last executing test programs: 7.467904866s ago: executing program 0 (id=3162): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000300000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x8, 0x1, 0x4404, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x49}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x8000, 0x57, &(0x7f0000000180)=""/87, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x10, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0, r0, r0, r0, r1], 0x0, 0x10, 0x9}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r2, r3}, 0xc) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}, 0x20000801) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 6.529739311s ago: executing program 0 (id=3168): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0000000000242b00", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x15, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2767], &(0x7f00000001c0)='GPL\x00'}, 0x48) write$cgroup_devices(r1, &(0x7f0000001080)=ANY=[], 0xffffff3c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff, '\x00', 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 6.128215424s ago: executing program 0 (id=3169): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1}, 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) 5.756897625s ago: executing program 4 (id=3170): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xe68c}, 0x10210, 0x88, 0x0, 0x6, 0x3, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x6, 0xc, 0x0, 0xffffffffffffffff, 0x6}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, 0x0, 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000002980), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r5}, 0x8) 5.478378632s ago: executing program 2 (id=3171): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000040)="0000ffffffffa000903626e43925", 0x0, 0x10c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018"], &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x189603e4342c0e17, @perf_bp={&(0x7f0000000080)}, 0x104001, 0x0, 0x3, 0xa2ed0d70c7c787cf, 0xfffffffffffffffe, 0x0, 0xfffd}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x7, 0xf3, 0x6, 0x0, 0x0, 0xd006e1258c48358c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0xc20, 0xc8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x3, r3, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}], 0x40}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 5.210593937s ago: executing program 1 (id=3172): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x71, 0x0, 0x1, 0x94}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x86, 0x1, 0x0, 0x0, 0x0, 0x1000, 0xa120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x302a0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8932, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000000010000fd0000000900000001000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000f050bfe70a00001000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000280), 0x4, r4}, 0x38) 4.949670362s ago: executing program 2 (id=3173): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x4012}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 4.035314955s ago: executing program 4 (id=3174): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) close(0x3) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xbd3d1606e608939d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r3}, &(0x7f00000008c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x1000003, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8e7}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)='%pB \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x40047459, &(0x7f0000001200)) syz_open_procfs$namespace(0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x11, 0x4, 0x3, 0x5, 0x30500}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.996486068s ago: executing program 2 (id=3175): r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x20, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6c, 0x2, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x44, 0x0, 0xfffffffffffffffd}) 3.945106641s ago: executing program 2 (id=3176): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x87) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 3.545128564s ago: executing program 4 (id=3180): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x700}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f00000000c0)="4d350a56a7bc74f8e9be2c1fc6b8590afd6f1dd0cf4762f72aae129a3603c71d9b", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x55}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000fc04000000000000000000008500000041000000850000009e00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], 0xfdef) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_clone(0x81280000, 0x0, 0x63, 0x0, 0x0, 0xfffffffffffffffc) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r5, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, r5, 0x0) 3.544257014s ago: executing program 3 (id=3190): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x112}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x14, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) close(0x4) 3.374174534s ago: executing program 3 (id=3181): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0x4) 3.067415662s ago: executing program 3 (id=3182): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a3, &(0x7f0000000080)) 3.055656983s ago: executing program 2 (id=3183): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70200000300000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000500), 0x8}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000009c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x8, 0x1, 0x4404, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x49}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x8000, 0x57, &(0x7f0000000180)=""/87, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x10, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r2}, 0xc) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000004c0)="0000faab91cbd3199c2c8c192f3fc33aaf7f780c6ea8fa86f36fc2205179a022d62cb1c2d5583d666b8c8a9b6e0f6e1fc7", 0x31}], 0x1}, 0x20000801) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 3.040901254s ago: executing program 4 (id=3184): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f0000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780), &(0x7f0000000580), 0x80000002, r0}, 0x38) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000100ffff0000000000000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r3}, 0x18) syz_clone(0x62005000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x8a, 0x0, 0xfef1) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000006b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x5, 0x7, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32=r8, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB="0f000000d849ecabffff0400efff0200020400000000c2ece4655d5f81db337f8a6d3cbcca28623ba05c3a696eccafdfc605f7b1b63c2e96f21d8a8fd8663312cbb418004be6671b13f03e7cd94f73daa5ae997eed4c2843360d5d063aae3ad5bd168df1da5fc3bdbbddbd5e122877e0a50e3d5475725d112d4455819948a9af2e5ad481a88836f02916d659f0d50022bebbf18f918374ceb835a360fb87b1207d79fc4ca7fa7027c21afa177b0afee66a57c06426eb54459804935bec750ddb8b46e4a96225d20a", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x5, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000313127d57a4eb343d66ba319ae7c936128b229e497df4bad09c8acf1dad0b20e785438e39b528f4b2d", @ANYRES32=r7], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f00000001c0)=r6, 0x4) 2.982986727s ago: executing program 3 (id=3185): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xe68c}, 0x10210, 0x88, 0x0, 0x6, 0x3, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x6, 0xc, 0x0, 0xffffffffffffffff, 0x6}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, 0x0, 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000002980), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r5}, 0x8) 2.652980946s ago: executing program 1 (id=3186): r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x20, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6c, 0x2, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x44, 0x0, 0xfffffffffffffffd}) 2.532322413s ago: executing program 1 (id=3187): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b70200000300000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000500), 0x8}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x8, 0x1, 0x4404, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x49}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x8000, 0x57, &(0x7f0000000180)=""/87, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x10, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r2}, 0xc) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000004c0)="0000faab91cbd3199c2c8c192f3fc33aaf7f780c6ea8fa86f36fc2205179a022d62cb1c2d5583d666b8c8a9b6e0f6e1fc7", 0x31}], 0x1}, 0x20000801) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 2.140958925s ago: executing program 2 (id=3188): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x71, 0x0, 0x1, 0x94}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8932, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) close(r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000000010000fd0000000900000001000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000f050bfe70a00001000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r6}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000280), 0x4, r6}, 0x38) 1.706290351s ago: executing program 1 (id=3189): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000208e052500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b9ff03076804268c989e14f088a8", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.614808077s ago: executing program 0 (id=3191): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9b66, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x28c612c076ed6f04, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200008000000000000000000000008500000027000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0xfca804a0, 0x80, 0x0, &(0x7f0000000500)="b820080000000000000000d1786d4b98cdebb1d7033770804c3e13c6e8c0d3aee244192ee29f487992cb8bfcad1832c75db95fe67f2e10120793697d7f985ecb78844b881acc4d4d88804dbf071f05e81c1aec9bca3eb8eda4770a696853a1a1d397f6832c0e468c871d7dd18709b7cfb751c8a261dc64f9c3098c58b00b4a82", 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.614278427s ago: executing program 1 (id=3192): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0xe42b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a0bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 895.733098ms ago: executing program 3 (id=3193): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) close(0x4) 892.283218ms ago: executing program 0 (id=3203): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000004000000990500000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="a5f9ff3cbb3ed2a1000000002078e400000000000007c8c34c00007f2d3954b5887600"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r1, 0x0, 0x1ba8847c99}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x50) socketpair(0xf, 0x3, 0x800, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000003e40)=ANY=[@ANYBLOB="15000000080000003c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x3, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='timer_start\x00', r5}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) syz_clone(0x62005000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 695.28755ms ago: executing program 4 (id=3194): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9b66, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x28c612c076ed6f04, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200008000000000000000000000008500000027000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0xfca804a0, 0x80, 0x0, &(0x7f0000000500)="b820080000000000000000d1786d4b98cdebb1d7033770804c3e13c6e8c0d3aee244192ee29f487992cb8bfcad1832c75db95fe67f2e10120793697d7f985ecb78844b881acc4d4d88804dbf071f05e81c1aec9bca3eb8eda4770a696853a1a1d397f6832c0e468c871d7dd18709b7cfb751c8a261dc64f9c3098c58b00b4a82", 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 501.817511ms ago: executing program 4 (id=3195): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x87) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 461.178834ms ago: executing program 3 (id=3196): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000300000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x8, 0x1, 0x4404, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x49}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x8000, 0x57, &(0x7f0000000180)=""/87, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x10, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0, r0, r0, r0, r1], 0x0, 0x10, 0x9}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r2, r3}, 0xc) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000004c0)="0000faab91cbd3199c2c8c192f3fc33aaf7f780c6ea8fa86f3", 0x19}], 0x1}, 0x20000801) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 327.905291ms ago: executing program 1 (id=3197): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x700}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f00000000c0)="4d350a56a7bc74f8e9be2c1fc6b8590afd6f1dd0cf4762f72aae129a3603c71d9b", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x55}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000fc04000000000000000000008500000041000000850000009e000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], 0xfdef) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_clone(0x81280000, 0x0, 0x63, 0x0, 0x0, 0xfffffffffffffffc) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r5, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, r5, 0x0) 0s ago: executing program 0 (id=3198): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01"], 0x48) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x87c, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000004c0), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x9b) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={&(0x7f0000000340)="df52b7ae74ae942a40ee1f9775e5d6906a0e0426684edb03ff071285613a41519633f3f1d4c3c9ced1b25816fe23aee137c256bcf6182d34f2eb9ee6d3ff5d0c4b86322f5ed8bad0597cee7f7e8f8134be3d2733ec01b4e65b9f79", &(0x7f0000000c40)=""/4096, &(0x7f00000003c0)="b1be9298280f5e10ac37eeba0ced382749c4735c6847e2028097ee4329e6043d254984065065143fc5b5b354ce03937cd6a2d42f7532f070ea5d7c78b91d6b6bd2547028e0e2788a4dbdb3ce142669082a8bc053b575270958130276a23d163fcc827b79a9daa129", &(0x7f0000000500)="f5d9f48021a31968e2724ca36d7e3d016864558eb68a320992f87d4b356b838b1cd91878273f592e290e23ed98e56db798a4aef0ffd6acd48f4c4d179c4fac7f4e45c1347788e0e4980ce43a1b6e2249a97bf8161c7aa869c9260e30b6c4f7bf65b25f37a667181c616c6f322be0e72ce34808fdd376e2445ed8f7aa0cd4961dc3b9f8a47befa81218512353c1ba2d6f849c70bea996e88e260dc7b22c7c6febebc930c60192b045f5be", 0x0, r0, 0x4}, 0x38) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000040), &(0x7f0000000080)=r5}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x81ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x38) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.241' (ED25519) to the list of known hosts. [ 21.430687][ T28] audit: type=1400 audit(1769045891.460:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.433747][ T275] cgroup: Unknown subsys name 'net' [ 21.453446][ T28] audit: type=1400 audit(1769045891.460:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.480638][ T28] audit: type=1400 audit(1769045891.480:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.480922][ T275] cgroup: Unknown subsys name 'devices' [ 21.592038][ T275] cgroup: Unknown subsys name 'hugetlb' [ 21.597652][ T275] cgroup: Unknown subsys name 'rlimit' [ 21.731655][ T28] audit: type=1400 audit(1769045891.760:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.754844][ T28] audit: type=1400 audit(1769045891.760:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.779615][ T28] audit: type=1400 audit(1769045891.760:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.803396][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.812194][ T28] audit: type=1400 audit(1769045891.840:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.837567][ T28] audit: type=1400 audit(1769045891.840:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.892239][ T28] audit: type=1400 audit(1769045891.920:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.917753][ T28] audit: type=1400 audit(1769045891.920:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.917784][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.868525][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.875818][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.883336][ T286] device bridge_slave_0 entered promiscuous mode [ 22.891381][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.898424][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.906336][ T286] device bridge_slave_1 entered promiscuous mode [ 22.969348][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.976495][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.983882][ T287] device bridge_slave_0 entered promiscuous mode [ 22.993628][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.000686][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.008044][ T287] device bridge_slave_1 entered promiscuous mode [ 23.022892][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.029944][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.037436][ T283] device bridge_slave_0 entered promiscuous mode [ 23.044086][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.051156][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.058534][ T284] device bridge_slave_0 entered promiscuous mode [ 23.067950][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.075076][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.082521][ T284] device bridge_slave_1 entered promiscuous mode [ 23.091605][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.098648][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.106096][ T283] device bridge_slave_1 entered promiscuous mode [ 23.177825][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.184915][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.192533][ T285] device bridge_slave_0 entered promiscuous mode [ 23.212117][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.219157][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.226571][ T285] device bridge_slave_1 entered promiscuous mode [ 23.320510][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.327579][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.334908][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.341967][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.352097][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.359122][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.366394][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.373422][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.394242][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.401291][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.408564][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.415603][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.427358][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.434388][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.441683][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.448707][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.494966][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.502004][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.509226][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.516263][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.539630][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.546844][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.554912][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.562146][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.569461][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.576989][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.584156][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.591317][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.598574][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.605785][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.613467][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.620857][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.631963][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.651290][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.659487][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.666541][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.673885][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.682126][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.689142][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.696781][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.716040][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.723413][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.731709][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.738729][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.747277][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.755424][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.762452][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.769980][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.778173][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.785189][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.792601][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.800750][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.807757][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.815153][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.836336][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.843831][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.852017][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.860870][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.867907][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.875414][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.883322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.891569][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.898603][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.905984][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.925243][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.933292][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.941270][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.949231][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.957290][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.966162][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.974450][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.982489][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.998057][ T287] device veth0_vlan entered promiscuous mode [ 24.004327][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.011925][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.019334][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.027388][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.035535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.043014][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.057617][ T286] device veth0_vlan entered promiscuous mode [ 24.065099][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.073519][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.081929][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.089729][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.097869][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.106509][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.114774][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.121839][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.129242][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.136798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.150531][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.158874][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.167304][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.174349][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.181931][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.189906][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.200508][ T287] device veth1_macvtap entered promiscuous mode [ 24.209925][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.218275][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.226567][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.234316][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.242636][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.253270][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.261759][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.278068][ T285] device veth0_vlan entered promiscuous mode [ 24.289294][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.297458][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.305273][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.312884][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.321315][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.329192][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.337589][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.345951][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.355474][ T286] device veth1_macvtap entered promiscuous mode [ 24.365817][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.373485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.382019][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.390608][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.404712][ T285] device veth1_macvtap entered promiscuous mode [ 24.416293][ T283] device veth0_vlan entered promiscuous mode [ 24.422797][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.431044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.439301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.447329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.455941][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.464282][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.472727][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.480318][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.494485][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.502979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.506241][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 24.525323][ T284] device veth0_vlan entered promiscuous mode [ 24.532997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.545894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.558503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.567613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.573558][ C0] hrtimer: interrupt took 34725 ns [ 24.577423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.589205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.598248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.607019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.619608][ T283] device veth1_macvtap entered promiscuous mode [ 24.636300][ T284] device veth1_macvtap entered promiscuous mode [ 24.647439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.660982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.669193][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.677023][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.686680][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.695453][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.703930][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.712442][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.768988][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.804093][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.851808][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.901468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.960377][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.020449][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.085618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.138963][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.566623][ T359] Ÿë: port 1(ip6gretap0) entered blocking state [ 26.710303][ T359] Ÿë: port 1(ip6gretap0) entered disabled state [ 26.751400][ T359] device ip6gretap0 entered promiscuous mode [ 28.159182][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 28.159196][ T28] audit: type=1400 audit(1769045898.180:104): avc: denied { write } for pid=380 comm="syz.4.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.589348][ T393] Ÿë: port 1(ip6gretap0) entered blocking state [ 28.620176][ T393] Ÿë: port 1(ip6gretap0) entered disabled state [ 28.666282][ T393] device ip6gretap0 entered promiscuous mode [ 29.684800][ T28] audit: type=1400 audit(1769045899.710:105): avc: denied { create } for pid=406 comm="syz.2.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.865767][ T28] audit: type=1400 audit(1769045899.890:106): avc: denied { tracepoint } for pid=406 comm="syz.2.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.328944][ T425] Driver unsupported XDP return value 0 on prog (id 44) dev N/A, expect packet loss! [ 31.399514][ T28] audit: type=1400 audit(1769045901.420:107): avc: denied { create } for pid=423 comm="syz.4.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 31.722638][ T28] audit: type=1400 audit(1769045901.740:108): avc: denied { relabelfrom } for pid=426 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.831823][ T28] audit: type=1400 audit(1769045901.740:109): avc: denied { relabelto } for pid=426 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.907346][ T28] audit: type=1400 audit(1769045901.790:110): avc: denied { attach_queue } for pid=426 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.667499][ T480] device pim6reg1 entered promiscuous mode [ 34.825388][ T481] device sit0 entered promiscuous mode [ 38.800982][ T28] audit: type=1400 audit(1769045908.820:111): avc: denied { create } for pid=527 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.631385][ T28] audit: type=1400 audit(1769045909.660:112): avc: denied { read } for pid=535 comm="syz.1.55" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.839975][ T536] sock: sock_set_timeout: `syz.1.55' (pid 536) tries to set negative timeout [ 39.871440][ T28] audit: type=1400 audit(1769045909.660:113): avc: denied { open } for pid=535 comm="syz.1.55" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.090526][ T28] audit: type=1400 audit(1769045909.660:114): avc: denied { ioctl } for pid=535 comm="syz.1.55" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.480943][ T28] audit: type=1400 audit(1769045912.510:115): avc: denied { create } for pid=574 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 44.296707][ T588] syz.4.70 (588) used greatest stack depth: 22560 bytes left [ 45.057443][ T612] device wg2 entered promiscuous mode [ 49.745815][ T28] audit: type=1400 audit(1769045919.760:116): avc: denied { write } for pid=676 comm="syz.2.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.836779][ T677] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.897278][ T28] audit: type=1400 audit(1769045920.920:117): avc: denied { cpu } for pid=697 comm="syz.3.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 53.125526][ T28] audit: type=1400 audit(1769045923.150:118): avc: denied { setopt } for pid=738 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 54.681538][ T28] audit: type=1400 audit(1769045924.710:119): avc: denied { associate } for pid=772 comm="syz.0.122" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 54.741128][ T28] audit: type=1400 audit(1769045924.770:120): avc: denied { create } for pid=772 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 54.761999][ T28] audit: type=1400 audit(1769045924.790:121): avc: denied { ioctl } for pid=772 comm="syz.0.122" path="socket:[16823]" dev="sockfs" ino=16823 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.931210][ T813] device ip6gretap0 left promiscuous mode [ 55.979447][ T813] Ÿë: port 1(ip6gretap0) entered disabled state [ 56.887768][ T858] device ip6gretap0 left promiscuous mode [ 56.894596][ T858] Ÿë: port 1(ip6gretap0) entered disabled state [ 58.387622][ T899] ÿ: renamed from bond_slave_0 [ 58.954736][ T902] device syzkaller0 entered promiscuous mode [ 59.005126][ T904] syz.4.161 (904) used greatest stack depth: 21376 bytes left [ 59.650529][ T917] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.657766][ T917] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.067437][ T1003] syz.1.191[1003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.067725][ T1003] syz.1.191[1003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.102386][ T1080] device syzkaller0 entered promiscuous mode [ 70.772344][ T28] audit: type=1400 audit(1769045940.800:122): avc: denied { create } for pid=1147 comm="syz.4.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 71.741435][ T1164] device syzkaller0 entered promiscuous mode [ 73.913692][ T28] audit: type=1400 audit(1769045943.940:123): avc: denied { read } for pid=1188 comm="syz.2.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 76.314886][ T1228] device sit0 left promiscuous mode [ 76.521386][ T1231] device sit0 entered promiscuous mode [ 80.822891][ T1312] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.830135][ T1312] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.151203][ T1311] device bridge_slave_1 left promiscuous mode [ 81.159524][ T1311] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.178080][ T1311] device bridge_slave_0 left promiscuous mode [ 81.186868][ T1311] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.840713][ T1379] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.847918][ T1379] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.097038][ T1379] device bridge_slave_1 left promiscuous mode [ 86.140266][ T1379] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.190439][ T1379] device bridge_slave_0 left promiscuous mode [ 86.262224][ T1379] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.465958][ T1437] Ÿë: port 1(ip6gretap0) entered blocking state [ 89.482538][ T1437] Ÿë: port 1(ip6gretap0) entered disabled state [ 89.489361][ T1437] device ip6gretap0 entered promiscuous mode [ 89.896061][ T1441] syzkaller: port 1(erspan0) entered blocking state [ 89.910304][ T1441] syzkaller: port 1(erspan0) entered disabled state [ 89.926604][ T1441] device erspan0 entered promiscuous mode [ 89.946755][ T1442] syzkaller: port 1(erspan0) entered blocking state [ 89.953423][ T1442] syzkaller: port 1(erspan0) entered forwarding state [ 91.555276][ T28] audit: type=1400 audit(1769045961.580:124): avc: denied { create } for pid=1473 comm="syz.1.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 95.896292][ T1554] device sit0 entered promiscuous mode [ 99.980051][ T28] audit: type=1400 audit(1769045969.990:125): avc: denied { create } for pid=1633 comm="syz.2.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.062314][ T1635] veth0_macvtap: mtu greater than device maximum [ 102.410163][ T1699] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.503532][ T1699] device bridge_slave_1 left promiscuous mode [ 102.510531][ T1699] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.518409][ T1699] device bridge_slave_0 left promiscuous mode [ 102.524722][ T1699] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.816267][ T1738] syz.1.400[1738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.816331][ T1738] syz.1.400[1738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.613892][ T28] audit: type=1400 audit(1769045974.640:126): avc: denied { write } for pid=1745 comm="syz.4.405" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 110.378494][ T1842] device pim6reg1 entered promiscuous mode [ 110.409857][ T1844] device ip6gretap0 left promiscuous mode [ 110.426217][ T1844] Ÿë: port 1(ip6gretap0) entered disabled state [ 112.153358][ T1888] device bridge_slave_1 left promiscuous mode [ 112.166046][ T1888] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.188853][ T1888] device bridge_slave_0 left promiscuous mode [ 112.235301][ T1888] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.849525][ T1933] bond_slave_1: mtu less than device minimum [ 115.210019][ C0] sched: RT throttling activated [ 117.568016][ T1969] bond_slave_1: mtu less than device minimum [ 117.634420][ T1967] device syzkaller0 entered promiscuous mode [ 117.748057][ T28] audit: type=1400 audit(1769045987.770:127): avc: denied { create } for pid=1977 comm="syz.1.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.128800][ T28] audit: type=1400 audit(1769045988.150:128): avc: denied { create } for pid=1997 comm="syz.3.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 118.858107][ T2037] tap0: tun_chr_ioctl cmd 2148553947 [ 119.095386][ T2066] device pim6reg1 entered promiscuous mode [ 121.217861][ T28] audit: type=1400 audit(1769045991.240:129): avc: denied { create } for pid=2088 comm="syz.2.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 122.768693][ T2126] device wg2 entered promiscuous mode [ 124.082831][ T28] audit: type=1400 audit(1769045994.110:130): avc: denied { create } for pid=2143 comm="syz.1.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 129.322053][ T2248] FAULT_INJECTION: forcing a failure. [ 129.322053][ T2248] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 129.402301][ T2248] CPU: 1 PID: 2248 Comm: syz.3.590 Not tainted syzkaller #0 [ 129.409636][ T2248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 129.419707][ T2248] Call Trace: [ 129.422994][ T2248] [ 129.425929][ T2248] __dump_stack+0x21/0x24 [ 129.430323][ T2248] dump_stack_lvl+0x110/0x170 [ 129.435014][ T2248] ? __cfi_dump_stack_lvl+0x8/0x8 [ 129.440050][ T2248] ? __this_cpu_preempt_check+0x13/0x20 [ 129.445608][ T2248] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 129.451880][ T2248] dump_stack+0x15/0x24 [ 129.456062][ T2248] should_fail_ex+0x3d4/0x520 [ 129.460769][ T2248] should_fail+0xb/0x10 [ 129.464939][ T2248] should_fail_usercopy+0x1a/0x20 [ 129.469982][ T2248] _copy_from_user+0x1e/0xc0 [ 129.474687][ T2248] iovec_from_user+0x1aa/0x2e0 [ 129.479464][ T2248] __import_iovec+0x71/0x470 [ 129.484072][ T2248] import_iovec+0x7c/0xb0 [ 129.488419][ T2248] ___sys_recvmsg+0x4b6/0x590 [ 129.493117][ T2248] ? __sys_recvmsg+0x280/0x280 [ 129.497900][ T2248] ? __hrtimer_run_queues+0x9a5/0xa00 [ 129.503288][ T2248] ? __fget_files+0x2d5/0x330 [ 129.507965][ T2248] ? __fdget+0x19c/0x220 [ 129.512218][ T2248] __x64_sys_recvmsg+0x202/0x2d0 [ 129.517175][ T2248] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 129.522655][ T2248] ? sched_clock_cpu+0x6e/0x260 [ 129.527510][ T2248] ? debug_smp_processor_id+0x17/0x20 [ 129.532878][ T2248] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 129.538955][ T2248] x64_sys_call+0x75/0x9a0 [ 129.543386][ T2248] do_syscall_64+0x4c/0xa0 [ 129.547807][ T2248] ? clear_bhb_loop+0x30/0x80 [ 129.552492][ T2248] ? clear_bhb_loop+0x30/0x80 [ 129.557182][ T2248] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 129.563072][ T2248] RIP: 0033:0x7fc49f19acb9 [ 129.567493][ T2248] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 129.587104][ T2248] RSP: 002b:00007fc4a000d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 129.595518][ T2248] RAX: ffffffffffffffda RBX: 00007fc49f415fa0 RCX: 00007fc49f19acb9 [ 129.603489][ T2248] RDX: 0000000040000100 RSI: 0000200000001140 RDI: 0000000000000005 [ 129.611467][ T2248] RBP: 00007fc4a000d090 R08: 0000000000000000 R09: 0000000000000000 [ 129.619440][ T2248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.627407][ T2248] R13: 00007fc49f416038 R14: 00007fc49f415fa0 R15: 00007fff72be78e8 [ 129.635384][ T2248] [ 130.472058][ T2281] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.479296][ T2281] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.611261][ T2282] device bridge_slave_1 left promiscuous mode [ 130.617936][ T2282] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.644191][ T2282] device bridge_slave_0 left promiscuous mode [ 130.670131][ T2282] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.157637][ T2311] FAULT_INJECTION: forcing a failure. [ 132.157637][ T2311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.170979][ T2311] CPU: 0 PID: 2311 Comm: syz.2.610 Not tainted syzkaller #0 [ 132.178276][ T2311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 132.188335][ T2311] Call Trace: [ 132.191619][ T2311] [ 132.194557][ T2311] __dump_stack+0x21/0x24 [ 132.198896][ T2311] dump_stack_lvl+0x110/0x170 [ 132.203579][ T2311] ? __cfi_dump_stack_lvl+0x8/0x8 [ 132.208606][ T2311] dump_stack+0x15/0x24 [ 132.212769][ T2311] should_fail_ex+0x3d4/0x520 [ 132.217450][ T2311] should_fail+0xb/0x10 [ 132.221610][ T2311] should_fail_usercopy+0x1a/0x20 [ 132.226655][ T2311] _copy_to_user+0x1e/0x90 [ 132.231100][ T2311] simple_read_from_buffer+0xe9/0x160 [ 132.236484][ T2311] proc_fail_nth_read+0x1a6/0x220 [ 132.241522][ T2311] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 132.247080][ T2311] ? security_file_permission+0x94/0xb0 [ 132.252642][ T2311] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 132.258218][ T2311] vfs_read+0x27a/0x910 [ 132.262390][ T2311] ? __cfi_vfs_read+0x10/0x10 [ 132.267090][ T2311] ? __kasan_check_write+0x14/0x20 [ 132.272208][ T2311] ? mutex_lock+0x93/0x1b0 [ 132.276638][ T2311] ? __cfi_mutex_lock+0x10/0x10 [ 132.281508][ T2311] ? __fdget_pos+0x2cd/0x380 [ 132.286103][ T2311] ? ksys_read+0x71/0x250 [ 132.290434][ T2311] ksys_read+0x149/0x250 [ 132.294683][ T2311] ? __cfi_ksys_read+0x10/0x10 [ 132.299480][ T2311] __x64_sys_read+0x7b/0x90 [ 132.303985][ T2311] x64_sys_call+0x2f/0x9a0 [ 132.308417][ T2311] do_syscall_64+0x4c/0xa0 [ 132.312845][ T2311] ? clear_bhb_loop+0x30/0x80 [ 132.317532][ T2311] ? clear_bhb_loop+0x30/0x80 [ 132.322225][ T2311] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 132.328131][ T2311] RIP: 0033:0x7f9df695b58e [ 132.332554][ T2311] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 132.352185][ T2311] RSP: 002b:00007f9df78d7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 132.360613][ T2311] RAX: ffffffffffffffda RBX: 00007f9df78d86c0 RCX: 00007f9df695b58e [ 132.368604][ T2311] RDX: 000000000000000f RSI: 00007f9df78d80a0 RDI: 000000000000000e [ 132.376661][ T2311] RBP: 00007f9df78d8090 R08: 0000000000000000 R09: 0000000000000000 [ 132.384634][ T2311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.392617][ T2311] R13: 00007f9df6c16128 R14: 00007f9df6c16090 R15: 00007ffd9277f478 [ 132.400610][ T2311] [ 134.660551][ T28] audit: type=1400 audit(1769046004.690:131): avc: denied { create } for pid=2365 comm="syz.4.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 135.846945][ T2384] device pim6reg1 entered promiscuous mode [ 136.446331][ T2393] device syzkaller0 entered promiscuous mode [ 138.096045][ T28] audit: type=1400 audit(1769046008.120:132): avc: denied { create } for pid=2418 comm="syz.3.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 139.220204][ T2446] ÿ: renamed from bond_slave_0 [ 139.551487][ T2454] device pim6reg1 entered promiscuous mode [ 141.287835][ T2482] device syzkaller0 entered promiscuous mode [ 141.865417][ T28] audit: type=1400 audit(1769046011.890:133): avc: denied { create } for pid=2490 comm="syz.4.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.669065][ T2872] syz.4.788 (2872) used obsolete PPPIOCDETACH ioctl [ 168.064767][ T28] audit: type=1400 audit(1769046038.090:134): avc: denied { create } for pid=2952 comm="syz.4.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 168.644600][ T2971] device wg2 left promiscuous mode [ 168.666009][ T2971] device wg2 entered promiscuous mode [ 172.961826][ T3038] device veth1_macvtap left promiscuous mode [ 172.978001][ T3038] device macsec0 entered promiscuous mode [ 182.247604][ T3199] device lo entered promiscuous mode [ 182.261516][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 188.181696][ T3285] device veth1_macvtap left promiscuous mode [ 196.110441][ T3392] device wg2 left promiscuous mode [ 196.189694][ T3388] device wg2 entered promiscuous mode [ 202.319571][ T3522] device sit0 entered promiscuous mode [ 202.413481][ T3522] device wg2 entered promiscuous mode [ 205.929971][ T3587] device sit0 left promiscuous mode [ 205.954125][ T3587] device sit0 entered promiscuous mode [ 210.272165][ T28] audit: type=1400 audit(1769046080.300:135): avc: denied { create } for pid=3664 comm="syz.2.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 210.822238][ T3666] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 213.071784][ T28] audit: type=1400 audit(1769046083.100:136): avc: denied { create } for pid=3722 comm="syz.1.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 214.220726][ T3755] bond_slave_1: mtu less than device minimum [ 214.410135][ T3760] device sit0 left promiscuous mode [ 215.663998][ T3782] device veth0_vlan left promiscuous mode [ 215.688249][ T3782] device veth0_vlan entered promiscuous mode [ 215.823188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.840667][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.880456][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.325033][ T3798] device sit0 entered promiscuous mode [ 217.156496][ T3813] device syzkaller0 entered promiscuous mode [ 218.029894][ T3836] device veth0_macvtap entered promiscuous mode [ 218.891622][ T3855] device sit0 entered promiscuous mode [ 219.497230][ T3865] device wg2 left promiscuous mode [ 219.503815][ T3866] device wg2 entered promiscuous mode [ 221.491831][ T3910] device veth0_vlan left promiscuous mode [ 221.497814][ T3910] device veth0_vlan entered promiscuous mode [ 221.627227][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.641278][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.670580][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.428425][ T3932] device veth0_vlan left promiscuous mode [ 222.450591][ T3932] device veth0_vlan entered promiscuous mode [ 222.466800][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.493522][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.502890][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.105655][ T3986] device sit0 left promiscuous mode [ 226.336747][ T3988] device sit0 entered promiscuous mode [ 227.650652][ T28] audit: type=1400 audit(1769046097.670:137): avc: denied { create } for pid=4004 comm="syz.3.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 230.027355][ T28] audit: type=1400 audit(1769046100.050:138): avc: denied { create } for pid=4075 comm="syz.4.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 230.893534][ T28] audit: type=1400 audit(1769046100.920:139): avc: denied { create } for pid=4105 comm="syz.3.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 242.652176][ T4256] device syzkaller0 entered promiscuous mode [ 244.868002][ T4317] device wg2 entered promiscuous mode [ 245.761279][ T4342] device wg2 left promiscuous mode [ 245.862968][ T4348] device wg2 entered promiscuous mode [ 248.268623][ T4387] device sit0 left promiscuous mode [ 248.567851][ T4391] device sit0 entered promiscuous mode [ 250.202958][ T4429] device vlan1 entered promiscuous mode [ 250.270727][ T4425] device veth0_vlan left promiscuous mode [ 250.282252][ T4425] device veth0_vlan entered promiscuous mode [ 250.330627][ T572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.338912][ T572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.367091][ T572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.062669][ T4453] device pim6reg1 entered promiscuous mode [ 254.157185][ T4542] device sit0 left promiscuous mode [ 254.175249][ T4542] device sit0 entered promiscuous mode [ 256.694779][ T4587] device veth1_macvtap left promiscuous mode [ 256.952766][ T4592] device veth1_macvtap entered promiscuous mode [ 256.962867][ T4592] device macsec0 entered promiscuous mode [ 257.082202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.334550][ T4668] device sit0 left promiscuous mode [ 261.475374][ T4673] device sit0 entered promiscuous mode [ 261.879282][ T4690] cgroup: fork rejected by pids controller in /syz1 [ 262.049263][ T28] audit: type=1400 audit(1769046132.070:140): avc: denied { create } for pid=4726 comm="syz.3.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 263.252081][ T4749] device sit0 left promiscuous mode [ 266.369890][ T4807] device sit0 left promiscuous mode [ 266.728974][ T4809] device sit0 entered promiscuous mode [ 267.139634][ T28] audit: type=1400 audit(1769046137.160:141): avc: denied { write } for pid=4808 comm="syz.2.1365" name="cgroup.subtree_control" dev="cgroup2" ino=397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 267.389672][ T28] audit: type=1400 audit(1769046137.160:142): avc: denied { open } for pid=4808 comm="syz.2.1365" path="" dev="cgroup2" ino=397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 267.512095][ T4822] device veth0_vlan left promiscuous mode [ 267.622201][ T4822] device veth0_vlan entered promiscuous mode [ 267.695251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.730686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.743402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.212564][ T4872] device syzkaller0 entered promiscuous mode [ 272.077989][ T4922] device sit0 left promiscuous mode [ 272.184095][ T4924] device sit0 entered promiscuous mode [ 276.562691][ T4999] device sit0 left promiscuous mode [ 288.181700][ T28] audit: type=1400 audit(1769046158.210:143): avc: denied { ioctl } for pid=5190 comm="syz.0.1494" path="uts:[4026532463]" dev="nsfs" ino=4026532463 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 288.208596][ T5191] GPL: port 1(erspan0) entered blocking state [ 288.230182][ T5191] GPL: port 1(erspan0) entered disabled state [ 288.277197][ T5191] device erspan0 entered promiscuous mode [ 292.350058][ T5280] device pim6reg1 entered promiscuous mode [ 293.488217][ T5304] device sit0 left promiscuous mode [ 297.368807][ T5360] device sit0 entered promiscuous mode [ 301.425283][ T5438] device pim6reg1 entered promiscuous mode [ 303.636199][ T5480] device pim6reg1 entered promiscuous mode [ 305.396166][ T5520] device sit0 left promiscuous mode [ 306.456952][ T5534] device pim6reg1 entered promiscuous mode [ 308.250490][ T5565] device pim6reg1 entered promiscuous mode [ 309.537028][ T5617] device pim6reg1 entered promiscuous mode [ 311.435644][ T5647] device pim6reg1 entered promiscuous mode [ 312.393389][ T5672] device vlan1 entered promiscuous mode [ 322.834061][ T5929] device pim6reg1 entered promiscuous mode [ 328.296411][ T6064] device pim6reg1 entered promiscuous mode [ 330.524912][ T28] audit: type=1400 audit(1769046200.550:144): avc: denied { create } for pid=6098 comm="syz.0.1777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 330.600395][ T6101] device pim6reg1 entered promiscuous mode [ 330.868471][ T6115] device sit0 left promiscuous mode [ 332.035278][ T6146] device pim6reg1 entered promiscuous mode [ 333.449790][ T6188] device pim6reg1 entered promiscuous mode [ 334.440438][ T6223] syz.2.1817[6223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.440526][ T6223] syz.2.1817[6223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.088850][ T6238] device pim6reg1 entered promiscuous mode [ 335.545001][ T28] audit: type=1400 audit(1769046205.570:145): avc: denied { create } for pid=6245 comm="syz.4.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 336.962213][ T6279] device sit0 entered promiscuous mode [ 337.473172][ T6284] device pim6reg1 entered promiscuous mode [ 338.380532][ T6297] device veth0_vlan left promiscuous mode [ 338.386598][ T6297] device veth0_vlan entered promiscuous mode [ 338.403716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.416884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.424421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.541773][ T28] audit: type=1400 audit(1769046208.570:146): avc: denied { read } for pid=6311 comm="syz.4.1848" dev="nsfs" ino=4026532456 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 338.653801][ T28] audit: type=1400 audit(1769046208.590:147): avc: denied { open } for pid=6311 comm="syz.4.1848" path="mnt:[4026532456]" dev="nsfs" ino=4026532456 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 342.640267][ T6419] device sit0 left promiscuous mode [ 347.294784][ T6513] device syzkaller0 entered promiscuous mode [ 348.904515][ T6566] device pim6reg1 entered promiscuous mode [ 350.376135][ T6606] device pim6reg1 entered promiscuous mode [ 352.577821][ T6642] device pim6reg1 entered promiscuous mode [ 353.351685][ T6654] device syzkaller0 entered promiscuous mode [ 354.917424][ T6690] device pim6reg1 entered promiscuous mode [ 360.487302][ T6787] device sit0 entered promiscuous mode [ 361.726692][ T6825] device pim6reg1 entered promiscuous mode [ 363.143772][ T6851] device pim6reg1 entered promiscuous mode [ 363.953109][ T6895] device pim6reg1 entered promiscuous mode [ 364.893241][ T6931] device pim6reg1 entered promiscuous mode [ 365.651525][ T6966] device pim6reg1 entered promiscuous mode [ 366.777808][ T6998] device pim6reg1 entered promiscuous mode [ 369.670842][ T7068] FAULT_INJECTION: forcing a failure. [ 369.670842][ T7068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.705363][ T7068] CPU: 1 PID: 7068 Comm: syz.2.2106 Not tainted syzkaller #0 [ 369.712768][ T7068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 369.722833][ T7068] Call Trace: [ 369.726121][ T7068] [ 369.729060][ T7068] __dump_stack+0x21/0x24 [ 369.733527][ T7068] dump_stack_lvl+0x110/0x170 [ 369.738221][ T7068] ? __cfi_dump_stack_lvl+0x8/0x8 [ 369.743285][ T7068] dump_stack+0x15/0x24 [ 369.747472][ T7068] should_fail_ex+0x3d4/0x520 [ 369.752239][ T7068] should_fail+0xb/0x10 [ 369.756423][ T7068] should_fail_usercopy+0x1a/0x20 [ 369.761460][ T7068] _copy_from_user+0x1e/0xc0 [ 369.766147][ T7068] __sys_bpf+0x2a0/0x850 [ 369.770421][ T7068] ? bpf_link_show_fdinfo+0x330/0x330 [ 369.775805][ T7068] ? __cfi_ksys_write+0x10/0x10 [ 369.780707][ T7068] ? debug_smp_processor_id+0x17/0x20 [ 369.786133][ T7068] __x64_sys_bpf+0x7c/0x90 [ 369.790585][ T7068] x64_sys_call+0x488/0x9a0 [ 369.795104][ T7068] do_syscall_64+0x4c/0xa0 [ 369.799530][ T7068] ? clear_bhb_loop+0x30/0x80 [ 369.804275][ T7068] ? clear_bhb_loop+0x30/0x80 [ 369.808978][ T7068] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 369.814859][ T7068] RIP: 0033:0x7f9df699acb9 [ 369.819260][ T7068] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 369.838851][ T7068] RSP: 002b:00007f9df78f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 369.847329][ T7068] RAX: ffffffffffffffda RBX: 00007f9df6c15fa0 RCX: 00007f9df699acb9 [ 369.855298][ T7068] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 369.863268][ T7068] RBP: 00007f9df78f9090 R08: 0000000000000000 R09: 0000000000000000 [ 369.871237][ T7068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.879203][ T7068] R13: 00007f9df6c16038 R14: 00007f9df6c15fa0 R15: 00007ffd9277f478 [ 369.887177][ T7068] [ 370.152527][ T7094] syz.4.2114[7094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.152599][ T7094] syz.4.2114[7094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.086139][ T7110] FAULT_INJECTION: forcing a failure. [ 371.086139][ T7110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.149979][ T7110] CPU: 0 PID: 7110 Comm: syz.1.2120 Not tainted syzkaller #0 [ 371.157391][ T7110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 371.167447][ T7110] Call Trace: [ 371.170737][ T7110] [ 371.173689][ T7110] __dump_stack+0x21/0x24 [ 371.178042][ T7110] dump_stack_lvl+0x110/0x170 [ 371.182755][ T7110] ? __cfi_dump_stack_lvl+0x8/0x8 [ 371.187807][ T7110] ? memcpy+0x56/0x70 [ 371.191903][ T7110] dump_stack+0x15/0x24 [ 371.196077][ T7110] should_fail_ex+0x3d4/0x520 [ 371.200760][ T7110] should_fail+0xb/0x10 [ 371.204925][ T7110] should_fail_usercopy+0x1a/0x20 [ 371.210039][ T7110] strncpy_from_user+0x24/0x2d0 [ 371.214930][ T7110] bpf_prog_load+0x1fe/0x16a0 [ 371.219606][ T7110] ? map_freeze+0x390/0x390 [ 371.224113][ T7110] ? selinux_bpf+0xc7/0xf0 [ 371.228584][ T7110] ? security_bpf+0x93/0xb0 [ 371.233127][ T7110] __sys_bpf+0x57b/0x850 [ 371.237418][ T7110] ? bpf_link_show_fdinfo+0x330/0x330 [ 371.242804][ T7110] ? __cfi_ksys_write+0x10/0x10 [ 371.247651][ T7110] ? debug_smp_processor_id+0x17/0x20 [ 371.253025][ T7110] __x64_sys_bpf+0x7c/0x90 [ 371.257465][ T7110] x64_sys_call+0x488/0x9a0 [ 371.261968][ T7110] do_syscall_64+0x4c/0xa0 [ 371.266394][ T7110] ? clear_bhb_loop+0x30/0x80 [ 371.271082][ T7110] ? clear_bhb_loop+0x30/0x80 [ 371.275783][ T7110] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 371.281694][ T7110] RIP: 0033:0x7fb33219acb9 [ 371.286110][ T7110] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 371.305713][ T7110] RSP: 002b:00007fb33303d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 371.314137][ T7110] RAX: ffffffffffffffda RBX: 00007fb332415fa0 RCX: 00007fb33219acb9 [ 371.322126][ T7110] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 371.330106][ T7110] RBP: 00007fb33303d090 R08: 0000000000000000 R09: 0000000000000000 [ 371.338079][ T7110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.346044][ T7110] R13: 00007fb332416038 R14: 00007fb332415fa0 R15: 00007ffda1c5c3b8 [ 371.354016][ T7110] [ 372.586395][ T7161] FAULT_INJECTION: forcing a failure. [ 372.586395][ T7161] name failslab, interval 1, probability 0, space 0, times 0 [ 372.633862][ T7165] device pim6reg1 entered promiscuous mode [ 372.635055][ T7161] CPU: 0 PID: 7161 Comm: syz.4.2138 Not tainted syzkaller #0 [ 372.647075][ T7161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 372.657237][ T7161] Call Trace: [ 372.660542][ T7161] [ 372.663480][ T7161] __dump_stack+0x21/0x24 [ 372.667820][ T7161] dump_stack_lvl+0x110/0x170 [ 372.672502][ T7161] ? __cfi_dump_stack_lvl+0x8/0x8 [ 372.677537][ T7161] ? avc_has_perm+0x163/0x250 [ 372.682232][ T7161] dump_stack+0x15/0x24 [ 372.686391][ T7161] should_fail_ex+0x3d4/0x520 [ 372.691074][ T7161] __should_failslab+0xac/0xf0 [ 372.695848][ T7161] ? __get_vm_area_node+0x12c/0x360 [ 372.701130][ T7161] should_failslab+0x9/0x20 [ 372.705673][ T7161] __kmem_cache_alloc_node+0x3d/0x2c0 [ 372.711103][ T7161] ? __get_vm_area_node+0x12c/0x360 [ 372.716296][ T7161] kmalloc_node_trace+0x26/0xb0 [ 372.721150][ T7161] __get_vm_area_node+0x12c/0x360 [ 372.726180][ T7161] __vmalloc_node_range+0x326/0x1430 [ 372.731461][ T7161] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 372.737079][ T7161] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 372.742804][ T7161] ? __stack_depot_save+0x36/0x480 [ 372.747918][ T7161] ? __cfi___vmalloc_node_range+0x10/0x10 [ 372.753642][ T7161] ? __cfi_selinux_capable+0x10/0x10 [ 372.758931][ T7161] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 372.764476][ T7161] __vmalloc+0x79/0x90 [ 372.768550][ T7161] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 372.774098][ T7161] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 372.779482][ T7161] ? security_capable+0x99/0xc0 [ 372.784389][ T7161] bpf_prog_alloc+0x22/0x1c0 [ 372.788984][ T7161] bpf_prog_load+0x825/0x16a0 [ 372.793669][ T7161] ? map_freeze+0x390/0x390 [ 372.798177][ T7161] ? selinux_bpf+0xc7/0xf0 [ 372.802592][ T7161] ? security_bpf+0x93/0xb0 [ 372.807106][ T7161] __sys_bpf+0x57b/0x850 [ 372.811377][ T7161] ? bpf_link_show_fdinfo+0x330/0x330 [ 372.816753][ T7161] ? __cfi_ksys_write+0x10/0x10 [ 372.821605][ T7161] ? debug_smp_processor_id+0x17/0x20 [ 372.826997][ T7161] __x64_sys_bpf+0x7c/0x90 [ 372.831606][ T7161] x64_sys_call+0x488/0x9a0 [ 372.836122][ T7161] do_syscall_64+0x4c/0xa0 [ 372.840538][ T7161] ? clear_bhb_loop+0x30/0x80 [ 372.845222][ T7161] ? clear_bhb_loop+0x30/0x80 [ 372.849908][ T7161] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 372.855821][ T7161] RIP: 0033:0x7f47ee79acb9 [ 372.860263][ T7161] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 372.879867][ T7161] RSP: 002b:00007f47ef5c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 372.888281][ T7161] RAX: ffffffffffffffda RBX: 00007f47eea15fa0 RCX: 00007f47ee79acb9 [ 372.896250][ T7161] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 372.904226][ T7161] RBP: 00007f47ef5c2090 R08: 0000000000000000 R09: 0000000000000000 [ 372.912203][ T7161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 372.920173][ T7161] R13: 00007f47eea16038 R14: 00007f47eea15fa0 R15: 00007ffe6106bdf8 [ 372.928143][ T7161] [ 372.979673][ T7161] syz.4.2138: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 373.018335][ T7161] CPU: 1 PID: 7161 Comm: syz.4.2138 Not tainted syzkaller #0 [ 373.025739][ T7161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 373.035801][ T7161] Call Trace: [ 373.039092][ T7161] [ 373.042043][ T7161] __dump_stack+0x21/0x24 [ 373.046402][ T7161] dump_stack_lvl+0x110/0x170 [ 373.051102][ T7161] ? __cfi_dump_stack_lvl+0x8/0x8 [ 373.056137][ T7161] ? pr_cont_kernfs_name+0x133/0x160 [ 373.061542][ T7161] dump_stack+0x15/0x24 [ 373.065725][ T7161] warn_alloc+0x1dc/0x200 [ 373.070071][ T7161] ? should_failslab+0x9/0x20 [ 373.074755][ T7161] ? __cfi_warn_alloc+0x10/0x10 [ 373.079630][ T7161] ? kmalloc_node_trace+0x3d/0xb0 [ 373.084674][ T7161] ? __get_vm_area_node+0x353/0x360 [ 373.089886][ T7161] __vmalloc_node_range+0x34b/0x1430 [ 373.095178][ T7161] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 373.100918][ T7161] ? __stack_depot_save+0x36/0x480 [ 373.106041][ T7161] ? __cfi___vmalloc_node_range+0x10/0x10 [ 373.111779][ T7161] ? __cfi_selinux_capable+0x10/0x10 [ 373.117085][ T7161] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 373.122646][ T7161] __vmalloc+0x79/0x90 [ 373.126737][ T7161] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 373.132303][ T7161] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 373.137694][ T7161] ? security_capable+0x99/0xc0 [ 373.142571][ T7161] bpf_prog_alloc+0x22/0x1c0 [ 373.147177][ T7161] bpf_prog_load+0x825/0x16a0 [ 373.151858][ T7161] ? map_freeze+0x390/0x390 [ 373.156391][ T7161] ? selinux_bpf+0xc7/0xf0 [ 373.160808][ T7161] ? security_bpf+0x93/0xb0 [ 373.165316][ T7161] __sys_bpf+0x57b/0x850 [ 373.169563][ T7161] ? bpf_link_show_fdinfo+0x330/0x330 [ 373.174940][ T7161] ? __cfi_ksys_write+0x10/0x10 [ 373.179795][ T7161] ? debug_smp_processor_id+0x17/0x20 [ 373.185164][ T7161] __x64_sys_bpf+0x7c/0x90 [ 373.189582][ T7161] x64_sys_call+0x488/0x9a0 [ 373.194084][ T7161] do_syscall_64+0x4c/0xa0 [ 373.198500][ T7161] ? clear_bhb_loop+0x30/0x80 [ 373.203187][ T7161] ? clear_bhb_loop+0x30/0x80 [ 373.207875][ T7161] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 373.213771][ T7161] RIP: 0033:0x7f47ee79acb9 [ 373.218183][ T7161] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 373.237788][ T7161] RSP: 002b:00007f47ef5c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 373.246198][ T7161] RAX: ffffffffffffffda RBX: 00007f47eea15fa0 RCX: 00007f47ee79acb9 [ 373.254162][ T7161] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 373.262139][ T7161] RBP: 00007f47ef5c2090 R08: 0000000000000000 R09: 0000000000000000 [ 373.270113][ T7161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 373.278080][ T7161] R13: 00007f47eea16038 R14: 00007f47eea15fa0 R15: 00007ffe6106bdf8 [ 373.286048][ T7161] [ 373.315724][ T7161] Mem-Info: [ 373.318939][ T7161] active_anon:5171 inactive_anon:0 isolated_anon:0 [ 373.318939][ T7161] active_file:23449 inactive_file:2417 isolated_file:0 [ 373.318939][ T7161] unevictable:0 dirty:182 writeback:0 [ 373.318939][ T7161] slab_reclaimable:7009 slab_unreclaimable:79872 [ 373.318939][ T7161] mapped:29742 shmem:163 pagetables:619 [ 373.318939][ T7161] sec_pagetables:0 bounce:0 [ 373.318939][ T7161] kernel_misc_reclaimable:0 [ 373.318939][ T7161] free:1514489 free_pcp:7611 free_cma:0 [ 373.437630][ T28] audit: type=1400 audit(1769046243.460:148): avc: denied { create } for pid=7173 comm="syz.2.2143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 373.547749][ T7161] Node 0 active_anon:20684kB inactive_anon:0kB active_file:93796kB inactive_file:9668kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118968kB dirty:728kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5388kB pagetables:2476kB sec_pagetables:0kB all_unreclaimable? no [ 373.730835][ T7161] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2973996kB mlocked:0kB bounce:0kB free_pcp:5464kB local_pcp:56kB free_cma:0kB [ 373.853744][ T7161] lowmem_reserve[]: 0 3932 3932 3932 [ 373.859106][ T7161] Normal free:3088108kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:22432kB inactive_anon:0kB active_file:93796kB inactive_file:9668kB unevictable:0kB writepending:732kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:37396kB local_pcp:19484kB free_cma:0kB [ 373.947135][ T7161] lowmem_reserve[]: 0 0 0 0 [ 373.968577][ T7161] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 374.100691][ T7161] Normal: 923*4kB (UME) 857*8kB (ME) 615*16kB (M) 666*32kB (UME) 357*64kB (UME) 109*128kB (UME) 63*256kB (UME) 22*512kB (UM) 23*1024kB (UME) 13*2048kB (UME) 715*4096kB (UM) = 3084708kB [ 374.179726][ T7161] 26056 total pagecache pages [ 374.190983][ T7161] 0 pages in swap cache [ 374.195247][ T7161] Free swap = 124996kB [ 374.201087][ T7161] Total swap = 124996kB [ 374.205250][ T7161] 2097051 pages RAM [ 374.209088][ T7161] 0 pages HighMem/MovableOnly [ 374.242935][ T7161] 346888 pages reserved [ 374.299976][ T7161] 0 pages cma reserved [ 374.446547][ T7213] device pim6reg1 entered promiscuous mode [ 374.768870][ T7230] device wg2 left promiscuous mode [ 374.905447][ T7235] device wg2 entered promiscuous mode [ 374.951293][ T28] audit: type=1400 audit(1769046244.970:149): avc: denied { create } for pid=7227 comm="syz.3.2161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 375.087327][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.130487][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.209053][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.562362][ T28] audit: type=1400 audit(1769046248.590:150): avc: denied { create } for pid=7270 comm="syz.1.2175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 381.173547][ T7323] pimreg: tun_chr_ioctl cmd 2147767517 [ 381.208576][ T7323] pimreg: tun_chr_ioctl cmd 1074025688 [ 382.622927][ T7382] device wg2 left promiscuous mode [ 382.684001][ T7386] device wg2 entered promiscuous mode [ 382.789950][ T7400] device veth0_vlan left promiscuous mode [ 382.813898][ T7400] device veth0_vlan entered promiscuous mode [ 382.902836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.932442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.969277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.389231][ T7446] device pim6reg1 entered promiscuous mode [ 385.495089][ T28] audit: type=1400 audit(1769046255.520:151): avc: denied { create } for pid=7449 comm="syz.3.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 387.352299][ T7482] device syzkaller0 entered promiscuous mode [ 387.747472][ T7492] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 387.759978][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 388.034135][ T7506] device pim6reg1 entered promiscuous mode [ 388.152630][ T7507] : port 1(erspan0) entered blocking state [ 388.158665][ T7507] : port 1(erspan0) entered disabled state [ 388.277353][ T7507] device erspan0 entered promiscuous mode [ 388.368064][ T7503] : port 1(erspan0) entered blocking state [ 388.374222][ T7503] : port 1(erspan0) entered forwarding state [ 391.783655][ T7576] device wg2 left promiscuous mode [ 391.858763][ T7576] device wg2 entered promiscuous mode [ 395.220205][ T7643] device pim6reg1 entered promiscuous mode [ 395.647985][ T7650] device wg2 left promiscuous mode [ 395.749234][ T7650] device wg2 entered promiscuous mode [ 396.785468][ T7676] device pim6reg1 entered promiscuous mode [ 398.698770][ T7717] device pim6reg1 entered promiscuous mode [ 405.039231][ T7812] device pim6reg1 entered promiscuous mode [ 407.530269][ T7851] device pim6reg1 entered promiscuous mode [ 409.030224][ T7890] device pim6reg1 entered promiscuous mode [ 411.165655][ T7927] device pim6reg1 entered promiscuous mode [ 413.568467][ T7966] device pim6reg1 entered promiscuous mode [ 413.990914][ T7975] device wg2 left promiscuous mode [ 414.090870][ T7975] device wg2 entered promiscuous mode [ 416.344732][ T8006] device pim6reg1 entered promiscuous mode [ 418.436919][ T8044] device pim6reg1 entered promiscuous mode [ 418.645110][ T8048] : port 1(erspan0) entered blocking state [ 418.704958][ T8048] : port 1(erspan0) entered disabled state [ 418.759076][ T8048] device erspan0 entered promiscuous mode [ 418.836769][ T8052] : port 1(erspan0) entered blocking state [ 418.842741][ T8052] : port 1(erspan0) entered forwarding state [ 419.732835][ T8079] device pim6reg1 entered promiscuous mode [ 420.047746][ T8076] device syzkaller0 entered promiscuous mode [ 422.671704][ T8120] device pim6reg1 entered promiscuous mode [ 422.902084][ T8125] device syzkaller0 entered promiscuous mode [ 425.441361][ T8154] device pim6reg1 entered promiscuous mode [ 429.213472][ T8220] device wg2 entered promiscuous mode [ 429.670815][ T8236] device pim6reg1 entered promiscuous mode [ 431.903148][ T8314] device pim6reg1 entered promiscuous mode [ 432.442812][ T8325] device wg2 left promiscuous mode [ 432.608105][ T8325] device wg2 entered promiscuous mode [ 433.487318][ T8352] device pim6reg1 entered promiscuous mode [ 434.760227][ T8383] device pim6reg1 entered promiscuous mode [ 435.725060][ T8424] FAULT_INJECTION: forcing a failure. [ 435.725060][ T8424] name failslab, interval 1, probability 0, space 0, times 0 [ 435.883727][ T8424] CPU: 0 PID: 8424 Comm: syz.0.2574 Not tainted syzkaller #0 [ 435.891163][ T8424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 435.901220][ T8424] Call Trace: [ 435.904501][ T8424] [ 435.907432][ T8424] __dump_stack+0x21/0x24 [ 435.911773][ T8424] dump_stack_lvl+0x110/0x170 [ 435.916471][ T8424] ? __cfi_dump_stack_lvl+0x8/0x8 [ 435.921608][ T8424] ? do_syscall_64+0x4c/0xa0 [ 435.926218][ T8424] dump_stack+0x15/0x24 [ 435.930377][ T8424] should_fail_ex+0x3d4/0x520 [ 435.935163][ T8424] __should_failslab+0xac/0xf0 [ 435.939953][ T8424] ? sk_prot_alloc+0xed/0x320 [ 435.944740][ T8424] should_failslab+0x9/0x20 [ 435.949279][ T8424] __kmem_cache_alloc_node+0x3d/0x2c0 [ 435.954661][ T8424] ? sk_prot_alloc+0xed/0x320 [ 435.959360][ T8424] __kmalloc+0xa1/0x1e0 [ 435.963579][ T8424] sk_prot_alloc+0xed/0x320 [ 435.968105][ T8424] sk_alloc+0x3b/0x460 [ 435.972191][ T8424] ? __kasan_check_write+0x14/0x20 [ 435.977319][ T8424] bpf_prog_test_run_skb+0x37e/0x1290 [ 435.982773][ T8424] ? __fget_files+0x2d5/0x330 [ 435.987495][ T8424] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 435.993314][ T8424] bpf_prog_test_run+0x3e3/0x640 [ 435.998260][ T8424] ? bpf_prog_query+0x270/0x270 [ 436.003125][ T8424] ? selinux_bpf+0xce/0xf0 [ 436.007552][ T8424] ? security_bpf+0x93/0xb0 [ 436.012077][ T8424] __sys_bpf+0x5ee/0x850 [ 436.016342][ T8424] ? bpf_link_show_fdinfo+0x330/0x330 [ 436.021730][ T8424] ? __cfi_ksys_write+0x10/0x10 [ 436.026607][ T8424] ? debug_smp_processor_id+0x17/0x20 [ 436.031998][ T8424] __x64_sys_bpf+0x7c/0x90 [ 436.036442][ T8424] x64_sys_call+0x488/0x9a0 [ 436.040954][ T8424] do_syscall_64+0x4c/0xa0 [ 436.045381][ T8424] ? clear_bhb_loop+0x30/0x80 [ 436.050073][ T8424] ? clear_bhb_loop+0x30/0x80 [ 436.054787][ T8424] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 436.060702][ T8424] RIP: 0033:0x7f1bf539acb9 [ 436.065137][ T8424] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 436.084837][ T8424] RSP: 002b:00007f1bf61c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 436.093284][ T8424] RAX: ffffffffffffffda RBX: 00007f1bf5616090 RCX: 00007f1bf539acb9 [ 436.101271][ T8424] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 436.109263][ T8424] RBP: 00007f1bf61c2090 R08: 0000000000000000 R09: 0000000000000000 [ 436.117249][ T8424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.125229][ T8424] R13: 00007f1bf5616128 R14: 00007f1bf5616090 R15: 00007fffd72b5b08 [ 436.133216][ T8424] [ 439.748433][ T8543] device syzkaller0 entered promiscuous mode [ 441.894489][ T8606] device syzkaller0 entered promiscuous mode [ 445.969858][ T8684] device syzkaller0 entered promiscuous mode [ 446.092416][ T8686] FAULT_INJECTION: forcing a failure. [ 446.092416][ T8686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 446.105841][ T8686] CPU: 1 PID: 8686 Comm: syz.0.2664 Not tainted syzkaller #0 [ 446.113226][ T8686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 446.123286][ T8686] Call Trace: [ 446.126571][ T8686] [ 446.129508][ T8686] __dump_stack+0x21/0x24 [ 446.133852][ T8686] dump_stack_lvl+0x110/0x170 [ 446.138551][ T8686] ? __cfi_dump_stack_lvl+0x8/0x8 [ 446.143592][ T8686] ? __rcu_read_unlock+0xa0/0xa0 [ 446.148614][ T8686] ? migrate_enable+0x1af/0x2a0 [ 446.153489][ T8686] dump_stack+0x15/0x24 [ 446.157654][ T8686] should_fail_ex+0x3d4/0x520 [ 446.162349][ T8686] should_fail+0xb/0x10 [ 446.166519][ T8686] should_fail_usercopy+0x1a/0x20 [ 446.171562][ T8686] _copy_to_user+0x1e/0x90 [ 446.175997][ T8686] bpf_test_finish+0x1b2/0x6c0 [ 446.180765][ T8686] ? convert_skb_to___skb+0x430/0x430 [ 446.186157][ T8686] bpf_prog_test_run_skb+0xce1/0x1290 [ 446.191592][ T8686] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 446.197410][ T8686] bpf_prog_test_run+0x3e3/0x640 [ 446.202350][ T8686] ? bpf_prog_query+0x270/0x270 [ 446.207204][ T8686] ? selinux_bpf+0xce/0xf0 [ 446.211632][ T8686] ? security_bpf+0x93/0xb0 [ 446.216148][ T8686] __sys_bpf+0x5ee/0x850 [ 446.220397][ T8686] ? bpf_link_show_fdinfo+0x330/0x330 [ 446.225768][ T8686] ? __cfi_ksys_write+0x10/0x10 [ 446.230620][ T8686] ? debug_smp_processor_id+0x17/0x20 [ 446.236018][ T8686] __x64_sys_bpf+0x7c/0x90 [ 446.240457][ T8686] x64_sys_call+0x488/0x9a0 [ 446.244962][ T8686] do_syscall_64+0x4c/0xa0 [ 446.249378][ T8686] ? clear_bhb_loop+0x30/0x80 [ 446.254056][ T8686] ? clear_bhb_loop+0x30/0x80 [ 446.258735][ T8686] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 446.264626][ T8686] RIP: 0033:0x7f1bf539acb9 [ 446.269036][ T8686] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 446.288645][ T8686] RSP: 002b:00007f1bf61e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 446.297055][ T8686] RAX: ffffffffffffffda RBX: 00007f1bf5615fa0 RCX: 00007f1bf539acb9 [ 446.305024][ T8686] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 446.312991][ T8686] RBP: 00007f1bf61e3090 R08: 0000000000000000 R09: 0000000000000000 [ 446.320962][ T8686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.328931][ T8686] R13: 00007f1bf5616038 R14: 00007f1bf5615fa0 R15: 00007fffd72b5b08 [ 446.336916][ T8686] [ 448.372341][ T8728] device pim6reg1 entered promiscuous mode [ 449.254492][ T8737] FAULT_INJECTION: forcing a failure. [ 449.254492][ T8737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 449.389950][ T8737] CPU: 1 PID: 8737 Comm: syz.3.2680 Not tainted syzkaller #0 [ 449.397357][ T8737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 449.407414][ T8737] Call Trace: [ 449.410696][ T8737] [ 449.413630][ T8737] __dump_stack+0x21/0x24 [ 449.417977][ T8737] dump_stack_lvl+0x110/0x170 [ 449.422672][ T8737] ? __cfi_dump_stack_lvl+0x8/0x8 [ 449.427709][ T8737] ? __rcu_read_unlock+0xa0/0xa0 [ 449.432661][ T8737] ? migrate_enable+0x1af/0x2a0 [ 449.437541][ T8737] dump_stack+0x15/0x24 [ 449.441708][ T8737] should_fail_ex+0x3d4/0x520 [ 449.446409][ T8737] should_fail+0xb/0x10 [ 449.450585][ T8737] should_fail_usercopy+0x1a/0x20 [ 449.455619][ T8737] _copy_to_user+0x1e/0x90 [ 449.460051][ T8737] bpf_test_finish+0x251/0x6c0 [ 449.464855][ T8737] ? __kasan_slab_alloc+0x72/0x80 [ 449.469901][ T8737] ? convert_skb_to___skb+0x430/0x430 [ 449.475298][ T8737] bpf_prog_test_run_skb+0xce1/0x1290 [ 449.480700][ T8737] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 449.486523][ T8737] bpf_prog_test_run+0x3e3/0x640 [ 449.491469][ T8737] ? bpf_prog_query+0x270/0x270 [ 449.496326][ T8737] ? selinux_bpf+0xce/0xf0 [ 449.500749][ T8737] ? security_bpf+0x93/0xb0 [ 449.505265][ T8737] __sys_bpf+0x5ee/0x850 [ 449.509520][ T8737] ? bpf_link_show_fdinfo+0x330/0x330 [ 449.514907][ T8737] ? __cfi_ksys_write+0x10/0x10 [ 449.519787][ T8737] ? debug_smp_processor_id+0x17/0x20 [ 449.525169][ T8737] __x64_sys_bpf+0x7c/0x90 [ 449.529616][ T8737] x64_sys_call+0x488/0x9a0 [ 449.534131][ T8737] do_syscall_64+0x4c/0xa0 [ 449.538555][ T8737] ? clear_bhb_loop+0x30/0x80 [ 449.543246][ T8737] ? clear_bhb_loop+0x30/0x80 [ 449.547946][ T8737] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 449.553848][ T8737] RIP: 0033:0x7fc49f19acb9 [ 449.558275][ T8737] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 449.577884][ T8737] RSP: 002b:00007fc49ffec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 449.586307][ T8737] RAX: ffffffffffffffda RBX: 00007fc49f416090 RCX: 00007fc49f19acb9 [ 449.594282][ T8737] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 449.602259][ T8737] RBP: 00007fc49ffec090 R08: 0000000000000000 R09: 0000000000000000 [ 449.610242][ T8737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.618221][ T8737] R13: 00007fc49f416128 R14: 00007fc49f416090 R15: 00007fff72be78e8 [ 449.626200][ T8737] [ 449.710532][ T8762] device pim6reg1 entered promiscuous mode [ 451.660866][ T8807] device pim6reg1 entered promiscuous mode [ 453.418154][ T8833] device syzkaller0 entered promiscuous mode [ 455.494396][ T8898] device pim6reg1 entered promiscuous mode [ 458.055111][ T8948] device syzkaller0 entered promiscuous mode [ 458.409643][ T8957] device pim6reg1 entered promiscuous mode [ 459.856331][ T8978] device syzkaller0 entered promiscuous mode [ 459.951313][ T8985] device pim6reg1 entered promiscuous mode [ 460.375662][ T8993] device wg2 left promiscuous mode [ 460.446265][ T8996] device wg2 entered promiscuous mode [ 460.949052][ T9004] device syzkaller0 entered promiscuous mode [ 462.964218][ T9038] device syzkaller0 entered promiscuous mode [ 463.773695][ T9070] veth0_macvtap: mtu greater than device maximum [ 464.122342][ T9076] device wg2 left promiscuous mode [ 464.777193][ T9083] device syzkaller0 entered promiscuous mode [ 464.809362][ T9093] device pim6reg1 entered promiscuous mode [ 464.836490][ T9096] device sit0 entered promiscuous mode [ 466.876549][ T9138] device pim6reg1 entered promiscuous mode [ 467.307161][ T9161] device syzkaller0 entered promiscuous mode [ 468.317508][ T9180] device pim6reg1 entered promiscuous mode [ 469.996949][ T9224] device syzkaller0 entered promiscuous mode [ 470.348641][ T9231] device pim6reg1 entered promiscuous mode [ 472.459025][ T9270] device pim6reg1 entered promiscuous mode [ 476.471352][ T9325] device pim6reg1 entered promiscuous mode [ 476.603344][ T9326] device syzkaller0 entered promiscuous mode [ 476.940282][ T9332] device pim6reg1 entered promiscuous mode [ 477.309189][ T9345] device pim6reg1 entered promiscuous mode [ 477.374233][ T9343] device sit0 entered promiscuous mode [ 477.564001][ T9357] device pim6reg1 entered promiscuous mode [ 478.303048][ T9364] device syzkaller0 entered promiscuous mode [ 479.448898][ T9390] device pim6reg1 entered promiscuous mode [ 479.761971][ T9396] device pim6reg1 entered promiscuous mode [ 480.205866][ T28] audit: type=1400 audit(1769046350.230:152): avc: denied { append } for pid=9406 comm="syz.4.2905" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 480.890965][ T9410] device syzkaller0 entered promiscuous mode [ 480.950570][ T9422] device pim6reg1 entered promiscuous mode [ 483.466334][ T9467] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.473564][ T9467] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.481169][ T9467] device bridge_slave_0 entered promiscuous mode [ 483.488100][ T9467] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.553950][ T9467] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.634030][ T9467] device bridge_slave_1 entered promiscuous mode [ 484.110146][ T28] audit: type=1400 audit(1769046354.130:153): avc: denied { create } for pid=9467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 484.132325][ T28] audit: type=1400 audit(1769046354.130:154): avc: denied { write } for pid=9467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 484.329909][ T28] audit: type=1400 audit(1769046354.130:155): avc: denied { read } for pid=9467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 484.495905][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 484.520511][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 484.588319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 484.634012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 484.642403][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.649445][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.682245][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 484.689987][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 484.698977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 484.707449][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.714500][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.779993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 484.790387][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 484.799690][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 484.826418][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 484.949990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 484.961575][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 484.990231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 485.048798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 485.101460][ T9467] device veth0_vlan entered promiscuous mode [ 485.143576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 485.163430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 485.391521][ T9467] device veth1_macvtap entered promiscuous mode [ 485.409357][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 485.427627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 485.464865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 485.519169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 485.552730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 485.577590][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 485.644174][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 485.694885][ T4741] : port 1(erspan0) entered disabled state [ 485.711496][ T4741] device erspan0 left promiscuous mode [ 485.727186][ T4741] : port 1(erspan0) entered disabled state [ 486.099898][ T4741] device veth1_macvtap left promiscuous mode [ 487.006526][ T9532] FAULT_INJECTION: forcing a failure. [ 487.006526][ T9532] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.050931][ T9532] CPU: 0 PID: 9532 Comm: syz.3.2940 Not tainted syzkaller #0 [ 487.058340][ T9532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 487.068397][ T9532] Call Trace: [ 487.071696][ T9532] [ 487.074645][ T9532] __dump_stack+0x21/0x24 [ 487.078986][ T9532] dump_stack_lvl+0x110/0x170 [ 487.083670][ T9532] ? __cfi_dump_stack_lvl+0x8/0x8 [ 487.088701][ T9532] dump_stack+0x15/0x24 [ 487.092864][ T9532] should_fail_ex+0x3d4/0x520 [ 487.097552][ T9532] should_fail_alloc_page+0x61/0x90 [ 487.102776][ T9532] prepare_alloc_pages+0x148/0x600 [ 487.107910][ T9532] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 487.113125][ T9532] ? slab_post_alloc_hook+0x4f/0x2d0 [ 487.118445][ T9532] ? kmem_cache_alloc_node+0x181/0x340 [ 487.123923][ T9532] ? alloc_vmap_area+0x184/0x18b0 [ 487.128955][ T9532] ? __get_vm_area_node+0x160/0x360 [ 487.134163][ T9532] ? __vmalloc_node_range+0x326/0x1430 [ 487.139646][ T9532] __alloc_pages+0x13a/0x480 [ 487.144258][ T9532] ? __cfi___alloc_pages+0x10/0x10 [ 487.149399][ T9532] __get_free_pages+0xe/0x30 [ 487.154013][ T9532] kasan_populate_vmalloc_pte+0x29/0x120 [ 487.159679][ T9532] __apply_to_page_range+0x8de/0xc80 [ 487.165072][ T9532] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 487.171332][ T9532] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 487.177595][ T9532] apply_to_page_range+0x3b/0x50 [ 487.182586][ T9532] kasan_populate_vmalloc+0x60/0x70 [ 487.187807][ T9532] alloc_vmap_area+0x1779/0x18b0 [ 487.192773][ T9532] ? vm_map_ram+0x930/0x930 [ 487.197308][ T9532] ? __kasan_kmalloc+0x95/0xb0 [ 487.202103][ T9532] ? kmalloc_node_trace+0x3d/0xb0 [ 487.207153][ T9532] __get_vm_area_node+0x160/0x360 [ 487.212204][ T9532] __vmalloc_node_range+0x326/0x1430 [ 487.217503][ T9532] ? prealloc_init+0x146/0x8f0 [ 487.222356][ T9532] ? irqentry_exit+0x37/0x40 [ 487.226965][ T9532] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 487.233168][ T9532] ? pcpu_memcg_post_alloc_hook+0x17e/0x270 [ 487.239107][ T9532] ? __bitmap_weight+0xb3/0x100 [ 487.244051][ T9532] ? __cfi___vmalloc_node_range+0x10/0x10 [ 487.249867][ T9532] ? pcpu_alloc+0x11ac/0x17a0 [ 487.254585][ T9532] bpf_map_area_alloc+0xd7/0xe0 [ 487.259454][ T9532] ? prealloc_init+0x146/0x8f0 [ 487.264235][ T9532] prealloc_init+0x146/0x8f0 [ 487.268843][ T9532] htab_map_alloc+0xb24/0xfd0 [ 487.273532][ T9532] map_create+0x49c/0xd80 [ 487.277870][ T9532] __sys_bpf+0x34e/0x850 [ 487.282124][ T9532] ? bpf_link_show_fdinfo+0x330/0x330 [ 487.287514][ T9532] ? __cfi_ksys_write+0x10/0x10 [ 487.292376][ T9532] ? debug_smp_processor_id+0x17/0x20 [ 487.297783][ T9532] __x64_sys_bpf+0x7c/0x90 [ 487.302226][ T9532] x64_sys_call+0x488/0x9a0 [ 487.306750][ T9532] do_syscall_64+0x4c/0xa0 [ 487.311179][ T9532] ? clear_bhb_loop+0x30/0x80 [ 487.315894][ T9532] ? clear_bhb_loop+0x30/0x80 [ 487.320586][ T9532] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 487.326491][ T9532] RIP: 0033:0x7f27f519acb9 [ 487.330908][ T9532] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 487.350521][ T9532] RSP: 002b:00007f27f60ba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 487.358948][ T9532] RAX: ffffffffffffffda RBX: 00007f27f5415fa0 RCX: 00007f27f519acb9 [ 487.366949][ T9532] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 487.374932][ T9532] RBP: 00007f27f60ba090 R08: 0000000000000000 R09: 0000000000000000 [ 487.382937][ T9532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.390926][ T9532] R13: 00007f27f5416038 R14: 00007f27f5415fa0 R15: 00007ffdf0b3efb8 [ 487.398909][ T9532] [ 488.251833][ T9544] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.258974][ T9544] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.267331][ T9544] device bridge_slave_0 entered promiscuous mode [ 488.310231][ T9544] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.317369][ T9544] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.338127][ T9544] device bridge_slave_1 entered promiscuous mode [ 488.556671][ T9544] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.563762][ T9544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.571078][ T9544] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.578115][ T9544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.631296][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 488.639697][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.647830][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.675629][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 488.684211][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.691271][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.699491][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 488.708377][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.715455][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.761520][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 488.769577][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 488.815908][ T9544] device veth0_vlan entered promiscuous mode [ 488.826271][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 488.837513][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 488.846448][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 488.855652][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 488.908481][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 488.946868][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 489.023198][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 489.031540][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 489.040513][ T9544] device veth1_macvtap entered promiscuous mode [ 489.067749][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 489.076490][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 489.084839][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 489.136057][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 489.183674][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 489.658379][ T4741] syzkaller: port 1(erspan0) entered disabled state [ 489.675649][ T4741] device erspan0 left promiscuous mode [ 489.684864][ T4741] syzkaller: port 1(erspan0) entered disabled state [ 490.098880][ T4741] device veth1_macvtap left promiscuous mode [ 490.403875][ T9589] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.411142][ T9589] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.435010][ T9592] device bridge_slave_1 left promiscuous mode [ 490.441289][ T9592] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.448741][ T9592] device bridge_slave_0 left promiscuous mode [ 490.455144][ T9592] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.580071][ T9597] device pim6reg1 entered promiscuous mode [ 491.045086][ T9595] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.063876][ T9595] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.093343][ T9595] device bridge_slave_0 entered promiscuous mode [ 491.125293][ T9595] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.155768][ T9595] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.198813][ T9595] device bridge_slave_1 entered promiscuous mode [ 491.937493][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.954729][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 492.026767][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 492.035943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 492.063574][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.070643][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.098002][ T28] audit: type=1400 audit(1769046362.120:156): avc: denied { ioctl } for pid=9620 comm="syz.4.2964" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 492.129611][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 492.143656][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 492.159483][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.166555][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.174564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 492.188887][ T4741] device erspan0 left promiscuous mode [ 492.194653][ T4741] GPL: port 1(erspan0) entered disabled state [ 492.211023][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 492.240511][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 492.250950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 492.266676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 492.449202][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 492.458120][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 492.486652][ T9595] device veth0_vlan entered promiscuous mode [ 492.849411][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 492.865001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.891821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 492.900325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.938205][ T9595] device veth1_macvtap entered promiscuous mode [ 492.952500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 492.962621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 492.972004][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 493.003076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 493.022832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 493.037398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 493.048412][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 494.718383][ T9669] syz.1.2978[9669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.718449][ T9669] syz.1.2978[9669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.607533][ T9734] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.633167][ T9734] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.641062][ T9734] device bridge_slave_0 entered promiscuous mode [ 497.655007][ T9734] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.662101][ T9734] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.669591][ T9734] device bridge_slave_1 entered promiscuous mode [ 497.822858][ T9754] device sit0 left promiscuous mode [ 497.935919][ T9734] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.943008][ T9734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.950300][ T9734] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.957330][ T9734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.264698][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.292864][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.362113][ T572] : port 1(erspan0) entered disabled state [ 498.378921][ T572] device erspan0 left promiscuous mode [ 498.461911][ T572] : port 1(erspan0) entered disabled state [ 498.553248][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 498.572829][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.607766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 498.625569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 498.633919][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.640968][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.649033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 498.693852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.702200][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.709248][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.724736][ T9770] device sit0 entered promiscuous mode [ 499.010317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 499.091161][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 499.152268][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 499.160512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 499.189952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 499.198327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 499.212664][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 499.239120][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.249621][ T9734] device veth0_vlan entered promiscuous mode [ 499.263116][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 499.270741][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 499.278179][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 499.286740][ T4741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 499.295564][ T9734] device veth1_macvtap entered promiscuous mode [ 499.308515][ T572] device veth1_macvtap left promiscuous mode [ 499.423652][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 499.444198][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 499.469116][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 499.519351][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 500.710149][ T9829] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.717369][ T9829] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.918475][ T9832] device bridge_slave_1 left promiscuous mode [ 500.930629][ T9832] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.947809][ T9832] device bridge_slave_0 left promiscuous mode [ 500.954202][ T9832] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.853125][ T9909] device pim6reg1 entered promiscuous mode [ 504.567411][ T9940] device pim6reg1 entered promiscuous mode [ 506.684170][ T9981] device pim6reg1 entered promiscuous mode [ 514.041912][T10151] device pim6reg1 entered promiscuous mode [ 514.291723][T10159] device pim6reg1 entered promiscuous mode [ 514.710934][T10176] device wg2 entered promiscuous mode [ 514.930416][T10183] device veth0_vlan left promiscuous mode [ 514.936724][T10183] device veth0_vlan entered promiscuous mode [ 515.016013][T10190] device pim6reg1 entered promiscuous mode [ 516.753784][T10224] device pim6reg1 entered promiscuous mode [ 517.225774][T10237] device syzkaller0 entered promiscuous mode [ 624.409801][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 624.416778][ C0] rcu: 1-...!: (0 ticks this GP) idle=a16c/1/0x4000000000000000 softirq=61052/61052 fqs=2 [ 624.426741][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P10318/1:b..l [ 624.434708][ C0] (detected by 0, t=10002 jiffies, g=82481, q=276 ncpus=2) [ 624.441973][ C0] Sending NMI from CPU 0 to CPUs 1: [ 624.447194][ C1] NMI backtrace for cpu 1 [ 624.447203][ C1] CPU: 1 PID: 914 Comm: kworker/1:5 Not tainted syzkaller #0 [ 624.447217][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 624.447228][ C1] Workqueue: events kfree_rcu_monitor [ 624.447307][ C1] RIP: 0010:kvm_wait+0xdf/0x150 [ 624.447328][ C1] Code: 43 c6 44 37 04 f8 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 93 66 90 0f 00 2d 42 14 13 04 f4 87 fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 624.447341][ C1] RSP: 0018:ffffc9000f5d7520 EFLAGS: 00000046 [ 624.447354][ C1] RAX: 0000000000000003 RBX: ffff8881f7127a80 RCX: ffffffff84ffa742 [ 624.447364][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f7127a80 [ 624.447375][ C1] RBP: ffffc9000f5d75b0 R08: ffff8881f7127a80 R09: 1ffff1103ee24f50 [ 624.447386][ C1] R10: dffffc0000000000 R11: ffffed103ee24f51 R12: 1ffff1103ee20001 [ 624.447398][ C1] R13: ffff8881f7138cd4 R14: dffffc0000000000 R15: 1ffff92001ebaea4 [ 624.447410][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 624.447423][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 624.447433][ C1] CR2: 0000200000964000 CR3: 0000000114238000 CR4: 00000000003506a0 [ 624.447446][ C1] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 624.447456][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 624.447466][ C1] Call Trace: [ 624.447471][ C1] [ 624.447478][ C1] ? __cfi_kvm_wait+0x10/0x10 [ 624.447499][ C1] __pv_queued_spin_lock_slowpath+0x690/0xc40 [ 624.447523][ C1] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 624.447546][ C1] queued_spin_lock_slowpath+0x47/0x50 [ 624.447604][ C1] _raw_spin_lock+0xe4/0xf0 [ 624.447620][ C1] ? __cfi__raw_spin_lock+0x10/0x10 [ 624.447639][ C1] kvfree_call_rcu+0x107/0x7c0 [ 624.447658][ C1] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 624.447675][ C1] ? __cfi_kvfree_call_rcu+0x10/0x10 [ 624.447694][ C1] ? longest_prefix_match+0x337/0x640 [ 624.447713][ C1] trie_delete_elem+0x572/0x720 [ 624.447732][ C1] bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 624.447747][ C1] bpf_trace_run3+0x123/0x290 [ 624.447805][ C1] ? __pcpu_freelist_pop+0x70f/0x840 [ 624.447820][ C1] ? __cfi_bpf_trace_run3+0x10/0x10 [ 624.447840][ C1] ? calc_wheel_index+0xc8/0x8d0 [ 624.447893][ C1] ? timer_update_keys+0xb0/0xb0 [ 624.447913][ C1] __bpf_trace_timer_start+0x2b/0x40 [ 624.447937][ C1] ? __cfi___bpf_trace_timer_start+0x10/0x10 [ 624.447953][ C1] __traceiter_timer_start+0x8c/0xe0 [ 624.447967][ C1] enqueue_timer+0x337/0x480 [ 624.447988][ C1] __mod_timer+0x84c/0xc00 [ 624.448007][ C1] add_timer+0x68/0x80 [ 624.448023][ C1] __queue_delayed_work+0x173/0x200 [ 624.448043][ C1] queue_delayed_work_on+0xe7/0x160 [ 624.448063][ C1] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 624.448082][ C1] ? finish_task_switch+0x16b/0x7b0 [ 624.448101][ C1] ? __switch_to_asm+0x3a/0x60 [ 624.448120][ C1] kfree_rcu_monitor+0x6fe/0x7f0 [ 624.448137][ C1] process_one_work+0x71f/0xc40 [ 624.448154][ C1] worker_thread+0xa29/0x11e0 [ 624.448172][ C1] ? __kthread_parkme+0x142/0x180 [ 624.448188][ C1] kthread+0x281/0x320 [ 624.448202][ C1] ? __cfi_worker_thread+0x10/0x10 [ 624.448216][ C1] ? __cfi_kthread+0x10/0x10 [ 624.448231][ C1] ret_from_fork+0x1f/0x30 [ 624.448251][ C1] [ 624.449192][ C0] task:syz.2.3188 state:R running task stack:25408 pid:10318 ppid:283 flags:0x00004004 [ 624.786797][ C0] Call Trace: [ 624.790062][ C0] [ 624.792981][ C0] __schedule+0xba6/0x1500 [ 624.797436][ C0] ? release_firmware_map_entry+0x190/0x190 [ 624.803318][ C0] ? preempt_schedule+0xbc/0xd0 [ 624.808157][ C0] preempt_schedule_common+0x9b/0xf0 [ 624.813439][ C0] preempt_schedule+0xbc/0xd0 [ 624.818110][ C0] ? __cfi_preempt_schedule+0x10/0x10 [ 624.823465][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 624.829610][ C0] preempt_schedule_thunk+0x16/0x18 [ 624.834799][ C0] _raw_spin_unlock_irqrestore+0x6f/0x80 [ 624.840414][ C0] trie_update_elem+0x981/0xdd0 [ 624.845252][ C0] bpf_map_update_value+0x351/0x420 [ 624.850438][ C0] generic_map_update_batch+0x508/0x780 [ 624.855993][ C0] ? __cfi_generic_map_update_batch+0x10/0x10 [ 624.862066][ C0] ? __cfi_generic_map_update_batch+0x10/0x10 [ 624.868125][ C0] bpf_map_do_batch+0x48c/0x620 [ 624.873003][ C0] __sys_bpf+0x6ba/0x850 [ 624.877239][ C0] ? bpf_link_show_fdinfo+0x330/0x330 [ 624.882604][ C0] ? fpregs_restore_userregs+0x128/0x260 [ 624.888315][ C0] __x64_sys_bpf+0x7c/0x90 [ 624.892723][ C0] x64_sys_call+0x488/0x9a0 [ 624.897234][ C0] do_syscall_64+0x4c/0xa0 [ 624.901636][ C0] ? clear_bhb_loop+0x30/0x80 [ 624.906306][ C0] ? clear_bhb_loop+0x30/0x80 [ 624.910973][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 624.916862][ C0] RIP: 0033:0x7f9df699acb9 [ 624.921261][ C0] RSP: 002b:00007f9df78f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 624.929654][ C0] RAX: ffffffffffffffda RBX: 00007f9df6c15fa0 RCX: 00007f9df699acb9 [ 624.937617][ C0] RDX: 0000000000000038 RSI: 0000200000000000 RDI: 000000000000001a [ 624.945590][ C0] RBP: 00007f9df6a08bf7 R08: 0000000000000000 R09: 0000000000000000 [ 624.953552][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 624.961506][ C0] R13: 00007f9df6c16038 R14: 00007f9df6c15fa0 R15: 00007ffd9277f478 [ 624.969475][ C0] [ 624.972490][ C0] rcu: rcu_preempt kthread starved for 9998 jiffies! g82481 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 624.983585][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 624.993536][ C0] rcu: RCU grace-period kthread stack dump: [ 624.999413][ C0] task:rcu_preempt state:R running task stack:28496 pid:14 ppid:2 flags:0x00004000 [ 625.010176][ C0] Call Trace: [ 625.013442][ C0] [ 625.016380][ C0] __schedule+0xba6/0x1500 [ 625.020785][ C0] ? release_firmware_map_entry+0x190/0x190 [ 625.026678][ C0] schedule+0xbd/0x170 [ 625.030734][ C0] schedule_timeout+0x159/0x340 [ 625.035577][ C0] ? __cfi_schedule_timeout+0x10/0x10 [ 625.040935][ C0] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 625.046381][ C0] ? __cfi_process_timeout+0x10/0x10 [ 625.051676][ C0] ? prepare_to_swait_event+0x308/0x320 [ 625.057299][ C0] rcu_gp_fqs_loop+0x2e9/0x10c0 [ 625.062157][ C0] ? __cfi_rcu_implicit_dynticks_qs+0x10/0x10 [ 625.068229][ C0] ? rcu_gp_init+0xf30/0xf30 [ 625.072802][ C0] rcu_gp_kthread+0x99/0x390 [ 625.077387][ C0] ? __cfi_rcu_gp_kthread+0x10/0x10 [ 625.082577][ C0] ? set_cpus_allowed_ptr+0x88/0xd0 [ 625.087770][ C0] ? __kasan_check_read+0x11/0x20 [ 625.092794][ C0] ? __kthread_parkme+0x142/0x180 [ 625.097815][ C0] kthread+0x281/0x320 [ 625.101872][ C0] ? __cfi_rcu_gp_kthread+0x10/0x10 [ 625.107078][ C0] ? __cfi_kthread+0x10/0x10 [ 625.111684][ C0] ret_from_fork+0x1f/0x30 [ 625.116102][ C0] [ 625.119100][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 625.125402][ C0] CPU: 0 PID: 10344 Comm: syz.0.3203 Not tainted syzkaller #0 [ 625.132857][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 625.142893][ C0] RIP: 0010:smp_call_function_many_cond+0x88d/0x980 [ 625.149514][ C0] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 be 74 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 8a 70 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 625.169103][ C0] RSP: 0018:ffffc900059df6a0 EFLAGS: 00000293 [ 625.175159][ C0] RAX: ffffffff8167d959 RBX: dffffc0000000000 RCX: ffff88811a01a880 [ 625.183123][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 625.191089][ C0] RBP: ffffc900059df7d8 R08: ffffc900059df627 R09: 1ffff92000b3bec4 [ 625.199046][ C0] R10: 0000000000000000 R11: fffff52000b3bec5 R12: 1ffff1103ee07218 [ 625.207007][ C0] R13: 1ffff1103ee278a5 R14: 0000000000000001 R15: ffff8881f713c528 [ 625.214960][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 625.223886][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 625.230450][ C0] CR2: 0000020b00000000 CR3: 0000000006e0f000 CR4: 00000000003506b0 [ 625.238409][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 625.246366][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 625.254327][ C0] Call Trace: [ 625.257592][ C0] [ 625.260522][ C0] ? __cfi_do_sync_core+0x10/0x10 [ 625.265558][ C0] ? smp_call_function_many+0x40/0x40 [ 625.270923][ C0] ? dev_hard_start_xmit+0x188/0x750 [ 625.276259][ C0] ? text_poke+0x30/0x30 [ 625.280507][ C0] ? text_poke_loc_init+0x396/0x5b0 [ 625.285710][ C0] ? __cfi_do_sync_core+0x10/0x10 [ 625.290725][ C0] on_each_cpu_cond_mask+0x43/0x80 [ 625.295827][ C0] text_poke_bp_batch+0x1cf/0x600 [ 625.300843][ C0] ? text_poke_loc_init+0x5b0/0x5b0 [ 625.306031][ C0] ? __kasan_check_write+0x14/0x20 [ 625.311137][ C0] ? mutex_lock+0x93/0x1b0 [ 625.315546][ C0] ? __cfi_mutex_lock+0x10/0x10 [ 625.320394][ C0] ? dev_hard_start_xmit+0x188/0x750 [ 625.325676][ C0] text_poke_finish+0x1a/0x30 [ 625.330335][ C0] arch_jump_label_transform_apply+0x15/0x30 [ 625.336300][ C0] __jump_label_update+0x37c/0x3a0 [ 625.341424][ C0] jump_label_update+0x39b/0x450 [ 625.346347][ C0] static_key_disable_cpuslocked+0xc9/0x1a0 [ 625.352226][ C0] static_key_disable+0x1a/0x30 [ 625.357064][ C0] tracepoint_probe_unregister+0x641/0x8e0 [ 625.362912][ C0] bpf_probe_unregister+0x61/0x70 [ 625.367942][ C0] bpf_raw_tp_link_release+0x63/0x90 [ 625.373228][ C0] bpf_link_free+0x13a/0x3a0 [ 625.377806][ C0] ? bpf_link_put_deferred+0x20/0x20 [ 625.383095][ C0] bpf_link_release+0x15f/0x170 [ 625.387924][ C0] ? __cfi_bpf_link_release+0x10/0x10 [ 625.393279][ C0] __fput+0x1fc/0x8f0 [ 625.397248][ C0] ____fput+0x15/0x20 [ 625.401213][ C0] task_work_run+0x1e1/0x250 [ 625.405786][ C0] ? __cfi_task_work_run+0x10/0x10 [ 625.410892][ C0] ? free_nsproxy+0x21f/0x270 [ 625.415565][ C0] do_exit+0xa35/0x2660 [ 625.419711][ C0] ? __cfi_do_exit+0x10/0x10 [ 625.424285][ C0] ? xfd_validate_state+0x70/0x150 [ 625.429398][ C0] ? __kasan_check_write+0x14/0x20 [ 625.434497][ C0] __x64_sys_exit+0x40/0x40 [ 625.438987][ C0] x64_sys_call+0x67/0x9a0 [ 625.443409][ C0] do_syscall_64+0x4c/0xa0 [ 625.447808][ C0] ? clear_bhb_loop+0x30/0x80 [ 625.452475][ C0] ? clear_bhb_loop+0x30/0x80 [ 625.457170][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 625.463055][ C0] RIP: 0033:0x7f3994f9acb9 [ 625.467458][ C0] Code: Unable to access opcode bytes at 0x7f3994f9ac8f. [ 625.474454][ C0] RSP: 002b:00007f3995df6fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 625.482854][ C0] RAX: ffffffffffffffda RBX: 00007f3995215fa0 RCX: 00007f3994f9acb9 [ 625.490811][ C0] RDX: 00007f3995df79c8 RSI: 0000000000000000 RDI: 0000000000000000 [ 625.498762][ C0] RBP: 00007f3995008bf7 R08: 0000000000000000 R09: 0000000000000000 [ 625.506713][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 625.514666][ C0] R13: 00007f3995216038 R14: 00007f3995215fa0 R15: 00007fff82cd6308 [ 625.522651][ C0] [ 771.054331][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz.0.3203:10344] [ 771.062684][ C0] Modules linked in: [ 771.066563][ C0] CPU: 0 PID: 10344 Comm: syz.0.3203 Not tainted syzkaller #0 [ 771.073996][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 771.084032][ C0] RIP: 0010:smp_call_function_many_cond+0x88d/0x980 [ 771.090613][ C0] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 be 74 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 8a 70 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 771.110198][ C0] RSP: 0018:ffffc900059df6a0 EFLAGS: 00000293 [ 771.116243][ C0] RAX: ffffffff8167d959 RBX: dffffc0000000000 RCX: ffff88811a01a880 [ 771.124198][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 771.132156][ C0] RBP: ffffc900059df7d8 R08: ffffc900059df627 R09: 1ffff92000b3bec4 [ 771.140112][ C0] R10: 0000000000000000 R11: fffff52000b3bec5 R12: 1ffff1103ee07218 [ 771.148090][ C0] R13: 1ffff1103ee278a5 R14: 0000000000000001 R15: ffff8881f713c528 [ 771.156062][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 771.164974][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 771.171540][ C0] CR2: 0000020b00000000 CR3: 0000000006e0f000 CR4: 00000000003506b0 [ 771.179499][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 771.187449][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 771.195408][ C0] Call Trace: [ 771.198671][ C0] [ 771.201588][ C0] ? __cfi_do_sync_core+0x10/0x10 [ 771.206602][ C0] ? smp_call_function_many+0x40/0x40 [ 771.211960][ C0] ? dev_hard_start_xmit+0x188/0x750 [ 771.217243][ C0] ? text_poke+0x30/0x30 [ 771.221472][ C0] ? text_poke_loc_init+0x396/0x5b0 [ 771.226659][ C0] ? __cfi_do_sync_core+0x10/0x10 [ 771.231669][ C0] on_each_cpu_cond_mask+0x43/0x80 [ 771.236787][ C0] text_poke_bp_batch+0x1cf/0x600 [ 771.241799][ C0] ? text_poke_loc_init+0x5b0/0x5b0 [ 771.246987][ C0] ? __kasan_check_write+0x14/0x20 [ 771.252082][ C0] ? mutex_lock+0x93/0x1b0 [ 771.256490][ C0] ? __cfi_mutex_lock+0x10/0x10 [ 771.261326][ C0] ? dev_hard_start_xmit+0x188/0x750 [ 771.266600][ C0] text_poke_finish+0x1a/0x30 [ 771.271260][ C0] arch_jump_label_transform_apply+0x15/0x30 [ 771.277277][ C0] __jump_label_update+0x37c/0x3a0 [ 771.282393][ C0] jump_label_update+0x39b/0x450 [ 771.287330][ C0] static_key_disable_cpuslocked+0xc9/0x1a0 [ 771.293218][ C0] static_key_disable+0x1a/0x30 [ 771.298053][ C0] tracepoint_probe_unregister+0x641/0x8e0 [ 771.303844][ C0] bpf_probe_unregister+0x61/0x70 [ 771.308856][ C0] bpf_raw_tp_link_release+0x63/0x90 [ 771.314134][ C0] bpf_link_free+0x13a/0x3a0 [ 771.318714][ C0] ? bpf_link_put_deferred+0x20/0x20 [ 771.323987][ C0] bpf_link_release+0x15f/0x170 [ 771.328826][ C0] ? __cfi_bpf_link_release+0x10/0x10 [ 771.334178][ C0] __fput+0x1fc/0x8f0 [ 771.338148][ C0] ____fput+0x15/0x20 [ 771.342116][ C0] task_work_run+0x1e1/0x250 [ 771.346699][ C0] ? __cfi_task_work_run+0x10/0x10 [ 771.351797][ C0] ? free_nsproxy+0x21f/0x270 [ 771.356471][ C0] do_exit+0xa35/0x2660 [ 771.360620][ C0] ? __cfi_do_exit+0x10/0x10 [ 771.365218][ C0] ? xfd_validate_state+0x70/0x150 [ 771.370320][ C0] ? __kasan_check_write+0x14/0x20 [ 771.375411][ C0] __x64_sys_exit+0x40/0x40 [ 771.379904][ C0] x64_sys_call+0x67/0x9a0 [ 771.384306][ C0] do_syscall_64+0x4c/0xa0 [ 771.388706][ C0] ? clear_bhb_loop+0x30/0x80 [ 771.393383][ C0] ? clear_bhb_loop+0x30/0x80 [ 771.398050][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 771.403929][ C0] RIP: 0033:0x7f3994f9acb9 [ 771.408327][ C0] Code: Unable to access opcode bytes at 0x7f3994f9ac8f. [ 771.415321][ C0] RSP: 002b:00007f3995df6fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 771.423712][ C0] RAX: ffffffffffffffda RBX: 00007f3995215fa0 RCX: 00007f3994f9acb9 [ 771.431664][ C0] RDX: 00007f3995df79c8 RSI: 0000000000000000 RDI: 0000000000000000 [ 771.439638][ C0] RBP: 00007f3995008bf7 R08: 0000000000000000 R09: 0000000000000000 [ 771.447596][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 771.455561][ C0] R13: 00007f3995216038 R14: 00007f3995215fa0 R15: 00007fff82cd6308 [ 771.463517][ C0] [ 771.466520][ C0] Sending NMI from CPU 0 to CPUs 1: [ 771.471769][ C1] NMI backtrace for cpu 1 [ 771.471778][ C1] CPU: 1 PID: 914 Comm: kworker/1:5 Not tainted syzkaller #0 [ 771.471794][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 771.471806][ C1] Workqueue: events kfree_rcu_monitor [ 771.471826][ C1] RIP: 0010:kvm_wait+0xdf/0x150 [ 771.471849][ C1] Code: 43 c6 44 37 04 f8 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 93 66 90 0f 00 2d 42 14 13 04 f4 87 fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 771.471864][ C1] RSP: 0018:ffffc9000f5d7520 EFLAGS: 00000046 [ 771.471878][ C1] RAX: 0000000000000003 RBX: ffff8881f7127a80 RCX: ffffffff84ffa742 [ 771.471890][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f7127a80 [ 771.471902][ C1] RBP: ffffc9000f5d75b0 R08: ffff8881f7127a80 R09: 1ffff1103ee24f50 [ 771.471916][ C1] R10: dffffc0000000000 R11: ffffed103ee24f51 R12: 1ffff1103ee20001 [ 771.471929][ C1] R13: ffff8881f7138cd4 R14: dffffc0000000000 R15: 1ffff92001ebaea4 [ 771.471942][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 771.471957][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 771.471970][ C1] CR2: 0000200000964000 CR3: 0000000114238000 CR4: 00000000003506a0 [ 771.471986][ C1] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 771.471998][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 771.472009][ C1] Call Trace: [ 771.472015][ C1] [ 771.472022][ C1] ? __cfi_kvm_wait+0x10/0x10 [ 771.472058][ C1] __pv_queued_spin_lock_slowpath+0x690/0xc40 [ 771.472099][ C1] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 771.472132][ C1] queued_spin_lock_slowpath+0x47/0x50 [ 771.472161][ C1] _raw_spin_lock+0xe4/0xf0 [ 771.472180][ C1] ? __cfi__raw_spin_lock+0x10/0x10 [ 771.472202][ C1] kvfree_call_rcu+0x107/0x7c0 [ 771.472224][ C1] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 771.472245][ C1] ? __cfi_kvfree_call_rcu+0x10/0x10 [ 771.472265][ C1] ? longest_prefix_match+0x337/0x640 [ 771.472288][ C1] trie_delete_elem+0x572/0x720 [ 771.472310][ C1] bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 771.472327][ C1] bpf_trace_run3+0x123/0x290 [ 771.472349][ C1] ? __pcpu_freelist_pop+0x70f/0x840 [ 771.472381][ C1] ? __cfi_bpf_trace_run3+0x10/0x10 [ 771.472405][ C1] ? calc_wheel_index+0xc8/0x8d0 [ 771.472429][ C1] ? timer_update_keys+0xb0/0xb0 [ 771.472452][ C1] __bpf_trace_timer_start+0x2b/0x40 [ 771.472470][ C1] ? __cfi___bpf_trace_timer_start+0x10/0x10 [ 771.472489][ C1] __traceiter_timer_start+0x8c/0xe0 [ 771.472506][ C1] enqueue_timer+0x337/0x480 [ 771.472530][ C1] __mod_timer+0x84c/0xc00 [ 771.472552][ C1] add_timer+0x68/0x80 [ 771.472571][ C1] __queue_delayed_work+0x173/0x200 [ 771.472596][ C1] queue_delayed_work_on+0xe7/0x160 [ 771.472619][ C1] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 771.472641][ C1] ? finish_task_switch+0x16b/0x7b0 [ 771.472664][ C1] ? __switch_to_asm+0x3a/0x60 [ 771.472686][ C1] kfree_rcu_monitor+0x6fe/0x7f0 [ 771.472704][ C1] process_one_work+0x71f/0xc40 [ 771.472725][ C1] worker_thread+0xa29/0x11e0 [ 771.472746][ C1] ? __kthread_parkme+0x142/0x180 [ 771.472764][ C1] kthread+0x281/0x320 [ 771.472781][ C1] ? __cfi_worker_thread+0x10/0x10 [ 771.472797][ C1] ? __cfi_kthread+0x10/0x10 [ 771.472828][ C1] ret_from_fork+0x1f/0x30 [ 771.472850][ C1]