last executing test programs: 11.420137404s ago: executing program 4 (id=6453): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000600), 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x11, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x48f}}, @tail_call, @generic={0x5, 0x5, 0x4, 0x0, 0x50c}]}, &(0x7f0000000080)='GPL\x00', 0xad, 0x45, &(0x7f0000000280)=""/69, 0x41100, 0x3, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x5, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x4, 0x1, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xc}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r1, 0x0, 0x7ff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 9.756352419s ago: executing program 0 (id=6575): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000b7abce9b24f264007b2ef8a639d674f7c4085773052bb09de3e83775e204d6901965f6474955cd532809baba6be6b51ed217a1ce8689530596ff5a8eaf8ac63138d693b28aa19e3eca8dd119e0bb0d6e224a0e05bc23ae1f9732ff6168dcf6d95528585b3b147ef01134836f569541bfefba0748dc7680382f77a7caecda8ff108b3c1407e0d0161aab6d997d084a6a4c787bb4d9d4184ccf357d2f306f84ba986fc0bef75dd53356f98cbfa5940053b769647e923cf362d05ddf7e4390a713d71eac92196a9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000001000000a2db6a1f1bdd7e6674", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffff00"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='devlink_health_report\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xc, 0x1bbb7ccd}, 0x410, 0x2000000, 0xffffffff, 0x0, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7050000000000006110480000000000dc0500002000000095000000000000009abb1723bf24203831c9545b21c751ee4024f479cbe4b89f9808837203000000000000c2d182c7a3221481f5009edaf5f5ac058299e10e790a198f42a715b99fb3d2a73dd025848710155ad1efd7d991408000000000000085a0db0401fa29e075b7ab0408a0d8cfceeb23465bb027ee1151c02af21d8f9aa57e673a6724441d08087aff070eda8abef22b3a806c8226f5a2886c93bd29b37252ba4a6e9cc5f69e75680c431aa855e487ae513abd6c4ee973fce29a26018ed5e0780f8778a602a3533a3dac7da4fe491edf3abfa7bf871c58848ac4"], &(0x7f00000002c0)='syzkaller\x00', 0xfffffff1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000a700000000080000000000000000000000040000001709000000008cf7f20c25885a38da72a4451e309717099956f278880a3d8e4ec45108999e78fe23856473d188f866"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x20}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x200000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES64=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000001070000000082cd0000260018110080", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) close(r4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 9.399918015s ago: executing program 4 (id=6453): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000600), 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x11, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x48f}}, @tail_call, @generic={0x5, 0x5, 0x4, 0x0, 0x50c}]}, &(0x7f0000000080)='GPL\x00', 0xad, 0x45, &(0x7f0000000280)=""/69, 0x41100, 0x3, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x5, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x4, 0x1, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xc}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r1, 0x0, 0x7ff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 7.634421062s ago: executing program 0 (id=6582): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000100000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') 7.633069612s ago: executing program 2 (id=6584): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0xffffffde, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r0, 0x500}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x82, &(0x7f0000000180), 0x4bd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'veth1_to_bridge\x00', 0x1000}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="1800825e61520000000000400000000d00000000850000006d000000850000007d00000095000000f6a8ca55c4b8cffb32b10acdcdcdc1333df185e7a8968b1d737a375648b6f4fe0041cd01ae963a7a52d171a690cec570f342cabbbecec331bc30e9016e18c5e79787d7fc45aa80b5140f45bbf5520fbfc9170782fb53663aa93a6a1d885f50027518981daf33461571862b6bf0567c3cf1eec6c3f2c2503868ae924c1bdb42545fe6b756fed923cfcb1d4230c0c63cfc3a2ce5e435a989815f4ece696bbfa944123318af5c4b771827b72480b8a46385ece2de9ee4ef2a32820e798c3d639ed1ed16e2"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 7.213982469s ago: executing program 0 (id=6586): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000100000000000000000", @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00001800000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') 7.212934259s ago: executing program 3 (id=6587): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000ebff000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0xc, 0x0, 0x4000, @void, @value}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000700)='ext4_sync_file_exit\x00', r5, 0x0, 0x7}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r0, &(0x7f0000000300)="b62ed7ada196d2d255caae11b9889314f5b2de1ceaee57832d085979d3534cd10aab68935a7f7de710fd1022638301d33e56436cf5ed85410a543dc1e7648e", &(0x7f0000000740)=""/130}, 0x20) openat$cgroup_freezer_state(r1, &(0x7f0000000600), 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x10024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) syz_open_procfs$namespace(r4, &(0x7f0000000080)='ns/ipc\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 7.052513461s ago: executing program 4 (id=6453): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000600), 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x11, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x48f}}, @tail_call, @generic={0x5, 0x5, 0x4, 0x0, 0x50c}]}, &(0x7f0000000080)='GPL\x00', 0xad, 0x45, &(0x7f0000000280)=""/69, 0x41100, 0x3, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x5, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x4, 0x1, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xc}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r1, 0x0, 0x7ff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 5.130633381s ago: executing program 0 (id=6588): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2, @ANYRES32, @ANYRES8=r4, @ANYRESHEX, @ANYRESHEX=0x0, @ANYRES16=r1, @ANYRESDEC=r7, @ANYBLOB="01f59f0af82e0af0bc8fbcd3e48f12fa14f0f5289bcef4a435342efd92e25ffea5605923e728173bf91179e478599c2f4e64ea42f3655060f8ccf496779b706750f64457be4b2b7fbc6207625901df5cef9ee35ac354ba1adc800f186426ca5f8ffabde10715a5b7c1973a6faf8a1da0490363267950a4681f7bf47a83a00e812334c8ad585e1135c1562b8155aebc5119a3dbbd490f274083bb03d333a05cf33398ab20c8b79ce8a7b1ffbd2f783c61b71b32200d68e8afd506d5bf352eda062c41f6dfe7beca34fb23c8aee58df916334d6dbc101aba7bdffbe0a6ee"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa1", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='blkio.bfq.io_merged\x00', 0x0, 0x0) 5.130263691s ago: executing program 1 (id=6589): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRES32=r1, @ANYRES64=r0], 0x48) unlink(0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 5.12913411s ago: executing program 2 (id=6590): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = openat$cgroup_subtree(r1, &(0x7f0000000240), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2b, 'hugetlb'}]}, 0x9) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000400)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0x17) perf_event_open$cgroup(&(0x7f0000000580)={0x3, 0x80, 0x0, 0xd, 0x10, 0x4c, 0x0, 0x8, 0x2c800, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x78}, 0x10800, 0xb, 0x8, 0x8, 0x400, 0x7e5, 0xd, 0x0, 0x7, 0x0, 0x6}, r4, 0x2, r0, 0xd) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) recvmsg$unix(r7, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033300fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r11}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000380a0000000800000001000006040000000100008002000000006100302e6161616100"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f00000003c0)={0x0, r6}, 0x8) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r12}, 0x10) 5.128388121s ago: executing program 3 (id=6591): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYRES8=r1, @ANYRES8=r5, @ANYRES16=r7, @ANYBLOB="e41921f4ec0144be94b432a78bd408b5ff8cf2e722dbd3386954fa46610cf7e7fd5e5d453559cf5ff28474146d8d0b97a598c2da65e161534eba0fa74f9766e8e4f76187cef9cd251064695e9143191dca39261dedd26d6d548a747d577269c3572c6b70f7568160684aac1b3342225b00647b1b841d34047e8318f4c138a4010e5a25a30be05f327c13f6333b0f3d06b6cb18f787795687c33ee307dcf4ef47808c6c04579059ac53776710f80dcf45672a9748c0e2699df0810ba3f63055", @ANYRES8=r2, @ANYRES32=r4, @ANYBLOB="6bf83179a256fea6be2888707c827ee474040c9f6c1961b3851600cef35b46ccf36fd5fbcadcd374210ba5e92f9027f8d2", @ANYRESOCT=r3, @ANYRESDEC, @ANYRES8=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRESHEX=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r11, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r5, @ANYRES16, @ANYRESHEX=r3, @ANYRESOCT=r6, @ANYBLOB="69b3b81011c51cea9c4b35e525b7a6ad067b6e6a6b7d8b67e2fe75e9529618e1780dbb1f8d920772eac31bbed9e43208a18cf159df3748ac0a4f6625d9a9e13fabca9b4ca285d746fbe906dc639155"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r12}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r14}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 5.067522102s ago: executing program 1 (id=6592): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='svcrdma_post_send\x00', r0}, 0x18) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000005c0)=@base={0x1a, 0x0, 0x41, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0xa, 0x8, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r4, &(0x7f0000000c00)={&(0x7f0000000300)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000440)="0b72e610c2469f9a0fb04e5cdeef42d261b5acbd1a524068dfbea5efdaacf7691b63c2af34dc0fe23ca21924480d10ee0e31773a7fb625c668d6a8b306a8e814fb77ce5d620919eb458ba4c035b2b45a2f6cf8e138ff601bb48852f599d90af8ef14c49cb1c3d70fec34e21e0fcbff70cf1f0568e854e5c5426815ce85d13705e0d19a8baffdfe4061b6ee3e4f8d23d11968f1e2f09cc8fe54b9a1d87dccefde3b5fe17ea8290c0e5f04f067824f57742d4ca9777e77788055204cc29eea441d78e7b61c91cbca86cde782ae07998f82feb98cc80f3e6f6220", 0xd9}, {&(0x7f0000000640)="6d96fb9d322f3a92404a01ce3ecddc71cb614014a1fe93c9b35f59e7df2927f08f7ef50e7250edc4dfee180cb57f4c6208a980029baf5802ea301533d6349da91fa8fec85e1c997ef2fb8d1e45667fb46f86f026cf4161e2b1ff3562550001672277233344ac805ed8b6057355c6796fc0af65203ec7ed6b47600acf35507d5365344bb044d2c5e858b14b", 0x8b}, {&(0x7f0000000540)="ff642e59ef5df33ec31c6f8ac9ad052072809a1b9e4b536450a287729db8a6cc9955cbc27f98cc7da0da0a068d949d9dbbd85592d19f30c25e2a28c310157b74970d0cd3f280f8247a89f57c460874be05031c3229a690556d3ce69c5bb2d14e5c47ab051839", 0x66}, {&(0x7f0000000340)}, {&(0x7f0000000780)="df76047ee2552dfae82b58a572a1e7f4624ba11a232409d590c26d50c55ceff96147f1b5ff66804a", 0x28}, {&(0x7f00000007c0)}], 0x6, &(0x7f00000009c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_retopts={{0x34, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0xc6, [@multicast2, @loopback]}, @lsrr={0x83, 0x17, 0x35, [@remote, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x36}, @private=0xa010101, @remote]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4eb8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @local, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}, @ip_retopts={{0xe0, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x5d, [@rand_addr=0x64010100, @multicast1, @dev={0xac, 0x14, 0x14, 0x2f}, @remote]}, @rr={0x7, 0x1f, 0xc7, [@dev={0xac, 0x14, 0x14, 0x15}, @dev={0xac, 0x14, 0x14, 0x25}, @rand_addr=0x64010100, @multicast1, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @noop, @timestamp_addr={0x44, 0x14, 0x9, 0x1, 0x9, [{@dev={0xac, 0x14, 0x14, 0x29}, 0x9}, {@rand_addr=0x64010100, 0x7}]}, @cipso={0x86, 0x25, 0x0, [{0x2, 0xc, "f3a1f1f9b3cb214fcf6d"}, {0x7, 0x4, "82b5"}, {0x5, 0xf, "e45a5c7156258593c4540873f8"}]}, @timestamp={0x44, 0x28, 0xaa, 0x0, 0x4, [0x58bc, 0x40, 0x9, 0x5, 0x80000000, 0xbe, 0x9, 0x7f, 0x5]}, @generic={0x94, 0x3, 'a'}, @timestamp_prespec={0x44, 0x1c, 0xae, 0x3, 0x9, [{@local}, {@private=0xa010101, 0xfffffffe}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x68}]}, @lsrr={0x83, 0x1b, 0xc1, [@loopback, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x34}, @private=0xa010102, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@ra={0x94, 0x4}, @lsrr={0x83, 0x1b, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x30}, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @multicast2]}, @ra={0x94, 0x4}, @ssrr={0x89, 0x13, 0x9, [@multicast1, @private=0xa010101, @broadcast, @dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}], 0x218}, 0x80) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r3, 0x0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000200)='kfree_skb\x00'}, 0x18) 4.968493913s ago: executing program 3 (id=6593): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB="0000010000000000", @ANYRES32=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r0, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 4.486682171s ago: executing program 4 (id=6453): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000600), 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x11, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x48f}}, @tail_call, @generic={0x5, 0x5, 0x4, 0x0, 0x50c}]}, &(0x7f0000000080)='GPL\x00', 0xad, 0x45, &(0x7f0000000280)=""/69, 0x41100, 0x3, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x5, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x4, 0x1, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xc}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r1, 0x0, 0x7ff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.513716091s ago: executing program 0 (id=6594): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000b7abce9b24f264007b2ef8a639d674f7c4085773052bb09de3e83775e204d6901965f6474955cd532809baba6be6b51ed217a1ce8689530596ff5a8eaf8ac63138d693b28aa19e3eca8dd119e0bb0d6e224a0e05bc23ae1f9732ff6168dcf6d95528585b3b147ef01134836f569541bfefba0748dc7680382f77a7caecda8ff108b3c1407e0d0161aab6d997d084a6a4c787bb4d9d4184ccf357d2f306f84ba986fc0bef75dd53356f98cbfa5940053b769647e923cf362d05ddf7e4390a713d71eac92196a9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000001000000a2db6a1f1bdd7e6674", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffff00"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='devlink_health_report\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xc, 0x1bbb7ccd}, 0x410, 0x2000000, 0xffffffff, 0x0, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7050000000000006110480000000000dc0500002000000095000000000000009abb1723bf24203831c9545b21c751ee4024f479cbe4b89f9808837203000000000000c2d182c7a3221481f5009edaf5f5ac058299e10e790a198f42a715b99fb3d2a73dd025848710155ad1efd7d991408000000000000085a0db0401fa29e075b7ab0408a0d8cfceeb23465bb027ee1151c02af21d8f9aa57e673a6724441d08087aff070eda8abef22b3a806c8226f5a2886c93bd29b37252ba4a6e9cc5f69e75680c431aa855e487ae513abd6c4ee973fce29a26018ed5e0780f8778a602a3533a3dac7da4fe491edf3abfa7bf871c58848ac4"], &(0x7f00000002c0)='syzkaller\x00', 0xfffffff1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000a700000000080000000000000000000000040000001709000000008cf7f20c25885a38da72a4451e309717099956f278880a3d8e4ec45108999e78fe23856473d188f866"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x20}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x200000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES64=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000001070000000082cd0000260018110080", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) close(r4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.512420781s ago: executing program 1 (id=6595): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r4, 0x0, 0x40000100) sendmsg$inet(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 2.510284471s ago: executing program 2 (id=6596): bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r0}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x4e) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.509490861s ago: executing program 3 (id=6597): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000040)=@raw=[@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x88}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xf}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x9, 0xfffffffb, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f00000001c0)=[{0x5, 0x3, 0x3, 0x2}, {0x1, 0x1, 0x5, 0x2}, {0x3, 0x1, 0xb}, {0x4, 0x3, 0xc, 0x3}, {0x4, 0x5, 0xb, 0x7}], 0x10, 0x1ff, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='rxrpc_rx_eproto\x00', r0, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000340)={0x800, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380)=r2, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xf, 0x3, 0x6, 0xfff, 0x0, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x59, 0x0, r3, 0x800, '\x00', 0x0, r4, 0x3, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x8, 0xfa, 0xad, 0x7, 0x0, 0x7, 0x288c4, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x76, 0x6}, 0x2800, 0x8000000000000000, 0x3, 0x3, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x8, r1, 0x2) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x480000, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x13) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001740)={r0, 0x0, 0x0, 0x15, &(0x7f00000005c0), &(0x7f0000000600)=""/21, 0x7b0, 0x0, 0xcd, 0x1000, &(0x7f0000000640)="e5c56e474857441653c729b0c5e130469b50bd9f22eb2eedbeb6f790ffb572e70448498a7d521504b42cdf016665c5d56345183e8ec8f32c8c4cdc5eda251ae482bbde23246f6ca77b2397edf2b8b0bb50231daf741cddd868857dbaa04e9229b31aa93a9f5459d7976663880b4fb9201fe9aba16bdfd867f569abc805575f25e1174792a1afdf806e18c0b53fa01914858fafe4813d579206395cc03960d5140a68d4e4acbb43a91e3165e0d86ed894fb8561ebe6e16545a5328d2b0fd5dfab428bf8738edbc6378d41af4df3", &(0x7f0000000740)="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", 0x4, 0x0, 0x5}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001800)=@generic={&(0x7f00000017c0)='./file0\x00', r3}, 0x18) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000018c0)={{r3, 0xffffffffffffffff}, &(0x7f0000001840), &(0x7f0000001880)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001980)={{r7}, &(0x7f0000001900), &(0x7f0000001940)}, 0x20) ioctl$TUNSETLINK(r6, 0x400454cd, 0x204) ioctl$TUNSETLINK(r6, 0x400454cd, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff}) ioctl$TUNGETVNETLE(r6, 0x800454dd, &(0x7f0000001a00)) r9 = openat$cgroup(r5, &(0x7f0000001a40)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f0000001a80), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000002100)={&(0x7f0000001b00)=@abs, 0x6e, &(0x7f0000002000)=[{&(0x7f0000001b80)=""/56, 0x38}, {&(0x7f0000001bc0)=""/152, 0x98}, {&(0x7f0000001c80)=""/17, 0x11}, {&(0x7f0000001cc0)=""/90, 0x5a}, {&(0x7f0000001d40)=""/185, 0xb9}, {&(0x7f0000001e00)=""/247, 0xf7}, {&(0x7f0000001f00)=""/249, 0xf9}], 0x7, &(0x7f0000002080)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x40002000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000021c0)={r16, &(0x7f0000002140)="0a90a6d4d8a40fcc48", &(0x7f0000002180)=""/24}, 0x20) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002240)=@o_path={&(0x7f0000002200)='./file0\x00', 0x0, 0x4008, r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002300)={{r7, 0xffffffffffffffff}, &(0x7f0000002280), &(0x7f00000022c0)=r13}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000023c0)={{r3, 0xffffffffffffffff}, &(0x7f0000002340), &(0x7f0000002380)=r12}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002940)={0xa, 0x1a, &(0x7f0000002400)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xcc}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r17}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @generic={0x8, 0x8, 0xf, 0xb1, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r19}}, @generic={0x63, 0x5, 0xd, 0x6, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @exit, @ldst={0x1, 0x0, 0x7, 0x9, 0x6, 0x80, 0xfffffffffffffff0}], &(0x7f0000002500)='syzkaller\x00', 0x0, 0xda, &(0x7f0000002540)=""/218, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x16, r16, 0x8, &(0x7f0000002700)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000028c0)=[r11, 0xffffffffffffffff, r8, 0xffffffffffffffff, r14, 0xffffffffffffffff, r13, r15, r12, 0xffffffffffffffff], &(0x7f0000002900)=[{0x2, 0x5, 0x3, 0x8}, {0x0, 0x3, 0x7, 0x2}, {0x4, 0x3, 0x1, 0x7}, {0x2, 0x1, 0x5, 0x5}], 0x10, 0x1, @void, @value}, 0x94) 2.489663441s ago: executing program 1 (id=6598): bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r0}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x4e) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.415339712s ago: executing program 2 (id=6599): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4c, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7f, @void, @value}, 0x94) sendmsg$inet(r4, &(0x7f0000001c40)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000003c0)={0x3, 0x80, 0xfa, 0x5, 0x3, 0x0, 0x0, 0x200, 0x8000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040)}, 0x60, 0x4, 0x8, 0x9, 0x6, 0x4, 0x3e, 0x0, 0x0, 0x0, 0x6}) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) 2.343439964s ago: executing program 2 (id=6600): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@typedef={0x7, 0x0, 0x0, 0x8, 0x5}, @ptr={0x2, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}}, &(0x7f0000001300)=""/91, 0x4a, 0x5b, 0x1, 0x0, 0x10000, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r5, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001440), &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x0, 0x0}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x3a, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4fa004f8, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x776b54aa}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x97}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6d3c}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x740}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x730c2b54705a0924}}}, &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, r0, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x10, 0x3ff, 0x2}, 0x10, 0x1b20e, r1, 0x4, &(0x7f0000000580), &(0x7f00000005c0)=[{0x2, 0x4, 0xa, 0xa}, {0x2, 0x4, 0x10, 0x5}, {0x4, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x8, 0x2}], 0x10, 0x1, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r8}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.318986394s ago: executing program 1 (id=6601): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x48) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge_slave_1\x00'}) 2.269129635s ago: executing program 4 (id=6453): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000600), 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x11, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x48f}}, @tail_call, @generic={0x5, 0x5, 0x4, 0x0, 0x50c}]}, &(0x7f0000000080)='GPL\x00', 0xad, 0x45, &(0x7f0000000280)=""/69, 0x41100, 0x3, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x5, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x4, 0x1, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xc}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r1, 0x0, 0x7ff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 112.893528ms ago: executing program 0 (id=6602): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/33, 0x12f, 0x21, 0x0, 0x9, 0x0, @void, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000000), 0x75}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000ecff0000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0189436, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x40}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair(0x6, 0x1, 0x9, &(0x7f00000002c0)) 112.513908ms ago: executing program 1 (id=6603): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001dc0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00'}, 0x10) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 107.404948ms ago: executing program 2 (id=6604): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r0, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) write$cgroup_devices(r6, 0x0, 0x9) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r9, 0x0, 0x20000000}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r3, 0x58, &(0x7f0000000340)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001880)='syz1\x00', 0x1ff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000280)="f8db6d0343c526dd3b5543a6dd39e8a25daa11768bf97222ebe2e4939fe16ae8f0948ad447c626b6a3b7510a08c37d123a46344b3586b9fad5a50f3c0718aeba64916668f6ce25b5439e0027aedcbe9cc9d2abbc52835c1fa2a7f5169e1aa0d94d649bf9e4cdb2fdf3d3b09031d5882ce5a451a4add465fd3b3b2aa83d8d6ae05fa191152e7b751a1132b01912cf320e0b12ed5f70", 0xfffffffffffffffc}, 0x20) 106.715468ms ago: executing program 3 (id=6605): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYRES8=r1, @ANYRES8=r5, @ANYRES16=r7, @ANYBLOB="e41921f4ec0144be94b432a78bd408b5ff8cf2e722dbd3386954fa46610cf7e7fd5e5d453559cf5ff28474146d8d0b97a598c2da65e161534eba0fa74f9766e8e4f76187cef9cd251064695e9143191dca39261dedd26d6d548a747d577269c3572c6b70f7568160684aac1b3342225b00647b1b841d34047e8318f4c138a4010e5a25a30be05f327c13f6333b0f3d06b6cb18f787795687c33ee307dcf4ef47808c6c04579059ac53776710f80dcf45672a9748c0e2699df0810ba3f63055", @ANYRES8=r2, @ANYRES32=r4, @ANYBLOB="6bf83179a256fea6be2888707c827ee474040c9f6c1961b3851600cef35b46ccf36fd5fbcadcd374210ba5e92f9027f8d2", @ANYRESOCT=r3, @ANYRESDEC, @ANYRES8=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRESHEX=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r11, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r5, @ANYRES16, @ANYRESHEX=r3, @ANYRESOCT=r6, @ANYBLOB="69b3b81011c51cea9c4b35e525b7a6ad067b6e6a6b7d8b67e2fe75e9529618e1780dbb1f8d920772eac31bbed9e43208a18cf159df3748ac0a4f6625d9a9e13fabca9b4ca285"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r12}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 48.500599ms ago: executing program 3 (id=6606): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0800000004000000ff0f00000500000040000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000c85fc7ccd0a8063d435345303d050000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000fcffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) socketpair(0x1a, 0x3, 0x5, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) close(r1) 0s ago: executing program 4 (id=6453): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000600), 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x11, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x48f}}, @tail_call, @generic={0x5, 0x5, 0x4, 0x0, 0x50c}]}, &(0x7f0000000080)='GPL\x00', 0xad, 0x45, &(0x7f0000000280)=""/69, 0x41100, 0x3, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x5, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x4, 0x1, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xc}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r1, 0x0, 0x7ff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): iscuous mode [ 151.670035][ T4988] device veth0_vlan entered promiscuous mode [ 151.742719][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.762310][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.801055][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.820043][ T4996] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 151.827832][ T4996] syzkaller0: persist disabled [ 152.044893][ T5008] €Â0: renamed from pim6reg1 [ 152.584717][ T5022] device veth0_vlan left promiscuous mode [ 152.619179][ T5022] device veth0_vlan entered promiscuous mode [ 152.734850][ T5022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.746161][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.755186][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.762479][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.471598][ T5040] device syzkaller0 entered promiscuous mode [ 154.026242][ T5050] device syzkaller0 entered promiscuous mode [ 154.475285][ T5064] €Â0: renamed from pim6reg1 [ 156.270033][ T5106] device veth0_vlan left promiscuous mode [ 156.281504][ T5106] device veth0_vlan entered promiscuous mode [ 156.334892][ T5108] €Â0: renamed from pim6reg1 [ 156.345296][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.371947][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.419084][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 156.458003][ T5107] device pim6reg1 entered promiscuous mode [ 157.281447][ T5131] device pim6reg1 entered promiscuous mode [ 157.794649][ T5143] device sit0 entered promiscuous mode [ 157.958444][ T5141] €Â0: renamed from pim6reg1 [ 158.413339][ T5154] €Â0: renamed from pim6reg1 [ 159.303436][ T5162] device pim6reg1 entered promiscuous mode [ 159.351760][ T24] audit: type=1400 audit(1750302348.510:150): avc: denied { create } for pid=5159 comm="syz.3.1598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.417971][ T5175] device wg2 left promiscuous mode [ 159.424032][ T5176] device wg2 entered promiscuous mode [ 159.499031][ T5178] device wg2 left promiscuous mode [ 159.505627][ T5178] device wg2 entered promiscuous mode [ 160.072854][ T5196] €Â0: renamed from pim6reg1 [ 160.424592][ T5206] device syzkaller0 entered promiscuous mode [ 160.565115][ T5210] €Â0: renamed from pim6reg1 [ 161.468321][ T24] audit: type=1400 audit(1750302350.630:151): avc: denied { create } for pid=5248 comm="syz.0.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 161.580832][ T5250] device syzkaller0 entered promiscuous mode [ 161.604446][ T5252] device wg2 left promiscuous mode [ 161.615221][ T5254] device wg2 entered promiscuous mode [ 162.946344][ T5294] €Â0: renamed from pim6reg1 [ 163.792772][ T5326] device pim6reg1 entered promiscuous mode [ 163.799745][ T5327] device wg2 left promiscuous mode [ 164.162500][ T5337] €Â0: renamed from pim6reg1 [ 164.399368][ T5355] device pim6reg1 entered promiscuous mode [ 164.734655][ T5373] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.744193][ T5373] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.941095][ T5379] device bridge_slave_1 left promiscuous mode [ 164.956344][ T5379] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.986542][ T5379] device bridge_slave_0 left promiscuous mode [ 165.021342][ T5379] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.103786][ T5384] device veth0_vlan left promiscuous mode [ 165.130522][ T5384] device veth0_vlan entered promiscuous mode [ 165.212462][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.229395][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.265104][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.869129][ T5429] device veth0_vlan left promiscuous mode [ 165.882397][ T5429] device veth0_vlan entered promiscuous mode [ 165.940461][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.949418][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.958193][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.538987][ T5492] device syzkaller0 entered promiscuous mode [ 167.841590][ T24] audit: type=1400 audit(1750302357.000:152): avc: denied { create } for pid=5528 comm="syz.2.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 168.830388][ T24] audit: type=1400 audit(1750302357.990:153): avc: denied { ioctl } for pid=5596 comm="syz.3.1741" path="mnt:[4026532367]" dev="nsfs" ino=4026532367 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 169.055712][ T24] audit: type=1400 audit(1750302358.210:154): avc: denied { create } for pid=5607 comm="syz.3.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 169.387959][ T5619] device wg2 entered promiscuous mode [ 170.471984][ T5670] device wg2 left promiscuous mode [ 170.498480][ T5670] device wg2 entered promiscuous mode [ 170.594412][ T5677] device sit0 entered promiscuous mode [ 170.812363][ T5686] €Â0: renamed from pim6reg1 [ 170.972170][ T5704] device wg2 left promiscuous mode [ 170.997182][ T5704] device wg2 entered promiscuous mode [ 171.306780][ T5715] device wg2 left promiscuous mode [ 171.346242][ T5715] device wg2 entered promiscuous mode [ 171.719679][ T5733] €Â0: renamed from pim6reg1 [ 172.636060][ T5774] device pim6reg1 entered promiscuous mode [ 173.569947][ T5811] €Â0: renamed from pim6reg1 [ 174.129294][ T5859] device pim6reg1 entered promiscuous mode [ 175.382854][ T5900] device pim6reg1 entered promiscuous mode [ 175.786710][ T5913] device syzkaller0 entered promiscuous mode [ 178.196948][ T6024] device sit0 entered promiscuous mode [ 178.702613][ T6053] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 178.894393][ T6055] device syzkaller0 entered promiscuous mode [ 180.004377][ T6100] device sit0 left promiscuous mode [ 180.042257][ T6101] device sit0 entered promiscuous mode [ 181.747990][ T24] audit: type=1400 audit(1750302370.910:155): avc: denied { create } for pid=6142 comm="syz.4.1913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 181.890287][ T24] audit: type=1400 audit(1750302370.940:156): avc: denied { read } for pid=6142 comm="syz.4.1913" dev="nsfs" ino=4026532454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 181.942618][ T24] audit: type=1400 audit(1750302370.940:157): avc: denied { open } for pid=6142 comm="syz.4.1913" path="cgroup:[4026532454]" dev="nsfs" ino=4026532454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 182.378007][ T6172] device syzkaller0 entered promiscuous mode [ 182.422620][ T6178] ÿÿÿÿÿÿ: renamed from vlan1 [ 184.212719][ T6215] device sit0 left promiscuous mode [ 184.724008][ T6243] device syzkaller0 entered promiscuous mode [ 184.758113][ T6243] device pim6reg1 entered promiscuous mode [ 185.194332][ T6261] €Â0: renamed from pim6reg1 [ 185.666574][ T6271] device veth0_vlan left promiscuous mode [ 185.725457][ T6271] device veth0_vlan entered promiscuous mode [ 186.012837][ T6294] syz.4.1959[6294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.012896][ T6294] syz.4.1959[6294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.296237][ T24] audit: type=1400 audit(1750302375.460:158): avc: denied { create } for pid=6293 comm="syz.4.1959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 187.977927][ T6374] device pim6reg1 entered promiscuous mode [ 188.209828][ T6391] device veth0_vlan left promiscuous mode [ 188.246924][ T6391] device veth0_vlan entered promiscuous mode [ 188.326046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.353434][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.381369][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 188.469840][ T6410] device wg2 entered promiscuous mode [ 188.823868][ T6427] €Â0: renamed from pim6reg1 [ 189.239253][ T6439] €Â0: renamed from pim6reg1 [ 189.428406][ T6451] device wg2 entered promiscuous mode [ 190.564301][ T6493] €Â0: renamed from pim6reg1 [ 190.707540][ T6499] €Â0: renamed from pim6reg1 [ 190.777766][ T6500] device wg2 left promiscuous mode [ 190.790972][ T6502] device wg2 entered promiscuous mode [ 192.097988][ T6544] €Â0: renamed from pim6reg1 [ 192.399996][ T6562] device pim6reg1 entered promiscuous mode [ 193.191870][ T6589] €Â0: renamed from pim6reg1 [ 193.782713][ T6632] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 193.858927][ T6636] device wg2 left promiscuous mode [ 193.929004][ T6633] device wg2 left promiscuous mode [ 194.039264][ T6636] device wg2 entered promiscuous mode [ 196.181025][ T6736] €Â0: renamed from pim6reg1 [ 196.621969][ T6752] device sit0 left promiscuous mode [ 198.049880][ T6806] €Â0: renamed from pim6reg1 [ 198.701713][ T6826] device wg2 left promiscuous mode [ 199.311445][ T6847] FAULT_INJECTION: forcing a failure. [ 199.311445][ T6847] name failslab, interval 1, probability 0, space 0, times 0 [ 199.342711][ T6847] CPU: 0 PID: 6847 Comm: syz.4.2134 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 199.354395][ T6847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 199.364453][ T6847] Call Trace: [ 199.367855][ T6847] __dump_stack+0x21/0x24 [ 199.372176][ T6847] dump_stack_lvl+0x169/0x1d8 [ 199.376844][ T6847] ? thaw_kernel_threads+0x220/0x220 [ 199.382532][ T6847] ? show_regs_print_info+0x18/0x18 [ 199.387827][ T6847] dump_stack+0x15/0x1c [ 199.391980][ T6847] should_fail+0x3c1/0x510 [ 199.396396][ T6847] ? bpf_map_area_alloc+0x49/0xe0 [ 199.401414][ T6847] __should_failslab+0xa4/0xe0 [ 199.406257][ T6847] should_failslab+0x9/0x20 [ 199.410836][ T6847] __kmalloc+0x60/0x330 [ 199.414991][ T6847] ? __kasan_check_write+0x14/0x20 [ 199.420090][ T6847] bpf_map_area_alloc+0x49/0xe0 [ 199.424931][ T6847] cpu_map_alloc+0x285/0x3c0 [ 199.429511][ T6847] map_create+0x441/0x2190 [ 199.434021][ T6847] __se_sys_bpf+0x203/0x680 [ 199.438512][ T6847] ? __x64_sys_bpf+0x90/0x90 [ 199.443106][ T6847] ? fpu__clear_all+0x20/0x20 [ 199.447790][ T6847] __x64_sys_bpf+0x7b/0x90 [ 199.452455][ T6847] do_syscall_64+0x31/0x40 [ 199.456893][ T6847] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 199.462784][ T6847] RIP: 0033:0x7f1e692d9929 [ 199.467192][ T6847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.486885][ T6847] RSP: 002b:00007f1e67942038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.495304][ T6847] RAX: ffffffffffffffda RBX: 00007f1e69500fa0 RCX: 00007f1e692d9929 [ 199.503275][ T6847] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 199.511237][ T6847] RBP: 00007f1e67942090 R08: 0000000000000000 R09: 0000000000000000 [ 199.519199][ T6847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.527162][ T6847] R13: 0000000000000000 R14: 00007f1e69500fa0 R15: 00007ffc2fd43818 [ 199.849449][ T6865] €Â0: renamed from pim6reg1 [ 200.174794][ T6879] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.275894][ T6881] device bridge_slave_1 left promiscuous mode [ 200.355819][ T6881] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.392959][ T6881] device bridge_slave_0 left promiscuous mode [ 200.452730][ T6881] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.228806][ T6903] €Â0: renamed from pim6reg1 [ 201.278889][ T6905] ªªªªªª: renamed from vlan0 [ 201.636666][ T6917] device wg2 entered promiscuous mode [ 202.418308][ T6949] €Â0: renamed from pim6reg1 [ 203.144070][ T6978] device wg2 left promiscuous mode [ 203.183134][ T6978] device wg2 entered promiscuous mode [ 204.037029][ T6994] device veth0_vlan left promiscuous mode [ 204.048834][ T6994] device veth0_vlan entered promiscuous mode [ 204.162905][ T7002] €Â0: renamed from pim6reg1 [ 204.271721][ T6999] €Â0: renamed from pim6reg1 [ 205.694032][ T7049] €Â0: renamed from pim6reg1 [ 205.921227][ T7066] €Â0: renamed from pim6reg1 [ 207.297407][ T7108] device pim6reg1 entered promiscuous mode [ 207.735508][ T24] audit: type=1400 audit(1750302396.900:159): avc: denied { create } for pid=7128 comm="syz.4.2227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 207.854441][ T7132] device sit0 left promiscuous mode [ 207.932061][ T7130] device sit0 entered promiscuous mode [ 208.051735][ T7139] device wg2 entered promiscuous mode [ 208.194120][ T7144] device wg2 left promiscuous mode [ 208.242739][ T7145] device wg2 entered promiscuous mode [ 210.804997][ T24] audit: type=1400 audit(1750302399.970:160): avc: denied { read } for pid=7316 comm="syz.0.2287" name="cgroup.subtree_control" dev="cgroup2" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 210.888121][ T7325] device wg2 left promiscuous mode [ 210.946310][ T7325] device wg2 entered promiscuous mode [ 211.818578][ T7371] device sit0 left promiscuous mode [ 212.663912][ T7412] device lo entered promiscuous mode [ 212.752666][ T7426] device wg2 left promiscuous mode [ 212.760875][ T7426] device wg2 entered promiscuous mode [ 213.187791][ T7447] device macsec0 left promiscuous mode [ 213.573171][ T7459] device sit0 entered promiscuous mode [ 214.065828][ T7469] device macsec0 entered promiscuous mode [ 214.443375][ T7480] device wg2 left promiscuous mode [ 214.480779][ T7480] device wg2 entered promiscuous mode [ 215.464011][ T7521] device wg2 left promiscuous mode [ 215.503122][ T7521] device wg2 entered promiscuous mode [ 216.358642][ T7555] device wg2 left promiscuous mode [ 216.417286][ T7555] device wg2 entered promiscuous mode [ 217.156294][ T7591] €Â0: renamed from pim6reg1 [ 217.361734][ T7625] syz.3.2386[7625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.362766][ T7625] syz.3.2386[7625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.687861][ T7656] €Â0: renamed from pim6reg1 [ 218.384327][ T7704] €Â0: renamed from pim6reg1 [ 218.654528][ T7712] FAULT_INJECTION: forcing a failure. [ 218.654528][ T7712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 218.712813][ T7712] CPU: 1 PID: 7712 Comm: syz.1.2417 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 218.724248][ T7712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 218.734315][ T7712] Call Trace: [ 218.737613][ T7712] __dump_stack+0x21/0x24 [ 218.742042][ T7712] dump_stack_lvl+0x169/0x1d8 [ 218.746731][ T7712] ? show_regs_print_info+0x18/0x18 [ 218.752203][ T7712] ? stack_trace_save+0x98/0xe0 [ 218.757076][ T7712] dump_stack+0x15/0x1c [ 218.761327][ T7712] should_fail+0x3c1/0x510 [ 218.765750][ T7712] should_fail_usercopy+0x1a/0x20 [ 218.770776][ T7712] _copy_from_user+0x20/0xd0 [ 218.775371][ T7712] __copy_msghdr_from_user+0xaf/0x5e0 [ 218.781010][ T7712] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 218.786302][ T7712] ? __fsnotify_parent+0x5f5/0x6c0 [ 218.791414][ T7712] ___sys_sendmsg+0x156/0x260 [ 218.796100][ T7712] ? __sys_sendmsg+0x250/0x250 [ 218.800868][ T7712] ? rw_verify_area+0x1c0/0x360 [ 218.805738][ T7712] ? __fdget+0x1a1/0x230 [ 218.809991][ T7712] __x64_sys_sendmsg+0x1e2/0x2a0 [ 218.814930][ T7712] ? fput+0x1a/0x20 [ 218.818730][ T7712] ? ___sys_sendmsg+0x260/0x260 [ 218.823575][ T7712] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 218.829641][ T7712] do_syscall_64+0x31/0x40 [ 218.834048][ T7712] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 218.839951][ T7712] RIP: 0033:0x7fe9456e8929 [ 218.844361][ T7712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.863958][ T7712] RSP: 002b:00007fe943d51038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.872363][ T7712] RAX: ffffffffffffffda RBX: 00007fe94590ffa0 RCX: 00007fe9456e8929 [ 218.880327][ T7712] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000008 [ 218.888289][ T7712] RBP: 00007fe943d51090 R08: 0000000000000000 R09: 0000000000000000 [ 218.896256][ T7712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.904276][ T7712] R13: 0000000000000000 R14: 00007fe94590ffa0 R15: 00007fff9cdf1378 [ 218.973595][ T7718] device veth0_vlan left promiscuous mode [ 218.991993][ T7718] device veth0_vlan entered promiscuous mode [ 219.142076][ T7734] €Â0: renamed from pim6reg1 [ 219.528871][ T7754] FAULT_INJECTION: forcing a failure. [ 219.528871][ T7754] name failslab, interval 1, probability 0, space 0, times 0 [ 219.628224][ T7758] tun0: tun_chr_ioctl cmd 1074025681 [ 219.638540][ T7754] CPU: 1 PID: 7754 Comm: syz.3.2432 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 219.649866][ T7754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 219.659946][ T7754] Call Trace: [ 219.663883][ T7754] __dump_stack+0x21/0x24 [ 219.668210][ T7754] dump_stack_lvl+0x169/0x1d8 [ 219.672887][ T7754] ? thaw_kernel_threads+0x220/0x220 [ 219.678187][ T7754] ? stack_trace_save+0x98/0xe0 [ 219.683046][ T7754] ? show_regs_print_info+0x18/0x18 [ 219.688320][ T7754] ? __kasan_slab_alloc+0xcf/0xf0 [ 219.693354][ T7754] ? __kasan_slab_alloc+0xbd/0xf0 [ 219.698465][ T7754] ? slab_post_alloc_hook+0x5d/0x2f0 [ 219.703749][ T7754] dump_stack+0x15/0x1c [ 219.707900][ T7754] should_fail+0x3c1/0x510 [ 219.712321][ T7754] ? __alloc_skb+0x9e/0x520 [ 219.716842][ T7754] __should_failslab+0xa4/0xe0 [ 219.721590][ T7754] should_failslab+0x9/0x20 [ 219.726079][ T7754] kmem_cache_alloc+0x3d/0x2e0 [ 219.730831][ T7754] __alloc_skb+0x9e/0x520 [ 219.735145][ T7754] alloc_skb_with_frags+0xa2/0x560 [ 219.740243][ T7754] ? avc_has_perm+0x234/0x360 [ 219.744911][ T7754] sock_alloc_send_pskb+0x853/0x980 [ 219.750098][ T7754] ? sock_kzfree_s+0x60/0x60 [ 219.754673][ T7754] ? __kasan_check_write+0x14/0x20 [ 219.759785][ T7754] ? _raw_spin_lock+0x8e/0xe0 [ 219.764575][ T7754] ? _raw_spin_trylock_bh+0x130/0x130 [ 219.769957][ T7754] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 219.776447][ T7754] unix_dgram_sendmsg+0x5f4/0x17d0 [ 219.781565][ T7754] ? selinux_socket_sendmsg+0x208/0x2e0 [ 219.787094][ T7754] ? selinux_socket_accept+0x500/0x500 [ 219.792540][ T7754] ? unix_dgram_poll+0x620/0x620 [ 219.797461][ T7754] ? kasan_set_track+0x5b/0x70 [ 219.802210][ T7754] unix_seqpacket_sendmsg+0x118/0x1e0 [ 219.807571][ T7754] ? unix_dgram_peer_wake_me+0x410/0x410 [ 219.813201][ T7754] ____sys_sendmsg+0x5a2/0x8c0 [ 219.817956][ T7754] ? __sys_sendmsg_sock+0x40/0x40 [ 219.822966][ T7754] ? import_iovec+0x7c/0xb0 [ 219.827453][ T7754] ___sys_sendmsg+0x1f0/0x260 [ 219.832115][ T7754] ? __sys_sendmsg+0x250/0x250 [ 219.836866][ T7754] ? rw_verify_area+0x1c0/0x360 [ 219.841706][ T7754] ? __fdget+0x1a1/0x230 [ 219.846105][ T7754] __x64_sys_sendmsg+0x1e2/0x2a0 [ 219.851113][ T7754] ? fput+0x1a/0x20 [ 219.854904][ T7754] ? ___sys_sendmsg+0x260/0x260 [ 219.859749][ T7754] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 219.865887][ T7754] do_syscall_64+0x31/0x40 [ 219.870454][ T7754] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 219.876340][ T7754] RIP: 0033:0x7f4bdd3e2929 [ 219.880742][ T7754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.900529][ T7754] RSP: 002b:00007f4bdba4b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.908936][ T7754] RAX: ffffffffffffffda RBX: 00007f4bdd609fa0 RCX: 00007f4bdd3e2929 [ 219.916892][ T7754] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000008 [ 219.925150][ T7754] RBP: 00007f4bdba4b090 R08: 0000000000000000 R09: 0000000000000000 [ 219.933382][ T7754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.941355][ T7754] R13: 0000000000000000 R14: 00007f4bdd609fa0 R15: 00007ffcacec5248 [ 220.172104][ T7772] €Â0: renamed from pim6reg1 [ 220.980843][ T7805] device veth0_vlan left promiscuous mode [ 220.991972][ T7805] device veth0_vlan entered promiscuous mode [ 221.051576][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.080028][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 221.135988][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 221.502793][ T7829] €Â0: renamed from pim6reg1 [ 221.745288][ T7838] device veth1_macvtap left promiscuous mode [ 221.794724][ T7838] device veth1_macvtap entered promiscuous mode [ 221.807719][ T7838] device macsec0 entered promiscuous mode [ 221.952151][ T7848] device wg2 left promiscuous mode [ 221.969741][ T7848] device wg2 entered promiscuous mode [ 222.020613][ T7851] device veth0_vlan left promiscuous mode [ 222.033136][ T7851] device veth0_vlan entered promiscuous mode [ 222.066129][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.082314][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 222.090987][ T7857] FAULT_INJECTION: forcing a failure. [ 222.090987][ T7857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.128935][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.233546][ T7857] CPU: 0 PID: 7857 Comm: syz.3.2464 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 222.244869][ T7857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 222.255008][ T7857] Call Trace: [ 222.258336][ T7857] __dump_stack+0x21/0x24 [ 222.262676][ T7857] dump_stack_lvl+0x169/0x1d8 [ 222.267355][ T7857] ? thaw_kernel_threads+0x220/0x220 [ 222.272641][ T7857] ? vsnprintf+0x1871/0x1960 [ 222.277238][ T7857] ? show_regs_print_info+0x18/0x18 [ 222.282449][ T7857] dump_stack+0x15/0x1c [ 222.286610][ T7857] should_fail+0x3c1/0x510 [ 222.291066][ T7857] should_fail_usercopy+0x1a/0x20 [ 222.296092][ T7857] _copy_to_user+0x20/0x90 [ 222.300520][ T7857] simple_read_from_buffer+0xe9/0x160 [ 222.305901][ T7857] proc_fail_nth_read+0x19a/0x210 [ 222.310928][ T7857] ? proc_fault_inject_write+0x2f0/0x2f0 [ 222.316565][ T7857] ? rw_verify_area+0x1c0/0x360 [ 222.321427][ T7857] ? proc_fault_inject_write+0x2f0/0x2f0 [ 222.327060][ T7857] vfs_read+0x1fe/0xa10 [ 222.331219][ T7857] ? kernel_read+0x70/0x70 [ 222.335636][ T7857] ? __kasan_check_write+0x14/0x20 [ 222.340743][ T7857] ? mutex_lock+0x8c/0xe0 [ 222.345070][ T7857] ? mutex_trylock+0xa0/0xa0 [ 222.349660][ T7857] ? __fget_files+0x2c4/0x320 [ 222.354337][ T7857] ? __fdget_pos+0x2d2/0x380 [ 222.358922][ T7857] ? ksys_read+0x71/0x240 [ 222.363266][ T7857] ksys_read+0x140/0x240 [ 222.367530][ T7857] ? vfs_write+0xd60/0xd60 [ 222.371964][ T7857] __x64_sys_read+0x7b/0x90 [ 222.376473][ T7857] do_syscall_64+0x31/0x40 [ 222.380895][ T7857] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.386814][ T7857] RIP: 0033:0x7f4bdd3e133c [ 222.391234][ T7857] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 222.410933][ T7857] RSP: 002b:00007f4bdba4b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 222.419363][ T7857] RAX: ffffffffffffffda RBX: 00007f4bdd609fa0 RCX: 00007f4bdd3e133c [ 222.427781][ T7857] RDX: 000000000000000f RSI: 00007f4bdba4b0a0 RDI: 000000000000000a [ 222.435855][ T7857] RBP: 00007f4bdba4b090 R08: 0000000000000000 R09: 0000000000000000 [ 222.443930][ T7857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.451913][ T7857] R13: 0000000000000000 R14: 00007f4bdd609fa0 R15: 00007ffcacec5248 [ 222.552953][ T7869] €Â0: renamed from pim6reg1 [ 222.924372][ T7879] device pim6reg1 entered promiscuous mode [ 223.376100][ T7911] device wg2 left promiscuous mode [ 223.416742][ T7911] device wg2 entered promiscuous mode [ 223.424961][ T7913] €Â0: renamed from pim6reg1 [ 223.596367][ T7920] device sit0 entered promiscuous mode [ 223.957112][ T7949] device veth0_vlan left promiscuous mode [ 223.967967][ T7949] device veth0_vlan entered promiscuous mode [ 223.990947][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.007564][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 224.058006][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.300108][ T7957] €Â0: renamed from pim6reg1 [ 224.537990][ T7961] device wg2 left promiscuous mode [ 224.577342][ T7962] device wg2 entered promiscuous mode [ 225.062486][ T7975] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 225.366130][ T7987] tun0: tun_chr_ioctl cmd 1074025678 [ 225.381410][ T7987] tun0: group set to 1 [ 225.770927][ T8004] device wg2 left promiscuous mode [ 225.825994][ T8005] device wg2 entered promiscuous mode [ 226.332315][ T8029] device veth0_vlan left promiscuous mode [ 226.345721][ T8029] device veth0_vlan entered promiscuous mode [ 226.362645][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.378289][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.393063][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.400560][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.886357][ T8050] device wg2 left promiscuous mode [ 226.939637][ T8051] device wg2 entered promiscuous mode [ 227.743277][ T8068] device sit0 left promiscuous mode [ 228.257562][ T8098] €Â0: renamed from pim6reg1 [ 229.574324][ T8136] €Â0: renamed from pim6reg1 [ 230.029988][ T8143] device syzkaller0 entered promiscuous mode [ 230.086380][ T8180] €Â0: renamed from pim6reg1 [ 230.190506][ T8185] device sit0 left promiscuous mode [ 230.208942][ T8183] €Â0: renamed from pim6reg1 [ 230.239762][ T8185] device sit0 entered promiscuous mode [ 230.278332][ T8190] device wg2 left promiscuous mode [ 230.307745][ T8192] device syzkaller0 entered promiscuous mode [ 230.628977][ T8198] device syzkaller0 entered promiscuous mode [ 231.064501][ T24] audit: type=1400 audit(1750302420.220:161): avc: denied { ioctl } for pid=8219 comm="syz.4.2578" path="mnt:[4026532453]" dev="nsfs" ino=4026532453 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 231.124365][ T8243] device bridge_slave_0 entered promiscuous mode [ 231.430555][ T8239] device veth1_macvtap left promiscuous mode [ 231.527735][ T8263] device pim6reg1 entered promiscuous mode [ 232.553796][ T8296] €Â0: renamed from pim6reg1 [ 233.931730][ T8344] €Â0: renamed from pim6reg1 [ 235.661242][ T8385] device syzkaller0 entered promiscuous mode [ 235.704180][ T8396] €Â0: renamed from pim6reg1 [ 237.717773][ T8440] €Â0: renamed from pim6reg1 [ 237.907044][ T8446] €Â0: renamed from pim6reg1 [ 238.317386][ T8460] device veth0_vlan left promiscuous mode [ 238.345273][ T8460] device veth0_vlan entered promiscuous mode [ 238.451455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.481718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 238.572434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 239.443627][ T8496] device sit0 entered promiscuous mode [ 239.653469][ T8509] device wg2 left promiscuous mode [ 239.723278][ T8510] device wg2 entered promiscuous mode [ 240.952497][ T8569] €Â0: renamed from pim6reg1 [ 241.299004][ T24] audit: type=1400 audit(1750302430.460:162): avc: denied { create } for pid=8577 comm="syz.3.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 241.540740][ T8584] syz.3.2683 (8584) used obsolete PPPIOCDETACH ioctl [ 241.896625][ T8606] device pim6reg1 entered promiscuous mode [ 241.925026][ T8603] €Â0: renamed from pim6reg1 [ 242.114789][ T8611] device pim6reg1 entered promiscuous mode [ 242.250271][ T8618] syz.3.2693[8618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.252410][ T8618] syz.3.2693[8618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.575193][ T8622] device syzkaller0 entered promiscuous mode [ 243.141083][ T8646] device veth0_vlan left promiscuous mode [ 243.151861][ T8646] device veth0_vlan entered promiscuous mode [ 243.186926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.198811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 243.247273][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 244.172724][ T24] audit: type=1400 audit(1750302433.330:163): avc: denied { create } for pid=8702 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 247.744379][ T8852] €Â0: renamed from pim6reg1 [ 247.831906][ T8861] device veth0_vlan left promiscuous mode [ 247.890430][ T8861] device veth0_vlan entered promiscuous mode [ 247.995549][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.019589][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.073580][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 248.775160][ T8877] device syzkaller0 entered promiscuous mode [ 249.257767][ T8906] device wg2 left promiscuous mode [ 249.292728][ T8906] device wg2 entered promiscuous mode [ 250.741932][ T8938] ÿÿÿÿÿÿ: renamed from vlan1 [ 252.539167][ T9019] €Â1: renamed from pim6reg1 [ 254.078118][ T9060] €Â0: renamed from pim6reg1 [ 254.342426][ T9071] device syzkaller0 entered promiscuous mode [ 255.640462][ T9129] device sit0 entered promiscuous mode [ 255.946551][ T9135] device wg2 entered promiscuous mode [ 256.711972][ T9169] device syzkaller0 entered promiscuous mode [ 256.802180][ T9160] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.891830][ T9160] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.933408][ T9160] device bridge_slave_0 entered promiscuous mode [ 257.113147][ T9160] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.124788][ T9160] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.165250][ T9160] device bridge_slave_1 entered promiscuous mode [ 257.386229][ T24] audit: type=1400 audit(1750302446.550:164): avc: denied { write } for pid=9160 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.430458][ T9160] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.437653][ T9160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.444940][ T9160] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.452046][ T9160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.459693][ T24] audit: type=1400 audit(1750302446.590:165): avc: denied { read } for pid=9160 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.483715][ T1016] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.490866][ T1016] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.501097][ T9203] device wg2 left promiscuous mode [ 257.530599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.538676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.548358][ T9203] device wg2 entered promiscuous mode [ 257.574904][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.593667][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.616223][ T1016] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.623332][ T1016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.676779][ T9] GPL: port 1(erspan0) entered disabled state [ 257.683862][ T9] device erspan0 left promiscuous mode [ 257.689532][ T9] GPL: port 1(erspan0) entered disabled state [ 257.699941][ T9212] device sit0 left promiscuous mode [ 257.829574][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.838120][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.846866][ T1016] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.853946][ T1016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.862075][ T9215] device sit0 entered promiscuous mode [ 257.879387][ T9217] device veth0_vlan left promiscuous mode [ 257.890524][ T9217] device veth0_vlan entered promiscuous mode [ 257.938873][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.947467][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.954819][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.018664][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.057279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.103881][ T9225] GPL: port 1(erspan0) entered blocking state [ 258.110302][ T9225] GPL: port 1(erspan0) entered disabled state [ 258.121083][ T9225] device erspan0 entered promiscuous mode [ 258.160256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.169898][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.179159][ T9224] GPL: port 1(erspan0) entered blocking state [ 258.185595][ T9224] GPL: port 1(erspan0) entered forwarding state [ 258.215704][ T9234] device wg2 left promiscuous mode [ 258.224724][ T9235] device wg2 entered promiscuous mode [ 258.265899][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.313247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.366984][ T9243] device wg2 left promiscuous mode [ 258.384275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.408460][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.442263][ T9243] device wg2 entered promiscuous mode [ 258.482143][ T9160] device veth0_vlan entered promiscuous mode [ 258.489230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.506971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.557251][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 258.577658][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.656373][ T9] device veth0_vlan left promiscuous mode [ 258.874306][ T9160] device veth1_macvtap entered promiscuous mode [ 258.937950][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.949241][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.965966][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.988485][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.040625][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.122961][ T9273] device wg2 left promiscuous mode [ 259.129364][ T9278] device wg2 entered promiscuous mode [ 259.548984][ T9293] device veth0_vlan left promiscuous mode [ 259.560751][ T9293] device veth0_vlan entered promiscuous mode [ 259.587746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.600942][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.648958][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 260.129989][ T9334] device sit0 left promiscuous mode [ 260.174971][ T9337] device sit0 entered promiscuous mode [ 260.922120][ T9402] device sit0 entered promiscuous mode [ 262.370906][ T9446] €Â0: renamed from pim6reg1 [ 262.654210][ T9450] device syzkaller0 entered promiscuous mode [ 263.643982][ T9492] €Â0: renamed from pim6reg1 [ 264.647406][ T9535] €Â0: renamed from pim6reg1 [ 264.682791][ T9537] €Â0: renamed from pim6reg1 [ 265.015547][ T9551] device pim6reg1 entered promiscuous mode [ 265.430025][ T9565] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.475522][ T9565] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.495049][ T9565] device bridge_slave_0 entered promiscuous mode [ 265.523656][ T9565] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.534406][ T9565] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.547519][ T9565] device bridge_slave_1 entered promiscuous mode [ 265.680209][ T9582] syz.3.3005[9582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.680268][ T9582] syz.3.3005[9582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.729358][ T9565] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.747768][ T9565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.755405][ T9565] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.762558][ T9565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.834918][ T9588] €Â1: renamed from pim6reg1 [ 265.907462][ T1016] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.915014][ T1016] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.949561][ T9596] device veth0_vlan left promiscuous mode [ 266.020361][ T9596] device veth0_vlan entered promiscuous mode [ 266.086572][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.117764][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.126560][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.139851][ T1016] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.146966][ T1016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.186256][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.277713][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.330321][ T1016] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.337453][ T1016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.353030][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.369438][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.420423][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.461222][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.564456][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 266.582976][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.608335][ T9565] device veth0_vlan entered promiscuous mode [ 266.675652][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.689063][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.719753][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.746433][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.758004][ T9565] device veth1_macvtap entered promiscuous mode [ 266.804126][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 266.833091][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.873148][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.883136][ T385] device veth0_vlan left promiscuous mode [ 267.005249][ T9638] €Â1: renamed from pim6reg1 [ 267.214556][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.223864][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.232475][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.241629][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.420175][ T9651] €Â0: renamed from pim6reg1 [ 267.587248][ T9659] device wg2 left promiscuous mode [ 267.643912][ T9659] device wg2 entered promiscuous mode [ 267.754202][ T9664] device sit0 entered promiscuous mode [ 267.949393][ T9674] device syzkaller0 entered promiscuous mode [ 268.066450][ T9680] €Â0: renamed from pim6reg1 [ 268.228586][ T9660] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.305230][ T9660] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.326969][ T9660] device bridge_slave_0 entered promiscuous mode [ 268.344723][ T9660] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.362462][ T9660] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.370212][ T9660] device bridge_slave_1 entered promiscuous mode [ 268.459899][ T9690] device syzkaller0 entered promiscuous mode [ 268.619444][ T9694] €Â0: renamed from pim6reg1 [ 268.791392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.818495][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.849416][ T9697] €Â0: renamed from pim6reg1 [ 268.898505][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.913421][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.934011][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.941094][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.972730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.981085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.002819][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.009858][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.020723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.047026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.150856][ T9713] device syzkaller0 entered promiscuous mode [ 269.158628][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.376393][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.442770][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.471092][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.480611][ T9660] device veth0_vlan entered promiscuous mode [ 269.550712][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.578533][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.605897][ T9660] device veth1_macvtap entered promiscuous mode [ 269.733706][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.742287][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.750650][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.761624][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 269.770111][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 269.874177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 269.901992][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 269.957351][ T9744] device wg2 entered promiscuous mode [ 270.450849][ T385] device veth1_macvtap left promiscuous mode [ 270.651727][ T9768] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.665269][ T9768] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.673279][ T9768] device bridge_slave_0 entered promiscuous mode [ 270.689197][ T9768] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.699232][ T9768] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.709898][ T9768] device bridge_slave_1 entered promiscuous mode [ 270.731099][ T9787] device syzkaller0 entered promiscuous mode [ 270.818229][ T9794] device wg2 entered promiscuous mode [ 270.968505][ T9768] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.975834][ T9768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.983139][ T9768] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.990427][ T9768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.243050][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.250771][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.258764][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.287866][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.297069][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.304315][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.352681][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.371119][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.378343][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.395461][ T9802] device pim6reg1 entered promiscuous mode [ 271.441900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.450721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.458947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.477632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.511082][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.524290][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.548985][ T9768] device veth0_vlan entered promiscuous mode [ 271.555523][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.563991][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.613901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.623684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.716717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 271.754240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.765519][ T9768] device veth1_macvtap entered promiscuous mode [ 271.826583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.834697][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.862221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.899163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.939432][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.110717][ T9822] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.118292][ T9822] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.234914][ T385] device veth0_vlan left promiscuous mode [ 272.856826][ T9848] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.889008][ T9848] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.977346][ T9848] device bridge_slave_0 entered promiscuous mode [ 273.020228][ T9848] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.030286][ T9848] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.057591][ T9848] device bridge_slave_1 entered promiscuous mode [ 273.277768][ T9865] €Â0: renamed from pim6reg1 [ 273.513368][ T9848] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.520433][ T9848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.527845][ T9848] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.534894][ T9848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.557911][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.589185][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.789395][ T9892] device syzkaller0 entered promiscuous mode [ 273.927213][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.935205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.962604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.970948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.980310][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.987496][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.003261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.011877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.026195][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.033326][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.077236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.086171][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.095193][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.103777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.130755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.139733][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.153520][ T385] GPL: port 1(erspan0) entered disabled state [ 274.160635][ T385] device erspan0 left promiscuous mode [ 274.166277][ T385] GPL: port 1(erspan0) entered disabled state [ 274.181700][ T9908] device syzkaller0 entered promiscuous mode [ 274.199015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.212277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.222029][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.230906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.727680][ T9848] device veth0_vlan entered promiscuous mode [ 274.760771][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.769155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.800074][ T9848] device veth1_macvtap entered promiscuous mode [ 274.809681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.818685][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.827608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.847815][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.856288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.009716][ T385] device veth0_vlan left promiscuous mode [ 275.299948][ T9930] device pim6reg1 entered promiscuous mode [ 276.923976][ T9999] €Â0: renamed from pim6reg1 [ 276.988920][T10003] device wg2 left promiscuous mode [ 277.039813][T10003] device wg2 entered promiscuous mode [ 278.489310][T10066] device syzkaller0 entered promiscuous mode [ 279.079592][T10083] device sit0 entered promiscuous mode [ 279.563585][T10100] syz.2.3162[10100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.563665][T10100] syz.2.3162[10100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.090559][T10110] device syzkaller0 entered promiscuous mode [ 280.196306][T10118] device veth0_vlan left promiscuous mode [ 280.212083][T10118] device veth0_vlan entered promiscuous mode [ 280.658163][T10138] €Â0: renamed from pim6reg1 [ 281.098346][T10157] device wg2 entered promiscuous mode [ 281.106296][T10147] €Â0: renamed from pim6reg1 [ 281.918455][T10180] €Â0: renamed from pim6reg1 [ 282.947999][T10230] device syzkaller0 entered promiscuous mode [ 283.223155][T10242] €Â0: renamed from pim6reg1 [ 283.230194][T10239] device veth1_macvtap left promiscuous mode [ 283.490442][T10257] device syzkaller0 entered promiscuous mode [ 283.779342][T10277] device syzkaller0 entered promiscuous mode [ 284.421557][T10301] €Â0: renamed from pim6reg1 [ 284.670981][T10307] €Â0: renamed from pim6reg1 [ 284.810336][T10318] €Â0: renamed from pim6reg1 [ 285.232596][T10350] €Â0: renamed from pim6reg1 [ 286.248773][T10393] €Â0: renamed from pim6reg1 [ 287.160606][T10419] €Â0: renamed from pim6reg1 [ 287.369914][T10430] device syzkaller0 entered promiscuous mode [ 287.386061][T10434] €Â0: renamed from pim6reg1 [ 287.786061][T10444] €Â0: renamed from pim6reg1 [ 288.165571][T10475] device sit0 entered promiscuous mode [ 288.350651][T10487] €Â0: renamed from pim6reg1 [ 288.889719][T10499] device syzkaller0 entered promiscuous mode [ 289.416810][T10517] device wg2 entered promiscuous mode [ 290.081268][T10525] device syzkaller0 entered promiscuous mode [ 290.739543][T10535] pim6reg0: tun_chr_ioctl cmd 1074812117 [ 291.105114][T10541] device pim6reg1 entered promiscuous mode [ 291.958365][T10565] device pim6reg1 entered promiscuous mode [ 292.021713][T10571] device sit0 left promiscuous mode [ 292.066290][T10573] device sit0 entered promiscuous mode [ 292.560206][T10582] €Â0: renamed from pim6reg1 [ 292.794321][T10593] device wg2 left promiscuous mode [ 293.252653][T10622] €Â0: renamed from pim6reg1 [ 293.336585][T10638] device wg2 left promiscuous mode [ 293.419580][T10638] device wg2 entered promiscuous mode [ 294.259133][T10669] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 294.332807][T10669] device syzkaller0 entered promiscuous mode [ 294.831059][T10678] €Â0: renamed from pim6reg1 [ 296.833127][T10732] €Â0: renamed from pim6reg1 [ 296.877299][T10730] device syzkaller0 entered promiscuous mode [ 297.438760][T10765] device syzkaller0 entered promiscuous mode [ 298.042343][T10771] device veth0_vlan left promiscuous mode [ 298.063027][T10771] device veth0_vlan entered promiscuous mode [ 298.080497][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.135412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.170636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.240299][T10778] device sit0 left promiscuous mode [ 298.821474][ T24] audit: type=1400 audit(1750302487.980:166): avc: denied { create } for pid=10803 comm="syz.3.3377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 299.102352][T10830] device wg2 left promiscuous mode [ 299.115076][T10830] device wg2 entered promiscuous mode [ 299.154663][T10833] device wg2 entered promiscuous mode [ 299.772849][T10840] device syzkaller0 entered promiscuous mode [ 300.374682][T10856] syz.4.3393[10856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.374771][T10856] syz.4.3393[10856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.904997][T10862] device wg2 left promiscuous mode [ 301.450308][T10876] device syzkaller0 entered promiscuous mode [ 301.814853][T10891] €Â0: renamed from pim6reg1 [ 302.527053][T10936] device syzkaller0 entered promiscuous mode [ 303.646491][T10970] €Â0: renamed from pim6reg1 [ 303.898663][T10972] device syzkaller0 entered promiscuous mode [ 304.308605][T11006] device wg2 left promiscuous mode [ 304.335277][T11006] device wg2 entered promiscuous mode [ 304.423640][T11008] device sit0 entered promiscuous mode [ 304.784265][T11016] €Â0: renamed from pim6reg1 [ 304.874767][T11026] device pim6reg1 entered promiscuous mode [ 305.770179][T11066] €Â0: renamed from pim6reg1 [ 308.085813][T11117] €Â0: renamed from pim6reg1 [ 308.132845][T11115] device veth0_vlan left promiscuous mode [ 308.210394][T11115] device veth0_vlan entered promiscuous mode [ 308.740205][T11124] device veth0_vlan left promiscuous mode [ 308.765238][T11124] device veth0_vlan entered promiscuous mode [ 309.084280][T11155] device wg2 left promiscuous mode [ 309.428025][T11165] €Â0: renamed from pim6reg1 [ 311.085226][T11214] €Â0: renamed from pim6reg1 [ 312.208336][T11241] device wg2 entered promiscuous mode [ 312.490331][T11253] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.497570][T11253] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.532305][T11262] €Â0: renamed from pim6reg1 [ 312.541554][T11260] device sit0 left promiscuous mode [ 312.702793][T11264] device sit0 entered promiscuous mode [ 312.861695][T11253] device bridge_slave_1 left promiscuous mode [ 312.870806][T11253] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.896470][T11253] device bridge_slave_0 left promiscuous mode [ 312.903711][T11253] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.020284][T11273] device veth1_macvtap left promiscuous mode [ 313.028123][T11273] device macsec0 entered promiscuous mode [ 313.082354][T11273] device syzkaller0 entered promiscuous mode [ 313.514707][T11301] device pim6reg1 entered promiscuous mode [ 313.766179][T11318] €Â0: renamed from pim6reg1 [ 313.812376][T11324] device veth1_macvtap left promiscuous mode [ 313.887196][T11324] device veth1_macvtap entered promiscuous mode [ 313.896215][T11324] device macsec0 entered promiscuous mode [ 314.208704][T11345] device pim6reg1 entered promiscuous mode [ 314.430893][T11363] device sit0 left promiscuous mode [ 314.498034][T11365] device sit0 entered promiscuous mode [ 314.745000][T11372] €Â0: renamed from pim6reg1 [ 315.482040][T11416] €Â0: renamed from pim6reg1 [ 316.307759][T11461] €Â0: renamed from pim6reg1 [ 317.133604][ T24] audit: type=1400 audit(1750302506.300:167): avc: denied { create } for pid=11497 comm="syz.0.3596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 317.185485][T11477] device syzkaller0 entered promiscuous mode [ 317.260750][T11491] €Â0: renamed from pim6reg1 [ 317.312699][T11500] €Â0: renamed from pim6reg1 [ 317.482340][T11513] device syzkaller0 entered promiscuous mode [ 318.410423][T11552] €Â0: renamed from pim6reg1 [ 318.485520][T11556] syz.4.3616[11556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.485576][T11556] syz.4.3616[11556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.771900][T11566] device syzkaller0 entered promiscuous mode [ 318.803190][T11575] cgroup: fork rejected by pids controller in /syz4 [ 318.836821][T11577] device veth1_macvtap left promiscuous mode [ 318.878867][T11577] device macsec0 entered promiscuous mode [ 319.781333][T11611] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.816723][T11611] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.844945][T11611] device bridge_slave_0 entered promiscuous mode [ 319.886743][T11611] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.949216][T11611] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.967727][T11622] syz.2.3635[11622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.969629][T11622] syz.2.3635[11622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.982051][T11611] device bridge_slave_1 entered promiscuous mode [ 320.043041][T11619] device sit0 left promiscuous mode [ 320.143886][T11620] device sit0 entered promiscuous mode [ 320.358045][T11631] device wg2 left promiscuous mode [ 320.975586][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.993984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.022882][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.031952][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.041012][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.048238][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.057257][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.065963][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.074996][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.082071][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.102977][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.111588][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.121449][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.142005][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.154491][T11611] device veth0_vlan entered promiscuous mode [ 321.165676][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.179207][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.226313][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.268429][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.340401][T11657] device syzkaller0 entered promiscuous mode [ 321.471024][ T7] device bridge_slave_1 left promiscuous mode [ 321.477378][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.486132][ T7] device bridge_slave_0 left promiscuous mode [ 321.492504][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.598826][T11611] device veth1_macvtap entered promiscuous mode [ 321.653160][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.667104][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.762496][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.790641][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.351804][T11689] €Â0: renamed from pim6reg1 [ 322.446733][T11706] device pim6reg1 entered promiscuous mode [ 322.529361][T11710] €Â0: renamed from pim6reg1 [ 322.593028][T11716] €Â0: renamed from pim6reg1 [ 323.368788][T11753] €Â0: renamed from pim6reg1 [ 323.418429][T11765] device veth0_vlan left promiscuous mode [ 323.435651][T11765] device veth0_vlan entered promiscuous mode [ 324.606895][T11812] €Â0: renamed from pim6reg1 [ 324.636524][T11813] device veth0_vlan left promiscuous mode [ 324.657244][T11813] device veth0_vlan entered promiscuous mode [ 324.754723][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.765334][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.776843][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.787213][T11818] device veth0_vlan left promiscuous mode [ 324.817314][T11818] device veth0_vlan entered promiscuous mode [ 324.869968][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.885556][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.921600][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.084553][T11831] device syzkaller0 entered promiscuous mode [ 326.133166][T11885] Â: renamed from pim6reg1 [ 326.277355][T11890] FAULT_INJECTION: forcing a failure. [ 326.277355][T11890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.361741][T11890] CPU: 1 PID: 11890 Comm: syz.2.3720 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 326.373296][T11890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.383494][T11890] Call Trace: [ 326.386909][T11890] __dump_stack+0x21/0x24 [ 326.391251][T11890] dump_stack_lvl+0x169/0x1d8 [ 326.395968][T11890] ? show_regs_print_info+0x18/0x18 [ 326.401172][T11890] ? do_vfs_ioctl+0x766/0x1510 [ 326.405952][T11890] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 326.411604][T11890] dump_stack+0x15/0x1c [ 326.415880][T11890] should_fail+0x3c1/0x510 [ 326.420320][T11890] should_fail_usercopy+0x1a/0x20 [ 326.425547][T11890] _copy_from_user+0x20/0xd0 [ 326.430318][T11890] __tun_chr_ioctl+0x1ef/0x1cd0 [ 326.435192][T11890] ? mutex_trylock+0xa0/0xa0 [ 326.439983][T11890] ? tun_flow_create+0x320/0x320 [ 326.445033][T11890] ? __fget_files+0x2c4/0x320 [ 326.449774][T11890] tun_chr_ioctl+0x2a/0x40 [ 326.454206][T11890] ? tun_chr_poll+0x6b0/0x6b0 [ 326.458896][T11890] __se_sys_ioctl+0x121/0x1a0 [ 326.463591][T11890] __x64_sys_ioctl+0x7b/0x90 [ 326.468191][T11890] do_syscall_64+0x31/0x40 [ 326.472704][T11890] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 326.478612][T11890] RIP: 0033:0x7f4969f34929 [ 326.483039][T11890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.502796][T11890] RSP: 002b:00007f496859d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.511322][T11890] RAX: ffffffffffffffda RBX: 00007f496a15bfa0 RCX: 00007f4969f34929 [ 326.519476][T11890] RDX: 0000200000000340 RSI: 00000000400454d9 RDI: 0000000000000004 [ 326.527552][T11890] RBP: 00007f496859d090 R08: 0000000000000000 R09: 0000000000000000 [ 326.535781][T11890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.544635][T11890] R13: 0000000000000000 R14: 00007f496a15bfa0 R15: 00007fffd4bab038 [ 326.725707][T11894] €Â0: renamed from pim6reg1 [ 327.042884][T11914] device sit0 left promiscuous mode [ 327.064827][T11915] device sit0 entered promiscuous mode [ 327.281086][T11912] device sit0 entered promiscuous mode [ 327.515388][T11929] FAULT_INJECTION: forcing a failure. [ 327.515388][T11929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.580331][T11929] CPU: 1 PID: 11929 Comm: syz.1.3734 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 327.591859][T11929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 327.602011][T11929] Call Trace: [ 327.605313][T11929] __dump_stack+0x21/0x24 [ 327.609801][T11929] dump_stack_lvl+0x169/0x1d8 [ 327.614509][T11929] ? thaw_kernel_threads+0x220/0x220 [ 327.619816][T11929] ? vsnprintf+0x1871/0x1960 [ 327.624412][T11929] ? show_regs_print_info+0x18/0x18 [ 327.629612][T11929] dump_stack+0x15/0x1c [ 327.633774][T11929] should_fail+0x3c1/0x510 [ 327.638197][T11929] should_fail_usercopy+0x1a/0x20 [ 327.643370][T11929] _copy_to_user+0x20/0x90 [ 327.647805][T11929] simple_read_from_buffer+0xe9/0x160 [ 327.653186][T11929] proc_fail_nth_read+0x19a/0x210 [ 327.658219][T11929] ? proc_fault_inject_write+0x2f0/0x2f0 [ 327.663866][T11929] ? rw_verify_area+0x1c0/0x360 [ 327.668720][T11929] ? proc_fault_inject_write+0x2f0/0x2f0 [ 327.674354][T11929] vfs_read+0x1fe/0xa10 [ 327.678610][T11929] ? kernel_read+0x70/0x70 [ 327.683027][T11929] ? __kasan_check_write+0x14/0x20 [ 327.688169][T11929] ? mutex_lock+0x8c/0xe0 [ 327.692545][T11929] ? mutex_trylock+0xa0/0xa0 [ 327.697148][T11929] ? __fget_files+0x2c4/0x320 [ 327.701827][T11929] ? __fdget_pos+0x2d2/0x380 [ 327.706431][T11929] ? ksys_read+0x71/0x240 [ 327.710785][T11929] ksys_read+0x140/0x240 [ 327.715125][T11929] ? vfs_write+0xd60/0xd60 [ 327.719548][T11929] __x64_sys_read+0x7b/0x90 [ 327.724070][T11929] do_syscall_64+0x31/0x40 [ 327.728586][T11929] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 327.734491][T11929] RIP: 0033:0x7f12a084733c [ 327.738915][T11929] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 327.758630][T11929] RSP: 002b:00007f129eeb1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 327.767230][T11929] RAX: ffffffffffffffda RBX: 00007f12a0a6ffa0 RCX: 00007f12a084733c [ 327.775220][T11929] RDX: 000000000000000f RSI: 00007f129eeb10a0 RDI: 0000000000000009 [ 327.783371][T11929] RBP: 00007f129eeb1090 R08: 0000000000000000 R09: 0000000000000000 [ 327.791347][T11929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.799412][T11929] R13: 0000000000000000 R14: 00007f12a0a6ffa0 R15: 00007ffce791c648 [ 327.848484][T11933] €Â0: renamed from pim6reg1 [ 328.053226][T11951] €Â0: renamed from pim6reg1 [ 328.635708][T12001] device wg2 entered promiscuous mode [ 328.801194][T12005] €Â0: renamed from pim6reg1 [ 328.888743][T12020] device syzkaller0 entered promiscuous mode [ 329.141614][T12040] device pim6reg1 entered promiscuous mode [ 329.586601][T12058] €Â0: renamed from pim6reg1 [ 329.746094][T12067] device syzkaller0 entered promiscuous mode [ 329.982646][T12086] device veth1_to_bond entered promiscuous mode [ 330.055311][T12079] device pim6reg1 entered promiscuous mode [ 330.357110][T12117] €Â0: renamed from pim6reg1 [ 330.661246][T12151] device syzkaller0 entered promiscuous mode [ 331.069974][T12161] device syzkaller0 entered promiscuous mode [ 331.448034][T12167] €Â0: renamed from pim6reg1 [ 331.498125][T12170] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 331.504528][T12170] pim6reg0: linktype set to 780 [ 331.655635][T12179] €Â0: renamed from pim6reg1 [ 332.107350][T12219] €Â0: renamed from pim6reg1 [ 332.502176][T12237] €Â0: renamed from pim6reg1 [ 332.860435][T12257] device syzkaller0 entered promiscuous mode [ 333.090962][T12273] €Â0: renamed from pim6reg1 [ 333.557392][T12285] €Â0: renamed from pim6reg1 [ 334.613726][T12315] €Â0: renamed from pim6reg1 [ 335.095714][T12328] device syzkaller0 entered promiscuous mode [ 335.155950][T12330] device syzkaller0 entered promiscuous mode [ 336.819173][T12363] €Â0: renamed from pim6reg1 [ 337.432037][T12391] syz.1.3875[12391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.432124][T12391] syz.1.3875[12391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.614502][T12395] device pim6reg1 entered promiscuous mode [ 337.694221][T12397] €Â0: renamed from pim6reg1 [ 337.893198][T12403] syz.0.3881[12403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.893258][T12403] syz.0.3881[12403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.519972][T12438] €Â0: renamed from pim6reg1 [ 338.888512][T12447] device veth0_vlan left promiscuous mode [ 338.912337][T12447] device veth0_vlan entered promiscuous mode [ 339.540944][T12475] FAULT_INJECTION: forcing a failure. [ 339.540944][T12475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.575722][T12475] CPU: 0 PID: 12475 Comm: syz.4.3901 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 339.588179][T12475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 339.598329][T12475] Call Trace: [ 339.601624][T12475] __dump_stack+0x21/0x24 [ 339.605965][T12475] dump_stack_lvl+0x169/0x1d8 [ 339.610654][T12475] ? show_regs_print_info+0x18/0x18 [ 339.616724][T12475] ? vfs_write+0xac8/0xd60 [ 339.621673][T12475] dump_stack+0x15/0x1c [ 339.626002][T12475] should_fail+0x3c1/0x510 [ 339.630767][T12475] should_fail_usercopy+0x1a/0x20 [ 339.636423][T12475] _copy_from_user+0x20/0xd0 [ 339.641025][T12475] __se_sys_bpf+0x181/0x680 [ 339.645531][T12475] ? __x64_sys_bpf+0x90/0x90 [ 339.650216][T12475] ? fpu__clear_all+0x20/0x20 [ 339.655107][T12475] __x64_sys_bpf+0x7b/0x90 [ 339.659657][T12475] do_syscall_64+0x31/0x40 [ 339.664123][T12475] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 339.670018][T12475] RIP: 0033:0x7f741f590929 [ 339.674440][T12475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.694135][T12475] RSP: 002b:00007f741dbf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 339.702559][T12475] RAX: ffffffffffffffda RBX: 00007f741f7b7fa0 RCX: 00007f741f590929 [ 339.710535][T12475] RDX: 0000000000000048 RSI: 0000200000000780 RDI: 0000000000000000 [ 339.719030][T12475] RBP: 00007f741dbf9090 R08: 0000000000000000 R09: 0000000000000000 [ 339.727017][T12475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.735016][T12475] R13: 0000000000000000 R14: 00007f741f7b7fa0 R15: 00007ffe44973018 [ 340.250295][T12506] FAULT_INJECTION: forcing a failure. [ 340.250295][T12506] name failslab, interval 1, probability 0, space 0, times 0 [ 340.382689][T12506] CPU: 1 PID: 12506 Comm: syz.1.3912 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 340.394203][T12506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 340.404297][T12506] Call Trace: [ 340.407709][T12506] __dump_stack+0x21/0x24 [ 340.412053][T12506] dump_stack_lvl+0x169/0x1d8 [ 340.416738][T12506] ? show_regs_print_info+0x18/0x18 [ 340.422297][T12506] dump_stack+0x15/0x1c [ 340.426462][T12506] should_fail+0x3c1/0x510 [ 340.430883][T12506] ? bpf_map_offload_map_alloc+0x12f/0x590 [ 340.436875][T12506] __should_failslab+0xa4/0xe0 [ 340.441662][T12506] should_failslab+0x9/0x20 [ 340.446307][T12506] kmem_cache_alloc_trace+0x3a/0x2e0 [ 340.451626][T12506] bpf_map_offload_map_alloc+0x12f/0x590 [ 340.457370][T12506] ? bpf_prog_offload_info_fill_ns+0x2a0/0x2a0 [ 340.463647][T12506] ? kernel_write+0x3c0/0x3c0 [ 340.468345][T12506] ? array_map_alloc_check+0x284/0x390 [ 340.473821][T12506] map_create+0x441/0x2190 [ 340.478244][T12506] __se_sys_bpf+0x203/0x680 [ 340.482788][T12506] ? __x64_sys_bpf+0x90/0x90 [ 340.487509][T12506] ? fpu__clear_all+0x20/0x20 [ 340.493073][T12506] __x64_sys_bpf+0x7b/0x90 [ 340.497504][T12506] do_syscall_64+0x31/0x40 [ 340.501940][T12506] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 340.508113][T12506] RIP: 0033:0x7f12a0848929 [ 340.512537][T12506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.532162][T12506] RSP: 002b:00007f129eeb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 340.540596][T12506] RAX: ffffffffffffffda RBX: 00007f12a0a6ffa0 RCX: 00007f12a0848929 [ 340.548594][T12506] RDX: 0000000000000048 RSI: 0000200000000780 RDI: 0000000000000000 [ 340.556705][T12506] RBP: 00007f129eeb1090 R08: 0000000000000000 R09: 0000000000000000 [ 340.564706][T12506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.572697][T12506] R13: 0000000000000000 R14: 00007f12a0a6ffa0 R15: 00007ffce791c648 [ 341.252278][T12543] ÿÿÿÿÿÿ: renamed from vlan1 [ 341.345408][T12548] device syzkaller0 entered promiscuous mode [ 341.411346][T12551] device syzkaller0 entered promiscuous mode [ 341.512250][ T94] udevd[94]: worker [1323] terminated by signal 33 (Unknown signal 33) [ 341.545549][ T94] udevd[94]: worker [1323] failed while handling '/devices/virtual/block/loop4' [ 341.845288][ T94] udevd[94]: worker [1319] terminated by signal 33 (Unknown signal 33) [ 341.878557][ T94] udevd[94]: worker [1319] failed while handling '/devices/virtual/block/loop0' [ 342.558611][T12604] €Â0: renamed from pim6reg1 [ 344.602048][T12655] €Â0: renamed from pim6reg1 [ 344.697497][T12657] device syzkaller0 entered promiscuous mode [ 345.525989][T12682] device pim6reg1 entered promiscuous mode [ 345.821423][T12699] device syzkaller0 entered promiscuous mode [ 346.034857][T12696] device sit0 left promiscuous mode [ 346.338999][T12710] €Â0: renamed from pim6reg1 [ 346.742959][T12741] €Â0: renamed from pim6reg1 [ 346.806321][T12744] €Â0: renamed from pim6reg1 [ 346.938531][T12751] syz.1.3999[12751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.938585][T12751] syz.1.3999[12751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.959874][T12790] €Â0: renamed from pim6reg1 [ 348.988923][T12839] €Â0: renamed from pim6reg1 [ 349.022276][T12841] device syzkaller0 entered promiscuous mode [ 349.066418][T12828] device pim6reg1 entered promiscuous mode [ 349.352833][T12862] device syzkaller0 entered promiscuous mode [ 349.868918][T12880] €Â0: renamed from pim6reg1 [ 350.617664][T12917] device syzkaller0 entered promiscuous mode [ 351.087264][T12939] €Â0: renamed from pim6reg1 [ 351.609597][T12967] device veth1_macvtap left promiscuous mode [ 351.642806][T12967] device macsec0 entered promiscuous mode [ 351.895948][T12976] €Â0: renamed from pim6reg1 [ 352.439062][T13018] syz.3.4084[13018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.441211][T13018] syz.3.4084[13018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.578167][T13028] device syzkaller0 entered promiscuous mode [ 352.694729][T13030] device syzkaller0 entered promiscuous mode [ 353.150911][T13035] €Â0: renamed from pim6reg1 [ 354.068193][T13064] device pim6reg1 entered promiscuous mode [ 354.267180][T13073] device syzkaller0 entered promiscuous mode [ 354.459276][T13075] device wg2 entered promiscuous mode [ 354.658483][T13095] syz.1.4106[13095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.658542][T13095] syz.1.4106[13095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.678188][T13092] €Â0: renamed from pim6reg1 [ 355.440069][T13119] device sit0 left promiscuous mode [ 355.552551][T13123] device sit0 entered promiscuous mode [ 355.897005][T13119] device syzkaller0 entered promiscuous mode [ 355.943063][T13132] €Â0: renamed from pim6reg1 [ 355.949028][T13133] €Â0: renamed from pim6reg1 [ 356.120991][T13144] device veth1_macvtap left promiscuous mode [ 356.143277][T13144] device macsec0 entered promiscuous mode [ 356.199469][T13150] device veth1_macvtap entered promiscuous mode [ 356.217061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 356.781151][T13165] €Â0: renamed from pim6reg1 [ 357.254049][T13180] device pim6reg1 entered promiscuous mode [ 359.127467][T13273] device veth0_vlan left promiscuous mode [ 359.145466][T13273] device veth0_vlan entered promiscuous mode [ 359.359921][T13291] device sit0 left promiscuous mode [ 359.629500][T13294] device wg2 entered promiscuous mode [ 360.120780][T13316] device syzkaller0 entered promiscuous mode [ 362.130562][T13382] device syzkaller0 entered promiscuous mode [ 362.350176][T13395] device syzkaller0 entered promiscuous mode [ 362.997119][T13420] device sit0 left promiscuous mode [ 363.206497][T13430] device sit0 entered promiscuous mode [ 364.001178][T13451] device syzkaller0 entered promiscuous mode [ 365.696024][T13503] device syzkaller0 entered promiscuous mode [ 365.934647][T13524] device pim6reg1 entered promiscuous mode [ 366.427383][T13555] device sit0 entered promiscuous mode [ 366.647234][T13564] syz.0.4263[13564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.647297][T13564] syz.0.4263[13564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.984277][T13575] device syzkaller0 entered promiscuous mode [ 368.194315][T13582] device syzkaller0 entered promiscuous mode [ 368.443059][T13593] €Â0: renamed from pim6reg1 [ 368.945377][T13605] device syzkaller0 entered promiscuous mode [ 369.209999][T13615] device syzkaller0 entered promiscuous mode [ 369.668458][T13638] €Â0: renamed from pim6reg1 [ 370.301462][T13686] €Â0: renamed from pim6reg1 [ 370.831065][T13708] device pim6reg1 entered promiscuous mode [ 371.023384][T13716] device pim6reg1 entered promiscuous mode [ 371.030564][T13729] device veth0_vlan left promiscuous mode [ 371.046969][T13729] device veth0_vlan entered promiscuous mode [ 371.103595][T13737] €Â0: renamed from pim6reg1 [ 371.113367][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.126385][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.135053][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 371.574832][T13775] device syzkaller0 entered promiscuous mode [ 371.647031][T13766] device pim6reg1 entered promiscuous mode [ 371.675815][T13779] €Â0: renamed from pim6reg1 [ 372.259857][T13789] syz.2.4337[13789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.261385][T13789] syz.2.4337[13789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.470984][T13821] device syzkaller0 entered promiscuous mode [ 372.659634][T13816] €Â0: renamed from pim6reg1 [ 372.791701][T13826] device veth0_vlan left promiscuous mode [ 372.824838][T13826] device veth0_vlan entered promiscuous mode [ 372.886988][T13828] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 373.253210][T13855] syz.4.4360[13855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.253269][T13855] syz.4.4360[13855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.509026][T13863] €Â0: renamed from pim6reg1 [ 373.980509][T13888] device syzkaller0 entered promiscuous mode [ 374.315586][T13913] €Â0: renamed from pim6reg1 [ 374.811844][T13938] syz.0.4386[13938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.811901][T13938] syz.0.4386[13938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.872965][T13939] syz.0.4386[13939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.065262][T13951] €Â0: renamed from pim6reg1 [ 375.281828][T13967] syz.3.4394[13967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.281863][T13967] syz.3.4394[13967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.651058][T13984] syz.1.4400[13984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.093465][T13994] €Â0: renamed from pim6reg1 [ 376.195846][T13997] device syzkaller0 entered promiscuous mode [ 376.344640][T14000] device syzkaller0 entered promiscuous mode [ 377.178749][T14034] €Â0: renamed from pim6reg1 [ 377.211045][T14033] device syzkaller0 entered promiscuous mode [ 377.888874][T14061] device sit0 entered promiscuous mode [ 378.413869][T14077] device syzkaller0 entered promiscuous mode [ 378.836472][T14093] device syzkaller0 entered promiscuous mode [ 378.910541][T14094] €Â0: renamed from pim6reg1 [ 379.124561][T14101] device sit0 left promiscuous mode [ 379.143005][T14102] device sit0 entered promiscuous mode [ 379.548528][T14128] device wg2 entered promiscuous mode [ 380.258334][T14153] €Â0: renamed from pim6reg1 [ 380.310317][T14151] device syzkaller0 entered promiscuous mode [ 380.547904][T14159] device wg2 left promiscuous mode [ 380.559542][T14160] device wg2 entered promiscuous mode [ 380.679183][T14171] bpf_get_probe_write_proto: 1 callbacks suppressed [ 380.679193][T14171] syz.3.4465[14171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.705609][T14171] syz.3.4465[14171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.956644][T14187] €Â0: renamed from pim6reg1 [ 381.051521][T14193] device syzkaller0 entered promiscuous mode [ 383.159185][T14231] €Â0: renamed from pim6reg1 [ 383.772341][T14250] device pim6reg1 entered promiscuous mode [ 384.198734][T14259] ÿÿÿÿÿÿ: renamed from vlan1 [ 384.433393][T14296] €Â0: renamed from pim6reg1 [ 384.862074][T14311] device veth0_vlan left promiscuous mode [ 384.907534][T14311] device veth0_vlan entered promiscuous mode [ 385.088952][T14327] device syzkaller0 entered promiscuous mode [ 385.191453][T14331] €Â0: renamed from pim6reg1 [ 385.219898][T14336] device syzkaller0 entered promiscuous mode [ 385.229188][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 385.252022][T14336] syz.2.4517[14336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.252072][T14336] syz.2.4517[14336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.289378][T14340] Â: renamed from pim6reg1 [ 386.197314][T14378] €Â0: renamed from pim6reg1 [ 386.280965][T14396] device syzkaller0 entered promiscuous mode [ 386.341330][T14391] device veth1_macvtap left promiscuous mode [ 386.643052][T14406] device syzkaller0 entered promiscuous mode [ 387.185700][T14447] device syzkaller0 entered promiscuous mode [ 388.189597][T14491] device syzkaller0 entered promiscuous mode [ 388.554034][T14517] device wg2 left promiscuous mode [ 388.627445][T14524] device wg2 entered promiscuous mode [ 389.354838][T14570] device syzkaller0 entered promiscuous mode [ 390.517016][T14626] device syzkaller0 entered promiscuous mode [ 391.559458][T14669] device syzkaller0 entered promiscuous mode [ 392.272401][T14683] €Â0: renamed from pim6reg1 [ 392.527830][T14693] €Â0: renamed from pim6reg1 [ 393.008147][T14705] device pim6reg1 entered promiscuous mode [ 393.050967][T14708] device syzkaller0 entered promiscuous mode [ 393.803918][T14731] €Â0: renamed from pim6reg1 [ 394.087827][T14746] device syzkaller0 entered promiscuous mode [ 396.265421][T14768] device syzkaller0 entered promiscuous mode [ 396.534667][T14781] €Â0: renamed from pim6reg1 [ 396.540528][T14783] device pim6reg1 entered promiscuous mode [ 396.602473][T14793] device syzkaller0 entered promiscuous mode [ 397.558386][T14841] €Â0: renamed from pim6reg1 [ 397.784566][T14858] device sit0 left promiscuous mode [ 397.935997][T14870] device sit0 entered promiscuous mode [ 398.517780][T14903] device syzkaller0 entered promiscuous mode [ 398.700867][T14906] device syzkaller0 entered promiscuous mode [ 399.120410][T14921] €Â0: renamed from pim6reg1 [ 399.381198][T14946] device syzkaller0 entered promiscuous mode [ 399.866462][T14968] device veth0_vlan left promiscuous mode [ 399.877839][T14968] device veth0_vlan entered promiscuous mode [ 399.918950][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 399.940557][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 399.963715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 399.984763][T14980] device sit0 left promiscuous mode [ 400.102417][ T24] audit: type=1400 audit(1750302589.260:168): avc: denied { create } for pid=14976 comm="syz.0.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 400.189210][T14969] device syzkaller0 entered promiscuous mode [ 400.207507][T14963] device sit0 entered promiscuous mode [ 400.502413][T15011] €Â0: renamed from pim6reg1 [ 400.628341][T15020] device pim6reg1 entered promiscuous mode [ 401.326726][T15104] device sit0 left promiscuous mode [ 401.413214][T15106] device sit0 entered promiscuous mode [ 402.080845][T15122] device syzkaller0 entered promiscuous mode [ 402.419589][T15123] €Â0: renamed from pim6reg1 [ 404.841745][T15194] €Â0: renamed from pim6reg1 [ 404.861884][T15189] €Â0: renamed from pim6reg1 [ 404.894120][T15201] device syzkaller0 entered promiscuous mode [ 405.136132][T15207] €Â0: renamed from pim6reg1 [ 405.226328][T15205] device veth0_vlan left promiscuous mode [ 405.286156][T15205] device veth0_vlan entered promiscuous mode [ 406.441969][T15249] €Â0: renamed from pim6reg1 [ 407.046550][T15256] device syzkaller0 entered promiscuous mode [ 407.072194][T15257] device syzkaller0 entered promiscuous mode [ 407.678662][T15274] €Â0: renamed from pim6reg1 [ 408.241626][T15304] €Â0: renamed from pim6reg1 [ 408.521060][T15311] device syzkaller0 entered promiscuous mode [ 409.364902][T15328] €Â0: renamed from pim6reg1 [ 409.432567][T15326] €Â0: renamed from pim6reg1 [ 410.403108][T15362] €Â0: renamed from pim6reg1 [ 410.655109][T15373] €Â0: renamed from pim6reg1 [ 410.661393][T15374] device veth0_vlan left promiscuous mode [ 410.694122][T15374] device veth0_vlan entered promiscuous mode [ 410.860372][T15379] device veth0_vlan left promiscuous mode [ 410.902376][T15379] device veth0_vlan entered promiscuous mode [ 410.970886][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.004242][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.032247][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 411.123975][T15386] device syzkaller0 entered promiscuous mode [ 412.132880][T15416] device sit0 left promiscuous mode [ 412.233452][T15418] €Â0: renamed from pim6reg1 [ 412.266615][T15419] device sit0 entered promiscuous mode [ 412.538629][T15434] device syzkaller0 entered promiscuous mode [ 413.097366][T15442] device veth0_vlan left promiscuous mode [ 413.123436][T15442] device veth0_vlan entered promiscuous mode [ 413.244371][T15452] device syzkaller0 entered promiscuous mode [ 413.548981][T15459] €Â0: renamed from pim6reg1 [ 413.641766][T15469] device syzkaller0 entered promiscuous mode [ 414.095649][T15489] €Â0: renamed from pim6reg1 [ 414.226421][T15498] device syzkaller0 entered promiscuous mode [ 414.513458][T15508] device sit0 left promiscuous mode [ 414.774060][T15512] €Â0: renamed from pim6reg1 [ 414.983800][T15528] device veth0_vlan left promiscuous mode [ 414.996325][T15528] device veth0_vlan entered promiscuous mode [ 415.020862][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 415.034025][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 415.072687][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.306489][T15540] €Â0: renamed from pim6reg1 [ 415.545955][T15546] syz.0.4892[15546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.546010][T15546] syz.0.4892[15546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.123076][T15626] €Â0: renamed from pim6reg1 [ 419.071455][T15683] device syzkaller0 entered promiscuous mode [ 419.388603][T15687] device syzkaller0 entered promiscuous mode [ 419.548592][T15693] device sit0 left promiscuous mode [ 419.559843][T15696] device sit0 entered promiscuous mode [ 420.532592][T15724] device syzkaller0 entered promiscuous mode [ 420.876450][T15761] device sit0 entered promiscuous mode [ 421.342639][T15777] device veth0_vlan left promiscuous mode [ 421.418338][T15777] device veth0_vlan entered promiscuous mode [ 422.146675][T15807] device syzkaller0 entered promiscuous mode [ 424.545170][T15935] device syzkaller0 entered promiscuous mode [ 426.966535][T16033] syzkaller0: mtu greater than device maximum [ 427.247377][T16054] device syzkaller0 entered promiscuous mode [ 428.268575][T16084] device pim6reg1 entered promiscuous mode [ 428.727070][T16098] device veth0_vlan left promiscuous mode [ 428.871612][T16098] device veth0_vlan entered promiscuous mode [ 429.132751][T16111] €Â0: renamed from pim6reg1 [ 429.215916][T16118] €Â0: renamed from pim6reg1 [ 429.951064][T16161] device wg2 left promiscuous mode [ 430.036577][T16168] device sit0 left promiscuous mode [ 430.147574][T16163] device sit0 entered promiscuous mode [ 430.320943][T16176] device syzkaller0 entered promiscuous mode [ 430.457827][T16188] device syzkaller0 entered promiscuous mode [ 433.067793][T16275] device veth0_vlan left promiscuous mode [ 433.080987][T16275] device veth0_vlan entered promiscuous mode [ 433.103934][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.117813][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 433.153237][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.861063][T16302] device syzkaller0 entered promiscuous mode [ 434.079538][T16300] device wg2 entered promiscuous mode [ 434.480076][T16333] device sit0 left promiscuous mode [ 434.735735][T16338] device sit0 entered promiscuous mode [ 435.120133][T16342] device veth0_vlan left promiscuous mode [ 435.138390][T16342] device veth0_vlan entered promiscuous mode [ 435.210945][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.263345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.282849][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 435.733426][T16348] device syzkaller0 entered promiscuous mode [ 435.771764][T16359] device pim6reg1 entered promiscuous mode [ 435.945225][T16371] €Â0: renamed from pim6reg1 [ 436.238722][T16388] device syzkaller0 entered promiscuous mode [ 436.483426][T16402] device pim6reg1 entered promiscuous mode [ 436.864507][T16431] device veth0_vlan left promiscuous mode [ 436.871716][T16431] device veth0_vlan entered promiscuous mode [ 437.082417][T16435] device veth0_vlan left promiscuous mode [ 437.124970][T16435] device veth0_vlan entered promiscuous mode [ 437.147476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.157174][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.196036][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 437.288536][T16441] €Â0: renamed from pim6reg1 [ 437.754542][T16476] device sit0 left promiscuous mode [ 437.791141][T16483] device sit0 entered promiscuous mode [ 438.363033][T16503] syz.4.5189[16503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.363127][T16503] syz.4.5189[16503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.567084][T16513] €Â0: renamed from pim6reg1 [ 440.677246][T16592] €Â0: renamed from pim6reg1 [ 441.796394][T16628] device syzkaller0 entered promiscuous mode [ 442.205117][T16647] €Â0: renamed from pim6reg1 [ 442.421517][T16661] device pim6reg1 entered promiscuous mode [ 442.555097][T16664] device pim6reg1 entered promiscuous mode [ 442.651647][T16671] device sit0 left promiscuous mode [ 442.671318][T16673] tun0: tun_chr_ioctl cmd 1074025692 [ 442.678402][T16673] tun0: tun_chr_ioctl cmd 21731 [ 442.717978][T16671] device sit0 entered promiscuous mode [ 443.999524][T16726] device syzkaller0 entered promiscuous mode [ 444.458946][T16738] syz.0.5268[16738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.459008][T16738] syz.0.5268[16738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.954317][T16812] device sit0 left promiscuous mode [ 446.158326][T16817] device sit0 entered promiscuous mode [ 446.409968][T16829] device syzkaller0 entered promiscuous mode [ 448.280352][T16911] device veth0_vlan left promiscuous mode [ 448.328516][T16911] device veth0_vlan entered promiscuous mode [ 448.985354][T16951] €Â0: renamed from pim6reg1 [ 449.916552][T16978] ÿÿÿÿÿÿ: renamed from vlan1 [ 450.068666][T16982] device syzkaller0 entered promiscuous mode [ 450.127077][T16989] €Â0: renamed from pim6reg1 [ 450.951108][T17035] €Â0: renamed from pim6reg1 [ 451.000763][T17040] device syzkaller0 entered promiscuous mode [ 451.382214][T17062] device syzkaller0 entered promiscuous mode [ 451.515928][T17069] €Â0: renamed from pim6reg1 [ 451.952610][T17086] €Â0: renamed from pim6reg1 [ 452.055025][T17090] €Â0: renamed from pim6reg1 [ 452.136339][T17096] device syzkaller0 entered promiscuous mode [ 452.881356][T17133] €Â0: renamed from pim6reg1 [ 452.949077][T17137] device syzkaller0 entered promiscuous mode [ 453.871968][T17176] €Â0: renamed from pim6reg1 [ 454.051350][T17184] device syzkaller0 entered promiscuous mode [ 454.650039][T17216] €Â0: renamed from pim6reg1 [ 454.745057][T17230] device syzkaller0 entered promiscuous mode [ 455.239602][T17258] device veth0_vlan left promiscuous mode [ 455.277565][T17258] device veth0_vlan entered promiscuous mode [ 455.317278][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.350548][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.408343][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 455.486514][T17282] €Â0: renamed from pim6reg1 [ 456.026765][T17317] device veth0_vlan left promiscuous mode [ 456.079311][T17317] device veth0_vlan entered promiscuous mode [ 456.160076][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.202969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.260525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 456.524689][T17369] syz.3.5471[17369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.524746][T17369] syz.3.5471[17369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.402312][T17423] device syzkaller0 entered promiscuous mode [ 457.880525][T17455] device syzkaller0 entered promiscuous mode [ 458.115894][T17469] ÿ: renamed from bond_slave_0 [ 458.519767][T17497] device sit0 entered promiscuous mode [ 459.925036][T17572] €Â0: renamed from pim6reg1 [ 460.964526][T17624] €Â0: renamed from pim6reg1 [ 461.793538][T17663] €Â0: renamed from pim6reg1 [ 462.623108][T17682] device sit0 left promiscuous mode [ 463.123481][T17713] €Â0: renamed from pim6reg1 [ 463.303160][T17723] device syzkaller0 entered promiscuous mode [ 463.816152][T17743] device veth0_vlan left promiscuous mode [ 463.867033][T17743] device veth0_vlan entered promiscuous mode [ 463.957406][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.973758][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 464.003127][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 464.086535][T17761] €Â0: renamed from pim6reg1 [ 464.346492][T17777] device syzkaller0 entered promiscuous mode [ 464.791583][T17805] €Â0: renamed from pim6reg1 [ 465.343458][T17838] device syzkaller0 entered promiscuous mode [ 465.644474][T17847] device veth0_vlan left promiscuous mode [ 465.651021][T17847] device veth0_vlan entered promiscuous mode [ 465.658573][T17849] €Â0: renamed from pim6reg1 [ 465.752600][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 465.761219][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 465.768874][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 465.776781][T17859] tap0: tun_chr_ioctl cmd 1074025675 [ 465.782227][T17859] tap0: persist enabled [ 466.334459][T17886] device syzkaller0 entered promiscuous mode [ 466.440159][T17897] €Â0: renamed from pim6reg1 [ 466.500871][T17907] device syzkaller0 entered promiscuous mode [ 466.827406][T17931] ÿÿÿÿÿÿ: renamed from vlan1 [ 467.440210][T17948] device syzkaller0 entered promiscuous mode [ 468.353679][T18013] device syzkaller0 entered promiscuous mode [ 468.420078][T18012] device syzkaller0 entered promiscuous mode [ 469.363928][ T24] audit: type=1400 audit(1750302658.530:169): avc: denied { create } for pid=18054 comm="syz.4.5683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 469.650191][T18066] device syzkaller0 entered promiscuous mode [ 469.872932][T18076] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 470.245137][T18086] device veth0_vlan left promiscuous mode [ 470.259956][T18086] device veth0_vlan entered promiscuous mode [ 470.334847][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 470.360152][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 470.403397][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.877237][T18118] €Â0: renamed from pim6reg1 [ 470.963853][T18125] device syzkaller0 entered promiscuous mode [ 471.445247][T18150] device wg2 left promiscuous mode [ 471.637817][T18155] €Â0: renamed from pim6reg1 [ 471.871861][T18173] device syzkaller0 entered promiscuous mode [ 472.226631][T18183] device syzkaller0 entered promiscuous mode [ 472.528188][T18208] €Â0: renamed from pim6reg1 [ 472.707985][T18223] device syzkaller0 entered promiscuous mode [ 473.355186][T18255] €Â0: renamed from pim6reg1 [ 473.378463][T18264] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.446487][T18271] device syzkaller0 entered promiscuous mode [ 473.636408][T18276] device sit0 left promiscuous mode [ 473.666638][T18277] device sit0 entered promiscuous mode [ 473.954685][T18283] device syzkaller0 entered promiscuous mode [ 474.121451][T18296] device syzkaller0 entered promiscuous mode [ 474.325400][T18303] €Â0: renamed from pim6reg1 [ 474.834344][T18320] device syzkaller0 entered promiscuous mode [ 475.391360][T18348] device veth0_vlan left promiscuous mode [ 475.397595][T18348] device veth0_vlan entered promiscuous mode [ 475.414188][T18353] €Â0: renamed from pim6reg1 [ 475.424567][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.447118][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.456939][ T1016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 475.776255][T18369] device syzkaller0 entered promiscuous mode [ 476.052641][T18409] device sit0 left promiscuous mode [ 476.102209][T18409] device sit0 entered promiscuous mode [ 476.565317][T18424] device syzkaller0 entered promiscuous mode [ 476.890296][T18453] device pim6reg1 entered promiscuous mode [ 477.008380][T18467] €Â0: renamed from pim6reg1 [ 477.300164][T18494] device syzkaller0 entered promiscuous mode [ 477.941553][T18516] €Â0: renamed from pim6reg1 [ 478.953587][T18570] €Â0: renamed from pim6reg1 [ 479.038556][T18574] €Â0: renamed from pim6reg1 [ 479.787328][T18615] €Â0: renamed from pim6reg1 [ 481.856542][T18654] €Â0: renamed from pim6reg1 [ 482.818358][T18674] €Â0: renamed from pim6reg1 [ 483.015205][T18689] €Â0: renamed from pim6reg1 [ 483.439164][T18708] device syzkaller0 entered promiscuous mode [ 483.591435][T18713] device syzkaller0 entered promiscuous mode [ 483.607343][T18710] €Â0: renamed from pim6reg1 [ 483.862968][T18722] device veth1_macvtap left promiscuous mode [ 483.895694][T18723] device veth1_macvtap entered promiscuous mode [ 483.912641][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 483.989346][T18726] €Â0: renamed from pim6reg1 [ 484.091142][T18739] device pim6reg1 entered promiscuous mode [ 484.137574][T18743] device syzkaller0 entered promiscuous mode [ 484.450378][T18749] €Â0: renamed from pim6reg1 [ 484.902377][T18768] device syzkaller0 entered promiscuous mode [ 484.941772][T18766] €Â0: renamed from pim6reg1 [ 485.330571][T18778] device veth0_vlan left promiscuous mode [ 485.357743][T18778] device veth0_vlan entered promiscuous mode [ 485.398234][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 485.410422][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 485.418454][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 485.457873][T18782] device syzkaller0 entered promiscuous mode [ 486.062135][T18792] €Â0: renamed from pim6reg1 [ 486.410135][T18806] €Â0: renamed from pim6reg1 [ 486.711431][T18818] device syzkaller0 entered promiscuous mode [ 487.198838][T18844] device veth1_macvtap entered promiscuous mode [ 487.208390][T18844] device macsec0 entered promiscuous mode [ 487.226112][T18844] device veth1_macvtap left promiscuous mode [ 487.409638][T18861] €Â0: renamed from pim6reg1 [ 488.455850][T18898] device syzkaller0 entered promiscuous mode [ 488.834588][T18916] €Â0: renamed from pim6reg1 [ 489.357643][T18951] device syzkaller0 entered promiscuous mode [ 489.544425][ T24] audit: type=1400 audit(1750302678.710:170): avc: denied { mounton } for pid=18958 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 489.670712][T18958] bridge0: port 1(bridge_slave_0) entered blocking state [ 489.690398][T18958] bridge0: port 1(bridge_slave_0) entered disabled state [ 489.716925][T18958] device bridge_slave_0 entered promiscuous mode [ 489.838993][T18967] €Â0: renamed from pim6reg1 [ 489.853851][T18958] bridge0: port 2(bridge_slave_1) entered blocking state [ 489.871406][T18958] bridge0: port 2(bridge_slave_1) entered disabled state [ 489.931519][T18958] device bridge_slave_1 entered promiscuous mode [ 490.426318][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 490.440556][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 490.472283][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 490.496343][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 490.504700][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.511758][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.562799][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 490.570606][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 490.579654][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.588183][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.595235][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.679508][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 490.689921][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 490.706848][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 490.725183][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 490.856911][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 490.872673][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 490.924416][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 490.934842][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.955748][T18997] device syzkaller0 entered promiscuous mode [ 490.992498][T18958] device veth0_vlan entered promiscuous mode [ 490.999698][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.012745][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.183707][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.211299][T18958] device veth1_macvtap entered promiscuous mode [ 491.303357][T19001] device syzkaller0 entered promiscuous mode [ 491.345391][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 491.361587][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.387365][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 491.396869][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 491.665330][ T24] audit: type=1400 audit(1750302680.830:171): avc: denied { unmount } for pid=18958 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 492.006354][T19030] device syzkaller0 entered promiscuous mode [ 492.099942][ T9] device bridge_slave_1 left promiscuous mode [ 492.128002][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.170250][ T9] device bridge_slave_0 left promiscuous mode [ 492.223214][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.251932][ T9] device veth1_macvtap left promiscuous mode [ 493.316611][T19076] device syzkaller0 entered promiscuous mode [ 494.262259][T19144] device syzkaller0 entered promiscuous mode [ 494.714558][T19161] €Â0: renamed from pim6reg1 [ 494.865759][T19163] device pim6reg1 entered promiscuous mode [ 495.201013][T19180] device pim6reg1 entered promiscuous mode [ 495.434956][T19186] device syzkaller0 entered promiscuous mode [ 496.003542][T19203] €Â0: renamed from pim6reg1 [ 496.361923][T19220] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.483036][T19220] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.540792][T19220] device bridge_slave_0 entered promiscuous mode [ 496.575264][T19220] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.603202][T19220] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.610972][T19220] device bridge_slave_1 entered promiscuous mode [ 496.721119][T19241] device sit0 entered promiscuous mode [ 496.896510][T19261] €Â0: renamed from pim6reg1 [ 497.199097][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 497.221363][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 497.265015][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 497.301856][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 497.344988][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.352078][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.442666][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 497.511552][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 497.545048][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 497.574770][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.581866][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.642649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 497.695514][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 497.733202][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 497.762087][T19220] device veth0_vlan entered promiscuous mode [ 497.768689][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 497.777029][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 497.785695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 497.820479][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.854916][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 497.884525][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 497.964138][T19220] device veth1_macvtap entered promiscuous mode [ 497.979653][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 498.003084][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 498.051763][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 498.117843][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 498.152883][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 498.186570][T19303] €Â0: renamed from pim6reg1 [ 498.569671][T19317] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.630928][T19317] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.673632][T19317] device bridge_slave_0 entered promiscuous mode [ 498.717932][T19317] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.766339][T19317] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.774408][T19317] device bridge_slave_1 entered promiscuous mode [ 498.824440][ T9] device veth0_vlan left promiscuous mode [ 499.265344][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 499.297543][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 499.352645][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 499.382758][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 499.407331][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.414426][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 499.481147][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 499.512939][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 499.535385][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.542501][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 499.558955][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 499.612038][T19353] €Â0: renamed from pim6reg1 [ 499.646378][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 499.669073][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 499.727102][T19317] device veth0_vlan entered promiscuous mode [ 499.744431][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.773684][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 499.791320][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 499.819438][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 499.882816][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 499.934119][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 499.991891][T19317] device veth1_macvtap entered promiscuous mode [ 500.025024][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 500.063032][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 500.105836][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 500.145197][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 500.178181][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 500.351473][T19382] device syzkaller0 entered promiscuous mode [ 500.672229][T19393] €Â0: renamed from pim6reg1 [ 500.762382][ T9] device bridge_slave_1 left promiscuous mode [ 500.791592][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.814755][ T9] device bridge_slave_0 left promiscuous mode [ 500.821136][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.838610][ T9] device veth0_vlan left promiscuous mode [ 501.298882][T19425] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.308003][T19426] device bridge_slave_1 left promiscuous mode [ 501.316616][T19426] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.324882][T19426] device bridge_slave_0 left promiscuous mode [ 501.331128][T19426] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.633893][T19417] bridge0: port 1(bridge_slave_0) entered blocking state [ 501.671554][T19417] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.712655][T19417] device bridge_slave_0 entered promiscuous mode [ 501.777549][T19417] bridge0: port 2(bridge_slave_1) entered blocking state [ 501.833017][T19417] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.860875][T19417] device bridge_slave_1 entered promiscuous mode [ 501.918803][T19449] device syzkaller0 entered promiscuous mode [ 502.706963][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 502.741054][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 502.817617][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 502.857810][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 502.883642][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.890736][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.898478][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 502.907226][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 502.915768][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.922838][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.080097][T19493] device wg2 left promiscuous mode [ 503.132611][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 503.151223][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 503.197144][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 503.205536][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 503.229190][T19417] device veth0_vlan entered promiscuous mode [ 503.317921][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.330380][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.338299][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 503.352966][T19417] device veth1_macvtap entered promiscuous mode [ 503.406584][ T9] device bridge_slave_1 left promiscuous mode [ 503.413413][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.465486][ T9] device bridge_slave_0 left promiscuous mode [ 503.471834][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.577237][ T9] device veth0_vlan left promiscuous mode [ 503.793069][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 503.809529][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 503.817952][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 503.845746][T19512] device veth0_vlan left promiscuous mode [ 503.870766][T19512] device veth0_vlan entered promiscuous mode [ 503.925917][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 503.978875][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 504.000185][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 504.010025][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 504.031626][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 504.052931][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 504.064948][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 504.146232][T19527] device syzkaller0 entered promiscuous mode [ 504.172061][T19531] device syzkaller0 entered promiscuous mode [ 504.759486][T19534] €Â0: renamed from pim6reg1 [ 504.768808][T19541] device veth1_to_bond entered promiscuous mode [ 505.098833][T19553] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.106669][T19553] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.189994][T19556] device bridge_slave_1 left promiscuous mode [ 505.222645][T19556] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.230437][T19556] device bridge_slave_0 left promiscuous mode [ 505.239317][T19556] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.929162][T19579] FAULT_INJECTION: forcing a failure. [ 505.929162][T19579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 506.023267][T19580] €Â0: renamed from pim6reg1 [ 506.057814][T19579] CPU: 1 PID: 19579 Comm: syz.4.6165 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 506.070184][T19579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 506.080334][T19579] Call Trace: [ 506.083636][T19579] __dump_stack+0x21/0x24 [ 506.088055][T19579] dump_stack_lvl+0x169/0x1d8 [ 506.092827][T19579] ? show_regs_print_info+0x18/0x18 [ 506.098031][T19579] ? kstrtouint_from_user+0x1a0/0x200 [ 506.103410][T19579] dump_stack+0x15/0x1c [ 506.107569][T19579] should_fail+0x3c1/0x510 [ 506.112088][T19579] should_fail_usercopy+0x1a/0x20 [ 506.117134][T19579] _copy_from_user+0x20/0xd0 [ 506.121873][T19579] ___sys_recvmsg+0x129/0x4f0 [ 506.126572][T19579] ? __sys_recvmsg+0x250/0x250 [ 506.131358][T19579] ? __fdget+0x1a1/0x230 [ 506.135608][T19579] __x64_sys_recvmsg+0x1dd/0x2a0 [ 506.140549][T19579] ? fput+0x1a/0x20 [ 506.144447][T19579] ? ___sys_recvmsg+0x4f0/0x4f0 [ 506.149393][T19579] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 506.155468][T19579] do_syscall_64+0x31/0x40 [ 506.159897][T19579] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.165790][T19579] RIP: 0033:0x7f741f590929 [ 506.170208][T19579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.189818][T19579] RSP: 002b:00007f741dbf9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 506.198233][T19579] RAX: ffffffffffffffda RBX: 00007f741f7b7fa0 RCX: 00007f741f590929 [ 506.206486][T19579] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 506.214459][T19579] RBP: 00007f741dbf9090 R08: 0000000000000000 R09: 0000000000000000 [ 506.222431][T19579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.230410][T19579] R13: 0000000000000000 R14: 00007f741f7b7fa0 R15: 00007ffe44973018 [ 506.405052][T19589] €Â0: renamed from pim6reg1 [ 506.434303][T19595] €Â0: renamed from pim6reg1 [ 506.713656][T19618] FAULT_INJECTION: forcing a failure. [ 506.713656][T19618] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 506.732569][T19618] CPU: 1 PID: 19618 Comm: syz.1.6179 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 506.743961][T19618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 506.754019][T19618] Call Trace: [ 506.757312][T19618] __dump_stack+0x21/0x24 [ 506.761640][T19618] dump_stack_lvl+0x169/0x1d8 [ 506.766317][T19618] ? show_regs_print_info+0x18/0x18 [ 506.771510][T19618] dump_stack+0x15/0x1c [ 506.775657][T19618] should_fail+0x3c1/0x510 [ 506.780065][T19618] should_fail_usercopy+0x1a/0x20 [ 506.785099][T19618] _copy_from_user+0x20/0xd0 [ 506.789681][T19618] iovec_from_user+0x1bc/0x2f0 [ 506.794434][T19618] ? kstrtouint_from_user+0x1a0/0x200 [ 506.799796][T19618] __import_iovec+0x71/0x390 [ 506.804377][T19618] ? memset+0x35/0x40 [ 506.808349][T19618] import_iovec+0x7c/0xb0 [ 506.812684][T19618] ___sys_recvmsg+0x420/0x4f0 [ 506.817463][T19618] ? __sys_recvmsg+0x250/0x250 [ 506.822221][T19618] ? __fdget+0x1a1/0x230 [ 506.826455][T19618] __x64_sys_recvmsg+0x1dd/0x2a0 [ 506.831467][T19618] ? fput+0x1a/0x20 [ 506.835358][T19618] ? ___sys_recvmsg+0x4f0/0x4f0 [ 506.840205][T19618] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 506.846350][T19618] do_syscall_64+0x31/0x40 [ 506.850758][T19618] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.856738][T19618] RIP: 0033:0x7f74e16ba929 [ 506.861145][T19618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.880747][T19618] RSP: 002b:00007f74dfd23038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 506.889174][T19618] RAX: ffffffffffffffda RBX: 00007f74e18e1fa0 RCX: 00007f74e16ba929 [ 506.897139][T19618] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 506.905107][T19618] RBP: 00007f74dfd23090 R08: 0000000000000000 R09: 0000000000000000 [ 506.913195][T19618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.921428][T19618] R13: 0000000000000000 R14: 00007f74e18e1fa0 R15: 00007ffc4bd9a8b8 [ 507.080597][T19636] device bridge_slave_1 entered promiscuous mode [ 507.089256][T19636] device wg2 entered promiscuous mode [ 507.096847][T19637] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 507.117869][T19637] syz.4.6183[19637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.117961][T19637] syz.4.6183[19637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.679947][T19660] device syzkaller0 entered promiscuous mode [ 507.834649][T19668] FAULT_INJECTION: forcing a failure. [ 507.834649][T19668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 507.901208][T19668] CPU: 0 PID: 19668 Comm: syz.0.6195 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 507.912702][T19668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 507.922947][T19668] Call Trace: [ 507.926249][T19668] __dump_stack+0x21/0x24 [ 507.930738][T19668] dump_stack_lvl+0x169/0x1d8 [ 507.935458][T19668] ? show_regs_print_info+0x18/0x18 [ 507.940749][T19668] ? avc_has_perm+0x234/0x360 [ 507.945523][T19668] dump_stack+0x15/0x1c [ 507.949687][T19668] should_fail+0x3c1/0x510 [ 507.954121][T19668] should_fail_usercopy+0x1a/0x20 [ 507.959148][T19668] _copy_to_iter+0x1df/0xa40 [ 507.963748][T19668] ? __kasan_check_write+0x14/0x20 [ 507.968865][T19668] ? __kasan_check_read+0x11/0x20 [ 507.973892][T19668] ? __check_object_size+0x2f4/0x3c0 [ 507.979192][T19668] simple_copy_to_iter+0x50/0x70 [ 507.984145][T19668] __skb_datagram_iter+0xdb/0x700 [ 507.989182][T19668] ? tipc_sk_anc_data_recv+0xa6/0x680 [ 507.994643][T19668] ? skb_copy_datagram_iter+0x150/0x150 [ 508.000193][T19668] skb_copy_datagram_iter+0x43/0x150 [ 508.005574][T19668] tipc_recvmsg+0x79b/0x13a0 [ 508.010177][T19668] ? tipc_send_packet+0xa0/0xa0 [ 508.015035][T19668] ? security_socket_recvmsg+0x87/0xb0 [ 508.020506][T19668] ? tipc_send_packet+0xa0/0xa0 [ 508.025360][T19668] ____sys_recvmsg+0x291/0x580 [ 508.030265][T19668] ? __sys_recvmsg_sock+0x50/0x50 [ 508.035317][T19668] ? import_iovec+0x7c/0xb0 [ 508.039833][T19668] ___sys_recvmsg+0x1af/0x4f0 [ 508.044513][T19668] ? __sys_recvmsg+0x250/0x250 [ 508.049277][T19668] ? __fdget+0x1a1/0x230 [ 508.053543][T19668] __x64_sys_recvmsg+0x1dd/0x2a0 [ 508.058917][T19668] ? fput+0x1a/0x20 [ 508.062811][T19668] ? ___sys_recvmsg+0x4f0/0x4f0 [ 508.067676][T19668] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 508.073734][T19668] do_syscall_64+0x31/0x40 [ 508.078145][T19668] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 508.084027][T19668] RIP: 0033:0x7fc287179929 [ 508.088436][T19668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 508.108050][T19668] RSP: 002b:00007fc2857e2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 508.116468][T19668] RAX: ffffffffffffffda RBX: 00007fc2873a0fa0 RCX: 00007fc287179929 [ 508.124436][T19668] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 508.132791][T19668] RBP: 00007fc2857e2090 R08: 0000000000000000 R09: 0000000000000000 [ 508.140782][T19668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 508.148749][T19668] R13: 0000000000000000 R14: 00007fc2873a0fa0 R15: 00007ffcaa56bb68 [ 508.474924][T19676] device syzkaller0 entered promiscuous mode [ 508.756759][T19709] device syzkaller0 entered promiscuous mode [ 515.468171][T20046] syz.3.6325[20046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.468255][T20046] syz.3.6325[20046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.987205][T20147] device veth0_vlan left promiscuous mode [ 518.046083][T20147] device veth0_vlan entered promiscuous mode [ 521.450590][T20337] ÿÿÿÿÿÿ: renamed from vlan1 [ 522.113174][T20371] device veth0_vlan left promiscuous mode [ 522.120332][T20371] device veth0_vlan entered promiscuous mode [ 522.478045][T20384] ÿÿÿÿÿÿ: renamed from vlan1 [ 522.494896][T20386] device wg2 left promiscuous mode [ 522.545427][T20392] device wg2 entered promiscuous mode [ 526.342668][T20548] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 534.707355][T20724] device veth1_macvtap left promiscuous mode [ 534.732500][T20724] device macsec0 entered promiscuous mode [ 534.843800][T20724] device veth1_macvtap entered promiscuous mode [ 534.906295][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 534.925797][T20729] device veth1_macvtap left promiscuous mode [ 536.128160][T20738] device wg2 left promiscuous mode [ 536.162335][T20738] device wg2 entered promiscuous mode [ 541.659350][T20806] ref_ctr_offset mismatch. inode: 0x1fd offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 541.740946][T20806] GPL: port 1(erspan0) entered blocking state [ 541.776136][T20806] GPL: port 1(erspan0) entered disabled state [ 541.797714][T20806] device erspan0 entered promiscuous mode [ 541.829866][T20813] GPL: port 1(erspan0) entered blocking state [ 541.835999][T20813] GPL: port 1(erspan0) entered forwarding state [ 543.793960][T20838] syz.2.6580[20838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.794051][T20838] syz.2.6580[20838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.936285][T20902] device bridge_slave_1 left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=6453 state=3 status=67 (errno 9: Bad file descriptor) [ 553.293280][ T24] audit: type=1400 audit(1750302742.450:172): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[1861]" dev="pipefs" ino=1861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 554.465278][ T112] GPL: port 1(erspan0) entered disabled state [ 554.473153][ T112] device erspan0 left promiscuous mode [ 554.478617][ T112] GPL: port 1(erspan0) entered disabled state [ 554.783482][ T112] device bridge_slave_1 left promiscuous mode [ 554.789808][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.797818][ T112] device bridge_slave_0 left promiscuous mode [ 554.804185][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.811841][ T112] device bridge_slave_1 left promiscuous mode [ 554.818052][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.825412][ T112] device bridge_slave_0 left promiscuous mode [ 554.831508][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.839463][ T112] device veth1_macvtap left promiscuous mode [ 554.845588][ T112] device veth0_vlan left promiscuous mode [ 554.851562][ T112] device veth0_vlan left promiscuous mode [ 556.943219][ T112] device bridge_slave_1 left promiscuous mode [ 556.949389][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.956931][ T112] device bridge_slave_0 left promiscuous mode [ 556.963104][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.970674][ T112] device veth1_macvtap left promiscuous mode