last executing test programs: 2.275316057s ago: executing program 4 (id=2653): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x3e6, 0x9, 0x2, 0x20012, 0xffffffffffffffff, 0x60d, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4, 0xd}, 0x50) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, r0, 0x4, '\x00', 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000700)='mm_lru_insertion\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_lru_insertion\x00', r2, 0x0, 0xa3b}, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) 2.109891748s ago: executing program 2 (id=2657): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x8, 0x0, 0x0}}, 0x10) r2 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) ioctl$TUNSETTXFILTER(r2, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r3 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) 1.803144339s ago: executing program 2 (id=2665): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x32}, 0x28) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486"], 0xfdef) 1.796972659s ago: executing program 0 (id=2666): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 1.72159119s ago: executing program 3 (id=2667): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000080)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r3, 0xffffffffffffffff}, 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26, 0x0, 0x1}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x86, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x50) r9 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}, @generic={0x79, 0x0, 0x0, 0xe7}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x29, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0x20, 0x8}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x7f, 0xff, &(0x7f0000000540)=""/255, 0x41100, 0x40, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x0, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r8, r2, 0x1, r10], 0x0, 0x10, 0x6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000080)=@bpf_lsm={0xd, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r2}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r3}, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26, 0x0, 0x1}, 0x28) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x86, &(0x7f0000002600)}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x50) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}, @generic={0x79, 0x0, 0x0, 0xe7}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x29, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0x20, 0x8}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x7f, 0xff, &(0x7f0000000540)=""/255, 0x41100, 0x40, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x0, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r8, r2, 0x1, r10], 0x0, 0x10, 0x6}, 0x94) (async) 1.72098201s ago: executing program 4 (id=2668): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000eaffffffffffffff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/10], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847e0ffff20000000000000007f141416ac1414", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000006000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdf0100000001000000aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37ff95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14eca0e214d1257e4dd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50affffffff000000003a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841ac047c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a932"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.65642792s ago: executing program 3 (id=2670): perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x41}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x1c, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x1c, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@fallback=r4, 0x0, 0x1, 0x4, &(0x7f0000000400)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x1000}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000003}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 1.62528832s ago: executing program 0 (id=2671): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0x40}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xfffffff8, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff00000000030000003e0000000000000002"], 0x0, 0x56}, 0x28) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x7, [@float={0x4, 0x0, 0x0, 0x10, 0xc}, @enum64={0xd, 0x3, 0x0, 0x13, 0x1, 0x0, [{0x1, 0x8, 0x1}, {0x4, 0xfffffffc, 0x3}, {0xf, 0xe6, 0xee}]}]}, {0x0, [0x5f, 0x5f, 0xb0, 0x30, 0x0]}}, &(0x7f0000000080)=""/193, 0x5b, 0xc1, 0x1, 0x7}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0xf3, 0x0, r0, 0x7, '\x00', 0x0, r1, 0x1, 0x0, 0x4}, 0x50) perf_event_open(&(0x7f0000000800)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7, 0xa, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.600727561s ago: executing program 2 (id=2673): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000f0ffffff0000000000000000000800000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff47) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x10, 0x3, 0x12, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r0, 0x0, 0x80000000}, 0x18) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r12) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r13 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r6, @ANYRES64=r5, @ANYRES8=r2, @ANYRES8=r4], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xa, 0x19, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000090000000000000000080000b7080000000000007b8af8ff00000000b7080000d70000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="de2de0", @ANYBLOB="00096517", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000583bc0ff080000000f2afeff0600000018230000", @ANYRESOCT=r8, @ANYBLOB="00000000000800008d500200040000009500000000000000"], &(0x7f00000004c0)='syzkaller\x00', 0x87e, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r13, 0x3, &(0x7f00000009c0)=[r7, r14, r11], &(0x7f0000000000)=[{0x1, 0x2, 0x1004, 0x8}, {0x4, 0x1, 0x0, 0x1}, {0x2, 0x2, 0x5, 0xc}], 0x10, 0x8}, 0x94) 1.476195641s ago: executing program 3 (id=2674): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000000000000000000000000181200", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00'], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00'], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, 0x0, 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x50) (async) r3 = bpf$MAP_CREATE(0x300000000000000, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x3, 0x5, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x2000141a) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047459, 0x2000000c) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047459, 0x2000000c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x24d9bb56c9a729a6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x50) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f0000000040)={'bridge0\x00', 0x400}) (async) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f0000000040)={'bridge0\x00', 0x400}) close(r9) 1.475583952s ago: executing program 0 (id=2675): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r3}, &(0x7f00000004c0), &(0x7f0000000540)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5}, 0x8228}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) 1.413989042s ago: executing program 0 (id=2676): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x7, 0x4, 0x80, 0xe, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) 1.356344162s ago: executing program 1 (id=2677): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x8, 0x0, 0x0}}, 0x10) r2 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) ioctl$TUNSETTXFILTER(r2, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r3 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) 1.256181473s ago: executing program 2 (id=2678): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000800)=ANY=[@ANYRESDEC=r0, @ANYRES16=r3, @ANYBLOB="007bca40225f5b224577a20000000000002600000000000000b803000002000000b70400000000000085000000570000009500000000000000000000000000000083778585c23e9329c40b7d073974f7004a3537fa52cd9ece79cf17c8753d96d5cdac8716eea095ea6010575ce3fbff0725204d89"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r9, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r9, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES32=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 868.195395ms ago: executing program 3 (id=2679): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1802000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x43, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x7}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x1a) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24}, 0x94) socketpair(0x1d, 0xa, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 832.133435ms ago: executing program 0 (id=2680): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x4, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r1, @ANYRESOCT=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff45, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r2, &(0x7f0000000ac0)="e52e0beb7a3de668fc7cd43ef5541d0beba688140ac12621f54e43f8ce93af8cf669d3b1dcdc55bb35dae70f042ff55561ff1798e73b3455ec2084c668c2dfcf92d0a5eaa3ebccb8b16590ac9a2e46857e44dd6b57e8b7c9f83cc5d77a6b26963848bc92bf058b97553f7f7a632b3f775a4d86cd36d5d6592514b33a911bcc45cfccc5128fe1c29c1313e1bd8e0d0268231b8518c63e50c7b65f37edd9d25f257079b23f98e9d5782378d8d9301e266be860d44ce9b50aa85bbdb2daa9ab4ebe8483556f45", &(0x7f0000000bc0)=""/170}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 500.634767ms ago: executing program 4 (id=2681): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) 499.238037ms ago: executing program 1 (id=2682): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 484.609087ms ago: executing program 3 (id=2683): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d73886eb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x6d) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270f"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x60000000}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), 0x0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="feffffff00", @ANYRES32=0x0], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xaf4}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x42, 0x42, 0xa, [@decl_tag={0x6, 0x0, 0x0, 0x11, 0x4, 0x5}, @datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x5, 0x9}], "d786"}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @func={0x8, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x5f, 0x5f, 0x5f, 0x30, 0x2e, 0x71, 0x30]}}, &(0x7f0000000c40)=""/252, 0x66, 0xfc, 0x1, 0x1, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1a, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000001}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}]}, &(0x7f0000000180)='syzkaller\x00', 0x3, 0x75, &(0x7f00000002c0)=""/117, 0x41100, 0x10, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000400)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0x10001, 0xc16}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x10, 0xfff}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="720ac4ff0000000071108d00000000009500000000000000ce2d754686fac65e96f63d877bd827c93bc520a0915eba37f95daa3d362ee0c7b51886931ed946fa8ccea6561de9d177272eb66335d9cd0662b5784df31ef9b0fcc4ba6afd6b0300000000000000496689823e6128f544"], &(0x7f0000000480)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0e00000004000000080000000180000004000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/15], 0x48) 421.708968ms ago: executing program 1 (id=2684): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x80000000}, 0x0, 0xc8, 0x0, 0x0, 0xfffffffffffffff9, 0xe}, 0xffffffffffffffff, 0x800000, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='kfree\x00', r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000980)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='rss_stat\x00'}, 0x18) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 378.483617ms ago: executing program 2 (id=2685): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRESHEX=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0xe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000080)='./file0\x00', r4}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r6}, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000b00)=ANY=[@ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="7005e62324000000", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r6, @ANYRES64=0x0], 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000010", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000500)='signal_generate\x00', r8}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000000)='./file0\x00', 0xe6) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000001000000000002000100000001000000", @ANYRES32, @ANYBLOB="000000020000000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 374.279518ms ago: executing program 0 (id=2686): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r3, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/203, 0xcb, 0x0, &(0x7f0000000600)=""/83, 0x53}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x18) unlink(0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061114c00000000009500000000001af2"], &(0x7f0000000000)='GPL\x00'}, 0x94) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="180400001852000008000000000000000000000085200000040000009500000000000000"], &(0x7f0000000740)='syzkaller\x00', 0x4e2d, 0xba, &(0x7f0000000780)=""/186, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x1, 0x6, 0x7041}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[r2, r3, r8], &(0x7f0000000900)=[{0x5, 0x5, 0x6, 0x1}, {0x5, 0x2, 0x0, 0x8}], 0x10, 0xffffffff}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r8, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r7, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000ac0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0], 0x0, 0x53, &(0x7f0000000bc0)=[{}, {}], 0x10, 0x10, &(0x7f0000000c00), &(0x7f0000000c40), 0x8, 0xd4, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e00)=r4, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x18, 0x13, &(0x7f00000010c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xaab0}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a80)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x10, '\x00', r11, 0x0, r12, 0x8, &(0x7f0000000e40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0xa, 0x80000000, 0xa7}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000ec0)=[r8, r8, r10], &(0x7f0000001040)=[{0x1, 0x4, 0xd, 0x5}, {0x4, 0x3, 0xa, 0x3}, {0x1, 0x2, 0x10, 0x8}, {0x2, 0x2, 0x4}, {0x0, 0x5, 0xd, 0xa}, {0x1, 0x4, 0x9, 0x7}, {0x1, 0x3, 0xe, 0x6}, {0x3, 0x3, 0x4, 0x7}], 0x10, 0x1}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x2a, 0x13, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}]}, &(0x7f0000000000)='GPL\x00', 0x80000001, 0xd, &(0x7f0000000280)=""/13, 0x41100, 0x61, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300)=[r13, r0], &(0x7f0000000340)=[{0x4, 0x3}, {0x1, 0x2, 0x9, 0xe}, {0x1, 0x1, 0x7}, {0x2, 0x3, 0x8, 0xa}, {0x4, 0x1, 0x9, 0xb}, {0x1, 0x4, 0x5, 0x7}, {0x5, 0x2, 0xc, 0xc}], 0x10, 0x5}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r14}, 0x10) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001"], 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r15}, 0x38) 365.569028ms ago: executing program 4 (id=2687): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x81, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) 263.561938ms ago: executing program 4 (id=2688): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000001080)=ANY=[@ANYBLOB="08000000040000000400000022bf0000000000002a53a6b00a9ea3775436a0e2545167c33f35e17cd2ead9c09bfb99bdfdb63f206bd57cf1336bb3ead3a3e96020717094ceb6272c66d0fa51dd0baa3863555b7a873f96c4a603a1bc", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000000}}, 0x0, 0xffd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) close(0xffffffffffffffff) 246.303738ms ago: executing program 1 (id=2689): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x44) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000005c0)='cgroup.max.descendants\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)=r4}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000700)=ANY=[@ANYBLOB='-', @ANYRESOCT], 0x27) 169.772089ms ago: executing program 4 (id=2690): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x3, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYBLOB="0000811323bc6fbd6db2f6a4d786c7b46c000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095ac35419e932d33f1f39faf75b1703a6e754e570f463c1afe2c4cd14d75fbd8d0d47a0cf580a8535457dfa764c65c3b3a038f2a4dba9ca5216c84369493bec704c77305be6031bbf8f9d1d27234023bc9cc51585788391157d3eabcee8882ae16b3d4e5d613a64c20e99e90a3bd9310a69ce2e3a902e1e37155e9d51c5e14362d72a378837e611b9f3309893c55cbd5103bf9ad71777af0d3876517"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000f1ffffffffff4a64ec8500000000"], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='rpc_clnt_new\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r4 = perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0xfffffffffffffffe, 0x2}, 0xc1f6152ebdc7d546, 0x2, 0x1, 0x0, 0x9, 0x5, 0x0, 0x0, 0x2, 0x0, 0x40}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) sendmsg$tipc(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000a40), 0x0, 0x0, 0x0, 0x4048c50}, 0x400c041) socketpair(0x1e, 0x1, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x49, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xf24, 0x7}, 0x0, 0xfffffffffffffffe, 0x0, 0x4, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580), &(0x7f00000005c0)=r8}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/570], &(0x7f0000000180)=""/147, 0x1bf, 0x93, 0x1, 0x2, 0xbac40e56252bcf20}, 0x28) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xc, &(0x7f0000000500)=ANY=[], &(0x7f0000000a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x7ff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r1, &(0x7f0000000280)="93937c7f5c39e3fb07fa5261453c0622be7a23b6dd8a79a1ed8d39f9e95ac4f4943bf4f2d4f4a2afd2901b17b67d5f980f8cef56c33b5fc34dfd2f0bd8c54a7c", &(0x7f00000002c0)=""/80}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='rxrpc_rtt_tx\x00', r10}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d00)=ANY=[], 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='blkio.bfq.idle_time\x00', 0x0, 0x0) 168.043689ms ago: executing program 1 (id=2691): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000fb7335db91850b43fd75f29cd0fa6ff6794fcfeda542311b2aee002da1a29d60b72c777a44f96002b043c21c38b280452208492d25873ea3c3ab065d51a33fd51d729a1085336990a3698a2ebe044d4aa5cc5dfc11d6"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000008000000020000000400000005000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000016193bb61d29c3810000006c461e00"/31], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="180000000500e7d8e3b300000400102800001815000027ea14802107527906d7bc32a002e97e4d7ad4f9d9a8d8b6fc740419c65ae09eb1bf", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xcd, 0xfc, &(0x7f0000000900)=""/252, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=[{0x5, 0x5, 0xf, 0x5}, {0x0, 0x3, 0xb}], 0x10, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) r5 = syz_clone(0x140020200, &(0x7f0000000580)="4712d6cfd85b8057b11a77680fb8651ec4b81f4d901e4a2180b874d3661b789c2ef4a4603e64d0e3217bbaf90320d20e044753c0ff75603f04be29ab6f1823c7b6eeac7165b07cca7ef74058e8276f4876b2d2b261ff7c4dc0ad3e20db60246b4e165c6de14b259ba1b696b9cf8de882305cfd5a0b5a079f2e36072ef6005bf10e3de0610d63332ee668cf9b2551250987def2b57d4240a5d05c2e4919d81f016a", 0xa1, &(0x7f00000003c0), &(0x7f0000000780), &(0x7f00000007c0)="cc060c0bb10e7df3ad77b120e10e4d68b594c2c2447c") syz_open_procfs$namespace(r5, 0xfffffffffffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0x2, 0x12) openat$cgroup_procs(r6, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 154.851949ms ago: executing program 3 (id=2692): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r4, 0x1e, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x15}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) (async) r6 = bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r6}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r6}, 0x50) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r7}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r7}, 0x18) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="18080000000000000000020000000000181000001cddedd6be05a87ee440152b9e82eb5b04d9e23e8943ae93ea77edef5197c1be7d198fbcb9d408de00f4ca2c4071a591edf8377e52ca801038e835f3d38adb9982fa5a1cf147adf5aa20d3671bfa8c60ced604848155dae0aa0b3c6532984f72c04289758dfda0c312e9dd4df30e7a1d", @ANYRES32=r8, @ANYBLOB="00000000000000007900e70000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) 80.588319ms ago: executing program 2 (id=2693): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x8, 0x0, 0x0}}, 0x10) r2 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) ioctl$TUNSETTXFILTER(r2, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r3 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) 0s ago: executing program 1 (id=2694): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095000000000000001dcdd739364f4105a460085d42722957cb87f0078e0a13d26307a4e2898ce065b7dc8a536e81d93a631c1d516277e53d2f7119589a1c3016bed8bb077ad13dee038aab4bf3daa05afb971becbb4e2d2b2358157f5b8eb71aad52fcbcc50c4d93b81400"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095000000000000001dcdd739364f4105a460085d42722957cb87f0078e0a13d26307a4e2898ce065b7dc8a536e81d93a631c1d516277e53d2f7119589a1c3016bed8bb077ad13dee038aab4bf3daa05afb971becbb4e2d2b2358157f5b8eb71aad52fcbcc50c4d93b81400"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000080), &(0x7f00000000c0)=r4}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r4}, 0x20) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r6, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a40)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x11, 0x21, &(0x7f0000000e00)=ANY=[@ANYBLOB="18000000030000003e834ca452655cc49e976d0000009cca03c1be8720d501", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000300000085000000060000009500000000000000ca57fcff09000000ec330800f0ffffff950000000000000085200000040000008520000005000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000004c0)='syzkaller\x00', 0xfffffff9, 0x63, &(0x7f0000000780)=""/99, 0x41000, 0x9, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000940)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r6, r9, r1, r6, r2]}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x16, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x7, 0xbd, &(0x7f0000000680)=""/189, 0x41000, 0xc25c9a3e0189acba, '\x00', r8, 0x25, r7, 0x8, &(0x7f0000000600)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x0, 0x8, 0x97b, 0x6}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000c40)=[r9, r1, r7, r2], &(0x7f0000000c80)=[{0x3, 0x5, 0x6, 0x5}, {0x1, 0x1, 0xb, 0xc}, {0x5, 0x4, 0x1}, {0x1, 0x3, 0x0, 0x3}, {0xd, 0x3, 0x10, 0x5}, {0x4, 0x5, 0x0, 0x1}, {0x4, 0x4, 0xa, 0x4}, {0x3, 0x2, 0x1, 0xc}, {0x0, 0x3, 0x2, 0x3}], 0x10, 0xffffffff, @value=r7}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0x800000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r10}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r10}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r11, 0x401054d5, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x28, 0xfc, 0x0, 0xfffff034}, {0x6, 0x0, 0xff, 0x9}]}) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r12}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r12}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r14) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r15, &(0x7f0000000840)}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r15, &(0x7f0000000840)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000"], 0xfdef) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r16, &(0x7f0000000000)=ANY=[], 0xfdef) kernel console output (not intermixed with test programs): bridge_slave_1) entered blocking state [ 24.134526][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.141926][ T279] device bridge_slave_1 entered promiscuous mode [ 24.171480][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.178545][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.186150][ T278] device bridge_slave_0 entered promiscuous mode [ 24.194020][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.201115][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.208480][ T278] device bridge_slave_1 entered promiscuous mode [ 24.219435][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.226536][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.234002][ T277] device bridge_slave_0 entered promiscuous mode [ 24.240887][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.248022][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.255461][ T277] device bridge_slave_1 entered promiscuous mode [ 24.305561][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.312629][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.320003][ T276] device bridge_slave_0 entered promiscuous mode [ 24.326963][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.334117][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.341747][ T276] device bridge_slave_1 entered promiscuous mode [ 24.426611][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.433686][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.440982][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.448008][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.489358][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.496438][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.503740][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.510779][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.533918][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.541003][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.548244][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.555289][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.566680][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.573784][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.581072][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.588101][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.604655][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.611804][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.619058][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.626128][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.645366][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.652824][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.659965][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.667410][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.674949][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.682211][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.689334][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.696580][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.703909][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.711318][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.718935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.726416][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.753133][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.760604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.768812][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.776035][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.784333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.792984][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.800001][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.808138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.824966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.833186][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.840195][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.848127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.856529][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.863588][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.871624][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.884848][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.892851][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.901440][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.908463][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.916141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.924087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.941623][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.949779][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.956835][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.964333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.972392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.980301][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.010395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.024396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.033700][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.040767][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.048554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.056749][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.063797][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.071188][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.079083][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.087082][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.095333][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.102380][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.109948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.118153][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.125198][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.132582][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.140475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.148518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.156875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.164418][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.173786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.182136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.190105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.198203][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.211105][ T275] device veth0_vlan entered promiscuous mode [ 25.220474][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.228905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.243106][ T276] device veth0_vlan entered promiscuous mode [ 25.252652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.261449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.269713][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.277712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.285805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.294116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.302471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.310006][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.321733][ T279] device veth0_vlan entered promiscuous mode [ 25.329283][ T275] device veth1_macvtap entered promiscuous mode [ 25.337797][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.346395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.354548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.362795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.371054][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.378762][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.386871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.397979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.407639][ T276] device veth1_macvtap entered promiscuous mode [ 25.419498][ T278] device veth0_vlan entered promiscuous mode [ 25.427166][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.435443][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.443907][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.451517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.459369][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.467787][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.487989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.496714][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.505130][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.513528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.521782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.530232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.538616][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.549273][ T277] device veth0_vlan entered promiscuous mode [ 25.560463][ T279] device veth1_macvtap entered promiscuous mode [ 25.567502][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 25.569881][ T278] device veth1_macvtap entered promiscuous mode [ 25.582545][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.590456][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.598969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.607302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.615844][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.624069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.632249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.639833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.647439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.661579][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.681796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.690042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.699038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.708330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.716911][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.725492][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.734333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.743018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.751629][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.760079][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.768718][ T277] device veth1_macvtap entered promiscuous mode [ 25.832580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.840538][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.865478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.870628][ C0] hrtimer: interrupt took 26597 ns [ 25.897290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.923801][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.350188][ T343] device syzkaller0 entered promiscuous mode [ 26.415624][ T349] device veth0_vlan left promiscuous mode [ 26.460167][ T349] device veth0_vlan entered promiscuous mode [ 27.550748][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 27.550760][ T24] audit: type=1400 audit(1761830701.160:113): avc: denied { create } for pid=401 comm="syz.4.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 27.743356][ T405] device syzkaller0 entered promiscuous mode [ 28.665260][ T456] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.672538][ T456] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.893777][ T582] tap0: tun_chr_ioctl cmd 1074025677 [ 30.899117][ T582] tap0: linktype set to 769 [ 30.962217][ T585] cgroup: syz.1.79 (585) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 31.011376][ T585] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 31.091298][ T575] device bridge_slave_1 left promiscuous mode [ 31.103007][ T575] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.123554][ T575] device bridge_slave_0 left promiscuous mode [ 31.131895][ T575] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.531263][ T606] device sit0 entered promiscuous mode [ 31.576179][ T612] device sit0 entered promiscuous mode [ 31.721426][ T625] ------------[ cut here ]------------ [ 31.781333][ T625] trace type BPF program uses run-time allocation [ 31.787995][ T625] WARNING: CPU: 0 PID: 625 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 31.940988][ T625] Modules linked in: [ 31.965031][ T625] CPU: 1 PID: 625 Comm: syz.2.90 Not tainted syzkaller #0 [ 32.014624][ T625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 32.125051][ T625] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 32.131911][ T625] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 32.158117][ T625] RSP: 0018:ffffc900011d7468 EFLAGS: 00010246 [ 32.164576][ T625] RAX: 428635e147d2c700 RBX: 0000000000000001 RCX: ffff88811995cf00 [ 32.172790][ T625] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 32.181545][ T625] RBP: ffffc900011d74b0 R08: dffffc0000000000 R09: ffffed103ee04e8b [ 32.208312][ T625] R10: ffffed103ee04e8b R11: 1ffff1103ee04e8a R12: ffff888118264000 [ 32.231318][ T625] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88812627d800 [ 32.263247][ T625] FS: 00007fc0d7ed16c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 32.404130][ T625] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.480485][ T625] CR2: 0000000100000000 CR3: 000000011e136000 CR4: 00000000003506a0 [ 32.539561][ T625] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.590698][ T625] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 32.650189][ T625] Call Trace: [ 32.677200][ T625] ? __fdget+0x1a1/0x230 [ 32.720053][ T625] resolve_pseudo_ldimm64+0x526/0x1020 [ 32.730945][ T625] ? bpf_check+0xd680/0xd680 [ 32.735650][ T625] ? kvmalloc_node+0x88/0x130 [ 32.751999][ T625] bpf_check+0x8d4b/0xd680 [ 32.756473][ T625] ? bpf_get_btf_vmlinux+0x60/0x60 [ 32.761885][ T625] ? bpf_prog_00798911c748094f+0x424/0x5a4 [ 32.767721][ T625] ? is_bpf_text_address+0x177/0x190 [ 32.781279][ T625] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.786806][ T625] ? __kernel_text_address+0xa0/0x100 [ 32.851444][ T625] ? unwind_get_return_address+0x4d/0x90 [ 32.857211][ T625] ? stack_trace_save+0xe0/0xe0 [ 32.862447][ T625] ? arch_stack_walk+0xee/0x140 [ 32.867456][ T625] ? stack_trace_save+0x98/0xe0 [ 32.872644][ T625] ? stack_trace_snprint+0xf0/0xf0 [ 32.877822][ T625] ? __kasan_slab_alloc+0x69/0xf0 [ 32.885717][ T625] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.892887][ T625] ? __kasan_kmalloc+0xec/0x110 [ 32.897770][ T625] ? __kasan_kmalloc+0xda/0x110 [ 32.929843][ T625] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 32.935780][ T625] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.941533][ T625] ? security_bpf_prog_alloc+0x62/0x90 [ 32.970995][ T625] ? bpf_prog_load+0x949/0x1420 [ 32.986209][ T625] ? __se_sys_bpf+0x442/0x680 [ 33.036862][ T625] ? __x64_sys_bpf+0x7b/0x90 [ 33.046947][ T625] ? do_syscall_64+0x31/0x40 [ 33.061881][ T625] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.079089][ T625] ? memset+0x35/0x40 [ 33.089227][ T625] ? bpf_obj_name_cpy+0x193/0x1e0 [ 33.107840][ T625] bpf_prog_load+0xf5a/0x1420 [ 33.129484][ T625] ? map_freeze+0x320/0x320 [ 33.134142][ T625] ? selinux_bpf+0xc7/0xf0 [ 33.136672][ T670] device veth0_vlan left promiscuous mode [ 33.138618][ T625] ? security_bpf+0x82/0xa0 [ 33.148990][ T625] __se_sys_bpf+0x442/0x680 [ 33.168903][ T670] device veth0_vlan entered promiscuous mode [ 33.175459][ T625] ? __x64_sys_bpf+0x90/0x90 [ 33.180089][ T625] ? __kasan_check_read+0x11/0x20 [ 33.229723][ T625] __x64_sys_bpf+0x7b/0x90 [ 33.234256][ T625] do_syscall_64+0x31/0x40 [ 33.244111][ T625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.250057][ T625] RIP: 0033:0x7fc0d9468fc9 [ 33.266390][ T625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.286939][ T625] RSP: 002b:00007fc0d7ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.295488][ T625] RAX: ffffffffffffffda RBX: 00007fc0d96bffa0 RCX: 00007fc0d9468fc9 [ 33.315257][ T679] device veth0_vlan left promiscuous mode [ 33.321972][ T679] device veth0_vlan entered promiscuous mode [ 33.328035][ T625] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 33.380766][ T625] RBP: 00007fc0d94ebf91 R08: 0000000000000000 R09: 0000000000000000 [ 33.415012][ T625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 33.440092][ T625] R13: 00007fc0d96c0038 R14: 00007fc0d96bffa0 R15: 00007ffef7911ae8 [ 33.454846][ T625] ---[ end trace aeb4b602a489d69b ]--- [ 35.548238][ T776] device syzkaller0 entered promiscuous mode [ 35.554386][ T24] audit: type=1400 audit(1761830709.160:114): avc: denied { ioctl } for pid=778 comm="syz.2.128" path="uts:[4026532589]" dev="nsfs" ino=4026532589 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 36.814144][ T834] device sit0 left promiscuous mode [ 36.957842][ T834] device sit0 entered promiscuous mode [ 37.389646][ T24] audit: type=1400 audit(1761830711.000:115): avc: denied { create } for pid=862 comm="syz.2.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 37.505982][ T859] device pim6reg1 entered promiscuous mode [ 37.511749][ T24] audit: type=1400 audit(1761830711.040:116): avc: denied { create } for pid=862 comm="syz.2.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 37.604410][ T24] audit: type=1400 audit(1761830711.140:117): avc: denied { relabelfrom } for pid=860 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.707042][ T24] audit: type=1400 audit(1761830711.140:118): avc: denied { relabelto } for pid=860 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.840343][ T24] audit: type=1400 audit(1761830711.450:119): avc: denied { cpu } for pid=885 comm="syz.3.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.406011][ T893] device syzkaller0 entered promiscuous mode [ 39.061722][ T24] audit: type=1400 audit(1761830712.680:120): avc: denied { create } for pid=934 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 39.467967][ T24] audit: type=1400 audit(1761830713.080:121): avc: denied { create } for pid=960 comm="syz.4.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 39.518694][ T951] device veth1_to_team entered promiscuous mode [ 39.586784][ T969] syz.1.184[969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.586874][ T969] syz.1.184[969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.600722][ T958] device wg2 entered promiscuous mode [ 39.952471][ T998] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 40.193507][ T24] audit: type=1400 audit(1761830713.810:122): avc: denied { create } for pid=1020 comm="syz.4.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 40.987805][ T24] audit: type=1400 audit(1761830714.600:123): avc: denied { create } for pid=1071 comm="syz.4.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.456075][ T1084] device syzkaller0 entered promiscuous mode [ 41.761586][ T1089] device dummy0 entered promiscuous mode [ 42.311087][ T24] audit: type=1400 audit(1761830715.920:124): avc: denied { create } for pid=1109 comm="syz.2.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 43.000350][ T24] audit: type=1400 audit(1761830716.610:125): avc: denied { create } for pid=1136 comm="syz.2.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 43.078134][ T1139] device syzkaller0 entered promiscuous mode [ 43.631035][ T1196] device pim6reg1 entered promiscuous mode [ 43.944789][ T1208] syz.2.260[1208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.944924][ T1208] syz.2.260[1208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.267430][ T24] audit: type=1400 audit(1761830717.880:126): avc: denied { ioctl } for pid=1222 comm="syz.2.264" path="socket:[18495]" dev="sockfs" ino=18495 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.471910][ T1230] syz.4.266 uses obsolete (PF_INET,SOCK_PACKET) [ 44.497384][ T24] audit: type=1400 audit(1761830718.110:127): avc: denied { create } for pid=1228 comm="syz.4.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.656008][ T24] audit: type=1400 audit(1761830718.270:128): avc: denied { create } for pid=1243 comm="syz.2.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 45.513690][ T1296] device sit0 left promiscuous mode [ 45.539508][ T1296] device sit0 entered promiscuous mode [ 45.700220][ T24] audit: type=1400 audit(1761830719.310:129): avc: denied { create } for pid=1309 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 46.178168][ T1327] ÿÿÿÿÿÿ: renamed from vlan1 [ 46.812859][ T24] audit: type=1400 audit(1761830720.430:130): avc: denied { create } for pid=1345 comm="syz.3.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 48.318412][ T1414] device veth0_vlan left promiscuous mode [ 48.332746][ T1414] device veth0_vlan entered promiscuous mode [ 48.340012][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.349153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.361798][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.462009][ T1419] syz.4.326[1419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.462166][ T1419] syz.4.326[1419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.131692][ T24] audit: type=1400 audit(1761830722.750:131): avc: denied { tracepoint } for pid=1431 comm="syz.2.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 49.943004][ T1455] FAULT_INJECTION: forcing a failure. [ 49.943004][ T1455] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 49.956127][ T1455] CPU: 0 PID: 1455 Comm: syz.1.336 Tainted: G W syzkaller #0 [ 49.964810][ T1455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 49.974970][ T1455] Call Trace: [ 49.978287][ T1455] __dump_stack+0x21/0x24 [ 49.982664][ T1455] dump_stack_lvl+0x169/0x1d8 [ 49.987368][ T1455] ? show_regs_print_info+0x18/0x18 [ 49.992586][ T1455] ? no_context+0x108/0xb60 [ 49.997100][ T1455] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.003176][ T1455] dump_stack+0x15/0x1c [ 50.007346][ T1455] should_fail+0x3c1/0x510 [ 50.011774][ T1455] should_fail_usercopy+0x1a/0x20 [ 50.017074][ T1455] strncpy_from_user+0x24/0x2e0 [ 50.021937][ T1455] strncpy_from_user_nofault+0x73/0x150 [ 50.027596][ T1455] bpf_trace_printk+0x83a/0xd30 [ 50.032550][ T1455] ? bpf_probe_write_user+0xf0/0xf0 [ 50.037758][ T1455] ? _raw_spin_lock+0x8e/0xe0 [ 50.042448][ T1455] ? _raw_spin_unlock+0x4d/0x70 [ 50.047305][ T1455] ? skb_release_data+0x532/0x670 [ 50.052415][ T1455] bpf_prog_7c77c7e0f6645ad8+0x35/0xd00 [ 50.058048][ T1455] bpf_trace_run2+0xb3/0x200 [ 50.062644][ T1455] ? bpf_trace_run1+0x200/0x200 [ 50.067496][ T1455] ? skb_release_data+0x532/0x670 [ 50.072521][ T1455] ? skb_release_data+0x532/0x670 [ 50.077544][ T1455] __bpf_trace_kmem_free+0x6f/0x90 [ 50.082656][ T1455] ? skb_release_data+0x532/0x670 [ 50.087675][ T1455] kfree+0x24a/0x270 [ 50.091570][ T1455] skb_release_data+0x532/0x670 [ 50.096419][ T1455] kfree_skb+0xb9/0x2f0 [ 50.100572][ T1455] ip6_rcv_core+0xa66/0x1300 [ 50.105165][ T1455] ipv6_rcv+0xca/0x210 [ 50.109231][ T1455] ? ip6_rcv_finish+0x360/0x360 [ 50.114074][ T1455] ? do_kern_addr_fault+0x80/0x80 [ 50.119268][ T1455] ? __kasan_check_write+0x14/0x20 [ 50.124379][ T1455] ? __alloc_skb+0x38b/0x520 [ 50.128981][ T1455] ? ip6_rcv_finish+0x360/0x360 [ 50.133861][ T1455] __netif_receive_skb+0xc8/0x280 [ 50.139004][ T1455] ? ktime_get_with_offset+0x187/0x1e0 [ 50.144468][ T1455] netif_receive_skb+0x9b/0x3d0 [ 50.149494][ T1455] ? netif_receive_skb_core+0x100/0x100 [ 50.155041][ T1455] ? virtio_net_hdr_to_skb+0x6d1/0x10c0 [ 50.160582][ T1455] tun_rx_batched+0x5e8/0x710 [ 50.165263][ T1455] ? local_bh_enable+0x30/0x30 [ 50.170022][ T1455] tun_get_user+0x25d0/0x3090 [ 50.174733][ T1455] ? __x64_sys_openat+0x136/0x160 [ 50.179754][ T1455] ? tun_do_read+0x1c00/0x1c00 [ 50.184516][ T1455] ? kstrtouint_from_user+0x1a0/0x200 [ 50.189891][ T1455] ? __fsnotify_parent+0x5f5/0x6c0 [ 50.195021][ T1455] ? avc_policy_seqno+0x1b/0x70 [ 50.199873][ T1455] ? selinux_file_permission+0x2a5/0x510 [ 50.205500][ T1455] ? fsnotify_perm+0x66/0x4b0 [ 50.210614][ T1455] tun_chr_write_iter+0x1bf/0x270 [ 50.215733][ T1455] vfs_write+0x725/0xd60 [ 50.219974][ T1455] ? kernel_write+0x3c0/0x3c0 [ 50.224761][ T1455] ? __fget_files+0x2c4/0x320 [ 50.229439][ T1455] ? __fdget_pos+0x1f7/0x380 [ 50.234119][ T1455] ? ksys_write+0x71/0x240 [ 50.238546][ T1455] ksys_write+0x140/0x240 [ 50.242964][ T1455] ? __ia32_sys_read+0x90/0x90 [ 50.247825][ T1455] ? debug_smp_processor_id+0x17/0x20 [ 50.253574][ T1455] __x64_sys_write+0x7b/0x90 [ 50.258170][ T1455] do_syscall_64+0x31/0x40 [ 50.262679][ T1455] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.268828][ T1455] RIP: 0033:0x7f357d701fc9 [ 50.273252][ T1455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.293235][ T1455] RSP: 002b:00007f357c16a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.301651][ T1455] RAX: ffffffffffffffda RBX: 00007f357d958fa0 RCX: 00007f357d701fc9 [ 50.309621][ T1455] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 50.317593][ T1455] RBP: 00007f357c16a090 R08: 0000000000000000 R09: 0000000000000000 [ 50.325624][ T1455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.333605][ T1455] R13: 00007f357d959038 R14: 00007f357d958fa0 R15: 00007fff08548098 [ 50.986229][ T1484] tap0: tun_chr_ioctl cmd 1074025675 [ 50.998378][ T1484] tap0: persist enabled [ 51.003357][ T1484] tap0: tun_chr_ioctl cmd 1074025675 [ 51.008805][ T1484] tap0: persist disabled [ 52.262731][ T24] audit: type=1400 audit(1761830725.880:132): avc: denied { write } for pid=1531 comm="syz.4.364" name="cgroup.subtree_control" dev="cgroup2" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 52.316307][ T1532] device veth0_vlan left promiscuous mode [ 52.352177][ T1532] device veth0_vlan entered promiscuous mode [ 52.388934][ T24] audit: type=1400 audit(1761830725.880:133): avc: denied { open } for pid=1531 comm="syz.4.364" path="" dev="cgroup2" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 52.422731][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.441477][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.469430][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 53.891978][ T1560] device syzkaller0 entered promiscuous mode [ 53.941288][ T1563] device wg2 left promiscuous mode [ 53.991682][ T1567] device syzkaller0 entered promiscuous mode [ 55.678361][ T1620] device syzkaller0 entered promiscuous mode [ 55.816743][ T1621] device sit0 entered promiscuous mode [ 56.235817][ T1658] device veth0_vlan left promiscuous mode [ 56.266541][ T1658] device veth0_vlan entered promiscuous mode [ 56.963466][ T1714] syz.3.415[1714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.963552][ T1714] syz.3.415[1714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.758521][ T1727] device syzkaller0 entered promiscuous mode [ 57.957181][ T1735] device veth1_macvtap left promiscuous mode [ 60.325966][ T1875] device syzkaller0 entered promiscuous mode [ 63.869554][ T24] audit: type=1400 audit(1761830737.480:134): avc: denied { create } for pid=2042 comm="syz.0.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 64.122110][ T2062] device veth0_to_team entered promiscuous mode [ 64.176882][ T2062] device syzkaller0 entered promiscuous mode [ 64.281549][ T2069] device syzkaller0 entered promiscuous mode [ 64.581276][ T2084] FAULT_INJECTION: forcing a failure. [ 64.581276][ T2084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.636146][ T2084] CPU: 1 PID: 2084 Comm: syz.4.527 Tainted: G W syzkaller #0 [ 64.644870][ T2084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 64.654943][ T2084] Call Trace: [ 64.658263][ T2084] __dump_stack+0x21/0x24 [ 64.662719][ T2084] dump_stack_lvl+0x169/0x1d8 [ 64.667421][ T2084] ? thaw_kernel_threads+0x220/0x220 [ 64.672720][ T2084] ? vsnprintf+0x1871/0x1960 [ 64.677325][ T2084] ? show_regs_print_info+0x18/0x18 [ 64.682548][ T2084] dump_stack+0x15/0x1c [ 64.686982][ T2084] should_fail+0x3c1/0x510 [ 64.691408][ T2084] should_fail_usercopy+0x1a/0x20 [ 64.696445][ T2084] _copy_to_user+0x20/0x90 [ 64.700870][ T2084] simple_read_from_buffer+0xe9/0x160 [ 64.706250][ T2084] proc_fail_nth_read+0x19a/0x210 [ 64.711282][ T2084] ? proc_fault_inject_write+0x2f0/0x2f0 [ 64.716921][ T2084] ? rw_verify_area+0x1c0/0x360 [ 64.721790][ T2084] ? proc_fault_inject_write+0x2f0/0x2f0 [ 64.727565][ T2084] vfs_read+0x1fe/0xa10 [ 64.731825][ T2084] ? kernel_read+0x70/0x70 [ 64.736258][ T2084] ? __kasan_check_write+0x14/0x20 [ 64.741392][ T2084] ? mutex_lock+0x8c/0xe0 [ 64.745735][ T2084] ? mutex_trylock+0xa0/0xa0 [ 64.750336][ T2084] ? __fget_files+0x2c4/0x320 [ 64.755028][ T2084] ? __fdget_pos+0x2d2/0x380 [ 64.759625][ T2084] ? ksys_read+0x71/0x240 [ 64.764140][ T2084] ksys_read+0x140/0x240 [ 64.768392][ T2084] ? vfs_write+0xd60/0xd60 [ 64.772828][ T2084] ? ____fput+0x15/0x20 [ 64.776995][ T2084] ? task_work_run+0x170/0x190 [ 64.781769][ T2084] ? __kasan_check_read+0x11/0x20 [ 64.786820][ T2084] __x64_sys_read+0x7b/0x90 [ 64.791402][ T2084] do_syscall_64+0x31/0x40 [ 64.793232][ T24] audit: type=1400 audit(1761830738.250:135): avc: denied { create } for pid=2076 comm="syz.2.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 64.795843][ T2084] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.795860][ T2084] RIP: 0033:0x7f283d46b9dc [ 64.825820][ T2084] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 64.845892][ T2084] RSP: 002b:00007f283beb4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 64.854326][ T2084] RAX: ffffffffffffffda RBX: 00007f283d6c4090 RCX: 00007f283d46b9dc [ 64.862400][ T2084] RDX: 000000000000000f RSI: 00007f283beb40a0 RDI: 0000000000000008 [ 64.870384][ T2084] RBP: 00007f283beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 64.878374][ T2084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.886360][ T2084] R13: 00007f283d6c4128 R14: 00007f283d6c4090 R15: 00007ffc56b7c878 [ 65.490101][ T24] audit: type=1400 audit(1761830739.100:136): avc: denied { create } for pid=2118 comm="syz.2.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 65.537416][ T2122] device veth0_vlan left promiscuous mode [ 65.547956][ T2122] device veth0_vlan entered promiscuous mode [ 65.962143][ T2149] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 65.968065][ T2149] syzkaller0: linktype set to 773 [ 66.094080][ T2157] device veth1_macvtap entered promiscuous mode [ 66.120960][ T2157] device macsec0 entered promiscuous mode [ 66.128721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.141881][ T2163] device sit0 left promiscuous mode [ 66.176254][ T2163] device sit0 entered promiscuous mode [ 66.430674][ T2177] device sit0 left promiscuous mode [ 66.451738][ T2175] device veth0_vlan left promiscuous mode [ 66.496826][ T24] audit: type=1400 audit(1761830740.100:137): avc: denied { create } for pid=2168 comm="syz.1.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 66.595021][ T2175] device veth0_vlan entered promiscuous mode [ 66.678429][ T2180] device sit0 entered promiscuous mode [ 66.869210][ T2179] device pim6reg1 entered promiscuous mode [ 66.882660][ T24] audit: type=1400 audit(1761830740.500:138): avc: denied { create } for pid=2192 comm="syz.4.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 67.665628][ T2231] device pim6reg1 entered promiscuous mode [ 69.740899][ T24] audit: type=1400 audit(1761830743.330:139): avc: denied { create } for pid=2305 comm="syz.1.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 69.986839][ T2314] device veth0_vlan left promiscuous mode [ 70.000003][ T2314] device veth0_vlan entered promiscuous mode [ 70.045082][ T2306] device sit0 entered promiscuous mode [ 70.480415][ T2318] ÿÿÿÿÿÿ: renamed from vlan1 [ 71.730143][ T2356] device pim6reg1 entered promiscuous mode [ 71.945610][ T2365] device veth0_vlan left promiscuous mode [ 71.952678][ T2365] device veth0_vlan entered promiscuous mode [ 71.972716][ T2362] device sit0 left promiscuous mode [ 72.778637][ T2362] device sit0 entered promiscuous mode [ 73.385183][ T2389] device sit0 entered promiscuous mode [ 73.684584][ T2403] device sit0 left promiscuous mode [ 73.787456][ T2403] device sit0 entered promiscuous mode [ 75.256258][ T2454] device pim6reg1 entered promiscuous mode [ 77.111216][ T2516] cgroup: fork rejected by pids controller in /syz4 [ 77.503569][ T2626] device pim6reg1 entered promiscuous mode [ 77.881010][ T2646] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.893762][ T2646] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.930068][ T2646] device bridge_slave_0 entered promiscuous mode [ 77.979389][ T2646] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.022245][ T2646] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.089084][ T2646] device bridge_slave_1 entered promiscuous mode [ 78.442615][ T9] device bridge_slave_1 left promiscuous mode [ 78.461310][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.590969][ T9] device bridge_slave_0 left promiscuous mode [ 78.635476][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.652050][ T9] device veth1_macvtap left promiscuous mode [ 78.662559][ T9] device veth0_vlan left promiscuous mode [ 78.819855][ T24] audit: type=1400 audit(1761830752.430:140): avc: denied { create } for pid=2646 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.843430][ T24] audit: type=1400 audit(1761830752.460:141): avc: denied { write } for pid=2646 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.888397][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.900474][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.908150][ T24] audit: type=1400 audit(1761830752.460:142): avc: denied { read } for pid=2646 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.991366][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.055786][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.083896][ T835] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.091094][ T835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.098808][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.107744][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.116207][ T835] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.123285][ T835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.130795][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.138745][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.146792][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.177060][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.194973][ T2646] device veth0_vlan entered promiscuous mode [ 79.203201][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.217163][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.231361][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.294808][ T2646] device veth1_macvtap entered promiscuous mode [ 79.331199][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.342744][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.352114][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.361182][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.369587][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.527277][ T2705] FAULT_INJECTION: forcing a failure. [ 79.527277][ T2705] name failslab, interval 1, probability 0, space 0, times 1 [ 79.643337][ T2705] CPU: 1 PID: 2705 Comm: syz.3.687 Tainted: G W syzkaller #0 [ 79.652055][ T2705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 79.662120][ T2705] Call Trace: [ 79.665429][ T2705] __dump_stack+0x21/0x24 [ 79.669802][ T2705] dump_stack_lvl+0x169/0x1d8 [ 79.674599][ T2705] ? thaw_kernel_threads+0x220/0x220 [ 79.679924][ T2705] ? show_regs_print_info+0x18/0x18 [ 79.685138][ T2705] dump_stack+0x15/0x1c [ 79.689301][ T2705] should_fail+0x3c1/0x510 [ 79.693746][ T2705] ? __alloc_skb+0x9e/0x520 [ 79.698260][ T2705] __should_failslab+0xa4/0xe0 [ 79.703038][ T2705] should_failslab+0x9/0x20 [ 79.707561][ T2705] kmem_cache_alloc+0x3d/0x2e0 [ 79.712339][ T2705] __alloc_skb+0x9e/0x520 [ 79.716694][ T2705] alloc_skb_with_frags+0xa2/0x560 [ 79.721821][ T2705] sock_alloc_send_pskb+0x853/0x980 [ 79.727069][ T2705] ? is_bpf_text_address+0x177/0x190 [ 79.732374][ T2705] ? __kernel_text_address+0xa0/0x100 [ 79.737764][ T2705] ? sock_kzfree_s+0x60/0x60 [ 79.742369][ T2705] ? stack_trace_save+0x98/0xe0 [ 79.747314][ T2705] tun_get_user+0x4bd/0x3090 [ 79.751914][ T2705] ? __x64_sys_openat+0x136/0x160 [ 79.756955][ T2705] ? tun_do_read+0x1c00/0x1c00 [ 79.761813][ T2705] ? kstrtouint_from_user+0x1a0/0x200 [ 79.767204][ T2705] ? __fsnotify_parent+0x5f5/0x6c0 [ 79.772424][ T2705] ? avc_policy_seqno+0x1b/0x70 [ 79.777288][ T2705] ? selinux_file_permission+0x2a5/0x510 [ 79.782939][ T2705] ? fsnotify_perm+0x66/0x4b0 [ 79.787645][ T2705] tun_chr_write_iter+0x1bf/0x270 [ 79.792681][ T2705] vfs_write+0x725/0xd60 [ 79.796933][ T2705] ? __kasan_slab_free+0x11/0x20 [ 79.801882][ T2705] ? kernel_write+0x3c0/0x3c0 [ 79.806568][ T2705] ? __fget_files+0x2c4/0x320 [ 79.811267][ T2705] ? __fdget_pos+0x1f7/0x380 [ 79.815861][ T2705] ? ksys_write+0x71/0x240 [ 79.820279][ T2705] ksys_write+0x140/0x240 [ 79.824629][ T2705] ? __ia32_sys_read+0x90/0x90 [ 79.829405][ T2705] ? debug_smp_processor_id+0x17/0x20 [ 79.834787][ T2705] __x64_sys_write+0x7b/0x90 [ 79.839382][ T2705] do_syscall_64+0x31/0x40 [ 79.843832][ T2705] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 79.849739][ T2705] RIP: 0033:0x7f28122d8fc9 [ 79.854172][ T2705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.873787][ T2705] RSP: 002b:00007f2810d41038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 79.882399][ T2705] RAX: ffffffffffffffda RBX: 00007f281252ffa0 RCX: 00007f28122d8fc9 [ 79.890540][ T2705] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 79.898534][ T2705] RBP: 00007f2810d41090 R08: 0000000000000000 R09: 0000000000000000 [ 79.906519][ T2705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.914506][ T2705] R13: 00007f2812530038 R14: 00007f281252ffa0 R15: 00007ffeb3d905c8 [ 79.931067][ T2707] device sit0 left promiscuous mode [ 80.025930][ T2707] device sit0 entered promiscuous mode [ 80.575300][ T2737] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.587044][ T2737] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.698846][ T2746] FAULT_INJECTION: forcing a failure. [ 80.698846][ T2746] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 80.727885][ T2746] CPU: 1 PID: 2746 Comm: syz.2.701 Tainted: G W syzkaller #0 [ 80.736597][ T2746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 80.746664][ T2746] Call Trace: [ 80.749980][ T2746] __dump_stack+0x21/0x24 [ 80.754328][ T2746] dump_stack_lvl+0x169/0x1d8 [ 80.759023][ T2746] ? show_regs_print_info+0x18/0x18 [ 80.764243][ T2746] ? slab_post_alloc_hook+0x5d/0x2f0 [ 80.769570][ T2746] ? __alloc_skb+0x9e/0x520 [ 80.774095][ T2746] ? alloc_skb_with_frags+0xa2/0x560 [ 80.779476][ T2746] ? sock_alloc_send_pskb+0x853/0x980 [ 80.784859][ T2746] ? tun_chr_write_iter+0x1bf/0x270 [ 80.790064][ T2746] dump_stack+0x15/0x1c [ 80.794223][ T2746] should_fail+0x3c1/0x510 [ 80.798641][ T2746] should_fail_alloc_page+0x4f/0x60 [ 80.803842][ T2746] __alloc_pages_nodemask+0x109/0x5f0 [ 80.809225][ T2746] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 80.814777][ T2746] kmalloc_order+0x4c/0x160 [ 80.819278][ T2746] ? slab_post_alloc_hook+0x7d/0x2f0 [ 80.824668][ T2746] kmalloc_order_trace+0x16/0x80 [ 80.829634][ T2746] __kmalloc_track_caller+0x1d7/0x320 [ 80.835000][ T2746] ? __alloc_skb+0x9e/0x520 [ 80.839496][ T2746] ? alloc_skb_with_frags+0xa2/0x560 [ 80.844776][ T2746] __alloc_skb+0xdc/0x520 [ 80.849101][ T2746] alloc_skb_with_frags+0xa2/0x560 [ 80.854206][ T2746] sock_alloc_send_pskb+0x853/0x980 [ 80.859403][ T2746] ? is_bpf_text_address+0x177/0x190 [ 80.864683][ T2746] ? __kernel_text_address+0xa0/0x100 [ 80.870051][ T2746] ? sock_kzfree_s+0x60/0x60 [ 80.874637][ T2746] ? stack_trace_save+0x98/0xe0 [ 80.879485][ T2746] tun_get_user+0x4bd/0x3090 [ 80.884072][ T2746] ? __x64_sys_openat+0x136/0x160 [ 80.889096][ T2746] ? tun_do_read+0x1c00/0x1c00 [ 80.893857][ T2746] ? kstrtouint_from_user+0x1a0/0x200 [ 80.899227][ T2746] ? __fsnotify_parent+0x5f5/0x6c0 [ 80.904329][ T2746] ? avc_policy_seqno+0x1b/0x70 [ 80.909189][ T2746] ? selinux_file_permission+0x2a5/0x510 [ 80.914930][ T2746] ? fsnotify_perm+0x66/0x4b0 [ 80.919616][ T2746] tun_chr_write_iter+0x1bf/0x270 [ 80.924640][ T2746] vfs_write+0x725/0xd60 [ 80.928908][ T2746] ? __kasan_slab_free+0x11/0x20 [ 80.933852][ T2746] ? kernel_write+0x3c0/0x3c0 [ 80.938523][ T2746] ? __fget_files+0x2c4/0x320 [ 80.943200][ T2746] ? __fdget_pos+0x1f7/0x380 [ 80.947785][ T2746] ? ksys_write+0x71/0x240 [ 80.952195][ T2746] ksys_write+0x140/0x240 [ 80.956521][ T2746] ? __ia32_sys_read+0x90/0x90 [ 80.961282][ T2746] ? debug_smp_processor_id+0x17/0x20 [ 80.966670][ T2746] __x64_sys_write+0x7b/0x90 [ 80.971365][ T2746] do_syscall_64+0x31/0x40 [ 80.975791][ T2746] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 80.981687][ T2746] RIP: 0033:0x7fc0d9468fc9 [ 80.986100][ T2746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.005724][ T2746] RSP: 002b:00007fc0d7ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 81.014137][ T2746] RAX: ffffffffffffffda RBX: 00007fc0d96bffa0 RCX: 00007fc0d9468fc9 [ 81.022201][ T2746] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 81.030257][ T2746] RBP: 00007fc0d7ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 81.038225][ T2746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.046304][ T2746] R13: 00007fc0d96c0038 R14: 00007fc0d96bffa0 R15: 00007ffef7911ae8 [ 81.237757][ T2768] device sit0 left promiscuous mode [ 81.277023][ T2768] device sit0 entered promiscuous mode [ 81.413868][ T2777] device sit0 left promiscuous mode [ 81.442962][ T2777] device sit0 entered promiscuous mode [ 81.568227][ T24] audit: type=1400 audit(1761830755.180:143): avc: denied { create } for pid=2778 comm="syz.4.712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 82.016816][ T2802] FAULT_INJECTION: forcing a failure. [ 82.016816][ T2802] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.150829][ T2802] CPU: 1 PID: 2802 Comm: syz.2.718 Tainted: G W syzkaller #0 [ 82.159810][ T2802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 82.169892][ T2802] Call Trace: [ 82.173234][ T2802] __dump_stack+0x21/0x24 [ 82.177591][ T2802] dump_stack_lvl+0x169/0x1d8 [ 82.182289][ T2802] ? show_regs_print_info+0x18/0x18 [ 82.187513][ T2802] dump_stack+0x15/0x1c [ 82.191678][ T2802] should_fail+0x3c1/0x510 [ 82.196114][ T2802] should_fail_usercopy+0x1a/0x20 [ 82.201158][ T2802] _copy_from_iter+0x1d1/0x9f0 [ 82.205951][ T2802] ? __kasan_check_read+0x11/0x20 [ 82.211002][ T2802] ? __check_object_size+0x2f4/0x3c0 [ 82.216388][ T2802] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 82.222126][ T2802] ? skb_put+0x10e/0x1f0 [ 82.226389][ T2802] tun_get_user+0x140a/0x3090 [ 82.231197][ T2802] ? __x64_sys_openat+0x136/0x160 [ 82.236242][ T2802] ? tun_do_read+0x1c00/0x1c00 [ 82.241020][ T2802] ? kstrtouint_from_user+0x1a0/0x200 [ 82.246416][ T2802] ? __fsnotify_parent+0x5f5/0x6c0 [ 82.251547][ T2802] ? avc_policy_seqno+0x1b/0x70 [ 82.256416][ T2802] ? selinux_file_permission+0x2a5/0x510 [ 82.262079][ T2802] ? fsnotify_perm+0x66/0x4b0 [ 82.266772][ T2802] tun_chr_write_iter+0x1bf/0x270 [ 82.271815][ T2802] vfs_write+0x725/0xd60 [ 82.276070][ T2802] ? kernel_write+0x3c0/0x3c0 [ 82.280763][ T2802] ? __fget_files+0x2c4/0x320 [ 82.285464][ T2802] ? __fdget_pos+0x1f7/0x380 [ 82.290067][ T2802] ? ksys_write+0x71/0x240 [ 82.294498][ T2802] ksys_write+0x140/0x240 [ 82.298847][ T2802] ? __ia32_sys_read+0x90/0x90 [ 82.303827][ T2802] ? debug_smp_processor_id+0x17/0x20 [ 82.309218][ T2802] __x64_sys_write+0x7b/0x90 [ 82.313821][ T2802] do_syscall_64+0x31/0x40 [ 82.318256][ T2802] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 82.324163][ T2802] RIP: 0033:0x7fc0d9468fc9 [ 82.328603][ T2802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.348322][ T2802] RSP: 002b:00007fc0d7ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 82.356755][ T2802] RAX: ffffffffffffffda RBX: 00007fc0d96bffa0 RCX: 00007fc0d9468fc9 [ 82.364849][ T2802] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 82.372841][ T2802] RBP: 00007fc0d7ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 82.380929][ T2802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.389148][ T2802] R13: 00007fc0d96c0038 R14: 00007fc0d96bffa0 R15: 00007ffef7911ae8 [ 82.702137][ T2822] device sit0 left promiscuous mode [ 82.860513][ T2812] device veth0_vlan left promiscuous mode [ 82.893626][ T2812] device veth0_vlan entered promiscuous mode [ 82.935101][ T2825] device veth1_macvtap left promiscuous mode [ 82.967117][ T2829] device sit0 entered promiscuous mode [ 83.094454][ T2831] device veth1_macvtap entered promiscuous mode [ 83.101125][ T2831] device macsec0 entered promiscuous mode [ 83.236014][ T2839] device veth1_to_team entered promiscuous mode [ 83.331033][ T2839] device wg2 entered promiscuous mode [ 84.265500][ T2884] device syzkaller0 entered promiscuous mode [ 85.598792][ T24] audit: type=1400 audit(1761830759.210:144): avc: denied { create } for pid=2942 comm="syz.3.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 86.001524][ T2973] FAULT_INJECTION: forcing a failure. [ 86.001524][ T2973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.114500][ T2973] CPU: 0 PID: 2973 Comm: syz.2.769 Tainted: G W syzkaller #0 [ 86.123212][ T2973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 86.133373][ T2973] Call Trace: [ 86.136688][ T2973] __dump_stack+0x21/0x24 [ 86.141028][ T2973] dump_stack_lvl+0x169/0x1d8 [ 86.145726][ T2973] ? show_regs_print_info+0x18/0x18 [ 86.150950][ T2973] ? do_vfs_ioctl+0x766/0x1510 [ 86.155736][ T2973] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 86.161385][ T2973] dump_stack+0x15/0x1c [ 86.165644][ T2973] should_fail+0x3c1/0x510 [ 86.170076][ T2973] should_fail_usercopy+0x1a/0x20 [ 86.175114][ T2973] _copy_from_user+0x20/0xd0 [ 86.179793][ T2973] __tun_chr_ioctl+0x1ef/0x1cd0 [ 86.184830][ T2973] ? mutex_trylock+0xa0/0xa0 [ 86.189438][ T2973] ? tun_flow_create+0x320/0x320 [ 86.194385][ T2973] ? __fget_files+0x2c4/0x320 [ 86.199082][ T2973] tun_chr_ioctl+0x2a/0x40 [ 86.203493][ T2973] ? tun_chr_poll+0x6b0/0x6b0 [ 86.208256][ T2973] __se_sys_ioctl+0x121/0x1a0 [ 86.212930][ T2973] __x64_sys_ioctl+0x7b/0x90 [ 86.217519][ T2973] do_syscall_64+0x31/0x40 [ 86.221935][ T2973] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 86.227824][ T2973] RIP: 0033:0x7fc0d9468fc9 [ 86.232262][ T2973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.251945][ T2973] RSP: 002b:00007fc0d7ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 86.260358][ T2973] RAX: ffffffffffffffda RBX: 00007fc0d96bffa0 RCX: 00007fc0d9468fc9 [ 86.268759][ T2973] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 86.276811][ T2973] RBP: 00007fc0d7ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 86.284889][ T2973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.292945][ T2973] R13: 00007fc0d96c0038 R14: 00007fc0d96bffa0 R15: 00007ffef7911ae8 [ 87.825217][ T3041] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.834621][ T3041] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.932343][ T95] udevd[95]: worker [298] terminated by signal 33 (Unknown signal 33) [ 87.941027][ T95] udevd[95]: worker [298] failed while handling '/devices/virtual/block/loop3' [ 88.008564][ T3044] device bridge_slave_1 left promiscuous mode [ 88.030776][ T3044] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.060783][ T95] udevd[95]: worker [1852] terminated by signal 33 (Unknown signal 33) [ 88.084390][ T95] udevd[95]: worker [1852] failed while handling '/devices/virtual/block/loop2' [ 88.120643][ T3044] device bridge_slave_0 left promiscuous mode [ 88.167354][ T3044] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.364893][ T95] udevd[95]: worker [3053] terminated by signal 33 (Unknown signal 33) [ 88.392568][ T95] udevd[95]: worker [3053] failed while handling '/devices/virtual/block/loop0' [ 88.709909][ T3075] syz.4.796[3075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.709980][ T3075] syz.4.796[3075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.435421][ T3095] device dummy0 entered promiscuous mode [ 89.862287][ T3111] @ÿ: renamed from bond_slave_0 [ 89.893043][ T3104] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 90.738358][ T3157] device pim6reg1 entered promiscuous mode [ 91.032125][ T3166] FAULT_INJECTION: forcing a failure. [ 91.032125][ T3166] name failslab, interval 1, probability 0, space 0, times 0 [ 91.054462][ T3166] CPU: 1 PID: 3166 Comm: syz.3.822 Tainted: G W syzkaller #0 [ 91.063207][ T3166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 91.073279][ T3166] Call Trace: [ 91.076598][ T3166] __dump_stack+0x21/0x24 [ 91.081070][ T3166] dump_stack_lvl+0x169/0x1d8 [ 91.085763][ T3166] ? show_regs_print_info+0x18/0x18 [ 91.090982][ T3166] dump_stack+0x15/0x1c [ 91.095152][ T3166] should_fail+0x3c1/0x510 [ 91.099586][ T3166] ? kvmalloc_node+0x88/0x130 [ 91.104280][ T3166] __should_failslab+0xa4/0xe0 [ 91.109059][ T3166] should_failslab+0x9/0x20 [ 91.113576][ T3166] __kmalloc+0x60/0x330 [ 91.117752][ T3166] ? kvmalloc_node+0x88/0x130 [ 91.122449][ T3166] kvmalloc_node+0x88/0x130 [ 91.126965][ T3166] alloc_netdev_mqs+0x844/0xc80 [ 91.131829][ T3166] tun_set_iff+0x535/0xe00 [ 91.136274][ T3166] __tun_chr_ioctl+0x795/0x1cd0 [ 91.141141][ T3166] ? mutex_trylock+0xa0/0xa0 [ 91.145757][ T3166] ? tun_flow_create+0x320/0x320 [ 91.150711][ T3166] ? __fget_files+0x2c4/0x320 [ 91.155411][ T3166] tun_chr_ioctl+0x2a/0x40 [ 91.159848][ T3166] ? tun_chr_poll+0x6b0/0x6b0 [ 91.164535][ T3166] __se_sys_ioctl+0x121/0x1a0 [ 91.169236][ T3166] __x64_sys_ioctl+0x7b/0x90 [ 91.173861][ T3166] do_syscall_64+0x31/0x40 [ 91.178298][ T3166] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.184208][ T3166] RIP: 0033:0x7f28122d8fc9 [ 91.188634][ T3166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.208254][ T3166] RSP: 002b:00007f2810d41038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 91.216688][ T3166] RAX: ffffffffffffffda RBX: 00007f281252ffa0 RCX: 00007f28122d8fc9 [ 91.224689][ T3166] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 91.232780][ T3166] RBP: 00007f2810d41090 R08: 0000000000000000 R09: 0000000000000000 [ 91.240767][ T3166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.248752][ T3166] R13: 00007f2812530038 R14: 00007f281252ffa0 R15: 00007ffeb3d905c8 [ 91.372606][ T3175] device syzkaller0 entered promiscuous mode [ 91.525377][ T3195] device syzkaller0 entered promiscuous mode [ 91.599155][ T3202] device veth0_vlan left promiscuous mode [ 91.616944][ T3202] device veth0_vlan entered promiscuous mode [ 91.706645][ T3207] FAULT_INJECTION: forcing a failure. [ 91.706645][ T3207] name failslab, interval 1, probability 0, space 0, times 0 [ 91.789145][ T3207] CPU: 0 PID: 3207 Comm: syz.2.835 Tainted: G W syzkaller #0 [ 91.797984][ T3207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 91.808143][ T3207] Call Trace: [ 91.811451][ T3207] __dump_stack+0x21/0x24 [ 91.815807][ T3207] dump_stack_lvl+0x169/0x1d8 [ 91.820504][ T3207] ? show_regs_print_info+0x18/0x18 [ 91.825818][ T3207] ? del_random_ready_callback+0x170/0x170 [ 91.831636][ T3207] dump_stack+0x15/0x1c [ 91.835900][ T3207] should_fail+0x3c1/0x510 [ 91.840337][ T3207] ? register_netdevice+0x22b/0x13c0 [ 91.845740][ T3207] __should_failslab+0xa4/0xe0 [ 91.850529][ T3207] should_failslab+0x9/0x20 [ 91.855334][ T3207] kmem_cache_alloc_trace+0x3a/0x2e0 [ 91.860671][ T3207] ? dev_get_valid_name+0x312/0x370 [ 91.865920][ T3207] register_netdevice+0x22b/0x13c0 [ 91.871104][ T3207] ? xdp_rxq_info_reg+0xec/0x2e0 [ 91.876164][ T3207] ? netif_stacked_transfer_operstate+0x220/0x220 [ 91.882690][ T3207] ? get_random_bytes+0x1c/0x30 [ 91.887546][ T3207] tun_set_iff+0x812/0xe00 [ 91.892242][ T3207] __tun_chr_ioctl+0x795/0x1cd0 [ 91.897109][ T3207] ? mutex_trylock+0xa0/0xa0 [ 91.901724][ T3207] ? tun_flow_create+0x320/0x320 [ 91.906670][ T3207] ? __fget_files+0x2c4/0x320 [ 91.911362][ T3207] tun_chr_ioctl+0x2a/0x40 [ 91.915788][ T3207] ? tun_chr_poll+0x6b0/0x6b0 [ 91.920587][ T3207] __se_sys_ioctl+0x121/0x1a0 [ 91.925293][ T3207] __x64_sys_ioctl+0x7b/0x90 [ 91.929992][ T3207] do_syscall_64+0x31/0x40 [ 91.934537][ T3207] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.940536][ T3207] RIP: 0033:0x7fc0d9468fc9 [ 91.944959][ T3207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.964619][ T3207] RSP: 002b:00007fc0d7ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 91.973048][ T3207] RAX: ffffffffffffffda RBX: 00007fc0d96bffa0 RCX: 00007fc0d9468fc9 [ 91.981050][ T3207] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 91.989023][ T3207] RBP: 00007fc0d7ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 91.996997][ T3207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.005066][ T3207] R13: 00007fc0d96c0038 R14: 00007fc0d96bffa0 R15: 00007ffef7911ae8 [ 92.665257][ T3247] device sit0 entered promiscuous mode [ 92.843352][ T3249] FAULT_INJECTION: forcing a failure. [ 92.843352][ T3249] name failslab, interval 1, probability 0, space 0, times 0 [ 92.856420][ T3249] CPU: 0 PID: 3249 Comm: syz.2.849 Tainted: G W syzkaller #0 [ 92.865157][ T3249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 92.875240][ T3249] Call Trace: [ 92.878586][ T3249] __dump_stack+0x21/0x24 [ 92.883055][ T3249] dump_stack_lvl+0x169/0x1d8 [ 92.887997][ T3249] ? show_regs_print_info+0x18/0x18 [ 92.893317][ T3249] ? pcpu_memcg_post_alloc_hook+0x165/0x2e0 [ 92.899315][ T3249] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 92.906039][ T3249] dump_stack+0x15/0x1c [ 92.910195][ T3249] should_fail+0x3c1/0x510 [ 92.914616][ T3249] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 92.920806][ T3249] __should_failslab+0xa4/0xe0 [ 92.925665][ T3249] should_failslab+0x9/0x20 [ 92.930177][ T3249] kmem_cache_alloc_trace+0x3a/0x2e0 [ 92.935506][ T3249] selinux_tun_dev_alloc_security+0x51/0x140 [ 92.941593][ T3249] security_tun_dev_alloc_security+0x62/0x90 [ 92.947574][ T3249] tun_net_init+0x1e1/0x580 [ 92.952092][ T3249] register_netdevice+0x351/0x13c0 [ 92.957203][ T3249] ? xdp_rxq_info_reg+0xec/0x2e0 [ 92.962138][ T3249] ? netif_stacked_transfer_operstate+0x220/0x220 [ 92.968583][ T3249] ? get_random_bytes+0x1c/0x30 [ 92.973435][ T3249] tun_set_iff+0x812/0xe00 [ 92.977852][ T3249] __tun_chr_ioctl+0x795/0x1cd0 [ 92.982708][ T3249] ? mutex_trylock+0xa0/0xa0 [ 92.987369][ T3249] ? tun_flow_create+0x320/0x320 [ 92.992606][ T3249] ? __fget_files+0x2c4/0x320 [ 92.997372][ T3249] tun_chr_ioctl+0x2a/0x40 [ 93.001787][ T3249] ? tun_chr_poll+0x6b0/0x6b0 [ 93.006463][ T3249] __se_sys_ioctl+0x121/0x1a0 [ 93.011331][ T3249] __x64_sys_ioctl+0x7b/0x90 [ 93.015919][ T3249] do_syscall_64+0x31/0x40 [ 93.020335][ T3249] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.026306][ T3249] RIP: 0033:0x7fc0d9468fc9 [ 93.030717][ T3249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.050337][ T3249] RSP: 002b:00007fc0d7ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 93.058757][ T3249] RAX: ffffffffffffffda RBX: 00007fc0d96bffa0 RCX: 00007fc0d9468fc9 [ 93.066725][ T3249] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 93.074699][ T3249] RBP: 00007fc0d7ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 93.082669][ T3249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.090646][ T3249] R13: 00007fc0d96c0038 R14: 00007fc0d96bffa0 R15: 00007ffef7911ae8 [ 93.381469][ T3285] device syzkaller0 entered promiscuous mode [ 93.564633][ T3300] device syzkaller0 entered promiscuous mode [ 93.721638][ T3304] device pim6reg1 entered promiscuous mode [ 93.935870][ T3308] FAULT_INJECTION: forcing a failure. [ 93.935870][ T3308] name failslab, interval 1, probability 0, space 0, times 0 [ 93.948684][ T3308] CPU: 1 PID: 3308 Comm: syz.4.867 Tainted: G W syzkaller #0 [ 93.957370][ T3308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 93.967422][ T3308] Call Trace: [ 93.970717][ T3308] __dump_stack+0x21/0x24 [ 93.975043][ T3308] dump_stack_lvl+0x169/0x1d8 [ 93.979724][ T3308] ? thaw_kernel_threads+0x220/0x220 [ 93.985013][ T3308] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 93.991160][ T3308] ? show_regs_print_info+0x18/0x18 [ 93.996351][ T3308] ? __kasan_kmalloc+0xec/0x110 [ 94.001200][ T3308] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 94.006736][ T3308] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 94.012908][ T3308] ? security_tun_dev_alloc_security+0x62/0x90 [ 94.019435][ T3308] ? register_netdevice+0x351/0x13c0 [ 94.024724][ T3308] ? tun_set_iff+0x812/0xe00 [ 94.029320][ T3308] ? __tun_chr_ioctl+0x795/0x1cd0 [ 94.034457][ T3308] ? tun_chr_ioctl+0x2a/0x40 [ 94.039216][ T3308] dump_stack+0x15/0x1c [ 94.043368][ T3308] should_fail+0x3c1/0x510 [ 94.047795][ T3308] ? kvmalloc_node+0x88/0x130 [ 94.052469][ T3308] __should_failslab+0xa4/0xe0 [ 94.057224][ T3308] should_failslab+0x9/0x20 [ 94.061716][ T3308] __kmalloc+0x60/0x330 [ 94.066223][ T3308] ? _raw_spin_lock+0xe0/0xe0 [ 94.070901][ T3308] kvmalloc_node+0x88/0x130 [ 94.075393][ T3308] tun_attach+0x8ae/0x1520 [ 94.079806][ T3308] ? __kasan_check_write+0x14/0x20 [ 94.084936][ T3308] ? enqueue_timer+0x1b6/0x480 [ 94.089700][ T3308] tun_net_init+0x45b/0x580 [ 94.094194][ T3308] register_netdevice+0x351/0x13c0 [ 94.099299][ T3308] ? xdp_rxq_info_reg+0xec/0x2e0 [ 94.104225][ T3308] ? netif_stacked_transfer_operstate+0x220/0x220 [ 94.111238][ T3308] ? get_random_bytes+0x1c/0x30 [ 94.116083][ T3308] tun_set_iff+0x812/0xe00 [ 94.120627][ T3308] __tun_chr_ioctl+0x795/0x1cd0 [ 94.125472][ T3308] ? mutex_trylock+0xa0/0xa0 [ 94.130139][ T3308] ? tun_flow_create+0x320/0x320 [ 94.135154][ T3308] ? __fget_files+0x2c4/0x320 [ 94.139823][ T3308] tun_chr_ioctl+0x2a/0x40 [ 94.144226][ T3308] ? tun_chr_poll+0x6b0/0x6b0 [ 94.148898][ T3308] __se_sys_ioctl+0x121/0x1a0 [ 94.153577][ T3308] __x64_sys_ioctl+0x7b/0x90 [ 94.158174][ T3308] do_syscall_64+0x31/0x40 [ 94.162594][ T3308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 94.168566][ T3308] RIP: 0033:0x7f27c216efc9 [ 94.172990][ T3308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.192620][ T3308] RSP: 002b:00007f27c0bd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 94.201034][ T3308] RAX: ffffffffffffffda RBX: 00007f27c23c5fa0 RCX: 00007f27c216efc9 [ 94.209098][ T3308] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 94.217156][ T3308] RBP: 00007f27c0bd7090 R08: 0000000000000000 R09: 0000000000000000 [ 94.225125][ T3308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.233092][ T3308] R13: 00007f27c23c6038 R14: 00007f27c23c5fa0 R15: 00007ffce98fb438 [ 94.971070][ T3351] device sit0 left promiscuous mode [ 95.078784][ T3352] device sit0 entered promiscuous mode [ 95.517283][ T3378] device syzkaller0 entered promiscuous mode [ 95.525347][ T3367] FAULT_INJECTION: forcing a failure. [ 95.525347][ T3367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.544428][ T3367] CPU: 0 PID: 3367 Comm: syz.0.884 Tainted: G W syzkaller #0 [ 95.553138][ T3367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 95.563388][ T3367] Call Trace: [ 95.566695][ T3367] __dump_stack+0x21/0x24 [ 95.571056][ T3367] dump_stack_lvl+0x169/0x1d8 [ 95.575752][ T3367] ? thaw_kernel_threads+0x220/0x220 [ 95.581224][ T3367] ? vsnprintf+0x1871/0x1960 [ 95.585826][ T3367] ? show_regs_print_info+0x18/0x18 [ 95.591187][ T3367] dump_stack+0x15/0x1c [ 95.595361][ T3367] should_fail+0x3c1/0x510 [ 95.599798][ T3367] should_fail_usercopy+0x1a/0x20 [ 95.605221][ T3367] _copy_to_user+0x20/0x90 [ 95.609652][ T3367] simple_read_from_buffer+0xe9/0x160 [ 95.615028][ T3367] proc_fail_nth_read+0x19a/0x210 [ 95.620048][ T3367] ? proc_fault_inject_write+0x2f0/0x2f0 [ 95.625677][ T3367] ? rw_verify_area+0x1c0/0x360 [ 95.630531][ T3367] ? proc_fault_inject_write+0x2f0/0x2f0 [ 95.636172][ T3367] vfs_read+0x1fe/0xa10 [ 95.640345][ T3367] ? kernel_read+0x70/0x70 [ 95.644769][ T3367] ? __kasan_check_write+0x14/0x20 [ 95.649889][ T3367] ? mutex_lock+0x8c/0xe0 [ 95.654214][ T3367] ? mutex_trylock+0xa0/0xa0 [ 95.658800][ T3367] ? __fget_files+0x2c4/0x320 [ 95.663612][ T3367] ? __fdget_pos+0x2d2/0x380 [ 95.668293][ T3367] ? ksys_read+0x71/0x240 [ 95.672630][ T3367] ksys_read+0x140/0x240 [ 95.676875][ T3367] ? vfs_write+0xd60/0xd60 [ 95.681301][ T3367] ? __kasan_check_read+0x11/0x20 [ 95.686326][ T3367] __x64_sys_read+0x7b/0x90 [ 95.690833][ T3367] do_syscall_64+0x31/0x40 [ 95.695249][ T3367] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 95.701139][ T3367] RIP: 0033:0x7f26c6de19dc [ 95.705551][ T3367] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 95.725170][ T3367] RSP: 002b:00007f26c584b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 95.733583][ T3367] RAX: ffffffffffffffda RBX: 00007f26c7039fa0 RCX: 00007f26c6de19dc [ 95.741571][ T3367] RDX: 000000000000000f RSI: 00007f26c584b0a0 RDI: 0000000000000008 [ 95.749544][ T3367] RBP: 00007f26c584b090 R08: 0000000000000000 R09: 0000000000000000 [ 95.757517][ T3367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.765483][ T3367] R13: 00007f26c703a038 R14: 00007f26c7039fa0 R15: 00007ffdd735ecf8 [ 95.845939][ T3379] device veth0_vlan left promiscuous mode [ 95.861983][ T3379] device veth0_vlan entered promiscuous mode [ 96.698896][ T3421] Â: renamed from pim6reg1 [ 97.123441][ T24] audit: type=1400 audit(1761830770.740:145): avc: denied { create } for pid=3449 comm="syz.4.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 97.256404][ T3454] device wg2 left promiscuous mode [ 97.314439][ T3454] device wg2 entered promiscuous mode [ 98.101702][ T3601] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.109351][ T3601] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.915139][ T3626] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.930767][ T3626] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.946562][ T3626] device bridge_slave_0 entered promiscuous mode [ 98.969184][ T3626] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.987992][ T3626] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.061385][ T3626] device bridge_slave_1 entered promiscuous mode [ 99.634392][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.671738][ T3656] device veth0_vlan left promiscuous mode [ 99.790459][ T3656] device veth0_vlan entered promiscuous mode [ 100.187121][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.231018][ T835] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.238122][ T835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.340733][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.350893][ T835] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.357945][ T835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.420792][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.440987][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.457767][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.502648][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.528332][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.606678][ T3687] device pim6reg1 entered promiscuous mode [ 100.622083][ T3626] device veth0_vlan entered promiscuous mode [ 100.631158][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.671209][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.722232][ T3626] device veth1_macvtap entered promiscuous mode [ 100.749305][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.757176][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.791003][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.850286][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.869494][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.886886][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.924246][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.933535][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.942025][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.144380][ T3716] ÿÿÿÿÿÿ: renamed from vlan1 [ 101.562079][ T7] device veth1_macvtap left promiscuous mode [ 102.565143][ T3804] device wg2 left promiscuous mode [ 102.894131][ T24] audit: type=1400 audit(1761830776.510:146): avc: denied { create } for pid=3803 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 103.422750][ T3829] device pim6reg1 entered promiscuous mode [ 103.433778][ T3829] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.441017][ T3829] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.096245][ T24] audit: type=1400 audit(1761830777.710:147): avc: denied { create } for pid=3856 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 106.471886][ T3922] device pim6reg1 entered promiscuous mode [ 106.743060][ T24] audit: type=1400 audit(1761830780.360:148): avc: denied { create } for pid=3943 comm="syz.4.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 107.442473][ T3980] device veth1_macvtap left promiscuous mode [ 107.676866][ T3980] device veth1_macvtap entered promiscuous mode [ 107.722725][ T3980] device macsec0 entered promiscuous mode [ 107.764861][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.780991][ T3987] device veth0_vlan left promiscuous mode [ 107.798778][ T3987] device veth0_vlan entered promiscuous mode [ 107.820630][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.829083][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.871306][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.041051][ T3996] device sit0 left promiscuous mode [ 108.649604][ T4011] ªªªªªª: renamed from vlan0 [ 110.625240][ T4080] device veth0_vlan left promiscuous mode [ 110.631561][ T4080] device veth0_vlan entered promiscuous mode [ 110.651127][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.659582][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 110.667497][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.858768][ T4086] device wg2 entered promiscuous mode [ 111.326233][ T4142] device wg2 left promiscuous mode [ 111.557793][ T4164] device syzkaller0 entered promiscuous mode [ 112.044213][ T4177] device sit0 left promiscuous mode [ 112.774577][ T4221] cgroup: fork rejected by pids controller in /syz2 [ 113.771257][ T4357] device pim6reg1 entered promiscuous mode [ 113.805042][ T24] audit: type=1400 audit(1761830787.420:149): avc: denied { create } for pid=4360 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 114.085232][ T4370] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.094072][ T4370] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.102765][ T4370] device bridge_slave_0 entered promiscuous mode [ 114.251074][ T24] audit: type=1400 audit(1761830787.860:150): avc: denied { create } for pid=4381 comm="syz.1.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 114.316895][ T4370] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.334631][ T4370] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.355272][ T4370] device bridge_slave_1 entered promiscuous mode [ 114.696653][ T4404] device syzkaller0 entered promiscuous mode [ 115.276452][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.293387][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.311100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.327749][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.342979][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.350089][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.366364][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.380255][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.392332][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.399429][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.412522][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.447169][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.459796][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.517943][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 115.529726][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.595895][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.622511][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.842069][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.860837][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.902920][ T4370] device veth0_vlan entered promiscuous mode [ 115.911534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.950930][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.135980][ T4370] device veth1_macvtap entered promiscuous mode [ 116.191079][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.221030][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.229333][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.557597][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.577587][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.737646][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.771209][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 117.482324][ T4455] device syzkaller0 entered promiscuous mode [ 118.101987][ T7] device bridge_slave_1 left promiscuous mode [ 118.141243][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.200899][ T7] device bridge_slave_0 left promiscuous mode [ 118.227435][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.329629][ T7] device veth1_macvtap left promiscuous mode [ 122.318040][ T24] audit: type=1400 audit(1761830795.930:151): avc: denied { create } for pid=4626 comm="syz.3.1194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 122.423308][ T4619] device syzkaller0 entered promiscuous mode [ 123.228413][ T4642] device syzkaller0 entered promiscuous mode [ 124.367346][ T4684] device sit0 entered promiscuous mode [ 125.390025][ T4723] device syzkaller0 entered promiscuous mode [ 127.481381][ T4775] device syzkaller0 entered promiscuous mode [ 127.901632][ T4790] device sit0 entered promiscuous mode [ 128.625181][ T4823] device veth0_vlan left promiscuous mode [ 128.635675][ T4823] device veth0_vlan entered promiscuous mode [ 129.025504][ T4834] ÿÿÿÿÿÿ: renamed from vlan1 [ 129.740477][ T24] audit: type=1400 audit(1761830803.350:152): avc: denied { append } for pid=4851 comm="syz.3.1261" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 130.739906][ T4901] device veth0_vlan left promiscuous mode [ 130.747102][ T4901] device veth0_vlan entered promiscuous mode [ 130.763568][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.775005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.791735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 131.374872][ T4910] device syzkaller0 entered promiscuous mode [ 133.917323][ T5044] device sit0 entered promiscuous mode [ 134.121378][ T5057] device pim6reg1 entered promiscuous mode [ 134.341321][ T5075] device pim6reg1 entered promiscuous mode [ 134.418176][ T5074] syz.2.1330[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.418732][ T5074] syz.2.1330[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.192751][ T5106] syz.1.1339[5106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.262055][ T5106] syz.1.1339[5106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.235297][ T5168] device syzkaller0 entered promiscuous mode [ 138.876886][ T5233] device pim6reg1 entered promiscuous mode [ 140.170098][ T5247] device sit0 left promiscuous mode [ 140.494746][ T5275] device syzkaller0 entered promiscuous mode [ 141.730058][ T24] audit: type=1400 audit(1761830815.340:153): avc: denied { create } for pid=5320 comm="syz.3.1398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 143.244416][ T5377] device sit0 entered promiscuous mode [ 143.646552][ T5386] device sit0 entered promiscuous mode [ 144.206740][ T24] audit: type=1400 audit(1761830817.820:154): avc: denied { read } for pid=5397 comm="syz.3.1422" dev="nsfs" ino=4026532285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 144.259659][ T24] audit: type=1400 audit(1761830817.820:155): avc: denied { open } for pid=5397 comm="syz.3.1422" path="uts:[4026532285]" dev="nsfs" ino=4026532285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 144.727532][ T24] audit: type=1400 audit(1761830818.340:156): avc: denied { create } for pid=5413 comm="syz.1.1427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 144.988622][ T5434] device pim6reg1 entered promiscuous mode [ 145.270519][ T5446] FAULT_INJECTION: forcing a failure. [ 145.270519][ T5446] name failslab, interval 1, probability 0, space 0, times 0 [ 145.406777][ T5446] CPU: 1 PID: 5446 Comm: syz.3.1439 Tainted: G W syzkaller #0 [ 145.416065][ T5446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 145.426505][ T5446] Call Trace: [ 145.429812][ T5446] __dump_stack+0x21/0x24 [ 145.434154][ T5446] dump_stack_lvl+0x169/0x1d8 [ 145.439350][ T5446] ? show_regs_print_info+0x18/0x18 [ 145.444556][ T5446] dump_stack+0x15/0x1c [ 145.448723][ T5446] should_fail+0x3c1/0x510 [ 145.453164][ T5446] ? alloc_perf_context+0x59/0x2e0 [ 145.458307][ T5446] __should_failslab+0xa4/0xe0 [ 145.463081][ T5446] should_failslab+0x9/0x20 [ 145.467918][ T5446] kmem_cache_alloc_trace+0x3a/0x2e0 [ 145.473235][ T5446] alloc_perf_context+0x59/0x2e0 [ 145.478488][ T5446] find_get_context+0x34c/0x9e0 [ 145.483337][ T5446] __se_sys_perf_event_open+0x8b9/0x1b10 [ 145.488980][ T5446] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 145.494707][ T5446] __x64_sys_perf_event_open+0xbf/0xd0 [ 145.500164][ T5446] do_syscall_64+0x31/0x40 [ 145.504953][ T5446] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 145.510878][ T5446] RIP: 0033:0x7f28122d8fc9 [ 145.515496][ T5446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.535385][ T5446] RSP: 002b:00007f2810d41038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 145.544154][ T5446] RAX: ffffffffffffffda RBX: 00007f281252ffa0 RCX: 00007f28122d8fc9 [ 145.552359][ T5446] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000012c0 [ 145.560452][ T5446] RBP: 00007f2810d41090 R08: 0000000000000000 R09: 0000000000000000 [ 145.568739][ T5446] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 145.576882][ T5446] R13: 00007f2812530038 R14: 00007f281252ffa0 R15: 00007ffeb3d905c8 [ 146.524342][ T5548] device pim6reg1 entered promiscuous mode [ 147.429563][ T5585] device veth1_macvtap left promiscuous mode [ 147.751099][ T5595] device veth1_macvtap left promiscuous mode [ 148.009672][ T5601] device syzkaller0 entered promiscuous mode [ 148.234370][ T5614] device veth0_vlan left promiscuous mode [ 148.254021][ T5614] device veth0_vlan entered promiscuous mode [ 148.332528][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.353622][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.372450][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 149.256189][ T5653] device sit0 left promiscuous mode [ 149.340207][ T5654] device sit0 entered promiscuous mode [ 150.562849][ T5681] device sit0 left promiscuous mode [ 150.839572][ T5682] @0Ù: renamed from bond_slave_1 [ 151.961731][ T5744] device pim6reg1 entered promiscuous mode [ 152.088409][ T5748] device pim6reg1 entered promiscuous mode [ 154.365991][ T5822] device sit0 left promiscuous mode [ 155.071143][ T24] audit: type=1400 audit(1761830828.690:157): avc: denied { create } for pid=5842 comm="syz.1.1557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 155.251148][ T5861] device macsec0 left promiscuous mode [ 155.266788][ T5861] device veth1_macvtap entered promiscuous mode [ 155.274345][ T5861] device macsec0 entered promiscuous mode [ 155.284075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.357478][ T5876] device pim6reg1 entered promiscuous mode [ 156.077164][ T5908] device veth0_vlan left promiscuous mode [ 156.100705][ T5908] device veth0_vlan entered promiscuous mode [ 156.164975][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.175384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.183290][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 156.594890][ T5938] device veth1_macvtap left promiscuous mode [ 156.601619][ T5938] device macsec0 entered promiscuous mode [ 156.954457][ T5967] ªªªªªª: renamed from vlan0 [ 157.005799][ T5965] device pim6reg1 entered promiscuous mode [ 158.536050][ T6016] device veth1_macvtap left promiscuous mode [ 159.554916][ T6048] device syzkaller0 entered promiscuous mode [ 159.750518][ T6055] device pim6reg1 entered promiscuous mode [ 160.066196][ T6059] device veth1_macvtap left promiscuous mode [ 160.078119][ T6059] device macsec0 left promiscuous mode [ 160.386010][ T6078] device syzkaller0 entered promiscuous mode [ 160.777516][ T6096] device bridge_slave_1 left promiscuous mode [ 160.833510][ T6096] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.865456][ T6096] device bridge_slave_0 left promiscuous mode [ 160.877992][ T6096] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.635558][ T6127] device wg2 entered promiscuous mode [ 162.201096][ T6149] device pim6reg1 entered promiscuous mode [ 162.631339][ T6149] device syzkaller0 entered promiscuous mode [ 163.579296][ T6216] device pim6reg1 entered promiscuous mode [ 164.911950][ T6292] device pim6reg1 entered promiscuous mode [ 165.095919][ T6297] device syzkaller0 entered promiscuous mode [ 166.145928][ T6371] device veth0_vlan left promiscuous mode [ 166.289253][ T6371] device veth0_vlan entered promiscuous mode [ 166.306873][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.329070][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 166.360329][ T24] audit: type=1400 audit(1761830839.970:158): avc: denied { ioctl } for pid=6359 comm="syz.0.1714" path="mnt:[4026532443]" dev="nsfs" ino=4026532443 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 166.393531][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 168.160818][ T6435] device pim6reg1 entered promiscuous mode [ 168.308205][ T6451] device veth0_vlan left promiscuous mode [ 168.341352][ T6451] device veth0_vlan entered promiscuous mode [ 168.473046][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.487030][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 168.542727][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.588074][ T6453] device macsec0 entered promiscuous mode [ 169.258137][ T6495] device veth1_macvtap entered promiscuous mode [ 169.288927][ T6495] device macsec0 entered promiscuous mode [ 169.387315][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.059207][ T6556] device syzkaller0 entered promiscuous mode [ 171.447941][ T6572] syz.2.1779[6572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.447989][ T6572] syz.2.1779[6572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.484349][ T6573] device syzkaller0 entered promiscuous mode [ 171.680955][ T6585] syz.2.1784[6585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.681010][ T6585] syz.2.1784[6585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.863272][ T6588] device pim6reg1 entered promiscuous mode [ 171.960562][ T6602] device veth0_vlan left promiscuous mode [ 171.985591][ T6602] device veth0_vlan entered promiscuous mode [ 173.005226][ T6640] device syzkaller0 entered promiscuous mode [ 173.853768][ T6660] device syzkaller0 entered promiscuous mode [ 173.931760][ T6667] device veth1_macvtap entered promiscuous mode [ 173.967239][ T6667] device macsec0 entered promiscuous mode [ 173.994507][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.045567][ T6669] device sit0 left promiscuous mode [ 174.202674][ T6670] device sit0 entered promiscuous mode [ 174.477606][ T6677] device sit0 left promiscuous mode [ 174.633014][ T6678] device sit0 entered promiscuous mode [ 175.217506][ T6687] device wg2 entered promiscuous mode [ 175.781646][ T6697] device pim6reg1 entered promiscuous mode [ 177.413921][ T6778] device pim6reg1 entered promiscuous mode [ 178.380816][ T6812] device veth1_macvtap left promiscuous mode [ 178.386851][ T6812] device macsec0 left promiscuous mode [ 178.819865][ T6844] device syzkaller0 entered promiscuous mode [ 180.548148][ T6888] FAULT_INJECTION: forcing a failure. [ 180.548148][ T6888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.601174][ T6888] CPU: 1 PID: 6888 Comm: syz.2.1875 Tainted: G W syzkaller #0 [ 180.610073][ T6888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 180.620148][ T6888] Call Trace: [ 180.623557][ T6888] __dump_stack+0x21/0x24 [ 180.628049][ T6888] dump_stack_lvl+0x169/0x1d8 [ 180.632732][ T6888] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 180.638911][ T6888] ? show_regs_print_info+0x18/0x18 [ 180.644148][ T6888] dump_stack+0x15/0x1c [ 180.648304][ T6888] should_fail+0x3c1/0x510 [ 180.652728][ T6888] should_fail_usercopy+0x1a/0x20 [ 180.657949][ T6888] strncpy_from_user+0x24/0x2e0 [ 180.662798][ T6888] ? kmem_cache_alloc+0x165/0x2e0 [ 180.667822][ T6888] ? getname_flags+0xb9/0x500 [ 180.672760][ T6888] getname_flags+0xf4/0x500 [ 180.677265][ T6888] getname+0x19/0x20 [ 180.681170][ T6888] do_sys_openat2+0xd9/0x6d0 [ 180.685762][ T6888] ? hrtimer_interrupt+0x5c2/0xdc0 [ 180.691134][ T6888] ? do_sys_open+0xe0/0xe0 [ 180.695559][ T6888] ? kvm_sched_clock_read+0x18/0x40 [ 180.700747][ T6888] ? sched_clock+0x3a/0x40 [ 180.705169][ T6888] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 180.711241][ T6888] __x64_sys_openat+0x136/0x160 [ 180.716089][ T6888] do_syscall_64+0x31/0x40 [ 180.720502][ T6888] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 180.726516][ T6888] RIP: 0033:0x7f4c64dba810 [ 180.730968][ T6888] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 180.750661][ T6888] RSP: 002b:00007f4c63823f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 180.759111][ T6888] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f4c64dba810 [ 180.767167][ T6888] RDX: 0000000000000002 RSI: 00007f4c63823fa0 RDI: 00000000ffffff9c [ 180.775145][ T6888] RBP: 00007f4c63823fa0 R08: 0000000000000000 R09: 0000000000000000 [ 180.783115][ T6888] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 180.791121][ T6888] R13: 00007f4c65013038 R14: 00007f4c65012fa0 R15: 00007ffd5bfc2cd8 [ 181.110115][ T6914] device veth0_vlan left promiscuous mode [ 181.132026][ T6914] device veth0_vlan entered promiscuous mode [ 181.235158][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.244319][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.254615][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.295296][ T6914] device veth0_vlan left promiscuous mode [ 181.355302][ T6914] device veth0_vlan entered promiscuous mode [ 181.378193][ T6914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.412131][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.420745][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.428126][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.213884][ T24] audit: type=1400 audit(1761830855.830:159): avc: denied { create } for pid=6931 comm="syz.1.1887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 182.419670][ T6939] FAULT_INJECTION: forcing a failure. [ 182.419670][ T6939] name failslab, interval 1, probability 0, space 0, times 0 [ 182.451935][ T6942] device veth0_vlan left promiscuous mode [ 182.468185][ T6939] CPU: 1 PID: 6939 Comm: syz.0.1890 Tainted: G W syzkaller #0 [ 182.477099][ T6939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 182.487178][ T6939] Call Trace: [ 182.490486][ T6939] __dump_stack+0x21/0x24 [ 182.494832][ T6939] dump_stack_lvl+0x169/0x1d8 [ 182.499615][ T6939] ? thaw_kernel_threads+0x220/0x220 [ 182.504941][ T6939] ? show_regs_print_info+0x18/0x18 [ 182.510153][ T6939] ? kvm_sched_clock_read+0x18/0x40 [ 182.515456][ T6939] ? sched_clock+0x3a/0x40 [ 182.519889][ T6939] ? sched_clock_cpu+0x1b/0x3d0 [ 182.523521][ T6942] device veth0_vlan entered promiscuous mode [ 182.524771][ T6939] ? sched_clock+0x3a/0x40 [ 182.535166][ T6939] dump_stack+0x15/0x1c [ 182.539481][ T6939] should_fail+0x3c1/0x510 [ 182.542892][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.544031][ T6939] ? __alloc_file+0x28/0x320 [ 182.556521][ T6939] __should_failslab+0xa4/0xe0 [ 182.556607][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.561297][ T6939] should_failslab+0x9/0x20 [ 182.561311][ T6939] kmem_cache_alloc+0x3d/0x2e0 [ 182.561325][ T6939] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 182.561344][ T6939] __alloc_file+0x28/0x320 [ 182.569380][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 182.573197][ T6939] alloc_empty_file+0x97/0x180 [ 182.573209][ T6939] path_openat+0xf2/0x3160 [ 182.573224][ T6939] ? kvm_sched_clock_read+0x18/0x40 [ 182.573234][ T6939] ? sched_clock+0x3a/0x40 [ 182.573244][ T6939] ? sched_clock_cpu+0x1b/0x3d0 [ 182.573253][ T6939] ? sched_clock+0x3a/0x40 [ 182.573268][ T6939] ? __irq_exit_rcu+0x40/0x150 [ 182.573279][ T6939] ? irq_exit_rcu+0x9/0x10 [ 182.573292][ T6939] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 182.573304][ T6939] ? do_filp_open+0x3e0/0x3e0 [ 182.573315][ T6939] ? do_filp_open+0x16f/0x3e0 [ 182.573330][ T6939] do_filp_open+0x1b3/0x3e0 [ 182.573342][ T6939] ? vfs_tmpfile+0x2c0/0x2c0 [ 182.573362][ T6939] ? get_unused_fd_flags+0x92/0xa0 [ 182.573373][ T6939] do_sys_openat2+0x14c/0x6d0 [ 182.573386][ T6939] ? hrtimer_interrupt+0x5c2/0xdc0 [ 182.573395][ T6939] ? do_sys_open+0xe0/0xe0 [ 182.573407][ T6939] ? kvm_sched_clock_read+0x18/0x40 [ 182.573417][ T6939] ? sched_clock+0x3a/0x40 [ 182.573442][ T6939] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 182.693002][ T6939] __x64_sys_openat+0x136/0x160 [ 182.697856][ T6939] do_syscall_64+0x31/0x40 [ 182.702388][ T6939] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 182.708294][ T6939] RIP: 0033:0x7f26c6de1810 [ 182.712727][ T6939] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 182.732654][ T6939] RSP: 002b:00007f26c584af10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 182.741159][ T6939] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f26c6de1810 [ 182.749487][ T6939] RDX: 0000000000000002 RSI: 00007f26c584afa0 RDI: 00000000ffffff9c [ 182.757720][ T6939] RBP: 00007f26c584afa0 R08: 0000000000000000 R09: 0000000000000000 [ 182.765690][ T6939] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 182.773657][ T6939] R13: 00007f26c703a038 R14: 00007f26c7039fa0 R15: 00007ffdd735ecf8 [ 184.759719][ T7036] syz.2.1920[7036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.759781][ T7036] syz.2.1920[7036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.606802][ T7070] syz.0.1933[7070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.750653][ T7070] syz.0.1933[7070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.997578][ T7070] device veth0_vlan left promiscuous mode [ 186.121454][ T7070] device veth0_vlan entered promiscuous mode [ 186.443081][ T7089] device wg2 entered promiscuous mode [ 186.587209][ T7093] device wg2 left promiscuous mode [ 186.587335][ T7096] syz.4.1941[7096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.592662][ T7096] syz.4.1941[7096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.934057][ T7103] device sit0 left promiscuous mode [ 187.036231][ T7101] device veth0_vlan left promiscuous mode [ 187.042931][ T7101] device veth0_vlan entered promiscuous mode [ 187.160484][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.169172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.176823][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.547570][ T7134] device sit0 entered promiscuous mode [ 189.573342][ T7204] syz.0.1973[7204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.573400][ T7204] syz.0.1973[7204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.722358][ T7212] device veth0_vlan left promiscuous mode [ 189.749613][ T7212] device veth0_vlan entered promiscuous mode [ 189.783665][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.821213][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.831962][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.986127][ T7232] device veth0_vlan left promiscuous mode [ 190.024640][ T7232] device veth0_vlan entered promiscuous mode [ 190.796321][ T7253] syz.0.1986[7253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.796411][ T7253] syz.0.1986[7253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.863573][ T7258] syz.3.1988[7258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.880005][ T7258] syz.3.1988[7258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.330127][ T7303] syz.1.2003[7303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.342269][ T7303] syz.1.2003[7303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.367373][ T7303] syz.1.2003[7303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.858177][ T7380] FAULT_INJECTION: forcing a failure. [ 192.858177][ T7380] name failslab, interval 1, probability 0, space 0, times 0 [ 192.910722][ T7380] CPU: 1 PID: 7380 Comm: syz.4.2023 Tainted: G W syzkaller #0 [ 192.919529][ T7380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 192.929586][ T7380] Call Trace: [ 192.932877][ T7380] __dump_stack+0x21/0x24 [ 192.937200][ T7380] dump_stack_lvl+0x169/0x1d8 [ 192.941874][ T7380] ? thaw_kernel_threads+0x220/0x220 [ 192.947157][ T7380] ? show_regs_print_info+0x18/0x18 [ 192.952358][ T7380] dump_stack+0x15/0x1c [ 192.956593][ T7380] should_fail+0x3c1/0x510 [ 192.961032][ T7380] ? security_inode_alloc+0x33/0x110 [ 192.966375][ T7380] __should_failslab+0xa4/0xe0 [ 192.971236][ T7380] should_failslab+0x9/0x20 [ 192.975855][ T7380] kmem_cache_alloc+0x3d/0x2e0 [ 192.980627][ T7380] security_inode_alloc+0x33/0x110 [ 192.985834][ T7380] inode_init_always+0x70a/0x9b0 [ 192.990857][ T7380] new_inode_pseudo+0x91/0x210 [ 192.995714][ T7380] new_inode+0x28/0x1e0 [ 192.999878][ T7380] ? d_hash_and_lookup+0x1f0/0x1f0 [ 193.004986][ T7380] proc_pid_make_inode+0x27/0x1d0 [ 193.010039][ T7380] proc_ns_dir_lookup+0x573/0x6b0 [ 193.015153][ T7380] ? proc_ns_dir_readdir+0x4c0/0x4c0 [ 193.020531][ T7380] path_openat+0x1127/0x3160 [ 193.025128][ T7380] ? do_filp_open+0x3e0/0x3e0 [ 193.029801][ T7380] ? sched_clock+0x3a/0x40 [ 193.034224][ T7380] ? expand_files+0xde/0x8e0 [ 193.038819][ T7380] do_filp_open+0x1b3/0x3e0 [ 193.043320][ T7380] ? vfs_tmpfile+0x2c0/0x2c0 [ 193.047913][ T7380] ? noop_direct_IO+0x20/0x20 [ 193.052590][ T7380] ? get_unused_fd_flags+0x92/0xa0 [ 193.057696][ T7380] do_sys_openat2+0x14c/0x6d0 [ 193.062599][ T7380] ? hrtimer_interrupt+0x848/0xdc0 [ 193.067703][ T7380] ? do_sys_open+0xe0/0xe0 [ 193.072125][ T7380] ? kvm_sched_clock_read+0x18/0x40 [ 193.077317][ T7380] ? sched_clock+0x3a/0x40 [ 193.081746][ T7380] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 193.087997][ T7380] __x64_sys_openat+0x136/0x160 [ 193.092847][ T7380] do_syscall_64+0x31/0x40 [ 193.097374][ T7380] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 193.103261][ T7380] RIP: 0033:0x7f8e14bd7810 [ 193.107678][ T7380] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 193.127373][ T7380] RSP: 002b:00007f8e13640f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 193.135788][ T7380] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f8e14bd7810 [ 193.143761][ T7380] RDX: 0000000000000002 RSI: 00007f8e13640fa0 RDI: 00000000ffffff9c [ 193.151734][ T7380] RBP: 00007f8e13640fa0 R08: 0000000000000000 R09: 0000000000000000 [ 193.159828][ T7380] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 193.167804][ T7380] R13: 00007f8e14e30038 R14: 00007f8e14e2ffa0 R15: 00007ffde8fab148 [ 194.919381][ T7430] device syzkaller0 entered promiscuous mode [ 195.666499][ T7467] device pim6reg1 entered promiscuous mode [ 196.307897][ T7479] device syzkaller0 entered promiscuous mode [ 196.380212][ T7497] device wg2 left promiscuous mode [ 196.397226][ T7499] device wg2 entered promiscuous mode [ 196.525869][ T7507] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.534587][ T7507] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.648617][ T7518] device bridge_slave_1 left promiscuous mode [ 196.726994][ T7518] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.797601][ T7518] device bridge_slave_0 left promiscuous mode [ 196.814177][ T7518] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.920109][ T7523] device pim6reg1 entered promiscuous mode [ 197.802396][ T7552] device syzkaller0 entered promiscuous mode [ 198.901805][ T7589] device wg2 entered promiscuous mode [ 198.942999][ T7592] syz.2.2085[7592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.943059][ T7592] syz.2.2085[7592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.969315][ T7596] device sit0 left promiscuous mode [ 199.088290][ T7597] device sit0 entered promiscuous mode [ 199.116779][ T7602] device sit0 entered promiscuous mode [ 199.814516][ T7629] cgroup: fork rejected by pids controller in /syz3 [ 200.883644][ T7757] FAULT_INJECTION: forcing a failure. [ 200.883644][ T7757] name failslab, interval 1, probability 0, space 0, times 0 [ 200.946542][ T7757] CPU: 1 PID: 7757 Comm: syz.2.2104 Tainted: G W syzkaller #0 [ 200.955343][ T7757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 200.965412][ T7757] Call Trace: [ 200.968717][ T7757] __dump_stack+0x21/0x24 [ 200.973061][ T7757] dump_stack_lvl+0x169/0x1d8 [ 200.977744][ T7757] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 200.984005][ T7757] ? show_regs_print_info+0x18/0x18 [ 200.989233][ T7757] dump_stack+0x15/0x1c [ 200.993396][ T7757] should_fail+0x3c1/0x510 [ 200.997821][ T7757] ? __alloc_file+0x28/0x320 [ 201.002420][ T7757] __should_failslab+0xa4/0xe0 [ 201.007200][ T7757] should_failslab+0x9/0x20 [ 201.011713][ T7757] kmem_cache_alloc+0x3d/0x2e0 [ 201.016501][ T7757] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 201.022663][ T7757] __alloc_file+0x28/0x320 [ 201.027178][ T7757] alloc_empty_file+0x97/0x180 [ 201.031957][ T7757] path_openat+0xf2/0x3160 [ 201.036383][ T7757] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 201.042725][ T7757] ? __kasan_slab_alloc+0xcf/0xf0 [ 201.047759][ T7757] ? __kasan_slab_alloc+0xbd/0xf0 [ 201.052799][ T7757] ? kmem_cache_alloc+0x165/0x2e0 [ 201.057830][ T7757] ? getname_flags+0xb9/0x500 [ 201.062513][ T7757] ? getname+0x19/0x20 [ 201.066770][ T7757] ? __x64_sys_openat+0x136/0x160 [ 201.071808][ T7757] ? do_syscall_64+0x31/0x40 [ 201.076404][ T7757] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.082582][ T7757] ? do_filp_open+0x3e0/0x3e0 [ 201.087268][ T7757] ? expand_files+0xde/0x8e0 [ 201.091865][ T7757] do_filp_open+0x1b3/0x3e0 [ 201.096379][ T7757] ? vfs_tmpfile+0x2c0/0x2c0 [ 201.100986][ T7757] ? get_unused_fd_flags+0x92/0xa0 [ 201.106119][ T7757] do_sys_openat2+0x14c/0x6d0 [ 201.110803][ T7757] ? do_sys_open+0xe0/0xe0 [ 201.115226][ T7757] ? __irq_exit_rcu+0x40/0x150 [ 201.119998][ T7757] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 201.125851][ T7757] __x64_sys_openat+0x136/0x160 [ 201.130710][ T7757] do_syscall_64+0x31/0x40 [ 201.135139][ T7757] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.141038][ T7757] RIP: 0033:0x7f4c64dba810 [ 201.145461][ T7757] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 201.165183][ T7757] RSP: 002b:00007f4c63823f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 201.173611][ T7757] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4c64dba810 [ 201.181593][ T7757] RDX: 0000000000000000 RSI: 00007f4c63823fa0 RDI: 00000000ffffff9c [ 201.189572][ T7757] RBP: 00007f4c63823fa0 R08: 0000000000000000 R09: 0000000000000000 [ 201.197558][ T7757] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 201.207918][ T7757] R13: 00007f4c65013038 R14: 00007f4c65012fa0 R15: 00007ffd5bfc2cd8 [ 201.243822][ T7748] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.315307][ T7748] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.324470][ T7748] device bridge_slave_0 entered promiscuous mode [ 201.422277][ T7762] device syzkaller0 entered promiscuous mode [ 201.446265][ T7748] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.460672][ T7748] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.489022][ T7748] device bridge_slave_1 entered promiscuous mode [ 201.528586][ T7772] device sit0 left promiscuous mode [ 201.621945][ T7772] device sit0 entered promiscuous mode [ 201.810246][ T7776] device pim6reg1 entered promiscuous mode [ 202.071111][ T7780] device syzkaller0 entered promiscuous mode [ 202.358947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.366914][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.398246][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.407208][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.417135][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.424220][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.432139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.473671][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.500533][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.507627][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.515075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.523153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.531398][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.548674][ T7792] device veth1_macvtap entered promiscuous mode [ 202.555674][ T7792] device macsec0 entered promiscuous mode [ 202.590056][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.620026][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.755176][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.816854][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.886467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.039687][ T7803] device syzkaller0 entered promiscuous mode [ 203.062815][ T7748] device veth0_vlan entered promiscuous mode [ 203.083508][ T7748] device veth1_macvtap entered promiscuous mode [ 203.294110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.342230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.397833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.444231][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.464877][ T7806] syz.4.2119[7806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.465810][ T7806] syz.4.2119[7806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.479671][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.499834][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.521692][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.929057][ T835] device veth1_macvtap left promiscuous mode [ 204.892270][ T7865] device syzkaller0 entered promiscuous mode [ 205.900999][ T7916] FAULT_INJECTION: forcing a failure. [ 205.900999][ T7916] name failslab, interval 1, probability 0, space 0, times 0 [ 205.951887][ T7916] CPU: 1 PID: 7916 Comm: syz.0.2149 Tainted: G W syzkaller #0 [ 205.960707][ T7916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 205.970894][ T7916] Call Trace: [ 205.974219][ T7916] __dump_stack+0x21/0x24 [ 205.978651][ T7916] dump_stack_lvl+0x169/0x1d8 [ 205.983338][ T7916] ? thaw_kernel_threads+0x220/0x220 [ 205.988641][ T7916] ? show_regs_print_info+0x18/0x18 [ 205.993854][ T7916] ? irqentry_exit+0x56/0x60 [ 205.998473][ T7916] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 206.004407][ T7916] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 206.010582][ T7916] dump_stack+0x15/0x1c [ 206.014766][ T7916] should_fail+0x3c1/0x510 [ 206.019189][ T7916] ? security_inode_alloc+0x33/0x110 [ 206.024643][ T7916] __should_failslab+0xa4/0xe0 [ 206.029406][ T7916] should_failslab+0x9/0x20 [ 206.033906][ T7916] kmem_cache_alloc+0x3d/0x2e0 [ 206.038842][ T7916] security_inode_alloc+0x33/0x110 [ 206.043952][ T7916] inode_init_always+0x70a/0x9b0 [ 206.048884][ T7916] new_inode_pseudo+0x91/0x210 [ 206.053654][ T7916] __ns_get_path+0x15c/0x470 [ 206.058239][ T7916] ? _raw_spin_unlock+0x4d/0x70 [ 206.063088][ T7916] ns_get_path+0x54/0x90 [ 206.067330][ T7916] proc_ns_get_link+0xf3/0x200 [ 206.072097][ T7916] ? proc_ns_instantiate+0xf0/0xf0 [ 206.077294][ T7916] ? security_inode_follow_link+0xc4/0x110 [ 206.083099][ T7916] ? proc_ns_instantiate+0xf0/0xf0 [ 206.088207][ T7916] pick_link+0x5b2/0xcc0 [ 206.092456][ T7916] step_into+0xab6/0xcf0 [ 206.096733][ T7916] ? lookup_fast+0x463/0x700 [ 206.101411][ T7916] ? set_root+0x3f0/0x3f0 [ 206.105744][ T7916] path_openat+0x1639/0x3160 [ 206.110340][ T7916] ? sched_clock+0x3a/0x40 [ 206.114754][ T7916] ? do_filp_open+0x3e0/0x3e0 [ 206.119512][ T7916] ? sched_clock+0x3a/0x40 [ 206.123926][ T7916] ? sched_clock_cpu+0x1b/0x3d0 [ 206.129051][ T7916] ? expand_files+0xde/0x8e0 [ 206.133656][ T7916] do_filp_open+0x1b3/0x3e0 [ 206.138157][ T7916] ? vfs_tmpfile+0x2c0/0x2c0 [ 206.142860][ T7916] ? get_unused_fd_flags+0x92/0xa0 [ 206.147974][ T7916] do_sys_openat2+0x14c/0x6d0 [ 206.152653][ T7916] ? do_sys_open+0xe0/0xe0 [ 206.157067][ T7916] ? __kasan_check_write+0x14/0x20 [ 206.162985][ T7916] ? switch_fpu_return+0x197/0x340 [ 206.168093][ T7916] ? fpu__clear_all+0x20/0x20 [ 206.172884][ T7916] ? ____fput+0x15/0x20 [ 206.177043][ T7916] ? task_work_run+0x170/0x190 [ 206.181901][ T7916] __x64_sys_openat+0x136/0x160 [ 206.186774][ T7916] do_syscall_64+0x31/0x40 [ 206.191194][ T7916] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.197198][ T7916] RIP: 0033:0x7f26c6de1810 [ 206.201617][ T7916] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 206.221220][ T7916] RSP: 002b:00007f26c584af10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 206.229728][ T7916] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f26c6de1810 [ 206.237814][ T7916] RDX: 0000000000000000 RSI: 00007f26c584afa0 RDI: 00000000ffffff9c [ 206.245955][ T7916] RBP: 00007f26c584afa0 R08: 0000000000000000 R09: 0000000000000000 [ 206.253923][ T7916] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 206.261978][ T7916] R13: 00007f26c703a038 R14: 00007f26c7039fa0 R15: 00007ffdd735ecf8 [ 206.589446][ T7930] syz.1.2152 (7930) used obsolete PPPIOCDETACH ioctl [ 206.747930][ T7934] device pim6reg1 entered promiscuous mode [ 206.764273][ T7937] device sit0 left promiscuous mode [ 208.989048][ T7994] device pim6reg1 entered promiscuous mode [ 209.604694][ T8019] device veth1_macvtap entered promiscuous mode [ 209.653464][ T8019] device macsec0 entered promiscuous mode [ 209.745721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 211.610662][ T8107] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.617974][ T8107] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.717826][ T8113] device bridge_slave_1 left promiscuous mode [ 211.728188][ T8113] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.832150][ T8113] device bridge_slave_0 left promiscuous mode [ 211.899728][ T8113] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.063427][ T8111] device veth1_macvtap entered promiscuous mode [ 212.166392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.421646][ T24] audit: type=1400 audit(1761830886.040:160): avc: denied { create } for pid=8141 comm="syz.4.2217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 213.287118][ T8173] device veth0_vlan left promiscuous mode [ 213.296849][ T8173] device veth0_vlan entered promiscuous mode [ 213.612938][ T8213] device wg2 left promiscuous mode [ 213.919066][ T8244] device pim6reg1 entered promiscuous mode [ 214.340963][ T8278] device syzkaller0 entered promiscuous mode [ 214.636225][ T8301] device syzkaller0 entered promiscuous mode [ 214.682165][ T8305] device syzkaller0 entered promiscuous mode [ 214.976873][ T8325] device wg2 entered promiscuous mode [ 217.374911][ T8461] device pim6reg1 entered promiscuous mode [ 217.561628][ T8461] device syzkaller0 entered promiscuous mode [ 218.314100][ T8487] device wg2 entered promiscuous mode [ 218.349228][ T8487] syz.4.2318[8487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.349288][ T8487] syz.4.2318[8487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.685662][ T8509] device wg2 left promiscuous mode [ 218.792662][ T8511] device wg2 entered promiscuous mode [ 218.937094][ T8520] device syzkaller0 entered promiscuous mode [ 220.071603][ T8556] device sit0 left promiscuous mode [ 220.761392][ T8570] device sit0 left promiscuous mode [ 220.926151][ T8571] device sit0 entered promiscuous mode [ 221.171867][ T8580] device pim6reg1 entered promiscuous mode [ 222.135424][ T8617] syz.0.2356[8617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.135484][ T8617] syz.0.2356[8617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.459785][ T8625] device veth0_vlan left promiscuous mode [ 222.521709][ T8625] device veth0_vlan entered promiscuous mode [ 222.561864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.571318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 222.578981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 222.853001][ T8668] device wg2 left promiscuous mode [ 223.004002][ T8669] device wg2 entered promiscuous mode [ 224.004938][ T8753] device veth0_vlan left promiscuous mode [ 224.014853][ T24] audit: type=1400 audit(1761830897.630:161): avc: denied { create } for pid=8742 comm="syz.0.2393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.074713][ T8753] device veth0_vlan entered promiscuous mode [ 225.003214][ T8842] device macsec0 entered promiscuous mode [ 226.880746][ T9006] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.887908][ T9006] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.895649][ T9006] device bridge_slave_0 entered promiscuous mode [ 226.904256][ T9006] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.914337][ T9006] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.921823][ T9006] device bridge_slave_1 entered promiscuous mode [ 226.997326][ T9006] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.004411][ T9006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.011738][ T9006] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.018769][ T9006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.038551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.046933][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.055183][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.112721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.129134][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.136267][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.150782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.159049][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.166111][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.173662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.181892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.209561][ T9006] device veth0_vlan entered promiscuous mode [ 227.223487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.232657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.241128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.249331][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.401968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.459866][ T9006] device veth1_macvtap entered promiscuous mode [ 227.482363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.491116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.500944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.509295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.621674][ T9029] syzkaller0: refused to change device tx_queue_len [ 228.241908][ T835] device veth1_macvtap left promiscuous mode [ 228.247974][ T835] device veth0_vlan left promiscuous mode [ 229.050305][ T9099] device sit0 entered promiscuous mode [ 230.423249][ T9184] ±ÿ: renamed from team_slave_1 [ 231.010356][ T9196] device sit0 entered promiscuous mode [ 231.440386][ T9220] device syzkaller0 entered promiscuous mode [ 231.819205][ T9230] device pim6reg1 entered promiscuous mode [ 234.044651][ T9340] device sit0 entered promiscuous mode [ 234.733773][ T9376] device wg2 left promiscuous mode [ 234.811569][ T9376] device wg2 entered promiscuous mode [ 235.126515][ T9395] device veth0_vlan left promiscuous mode [ 235.146939][ T9395] device veth0_vlan entered promiscuous mode [ 235.275021][ T9399] device sit0 entered promiscuous mode [ 235.429224][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.439832][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.454854][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.799351][ T9482] device sit0 entered promiscuous mode [ 238.195911][ T9499] device veth1_macvtap left promiscuous mode [ 238.210803][ T9499] device macsec0 left promiscuous mode [ 239.695561][ T9532] device syzkaller0 entered promiscuous mode [ 240.288275][ T9671] device syzkaller0 entered promiscuous mode [ 240.379205][ T9672] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.397063][ T9672] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.407399][ T9672] device bridge_slave_0 entered promiscuous mode [ 240.528994][ T9672] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.536470][ T9672] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.543995][ T9672] device bridge_slave_1 entered promiscuous mode [ 240.718373][ T9672] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.725799][ T9672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.733124][ T9672] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.740276][ T9672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.833401][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.862780][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.870780][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.904014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.913455][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.920564][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.929700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.938569][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.945939][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.009281][ T9725] device pim6reg1 entered promiscuous mode [ 241.025552][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.077894][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.124519][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.153063][ T9672] device veth0_vlan entered promiscuous mode [ 241.162874][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.176979][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.236779][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.249411][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.259429][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.283425][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.292028][ T9672] device veth1_macvtap entered promiscuous mode [ 241.367294][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.375312][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.383923][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.401563][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.409965][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.670893][ T835] device veth1_macvtap left promiscuous mode [ 241.683647][ T835] device veth0_vlan left promiscuous mode [ 242.384865][ T9800] device veth0_vlan left promiscuous mode [ 242.402906][ T9800] device veth0_vlan entered promiscuous mode [ 243.573407][ T9877] device syzkaller0 entered promiscuous mode [ 243.973785][ T9886] device macsec0 entered promiscuous mode [ 244.001718][ T9889] device pim6reg1 entered promiscuous mode [ 244.079248][ T9898] device pim6reg1 entered promiscuous mode [ 244.478099][ T9922] device veth0_vlan left promiscuous mode [ 244.491151][ T9922] device veth0_vlan entered promiscuous mode [ 244.512132][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.522943][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.533511][ T371] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 244.542386][ T9933] ------------[ cut here ]------------ [ 244.551345][ T9933] kernel BUG at kernel/bpf/arraymap.c:980! [ 244.557568][ T9933] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 244.563659][ T9933] CPU: 0 PID: 9933 Comm: syz.1.2694 Tainted: G W syzkaller #0 [ 244.572425][ T9933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 244.582488][ T9933] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 244.588724][ T9933] Code: 96 e9 ff eb 05 e8 1c 96 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 08 96 e9 ff 0f 0b e9 78 f9 ff ff e8 fc 95 e9 ff <0f> 0b e8 f5 95 e9 ff 0f 0b e8 ee 95 e9 ff 0f 0b e8 e7 95 e9 ff 0f [ 244.608362][ T9933] RSP: 0018:ffffc90000bd7c30 EFLAGS: 00010293 [ 244.614607][ T9933] RAX: ffffffff817a0fa4 RBX: ffff88810d874010 RCX: ffff8881195ce2c0 [ 244.622671][ T9933] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 244.630675][ T9933] RBP: ffffc90000bd7cb0 R08: dffffc0000000000 R09: fffffbfff0c5d4d1 [ 244.638644][ T9933] R10: fffffbfff0c5d4d1 R11: 1ffffffff0c5d4d0 R12: ffffffffa005ec00 [ 244.646622][ T9933] R13: ffff888126370d00 R14: 0000000000000001 R15: 00000000fffffff0 [ 244.654592][ T9933] FS: 00007f357c1286c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 244.663515][ T9933] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 244.670311][ T9933] CR2: 00000000508f0000 CR3: 0000000128ea8000 CR4: 00000000003506b0 [ 244.678282][ T9933] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 244.686269][ T9933] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 244.694242][ T9933] Call Trace: [ 244.697530][ T9933] ? bpf_prog_4b8b081278bac347+0xb/0x3c4 [ 244.703163][ T9933] bpf_fd_array_map_update_elem+0x21f/0x330 [ 244.709139][ T9933] bpf_map_update_value+0xb4/0x430 [ 244.714258][ T9933] map_update_elem+0x4a1/0x5e0 [ 244.719016][ T9933] __se_sys_bpf+0x398/0x680 [ 244.723529][ T9933] ? __x64_sys_bpf+0x90/0x90 [ 244.728120][ T9933] ? do_user_addr_fault+0x791/0xc80 [ 244.733318][ T9933] ? debug_smp_processor_id+0x17/0x20 [ 244.738686][ T9933] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 244.744769][ T9933] __x64_sys_bpf+0x7b/0x90 [ 244.749188][ T9933] do_syscall_64+0x31/0x40 [ 244.753605][ T9933] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 244.759489][ T9933] RIP: 0033:0x7f357d701fc9 [ 244.763898][ T9933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.783584][ T9933] RSP: 002b:00007f357c128038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.792112][ T9933] RAX: ffffffffffffffda RBX: 00007f357d959180 RCX: 00007f357d701fc9 [ 244.800113][ T9933] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000002 [ 244.808084][ T9933] RBP: 00007f357d784f91 R08: 0000000000000000 R09: 0000000000000000 [ 244.816401][ T9933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 244.824378][ T9933] R13: 00007f357d959218 R14: 00007f357d959180 R15: 00007fff08548098 [ 244.832359][ T9933] Modules linked in: [ 244.836919][ T9933] ---[ end trace aeb4b602a489d69c ]--- [ 244.843894][ T9933] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 244.850379][ T9933] Code: 96 e9 ff eb 05 e8 1c 96 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 08 96 e9 ff 0f 0b e9 78 f9 ff ff e8 fc 95 e9 ff <0f> 0b e8 f5 95 e9 ff 0f 0b e8 ee 95 e9 ff 0f 0b e8 e7 95 e9 ff 0f [ 244.870857][ T9933] RSP: 0018:ffffc90000bd7c30 EFLAGS: 00010293 [ 244.877060][ T9933] RAX: ffffffff817a0fa4 RBX: ffff88810d874010 RCX: ffff8881195ce2c0 [ 244.885446][ T9933] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 244.893500][ T9933] RBP: ffffc90000bd7cb0 R08: dffffc0000000000 R09: fffffbfff0c5d4d1 [ 244.901671][ T9933] R10: fffffbfff0c5d4d1 R11: 1ffffffff0c5d4d0 R12: ffffffffa005ec00 [ 244.909710][ T9933] R13: ffff888126370d00 R14: 0000000000000001 R15: 00000000fffffff0 [ 244.917819][ T9933] FS: 00007f357c1286c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 244.927085][ T9933] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 244.933859][ T9933] CR2: 00000000508f0000 CR3: 0000000128ea8000 CR4: 00000000003506b0 [ 244.942093][ T9933] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 244.950088][ T9933] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 244.958380][ T9933] Kernel panic - not syncing: Fatal exception [ 244.960073][ T24] audit: type=1400 audit(1761830918.580:162): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 244.964574][ T9933] Kernel Offset: disabled [ 244.990600][ T9933] Rebooting in 86400 seconds..