz.1.6658[25275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.394562][T25275] syz.1.6658[25275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.425077][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 629.480716][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.512965][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 629.707352][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.796930][T25223] device veth0_vlan entered promiscuous mode [ 629.848674][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.882746][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.895648][T25223] device veth1_macvtap entered promiscuous mode [ 629.926024][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 629.934750][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.943483][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.980444][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.999591][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 630.010726][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 630.025621][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.118309][T25305] device pim6reg1 entered promiscuous mode [ 630.364995][T25329] device wg2 left promiscuous mode [ 631.154815][T25381] device veth0_vlan left promiscuous mode [ 631.161531][T25383] syz.1.6685[25383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.161584][T25383] syz.1.6685[25383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.174824][T25381] device veth0_vlan entered promiscuous mode [ 631.193198][T25384] syz.1.6685[25384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.193253][T25384] syz.1.6685[25384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.219524][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 631.350419][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 631.467300][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 632.204056][ T5538] device veth1_macvtap left promiscuous mode [ 632.220441][ T5538] device veth0_vlan left promiscuous mode [ 633.514327][T25491] device syzkaller0 entered promiscuous mode [ 634.729864][T25535] device veth1_macvtap left promiscuous mode [ 636.731935][T25636] device sit0 entered promiscuous mode [ 637.123180][T25661] ÿ: renamed from bond_slave_0 [ 637.850462][T25681] device sit0 left promiscuous mode [ 639.735867][T25761] device pim6reg1 entered promiscuous mode [ 639.883100][T25776] device pim6reg1 entered promiscuous mode [ 639.931498][T25782] device bridge0 entered promiscuous mode [ 640.223720][T25786] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.231238][T25786] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.344082][T25835] device sit0 entered promiscuous mode [ 642.024081][T25858] device wg2 left promiscuous mode [ 642.042347][T25858] device wg2 entered promiscuous mode [ 642.086556][ T24] audit: type=1400 audit(1766778803.790:174): avc: denied { create } for pid=25859 comm="syz.3.6818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 642.153619][T25866] device sit0 entered promiscuous mode [ 642.917279][T25874] device sit0 left promiscuous mode [ 643.991753][T25893] device pim6reg1 entered promiscuous mode [ 644.008434][T25898] bridge0: port 2(bridge_slave_1) entered disabled state [ 644.015598][T25898] bridge0: port 1(bridge_slave_0) entered disabled state [ 644.023606][T25898] device bridge0 left promiscuous mode [ 644.202572][T25929] device syzkaller0 entered promiscuous mode [ 644.776617][T25955] device pim6reg1 entered promiscuous mode [ 646.051810][T26085] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.235133][T26085] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.271491][T26085] device bridge_slave_0 entered promiscuous mode [ 646.370370][T26085] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.477457][T26085] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.601089][T26085] device bridge_slave_1 entered promiscuous mode [ 646.915222][T26129] device sit0 entered promiscuous mode [ 647.719517][T26150] device pim6reg1 entered promiscuous mode [ 647.783485][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 647.799341][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 647.877114][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 647.885913][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 647.895065][T20618] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.902467][T20618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.910946][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 647.920207][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 647.929509][T20618] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.936744][T20618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 648.041128][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 648.087796][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 648.107919][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 648.116342][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 648.124945][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 648.132671][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 648.140741][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 648.148834][T26085] device veth0_vlan entered promiscuous mode [ 648.162379][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 648.172410][T26085] device veth1_macvtap entered promiscuous mode [ 648.191445][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 648.200981][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 648.210220][T26164] device veth1_macvtap left promiscuous mode [ 648.222559][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 648.236024][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 648.267511][T26168] p: renamed from pim6reg1 [ 648.352574][ T5538] device bridge_slave_1 left promiscuous mode [ 648.359344][ T5538] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.367954][ T5538] device bridge_slave_0 left promiscuous mode [ 648.375032][ T5538] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.385566][ T5538] device veth1_macvtap left promiscuous mode [ 648.391649][ T5538] device veth0_vlan left promiscuous mode [ 650.221795][T26278] device sit0 entered promiscuous mode [ 651.143428][T26300] device syzkaller0 entered promiscuous mode [ 651.538739][T26329] device syzkaller0 entered promiscuous mode [ 652.042894][T26332] device wg2 entered promiscuous mode [ 655.313521][T26443] device sit0 left promiscuous mode [ 655.424674][T26448] device sit0 entered promiscuous mode [ 655.800088][T26466] device syzkaller0 entered promiscuous mode [ 656.937157][T26498] device wg2 left promiscuous mode [ 656.948321][T26498] device wg2 entered promiscuous mode [ 658.029545][T26537] device veth0_vlan left promiscuous mode [ 658.073269][T26537] device veth0_vlan entered promiscuous mode [ 658.189966][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.198747][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 658.206759][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 658.270283][T26543] device syzkaller0 entered promiscuous mode [ 659.958716][T26568] device wg2 entered promiscuous mode [ 660.546423][T26585] syz.4.6998[26585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.546535][T26585] syz.4.6998[26585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.590575][T26588] FAULT_INJECTION: forcing a failure. [ 660.590575][T26588] name failslab, interval 1, probability 0, space 0, times 1 [ 660.640056][T26588] CPU: 0 PID: 26588 Comm: syz.4.6999 Tainted: G W syzkaller #0 [ 660.649013][T26588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 660.659081][T26588] Call Trace: [ 660.662384][T26588] __dump_stack+0x21/0x24 [ 660.666716][T26588] dump_stack_lvl+0x169/0x1d8 [ 660.671384][T26588] ? show_regs_print_info+0x18/0x18 [ 660.676713][T26588] dump_stack+0x15/0x1c [ 660.680866][T26588] should_fail+0x3c1/0x510 [ 660.685415][T26588] ? kvmalloc_node+0x88/0x130 [ 660.690456][T26588] __should_failslab+0xa4/0xe0 [ 660.695217][T26588] should_failslab+0x9/0x20 [ 660.699720][T26588] __kmalloc+0x60/0x330 [ 660.703965][T26588] kvmalloc_node+0x88/0x130 [ 660.708545][T26588] btf_new_fd+0x1e4/0xa00 [ 660.713044][T26588] bpf_btf_load+0x5e/0x70 [ 660.717471][T26588] __se_sys_bpf+0x48a/0x680 [ 660.722078][T26588] ? __x64_sys_bpf+0x90/0x90 [ 660.726886][T26588] ? debug_smp_processor_id+0x17/0x20 [ 660.732441][T26588] __x64_sys_bpf+0x7b/0x90 [ 660.736961][T26588] do_syscall_64+0x31/0x40 [ 660.741483][T26588] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 660.747624][T26588] RIP: 0033:0x7f4011d88749 [ 660.752336][T26588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 660.772369][T26588] RSP: 002b:00007f40107f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 660.780783][T26588] RAX: ffffffffffffffda RBX: 00007f4011fdefa0 RCX: 00007f4011d88749 [ 660.788823][T26588] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 660.797220][T26588] RBP: 00007f40107f0090 R08: 0000000000000000 R09: 0000000000000000 [ 660.805799][T26588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 660.813930][T26588] R13: 00007f4011fdf038 R14: 00007f4011fdefa0 R15: 00007ffd5355d758 [ 660.969559][T26616] device veth0_vlan left promiscuous mode [ 661.047905][T26616] device veth0_vlan entered promiscuous mode [ 661.168848][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 661.214964][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 661.233536][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 661.348376][T26628] FAULT_INJECTION: forcing a failure. [ 661.348376][T26628] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 661.362205][T26628] CPU: 1 PID: 26628 Comm: syz.2.7012 Tainted: G W syzkaller #0 [ 661.371366][T26628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 661.381678][T26628] Call Trace: [ 661.385137][T26628] __dump_stack+0x21/0x24 [ 661.389833][T26628] dump_stack_lvl+0x169/0x1d8 [ 661.394598][T26628] ? show_regs_print_info+0x18/0x18 [ 661.399989][T26628] dump_stack+0x15/0x1c [ 661.404379][T26628] should_fail+0x3c1/0x510 [ 661.408819][T26628] should_fail_usercopy+0x1a/0x20 [ 661.413853][T26628] _copy_from_user+0x20/0xd0 [ 661.418699][T26628] btf_new_fd+0x259/0xa00 [ 661.423024][T26628] bpf_btf_load+0x5e/0x70 [ 661.427350][T26628] __se_sys_bpf+0x48a/0x680 [ 661.432046][T26628] ? __x64_sys_bpf+0x90/0x90 [ 661.436730][T26628] ? __bpf_trace_sys_enter+0x62/0x70 [ 661.442097][T26628] __x64_sys_bpf+0x7b/0x90 [ 661.446517][T26628] do_syscall_64+0x31/0x40 [ 661.450940][T26628] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 661.457172][T26628] RIP: 0033:0x7f5c17b1f749 [ 661.461705][T26628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 661.481408][T26628] RSP: 002b:00007f5c16587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 661.490077][T26628] RAX: ffffffffffffffda RBX: 00007f5c17d75fa0 RCX: 00007f5c17b1f749 [ 661.498132][T26628] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 661.506734][T26628] RBP: 00007f5c16587090 R08: 0000000000000000 R09: 0000000000000000 [ 661.514973][T26628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 661.523022][T26628] R13: 00007f5c17d76038 R14: 00007f5c17d75fa0 R15: 00007ffe9a647dd8 [ 661.546165][T26631] syz.2.7013[26631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.546223][T26631] syz.2.7013[26631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.593888][T26635] device pim6reg1 entered promiscuous mode [ 662.055511][T26684] device syzkaller0 entered promiscuous mode [ 662.635926][T26701] device veth0_vlan left promiscuous mode [ 662.805693][T26701] device veth0_vlan entered promiscuous mode [ 665.488402][T26784] FAULT_INJECTION: forcing a failure. [ 665.488402][T26784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 665.656525][T26784] CPU: 1 PID: 26784 Comm: syz.3.7055 Tainted: G W syzkaller #0 [ 665.665748][T26784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 665.675972][T26784] Call Trace: [ 665.679272][T26784] __dump_stack+0x21/0x24 [ 665.683633][T26784] dump_stack_lvl+0x169/0x1d8 [ 665.688593][T26784] ? thaw_kernel_threads+0x220/0x220 [ 665.694080][T26784] ? show_regs_print_info+0x18/0x18 [ 665.699630][T26784] ? memcpy+0x56/0x70 [ 665.703977][T26784] dump_stack+0x15/0x1c [ 665.708129][T26784] should_fail+0x3c1/0x510 [ 665.712558][T26784] should_fail_usercopy+0x1a/0x20 [ 665.717787][T26784] _copy_to_user+0x20/0x90 [ 665.722363][T26784] bpf_verifier_vlog+0x1b4/0x330 [ 665.727413][T26784] __btf_verifier_log+0xd1/0x120 [ 665.732327][T26784] ? btf_check_sec_info+0x330/0x330 [ 665.737526][T26784] ? memcpy+0x56/0x70 [ 665.741612][T26784] btf_parse_hdr+0x3b4/0x7b0 [ 665.746378][T26784] btf_new_fd+0x4af/0xa00 [ 665.750710][T26784] bpf_btf_load+0x5e/0x70 [ 665.755245][T26784] __se_sys_bpf+0x48a/0x680 [ 665.759817][T26784] ? __x64_sys_bpf+0x90/0x90 [ 665.764562][T26784] ? debug_smp_processor_id+0x17/0x20 [ 665.770286][T26784] __x64_sys_bpf+0x7b/0x90 [ 665.775560][T26784] do_syscall_64+0x31/0x40 [ 665.780218][T26784] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 665.786806][T26784] RIP: 0033:0x7f5fcda99749 [ 665.791558][T26784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.811499][T26784] RSP: 002b:00007f5fcc501038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.820092][T26784] RAX: ffffffffffffffda RBX: 00007f5fcdceffa0 RCX: 00007f5fcda99749 [ 665.828451][T26784] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 665.836504][T26784] RBP: 00007f5fcc501090 R08: 0000000000000000 R09: 0000000000000000 [ 665.844664][T26784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.852623][T26784] R13: 00007f5fcdcf0038 R14: 00007f5fcdceffa0 R15: 00007ffd33282ba8 [ 666.005870][T26792] device syzkaller0 entered promiscuous mode [ 666.027029][T26794] device sit0 left promiscuous mode [ 666.197620][T26819] FAULT_INJECTION: forcing a failure. [ 666.197620][T26819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 666.212382][T26819] CPU: 1 PID: 26819 Comm: syz.0.7068 Tainted: G W syzkaller #0 [ 666.221347][T26819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 666.231398][T26819] Call Trace: [ 666.234686][T26819] __dump_stack+0x21/0x24 [ 666.239028][T26819] dump_stack_lvl+0x169/0x1d8 [ 666.243709][T26819] ? thaw_kernel_threads+0x220/0x220 [ 666.249118][T26819] ? show_regs_print_info+0x18/0x18 [ 666.254449][T26819] ? memcpy+0x56/0x70 [ 666.258435][T26819] dump_stack+0x15/0x1c [ 666.262591][T26819] should_fail+0x3c1/0x510 [ 666.267020][T26819] should_fail_usercopy+0x1a/0x20 [ 666.272139][T26819] _copy_to_user+0x20/0x90 [ 666.276563][T26819] bpf_verifier_vlog+0x1b4/0x330 [ 666.281496][T26819] __btf_verifier_log+0xd1/0x120 [ 666.286440][T26819] ? btf_check_sec_info+0x330/0x330 [ 666.291636][T26819] ? memcpy+0x56/0x70 [ 666.295614][T26819] btf_parse_hdr+0x3df/0x7b0 [ 666.300384][T26819] btf_new_fd+0x4af/0xa00 [ 666.304712][T26819] bpf_btf_load+0x5e/0x70 [ 666.309124][T26819] __se_sys_bpf+0x48a/0x680 [ 666.313640][T26819] ? __x64_sys_bpf+0x90/0x90 [ 666.318346][T26819] ? debug_smp_processor_id+0x17/0x20 [ 666.324074][T26819] __x64_sys_bpf+0x7b/0x90 [ 666.328559][T26819] do_syscall_64+0x31/0x40 [ 666.332979][T26819] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 666.339058][T26819] RIP: 0033:0x7fbebf035749 [ 666.343535][T26819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 666.363585][T26819] RSP: 002b:00007fbebda9d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 666.372085][T26819] RAX: ffffffffffffffda RBX: 00007fbebf28bfa0 RCX: 00007fbebf035749 [ 666.380053][T26819] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 666.388298][T26819] RBP: 00007fbebda9d090 R08: 0000000000000000 R09: 0000000000000000 [ 666.396411][T26819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 666.405089][T26819] R13: 00007fbebf28c038 R14: 00007fbebf28bfa0 R15: 00007ffd0293c8f8 [ 666.625819][T26839] device syzkaller0 entered promiscuous mode [ 666.806580][T26861] syz.2.7081[26861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.806656][T26861] syz.2.7081[26861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.818767][T26861] syz.2.7081[26861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.850859][T26861] syz.2.7081[26861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.878992][T26861] syz.2.7081[26861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.082739][T26885] FAULT_INJECTION: forcing a failure. [ 667.082739][T26885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 667.390703][T26885] CPU: 1 PID: 26885 Comm: syz.1.7089 Tainted: G W syzkaller #0 [ 667.399665][T26885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 667.409805][T26885] Call Trace: [ 667.413098][T26885] __dump_stack+0x21/0x24 [ 667.417416][T26885] dump_stack_lvl+0x169/0x1d8 [ 667.422083][T26885] ? thaw_kernel_threads+0x220/0x220 [ 667.427358][T26885] ? show_regs_print_info+0x18/0x18 [ 667.432631][T26885] ? memcpy+0x56/0x70 [ 667.436784][T26885] dump_stack+0x15/0x1c [ 667.440929][T26885] should_fail+0x3c1/0x510 [ 667.445341][T26885] should_fail_usercopy+0x1a/0x20 [ 667.450450][T26885] _copy_to_user+0x20/0x90 [ 667.454912][T26885] bpf_verifier_vlog+0x1b4/0x330 [ 667.460015][T26885] __btf_verifier_log+0xd1/0x120 [ 667.465101][T26885] ? btf_check_sec_info+0x330/0x330 [ 667.470314][T26885] ? memcpy+0x56/0x70 [ 667.474291][T26885] btf_parse_hdr+0x40a/0x7b0 [ 667.479047][T26885] btf_new_fd+0x4af/0xa00 [ 667.483467][T26885] bpf_btf_load+0x5e/0x70 [ 667.488048][T26885] __se_sys_bpf+0x48a/0x680 [ 667.492558][T26885] ? __x64_sys_bpf+0x90/0x90 [ 667.497232][T26885] ? debug_smp_processor_id+0x17/0x20 [ 667.502604][T26885] __x64_sys_bpf+0x7b/0x90 [ 667.507013][T26885] do_syscall_64+0x31/0x40 [ 667.511422][T26885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 667.517327][T26885] RIP: 0033:0x7f5ed4f26749 [ 667.521732][T26885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.541502][T26885] RSP: 002b:00007f5ed398e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 667.549908][T26885] RAX: ffffffffffffffda RBX: 00007f5ed517cfa0 RCX: 00007f5ed4f26749 [ 667.557872][T26885] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 667.565841][T26885] RBP: 00007f5ed398e090 R08: 0000000000000000 R09: 0000000000000000 [ 667.574022][T26885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 667.581988][T26885] R13: 00007f5ed517d038 R14: 00007f5ed517cfa0 R15: 00007ffc73999328 [ 667.893340][T26912] device syzkaller0 entered promiscuous mode [ 668.596328][T26931] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.603437][T26931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.610810][T26931] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.617886][T26931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.626740][T26931] device bridge0 entered promiscuous mode [ 668.894057][T26947] device syzkaller0 entered promiscuous mode [ 669.063533][T26957] device syzkaller0 entered promiscuous mode [ 669.142384][T26959] cgroup: fork rejected by pids controller in /syz1 [ 669.805190][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 669.813131][T26981] device sit0 left promiscuous mode [ 669.822059][T26978] device sit0 entered promiscuous mode [ 670.287874][T26989] device syzkaller0 entered promiscuous mode [ 670.416339][T26996] device syzkaller0 entered promiscuous mode [ 670.639859][T26990] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.648759][T26990] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.656995][T26990] device bridge_slave_0 entered promiscuous mode [ 670.675538][T26990] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.682810][T26990] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.691272][T26990] device bridge_slave_1 entered promiscuous mode [ 670.761102][T26990] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.768346][T26990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.775620][T26990] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.782684][T26990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.889215][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.899678][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.944388][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 670.955729][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 670.988566][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 670.997600][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 671.006201][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.013615][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 671.027037][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 671.036219][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 671.051946][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.059061][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 671.067108][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 671.075487][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 671.083940][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 671.092863][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 671.305670][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 671.314261][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 671.337221][T26990] device veth0_vlan entered promiscuous mode [ 671.346854][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 671.354984][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 671.364736][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 671.372426][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 671.390754][T26990] device veth1_macvtap entered promiscuous mode [ 671.426731][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 671.443268][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 671.461826][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 671.555564][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 671.672111][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 671.685022][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 671.701729][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 671.858569][T27058] device veth0_vlan left promiscuous mode [ 671.869240][T27058] device veth0_vlan entered promiscuous mode [ 672.054055][T27078] tap0: tun_chr_ioctl cmd 1074025677 [ 672.064518][T27078] tap0: linktype set to 24 [ 672.989203][T27124] FAULT_INJECTION: forcing a failure. [ 672.989203][T27124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 673.006586][T27124] CPU: 0 PID: 27124 Comm: syz.3.7153 Tainted: G W syzkaller #0 [ 673.015456][T27124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 673.025642][T27124] Call Trace: [ 673.029145][T27124] __dump_stack+0x21/0x24 [ 673.033554][T27124] dump_stack_lvl+0x169/0x1d8 [ 673.038311][T27124] ? thaw_kernel_threads+0x220/0x220 [ 673.043575][T27124] ? show_regs_print_info+0x18/0x18 [ 673.048834][T27124] ? memcpy+0x56/0x70 [ 673.052980][T27124] dump_stack+0x15/0x1c [ 673.057149][T27124] should_fail+0x3c1/0x510 [ 673.061638][T27124] should_fail_usercopy+0x1a/0x20 [ 673.066666][T27124] _copy_to_user+0x20/0x90 [ 673.071154][T27124] bpf_verifier_vlog+0x1b4/0x330 [ 673.076070][T27124] __btf_verifier_log+0xd1/0x120 [ 673.081168][T27124] ? btf_check_sec_info+0x330/0x330 [ 673.086628][T27124] ? memcpy+0x56/0x70 [ 673.090827][T27124] btf_parse_hdr+0x49d/0x7b0 [ 673.095404][T27124] btf_new_fd+0x4af/0xa00 [ 673.099831][T27124] bpf_btf_load+0x5e/0x70 [ 673.104163][T27124] __se_sys_bpf+0x48a/0x680 [ 673.108667][T27124] ? __x64_sys_bpf+0x90/0x90 [ 673.113274][T27124] ? debug_smp_processor_id+0x17/0x20 [ 673.118627][T27124] __x64_sys_bpf+0x7b/0x90 [ 673.123055][T27124] do_syscall_64+0x31/0x40 [ 673.127447][T27124] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 673.133314][T27124] RIP: 0033:0x7f5fcda99749 [ 673.137710][T27124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 673.157484][T27124] RSP: 002b:00007f5fcc501038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 673.166257][T27124] RAX: ffffffffffffffda RBX: 00007f5fcdceffa0 RCX: 00007f5fcda99749 [ 673.174243][T27124] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 673.182219][T27124] RBP: 00007f5fcc501090 R08: 0000000000000000 R09: 0000000000000000 [ 673.190190][T27124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.198226][T27124] R13: 00007f5fcdcf0038 R14: 00007f5fcdceffa0 R15: 00007ffd33282ba8 [ 673.361331][T27140] device veth0_vlan left promiscuous mode [ 673.373035][T27140] device veth0_vlan entered promiscuous mode [ 673.452157][T27126] device pim6reg1 entered promiscuous mode [ 673.876959][T27183] FAULT_INJECTION: forcing a failure. [ 673.876959][T27183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 674.047594][T27183] CPU: 1 PID: 27183 Comm: syz.1.7169 Tainted: G W syzkaller #0 [ 674.056742][T27183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 674.066888][T27183] Call Trace: [ 674.070368][T27183] __dump_stack+0x21/0x24 [ 674.074781][T27183] dump_stack_lvl+0x169/0x1d8 [ 674.079617][T27183] ? thaw_kernel_threads+0x220/0x220 [ 674.084978][T27183] ? show_regs_print_info+0x18/0x18 [ 674.090348][T27183] ? string+0x292/0x2b0 [ 674.094541][T27183] dump_stack+0x15/0x1c [ 674.098696][T27183] should_fail+0x3c1/0x510 [ 674.103114][T27183] should_fail_usercopy+0x1a/0x20 [ 674.108128][T27183] _copy_to_user+0x20/0x90 [ 674.112529][T27183] bpf_verifier_vlog+0x1b4/0x330 [ 674.117460][T27183] __btf_verifier_log+0xd1/0x120 [ 674.122389][T27183] ? stack_trace_save+0xe0/0xe0 [ 674.127227][T27183] ? btf_check_sec_info+0x330/0x330 [ 674.132410][T27183] ? number+0xd1d/0xf70 [ 674.136554][T27183] __btf_verifier_log_type+0x387/0x610 [ 674.141998][T27183] ? btf_sec_info_cmp+0x5f/0x110 [ 674.146922][T27183] ? btf_int_show+0x2bf0/0x2bf0 [ 674.152039][T27183] ? sort_r+0xe04/0xe20 [ 674.156283][T27183] btf_func_proto_check_meta+0xf4/0x160 [ 674.161820][T27183] btf_check_all_metas+0x230/0x820 [ 674.167122][T27183] ? __btf_verifier_log+0x120/0x120 [ 674.172415][T27183] btf_parse_type_sec+0xea/0x15a0 [ 674.177434][T27183] ? btf_check_sec_info+0x27a/0x330 [ 674.182628][T27183] ? btf_check_sec_info+0x330/0x330 [ 674.187823][T27183] ? btf_verifier_log+0x2a0/0x2a0 [ 674.192934][T27183] ? memcpy+0x56/0x70 [ 674.196907][T27183] ? btf_parse_hdr+0x5d6/0x7b0 [ 674.201657][T27183] ? btf_parse_str_sec+0x1aa/0x260 [ 674.206755][T27183] btf_new_fd+0x562/0xa00 [ 674.211159][T27183] bpf_btf_load+0x5e/0x70 [ 674.215588][T27183] __se_sys_bpf+0x48a/0x680 [ 674.220165][T27183] ? __x64_sys_bpf+0x90/0x90 [ 674.224753][T27183] ? debug_smp_processor_id+0x17/0x20 [ 674.230201][T27183] __x64_sys_bpf+0x7b/0x90 [ 674.234604][T27183] do_syscall_64+0x31/0x40 [ 674.239026][T27183] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 674.244905][T27183] RIP: 0033:0x7ff36ae03749 [ 674.249493][T27183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 674.269265][T27183] RSP: 002b:00007ff36986b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 674.277785][T27183] RAX: ffffffffffffffda RBX: 00007ff36b059fa0 RCX: 00007ff36ae03749 [ 674.285885][T27183] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 674.294386][T27183] RBP: 00007ff36986b090 R08: 0000000000000000 R09: 0000000000000000 [ 674.302391][T27183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 674.311050][T27183] R13: 00007ff36b05a038 R14: 00007ff36b059fa0 R15: 00007ffedb434718 [ 674.948598][T27202] device sit0 entered promiscuous mode [ 675.138114][T27220] device syzkaller0 entered promiscuous mode [ 675.250247][T27233] FAULT_INJECTION: forcing a failure. [ 675.250247][T27233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 675.410657][T27233] CPU: 1 PID: 27233 Comm: syz.1.7183 Tainted: G W syzkaller #0 [ 675.419708][T27233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 675.429800][T27233] Call Trace: [ 675.433176][T27233] __dump_stack+0x21/0x24 [ 675.437684][T27233] dump_stack_lvl+0x169/0x1d8 [ 675.442539][T27233] ? thaw_kernel_threads+0x220/0x220 [ 675.448038][T27233] ? show_regs_print_info+0x18/0x18 [ 675.453238][T27233] ? memcpy+0x56/0x70 [ 675.457226][T27233] dump_stack+0x15/0x1c [ 675.461375][T27233] should_fail+0x3c1/0x510 [ 675.465786][T27233] should_fail_usercopy+0x1a/0x20 [ 675.470900][T27233] _copy_to_user+0x20/0x90 [ 675.475752][T27233] bpf_verifier_vlog+0x1b4/0x330 [ 675.480936][T27233] btf_verifier_log+0x1dc/0x2a0 [ 675.485783][T27233] ? bpf_verifier_vlog+0x1fd/0x330 [ 675.491037][T27233] ? btf_id_cmp_func+0x80/0x80 [ 675.495808][T27233] ? __btf_verifier_log+0xd1/0x120 [ 675.501007][T27233] ? btf_check_sec_info+0x330/0x330 [ 675.506204][T27233] btf_func_proto_log+0x76/0x670 [ 675.511408][T27233] __btf_verifier_log_type+0x3f9/0x610 [ 675.516875][T27233] ? btf_sec_info_cmp+0x5f/0x110 [ 675.521914][T27233] ? btf_int_show+0x2bf0/0x2bf0 [ 675.526844][T27233] ? sort_r+0xe04/0xe20 [ 675.531588][T27233] btf_func_proto_check_meta+0xf4/0x160 [ 675.537216][T27233] btf_check_all_metas+0x230/0x820 [ 675.542334][T27233] ? __btf_verifier_log+0x120/0x120 [ 675.547540][T27233] btf_parse_type_sec+0xea/0x15a0 [ 675.552552][T27233] ? btf_check_sec_info+0x27a/0x330 [ 675.557813][T27233] ? btf_check_sec_info+0x330/0x330 [ 675.563008][T27233] ? btf_verifier_log+0x2a0/0x2a0 [ 675.568100][T27233] ? memcpy+0x56/0x70 [ 675.572054][T27233] ? btf_parse_hdr+0x5d6/0x7b0 [ 675.576809][T27233] ? btf_parse_str_sec+0x1aa/0x260 [ 675.582407][T27233] btf_new_fd+0x562/0xa00 [ 675.586805][T27233] bpf_btf_load+0x5e/0x70 [ 675.591114][T27233] __se_sys_bpf+0x48a/0x680 [ 675.595733][T27233] ? __x64_sys_bpf+0x90/0x90 [ 675.600477][T27233] ? debug_smp_processor_id+0x17/0x20 [ 675.606023][T27233] __x64_sys_bpf+0x7b/0x90 [ 675.610422][T27233] do_syscall_64+0x31/0x40 [ 675.615254][T27233] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 675.621227][T27233] RIP: 0033:0x7ff36ae03749 [ 675.625634][T27233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 675.646041][T27233] RSP: 002b:00007ff36986b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 675.654537][T27233] RAX: ffffffffffffffda RBX: 00007ff36b059fa0 RCX: 00007ff36ae03749 [ 675.662753][T27233] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 675.670799][T27233] RBP: 00007ff36986b090 R08: 0000000000000000 R09: 0000000000000000 [ 675.678744][T27233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 675.687282][T27233] R13: 00007ff36b05a038 R14: 00007ff36b059fa0 R15: 00007ffedb434718 [ 676.080459][T27261] FAULT_INJECTION: forcing a failure. [ 676.080459][T27261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 676.165353][T27261] CPU: 0 PID: 27261 Comm: syz.1.7194 Tainted: G W syzkaller #0 [ 676.174221][T27261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 676.184445][T27261] Call Trace: [ 676.187734][T27261] __dump_stack+0x21/0x24 [ 676.192148][T27261] dump_stack_lvl+0x169/0x1d8 [ 676.196897][T27261] ? thaw_kernel_threads+0x220/0x220 [ 676.202155][T27261] ? show_regs_print_info+0x18/0x18 [ 676.207330][T27261] ? string+0x292/0x2b0 [ 676.211479][T27261] dump_stack+0x15/0x1c [ 676.215794][T27261] should_fail+0x3c1/0x510 [ 676.220192][T27261] should_fail_usercopy+0x1a/0x20 [ 676.225283][T27261] _copy_to_user+0x20/0x90 [ 676.229701][T27261] bpf_verifier_vlog+0x1b4/0x330 [ 676.234700][T27261] btf_verifier_log+0x1dc/0x2a0 [ 676.239612][T27261] ? bpf_verifier_vlog+0x1fd/0x330 [ 676.245043][T27261] ? btf_id_cmp_func+0x80/0x80 [ 676.249799][T27261] ? __btf_verifier_log+0xd1/0x120 [ 676.254902][T27261] ? btf_check_sec_info+0x330/0x330 [ 676.260088][T27261] btf_func_proto_log+0x211/0x670 [ 676.265090][T27261] __btf_verifier_log_type+0x3f9/0x610 [ 676.270616][T27261] ? btf_sec_info_cmp+0x5f/0x110 [ 676.275676][T27261] ? btf_int_show+0x2bf0/0x2bf0 [ 676.280678][T27261] ? sort_r+0xe04/0xe20 [ 676.284932][T27261] btf_func_proto_check_meta+0xf4/0x160 [ 676.290459][T27261] btf_check_all_metas+0x230/0x820 [ 676.295637][T27261] ? __btf_verifier_log+0x120/0x120 [ 676.300810][T27261] btf_parse_type_sec+0xea/0x15a0 [ 676.305897][T27261] ? btf_check_sec_info+0x27a/0x330 [ 676.311071][T27261] ? btf_check_sec_info+0x330/0x330 [ 676.316344][T27261] ? btf_verifier_log+0x2a0/0x2a0 [ 676.321453][T27261] ? memcpy+0x56/0x70 [ 676.325451][T27261] ? btf_parse_hdr+0x5d6/0x7b0 [ 676.330493][T27261] ? btf_parse_str_sec+0x1aa/0x260 [ 676.335769][T27261] btf_new_fd+0x562/0xa00 [ 676.340108][T27261] bpf_btf_load+0x5e/0x70 [ 676.344531][T27261] __se_sys_bpf+0x48a/0x680 [ 676.349405][T27261] ? __x64_sys_bpf+0x90/0x90 [ 676.354402][T27261] ? debug_smp_processor_id+0x17/0x20 [ 676.359844][T27261] __x64_sys_bpf+0x7b/0x90 [ 676.364324][T27261] do_syscall_64+0x31/0x40 [ 676.368968][T27261] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 676.375075][T27261] RIP: 0033:0x7ff36ae03749 [ 676.379562][T27261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 676.399338][T27261] RSP: 002b:00007ff36986b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 676.408032][T27261] RAX: ffffffffffffffda RBX: 00007ff36b059fa0 RCX: 00007ff36ae03749 [ 676.416512][T27261] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 676.424465][T27261] RBP: 00007ff36986b090 R08: 0000000000000000 R09: 0000000000000000 [ 676.432613][T27261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 676.440826][T27261] R13: 00007ff36b05a038 R14: 00007ff36b059fa0 R15: 00007ffedb434718 [ 676.951662][T27321] FAULT_INJECTION: forcing a failure. [ 676.951662][T27321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 676.990523][T27302] device wg2 left promiscuous mode [ 677.009790][T27321] CPU: 1 PID: 27321 Comm: syz.3.7209 Tainted: G W syzkaller #0 [ 677.018659][T27321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 677.028853][T27321] Call Trace: [ 677.032150][T27321] __dump_stack+0x21/0x24 [ 677.036488][T27321] dump_stack_lvl+0x169/0x1d8 [ 677.041167][T27321] ? thaw_kernel_threads+0x220/0x220 [ 677.046622][T27321] ? show_regs_print_info+0x18/0x18 [ 677.051989][T27321] ? memcpy+0x56/0x70 [ 677.056156][T27321] dump_stack+0x15/0x1c [ 677.060389][T27321] should_fail+0x3c1/0x510 [ 677.064782][T27321] should_fail_usercopy+0x1a/0x20 [ 677.069798][T27321] _copy_to_user+0x20/0x90 [ 677.074197][T27321] bpf_verifier_vlog+0x1b4/0x330 [ 677.079287][T27321] btf_verifier_log+0x1dc/0x2a0 [ 677.084840][T27321] ? bpf_verifier_vlog+0x1fd/0x330 [ 677.090450][T27321] ? btf_id_cmp_func+0x80/0x80 [ 677.095291][T27321] ? __btf_verifier_log+0xd1/0x120 [ 677.100416][T27321] ? btf_check_sec_info+0x330/0x330 [ 677.105621][T27321] btf_func_proto_log+0x53d/0x670 [ 677.110749][T27321] __btf_verifier_log_type+0x3f9/0x610 [ 677.116286][T27321] ? btf_sec_info_cmp+0x5f/0x110 [ 677.121239][T27321] ? btf_int_show+0x2bf0/0x2bf0 [ 677.126262][T27321] ? sort_r+0xe04/0xe20 [ 677.130408][T27321] btf_func_proto_check_meta+0xf4/0x160 [ 677.136028][T27321] btf_check_all_metas+0x230/0x820 [ 677.141221][T27321] ? __btf_verifier_log+0x120/0x120 [ 677.146422][T27321] btf_parse_type_sec+0xea/0x15a0 [ 677.151792][T27321] ? btf_check_sec_info+0x27a/0x330 [ 677.157056][T27321] ? btf_check_sec_info+0x330/0x330 [ 677.162229][T27321] ? btf_verifier_log+0x2a0/0x2a0 [ 677.167416][T27321] ? memcpy+0x56/0x70 [ 677.171385][T27321] ? btf_parse_hdr+0x5d6/0x7b0 [ 677.176134][T27321] ? btf_parse_str_sec+0x1aa/0x260 [ 677.181227][T27321] btf_new_fd+0x562/0xa00 [ 677.185549][T27321] bpf_btf_load+0x5e/0x70 [ 677.189992][T27321] __se_sys_bpf+0x48a/0x680 [ 677.194835][T27321] ? __x64_sys_bpf+0x90/0x90 [ 677.199413][T27321] ? debug_smp_processor_id+0x17/0x20 [ 677.204958][T27321] __x64_sys_bpf+0x7b/0x90 [ 677.209508][T27321] do_syscall_64+0x31/0x40 [ 677.213919][T27321] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 677.219790][T27321] RIP: 0033:0x7f5fcda99749 [ 677.224275][T27321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 677.244342][T27321] RSP: 002b:00007f5fcc501038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 677.252940][T27321] RAX: ffffffffffffffda RBX: 00007f5fcdceffa0 RCX: 00007f5fcda99749 [ 677.260911][T27321] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 677.269155][T27321] RBP: 00007f5fcc501090 R08: 0000000000000000 R09: 0000000000000000 [ 677.277203][T27321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 677.285427][T27321] R13: 00007f5fcdcf0038 R14: 00007f5fcdceffa0 R15: 00007ffd33282ba8 [ 677.882035][T27343] bridge0: port 3(veth0) entered blocking state [ 677.903591][T27343] bridge0: port 3(veth0) entered disabled state [ 677.940704][T27343] device veth0 entered promiscuous mode [ 678.049184][T27368] FAULT_INJECTION: forcing a failure. [ 678.049184][T27368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 678.062453][T27368] CPU: 0 PID: 27368 Comm: syz.2.7225 Tainted: G W syzkaller #0 [ 678.071406][T27368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 678.081552][T27368] Call Trace: [ 678.085125][T27368] __dump_stack+0x21/0x24 [ 678.089726][T27368] dump_stack_lvl+0x169/0x1d8 [ 678.094398][T27368] ? thaw_kernel_threads+0x220/0x220 [ 678.099681][T27368] ? show_regs_print_info+0x18/0x18 [ 678.104872][T27368] ? memcpy+0x56/0x70 [ 678.109111][T27368] dump_stack+0x15/0x1c [ 678.113259][T27368] should_fail+0x3c1/0x510 [ 678.117678][T27368] should_fail_usercopy+0x1a/0x20 [ 678.122690][T27368] _copy_to_user+0x20/0x90 [ 678.127189][T27368] bpf_verifier_vlog+0x1b4/0x330 [ 678.132116][T27368] __btf_verifier_log+0xd1/0x120 [ 678.137260][T27368] ? btf_check_sec_info+0x330/0x330 [ 678.142458][T27368] ? btf_func_proto_log+0x53d/0x670 [ 678.147656][T27368] __btf_verifier_log_type+0x4a0/0x610 [ 678.153350][T27368] ? btf_sec_info_cmp+0x5f/0x110 [ 678.158373][T27368] ? btf_int_show+0x2bf0/0x2bf0 [ 678.163207][T27368] ? sort_r+0xe04/0xe20 [ 678.167361][T27368] btf_func_proto_check_meta+0xf4/0x160 [ 678.172908][T27368] btf_check_all_metas+0x230/0x820 [ 678.178001][T27368] ? __btf_verifier_log+0x120/0x120 [ 678.183177][T27368] btf_parse_type_sec+0xea/0x15a0 [ 678.188353][T27368] ? btf_check_sec_info+0x27a/0x330 [ 678.193535][T27368] ? btf_check_sec_info+0x330/0x330 [ 678.198822][T27368] ? btf_verifier_log+0x2a0/0x2a0 [ 678.203834][T27368] ? memcpy+0x56/0x70 [ 678.207805][T27368] ? btf_parse_hdr+0x5d6/0x7b0 [ 678.212549][T27368] ? btf_parse_str_sec+0x1aa/0x260 [ 678.217838][T27368] btf_new_fd+0x562/0xa00 [ 678.222246][T27368] bpf_btf_load+0x5e/0x70 [ 678.226662][T27368] __se_sys_bpf+0x48a/0x680 [ 678.231161][T27368] ? __x64_sys_bpf+0x90/0x90 [ 678.235836][T27368] ? debug_smp_processor_id+0x17/0x20 [ 678.241198][T27368] __x64_sys_bpf+0x7b/0x90 [ 678.245766][T27368] do_syscall_64+0x31/0x40 [ 678.250246][T27368] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 678.256198][T27368] RIP: 0033:0x7f5c17b1f749 [ 678.260889][T27368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 678.280733][T27368] RSP: 002b:00007f5c16587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 678.289148][T27368] RAX: ffffffffffffffda RBX: 00007f5c17d75fa0 RCX: 00007f5c17b1f749 [ 678.297187][T27368] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 678.305158][T27368] RBP: 00007f5c16587090 R08: 0000000000000000 R09: 0000000000000000 [ 678.313107][T27368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 678.321255][T27368] R13: 00007f5c17d76038 R14: 00007f5c17d75fa0 R15: 00007ffe9a647dd8 [ 679.548438][T27413] FAULT_INJECTION: forcing a failure. [ 679.548438][T27413] name failslab, interval 1, probability 0, space 0, times 0 [ 679.561725][T27413] CPU: 1 PID: 27413 Comm: syz.4.7237 Tainted: G W syzkaller #0 [ 679.570581][T27413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 679.580889][T27413] Call Trace: [ 679.584166][T27413] __dump_stack+0x21/0x24 [ 679.588477][T27413] dump_stack_lvl+0x169/0x1d8 [ 679.593133][T27413] ? show_regs_print_info+0x18/0x18 [ 679.598328][T27413] ? __btf_verifier_log_type+0x4a0/0x610 [ 679.603941][T27413] dump_stack+0x15/0x1c [ 679.608171][T27413] should_fail+0x3c1/0x510 [ 679.612655][T27413] ? kvmalloc_node+0x88/0x130 [ 679.617317][T27413] __should_failslab+0xa4/0xe0 [ 679.622929][T27413] should_failslab+0x9/0x20 [ 679.627503][T27413] __kmalloc+0x60/0x330 [ 679.631824][T27413] kvmalloc_node+0x88/0x130 [ 679.636313][T27413] btf_check_all_metas+0x347/0x820 [ 679.641404][T27413] btf_parse_type_sec+0xea/0x15a0 [ 679.646579][T27413] ? btf_check_sec_info+0x27a/0x330 [ 679.651759][T27413] ? btf_check_sec_info+0x330/0x330 [ 679.657028][T27413] ? btf_verifier_log+0x2a0/0x2a0 [ 679.662041][T27413] ? memcpy+0x56/0x70 [ 679.666317][T27413] ? btf_parse_hdr+0x5d6/0x7b0 [ 679.671588][T27413] ? btf_parse_str_sec+0x1aa/0x260 [ 679.676912][T27413] btf_new_fd+0x562/0xa00 [ 679.681871][T27413] bpf_btf_load+0x5e/0x70 [ 679.686553][T27413] __se_sys_bpf+0x48a/0x680 [ 679.691135][T27413] ? __x64_sys_bpf+0x90/0x90 [ 679.695834][T27413] ? debug_smp_processor_id+0x17/0x20 [ 679.701211][T27413] __x64_sys_bpf+0x7b/0x90 [ 679.705643][T27413] do_syscall_64+0x31/0x40 [ 679.710221][T27413] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 679.716187][T27413] RIP: 0033:0x7f4011d88749 [ 679.720747][T27413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 679.740695][T27413] RSP: 002b:00007f40107f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 679.750193][T27413] RAX: ffffffffffffffda RBX: 00007f4011fdefa0 RCX: 00007f4011d88749 [ 679.758410][T27413] RDX: 0000000000000028 RSI: 00002000000016c0 RDI: 0000000000000012 [ 679.766818][T27413] RBP: 00007f40107f0090 R08: 0000000000000000 R09: 0000000000000000 [ 679.774904][T27413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 679.783047][T27413] R13: 00007f4011fdf038 R14: 00007f4011fdefa0 R15: 00007ffd5355d758 [ 680.262150][T27425] : renamed from veth0_vlan [ 683.830402][T27522] device wg2 left promiscuous mode [ 690.218229][T27528] device veth0_vlan left promiscuous mode [ 690.232369][T27528] device veth0_vlan entered promiscuous mode [ 690.288542][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 690.310533][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 690.336985][T20618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 690.393425][T27552] device syzkaller0 entered promiscuous mode [ 690.497443][T27566] device pim6reg1 entered promiscuous mode [ 690.525628][T27576] device syzkaller0 entered promiscuous mode [ 690.646690][T27611] device pim6reg1 entered promiscuous mode [ 690.694795][ T24] audit: type=1400 audit(1766778852.400:175): avc: denied { create } for pid=27603 comm="syz.1.7294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 691.114947][T27649] FAULT_INJECTION: forcing a failure. [ 691.114947][T27649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 691.129425][T27649] CPU: 0 PID: 27649 Comm: syz.4.7307 Tainted: G W syzkaller #0 [ 691.138560][T27649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 691.148608][T27649] Call Trace: [ 691.151991][T27649] __dump_stack+0x21/0x24 [ 691.156317][T27649] dump_stack_lvl+0x169/0x1d8 [ 691.161331][T27649] ? thaw_kernel_threads+0x220/0x220 [ 691.166790][T27649] ? vsnprintf+0x186d/0x1960 [ 691.171371][T27649] ? show_regs_print_info+0x18/0x18 [ 691.176561][T27649] dump_stack+0x15/0x1c [ 691.180705][T27649] should_fail+0x3c1/0x510 [ 691.185116][T27649] should_fail_usercopy+0x1a/0x20 [ 691.190266][T27649] _copy_to_user+0x20/0x90 [ 691.194780][T27649] simple_read_from_buffer+0xe9/0x160 [ 691.200340][T27649] proc_fail_nth_read+0x19a/0x210 [ 691.205357][T27649] ? proc_fault_inject_write+0x2f0/0x2f0 [ 691.211080][T27649] ? rw_verify_area+0x1c0/0x360 [ 691.216148][T27649] ? proc_fault_inject_write+0x2f0/0x2f0 [ 691.222217][T27649] vfs_read+0x1fe/0xa10 [ 691.226565][T27649] ? kernel_read+0x70/0x70 [ 691.231153][T27649] ? __kasan_check_write+0x14/0x20 [ 691.236262][T27649] ? mutex_lock+0x8c/0xe0 [ 691.240568][T27649] ? mutex_trylock+0xa0/0xa0 [ 691.245486][T27649] ? __fget_files+0x2c4/0x320 [ 691.250236][T27649] ? __fdget_pos+0x2d2/0x380 [ 691.254796][T27649] ? ksys_read+0x71/0x240 [ 691.259392][T27649] ksys_read+0x140/0x240 [ 691.263711][T27649] ? vfs_write+0xd60/0xd60 [ 691.268541][T27649] ? __bpf_trace_sys_enter+0x62/0x70 [ 691.274115][T27649] __x64_sys_read+0x7b/0x90 [ 691.278897][T27649] do_syscall_64+0x31/0x40 [ 691.283325][T27649] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 691.289303][T27649] RIP: 0033:0x7f4011d8715c [ 691.293910][T27649] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 691.314447][T27649] RSP: 002b:00007f40107f0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 691.323098][T27649] RAX: ffffffffffffffda RBX: 00007f4011fdefa0 RCX: 00007f4011d8715c [ 691.332075][T27649] RDX: 000000000000000f RSI: 00007f40107f00a0 RDI: 0000000000000003 [ 691.341347][T27649] RBP: 00007f40107f0090 R08: 0000000000000000 R09: 0000000000000000 [ 691.349746][T27649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 691.358089][T27649] R13: 00007f4011fdf038 R14: 00007f4011fdefa0 R15: 00007ffd5355d758 [ 691.474295][T27644] -1: renamed from syzkaller0 [ 691.488428][T27651] device veth0_vlan left promiscuous mode [ 691.507425][T27651] device veth0_vlan entered promiscuous mode [ 691.598645][T27653] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.605907][T27653] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.614335][T27653] device bridge_slave_0 entered promiscuous mode [ 691.622238][T27653] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.629519][T27653] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.637446][T27653] device bridge_slave_1 entered promiscuous mode [ 691.699664][T27665] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.707452][T27665] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.767535][T27665] device bridge0 left promiscuous mode [ 691.929263][T27682] device bridge_slave_1 left promiscuous mode [ 692.036673][T27682] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.137049][T27682] device bridge_slave_0 left promiscuous mode [ 692.143297][T27682] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.257887][T27653] bridge0: port 2(bridge_slave_1) entered blocking state [ 692.265046][T27653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 692.272446][T27653] bridge0: port 1(bridge_slave_0) entered blocking state [ 692.279532][T27653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 692.557912][ T5538] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.567213][ T5538] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.622811][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 692.646077][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 692.654040][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 692.675712][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 692.686757][ T5538] bridge0: port 1(bridge_slave_0) entered blocking state [ 692.694878][ T5538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 692.709470][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 692.724890][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 692.739000][ T5538] bridge0: port 2(bridge_slave_1) entered blocking state [ 692.746709][ T5538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 692.803859][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 692.814526][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 692.827833][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 692.837393][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 692.875408][T27653] device veth0_vlan entered promiscuous mode [ 692.891045][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 692.904429][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 692.905767][ T24] audit: type=1400 audit(1766778854.610:176): avc: denied { create } for pid=27730 comm="syz.1.7328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 692.915322][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 692.976020][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 693.001525][T27653] device veth1_macvtap entered promiscuous mode [ 693.045406][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 693.056151][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 693.073971][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 693.106958][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 693.118767][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 693.217515][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 693.237376][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 693.246227][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 693.267140][ T5538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 693.949465][T27809] device wg2 entered promiscuous mode [ 693.993521][T27818] bridge0: port 2(bridge_slave_1) entered disabled state [ 694.000892][T27818] bridge0: port 1(bridge_slave_0) entered disabled state [ 694.495872][T27855] syz.4.7362[27855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.495930][T27855] syz.4.7362[27855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.647014][T27853] device xfrm0 entered promiscuous mode [ 694.666972][T27858] device sit0 left promiscuous mode [ 694.699889][T27860] device sit0 entered promiscuous mode [ 694.786825][T27871] device syzkaller0 entered promiscuous mode [ 695.191017][T27904] syz.2.7373[27904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.191067][T27904] syz.2.7373[27904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 696.867165][T27970] device wg2 entered promiscuous mode [ 697.719504][T28014] : renamed from bond_slave_0 [ 698.536504][T28022] device syzkaller0 entered promiscuous mode [ 698.929688][T28051] device pim6reg1 entered promiscuous mode [ 699.707817][T28077] syz.4.7421[28077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.707880][T28077] syz.4.7421[28077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.127530][T28121] syz.4.7433[28121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.238905][T28121] syz.4.7433[28121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.261678][T28124] syz.4.7433[28124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.273987][T28124] syz.4.7433[28124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.459617][T28139] device wg2 entered promiscuous mode [ 700.962530][T28155] device pim6reg1 entered promiscuous mode