last executing test programs: 1.809199306s ago: executing program 4 (id=5321): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x47d6839b43067ebd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.642526189s ago: executing program 1 (id=5327): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x14, 0x12, &(0x7f0000000a00)=@raw=[@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x465}}, @alu={0x4, 0x0, 0xa, 0x7, 0x9, 0xfffffffffffffffe, 0xfffffffffffffff0}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='syzkaller\x00', 0xf75, 0xd, &(0x7f0000000400)=""/13, 0x40f00, 0x60, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x3, 0x5, 0x583f}, 0x10, 0x0, r2, 0x1, &(0x7f0000001c00)=[0xffffffffffffffff, r1, r0, r1, r0, r1, r0], &(0x7f0000001c40)=[{0x2, 0x4, 0xd, 0xa}], 0x10, 0x7f}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5d371c61f550e9d86aabda45706bda78a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(0x3) close(r4) sendmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="17b3cbf16c1f5e5d32322908aff8ea4c6ce7dc63d87414ec6bb205e8e725344aa1189d691078bff6f8ca2808ae0e696a8aec26638e73c08b8b6a7d2330aa47ae327e99a39a64f1c2826ebe0694f19bfee3", 0x51}], 0x1, &(0x7f00000004c0)=[{0x68, 0x103, 0xf, "7d44e77716d1e99e3b52679105a4467acc3deb69a39f5dc085dd86b07f1d62a4dd09120dd30c9018b452eb37375dbfefee6f5f9c4411c44cf8fdf943f6ae83204bd2ba0eda0ae53c7c6e6619d2363d37643beff60e"}, {0xa8, 0x114, 0xe, "6ebff39eee60d96f1259ee50a9beee486b1b4573d980e29a37d4a33cd2f7a2df48b09d33d5bca607be45f6c98770527424fe2ab15c4cd3f57ed4041032af4dfe1d4af94b83d99988d9f700c16cf7fc50841c8958bbe1e667289a718012d7a47cdb4dff7db6bc0769af336ac96e9a0b99f97ba03870c9f3abe6bdfd144a3339255e246dbd801547427e73b30bf5de7f3034ad013a0d2ec1"}, {0xe8, 0x113, 0x3, "b47941d45e21dcc406d2025c3dff9d59194230a495b5f16564ba40f2790e81d5fb33eefc6097d2c36131d505e146d22a0568614722d5f650a9ea91abb569b501330668afae7d81015b91e9958822c683de1536bd98a822fe3a30624077b0c0a24bdc8d879ffd6c157837a923bd0da25d3c14584a3d09fc95a7a931538eec33897719f5c1c7328bca576823aa3046c229caf6e1be27c638f434ca7b99e6e11b29bf202a4bea1d9a150b52efb78512422fa28be682c2e5e2f98b2974e131f854a4f55cf564aa0deed6185f56634c51ccad17f2df55"}], 0x1f8}, 0x20008010) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 1.57647478s ago: executing program 4 (id=5328): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0xffffffffffffff57, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180900000000000000000000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 1.317191895s ago: executing program 4 (id=5332): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.198995877s ago: executing program 4 (id=5335): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 1.04587467s ago: executing program 1 (id=5338): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xf7, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff40000", 0x0, 0x24, 0x60000000}, 0x50) 996.219951ms ago: executing program 4 (id=5339): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000000000cd0b0000f285950000000b000000"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1da020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0xa}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000ebd8f4393f3ca0300000000000e979160d090f31127b89df5e2d5461fbfe7f6a545491938d9894c6333b3abbdd40a6e9283509758514533a62cc9968f8d5e325bac76a2cb8c86116ff3f074d69b3d135cc79b913330f44385f2634e16d8aa5218339e87db3818c26ae1b3cadd274d3f5859c4d7b0f70b0dd405d4c0346edd05d19e750d4d338572cb6f7e378f4c672abfd8cf06fa4eadf9165effcd6b9588d35f592a32455cc8bbe497fe41ee3b8de6f9309ae4005ea1593ca14a658e6e2e45b4408a734618e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000020000008500000086000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r8}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) sendmsg$inet(r9, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xb, &(0x7f00000009c0)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r7, &(0x7f0000000400)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x0, 0x3}}, 0x10, 0x0, 0x0, &(0x7f0000003280)="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", 0x7f8, 0x4044804}, 0x4044010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r10}, 0xb) socketpair(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x1, 0xef, 0x0, 0x0, 0x3, 0x20080, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, 0x0, @perf_config_ext={0x80000000, 0xf}, 0x10121, 0x0, 0xe69, 0x1, 0x0, 0xf, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 995.587151ms ago: executing program 2 (id=5340): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x4f}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x4f}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x64, 0x0, 0x6, 0x80000}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x401}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x3, 0xa, 0x100, &(0x7f00000003c0)={0x0, 0x0}) (async) socketpair(0x3, 0xa, 0x100, &(0x7f00000003c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = gettid() sendmsg$unix(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r10, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r8, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0xb, 0x8, 0xe, 0x0, 0x9, 0x9102, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x9}, 0x168c0, 0x7fffffffffffffff, 0x5, 0x7, 0xd6e, 0x0, 0x4, 0x0, 0xcc2b, 0x0, 0xff}, r10, 0x3, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 995.385811ms ago: executing program 1 (id=5341): bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="060000000400000000", @ANYRES32], 0x48) (fail_nth: 1) 977.583032ms ago: executing program 0 (id=5343): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 678.959698ms ago: executing program 0 (id=5346): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000080), 0x0}, 0x20) 648.435128ms ago: executing program 1 (id=5347): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) 648.148658ms ago: executing program 2 (id=5348): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, 0x0, 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 612.176028ms ago: executing program 2 (id=5350): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)=r0, 0x2000000}, 0x20) 611.471779ms ago: executing program 1 (id=5351): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00c014}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0xfe, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x3}, 0x100212, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r5, 0x0, 0x2, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008840}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00', r10}, 0x18) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 593.554989ms ago: executing program 0 (id=5353): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffffffb}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, 0x0, &(0x7f0000000380)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0xfffffc01, '\x00', r3, r7, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 541.89541ms ago: executing program 2 (id=5354): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1000000}]}}, 0x0, 0x26}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xb, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 540.82107ms ago: executing program 2 (id=5356): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000001000)=ANY=[@ANYBLOB="1802000000351882b458e58bba00000000000000000000008500000075000000952c000000000000"], 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000030bb00000000", @ANYRES32, @ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002a00)={0x11, 0xc, 0x0, &(0x7f0000002900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x7, 0x0, 0x0, 0xfffffffffffffffe, 0x20404, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000001140)}, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000020000000000004002018110000", @ANYRES32, @ANYRES64=r6], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x3}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, 0xfffffd96) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 493.941551ms ago: executing program 0 (id=5358): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 488.006371ms ago: executing program 3 (id=5359): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 462.482802ms ago: executing program 3 (id=5360): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, 0x0, 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 408.312252ms ago: executing program 3 (id=5361): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x94, 0x0, 0x2, 0x11}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000fcffffff000000004000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000004000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800006afa0000f3aa2ef600000000009500000000009daa"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 407.986102ms ago: executing program 3 (id=5362): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000080)) 382.347943ms ago: executing program 3 (id=5363): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000080), 0x0}, 0x20) 375.738893ms ago: executing program 0 (id=5364): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 298.171925ms ago: executing program 2 (id=5365): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (fail_nth: 1) 297.665605ms ago: executing program 1 (id=5366): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ff000000000000850000000300000095", @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0x800, 0x10400, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b7696a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0xc, 0x10200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100, 0x0, 0x1, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x6, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff85000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000000)='cpu&\t\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000200"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 267.953525ms ago: executing program 0 (id=5367): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x400000, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xf}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r3}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="10000000040000000800000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r7}, &(0x7f00000008c0), &(0x7f0000000900)=r6}, 0x20) 15.26965ms ago: executing program 3 (id=5368): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffffffb}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, 0x0, &(0x7f0000000380)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0xfffffc01, '\x00', r3, r7, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 4 (id=5369): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.88' (ED25519) to the list of known hosts. [ 19.615275][ T30] audit: type=1400 audit(1757734005.954:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.616461][ T273] cgroup: Unknown subsys name 'net' [ 19.638403][ T30] audit: type=1400 audit(1757734005.954:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.665650][ T30] audit: type=1400 audit(1757734005.984:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.665863][ T273] cgroup: Unknown subsys name 'devices' [ 19.774234][ T273] cgroup: Unknown subsys name 'hugetlb' [ 19.779857][ T273] cgroup: Unknown subsys name 'rlimit' [ 19.946116][ T30] audit: type=1400 audit(1757734006.284:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.969561][ T30] audit: type=1400 audit(1757734006.284:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.994762][ T30] audit: type=1400 audit(1757734006.284:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.000697][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.026766][ T30] audit: type=1400 audit(1757734006.364:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.052363][ T30] audit: type=1400 audit(1757734006.364:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.083670][ T30] audit: type=1400 audit(1757734006.424:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.109438][ T30] audit: type=1400 audit(1757734006.424:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.109727][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.988646][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.995778][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.003291][ T282] device bridge_slave_0 entered promiscuous mode [ 21.010198][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.017340][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.024793][ T282] device bridge_slave_1 entered promiscuous mode [ 21.057599][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.065062][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.072766][ T281] device bridge_slave_0 entered promiscuous mode [ 21.080079][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.087277][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.094654][ T281] device bridge_slave_1 entered promiscuous mode [ 21.141013][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.148097][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.155520][ T283] device bridge_slave_0 entered promiscuous mode [ 21.165430][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.172532][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.180022][ T283] device bridge_slave_1 entered promiscuous mode [ 21.206000][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.213081][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.220352][ T284] device bridge_slave_0 entered promiscuous mode [ 21.228735][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.235922][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.243344][ T284] device bridge_slave_1 entered promiscuous mode [ 21.303899][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.311061][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.318636][ T285] device bridge_slave_0 entered promiscuous mode [ 21.340020][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.347143][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.354649][ T285] device bridge_slave_1 entered promiscuous mode [ 21.466885][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.473961][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.510498][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.517592][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.525260][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.532346][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.547345][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.554429][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.561713][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.568889][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.581279][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.588364][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.595641][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.602701][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.612227][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.619358][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.626777][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.633812][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.668609][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.675945][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.683539][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.690790][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.698339][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.705965][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.713326][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.721040][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.728661][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.737116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.744742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.765203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.773438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.781776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.789934][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.796969][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.804479][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.812890][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.819909][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.837087][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.844845][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.853430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.861662][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.868712][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.902978][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.911306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.920320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.928502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.936920][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.944160][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.952418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.960562][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.967609][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.974967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.983193][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.990204][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.997579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.005742][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.012920][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.020311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.028721][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.035968][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.043370][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.051522][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.058744][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.066101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.074293][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.081394][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.088830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.096959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.104983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.112884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.124814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.133222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.154291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.162557][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.170671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.178857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.187084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.195789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.203921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.212095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.229228][ T285] device veth0_vlan entered promiscuous mode [ 22.239238][ T282] device veth0_vlan entered promiscuous mode [ 22.246097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.254490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.263518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.271337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.279774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.288259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.296570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.304779][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.312766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.320235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.327631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.335093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.346818][ T283] device veth0_vlan entered promiscuous mode [ 22.357987][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.365970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.374435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.383564][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.391800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.399480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.409601][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.418244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.432571][ T285] device veth1_macvtap entered promiscuous mode [ 22.442366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.450534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.459067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.466851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.475630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.487428][ T284] device veth0_vlan entered promiscuous mode [ 22.496629][ T282] device veth1_macvtap entered promiscuous mode [ 22.505838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.513859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.521801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.530196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.538921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.547342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.555255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.563432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.571294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.579196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.586770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.597278][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.605612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.615906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.624346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.637263][ T283] device veth1_macvtap entered promiscuous mode [ 22.644643][ T281] device veth0_vlan entered promiscuous mode [ 22.652612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.661384][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.670134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.678526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.687282][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.695133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.703435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.716167][ T284] device veth1_macvtap entered promiscuous mode [ 22.738164][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 22.738556][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.759098][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.767820][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.776256][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.785023][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.806299][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.816569][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.833520][ T281] device veth1_macvtap entered promiscuous mode [ 22.842032][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.852764][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.861054][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.878717][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.887314][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.917575][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.939381][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.952576][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.960978][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.162182][ C0] hrtimer: interrupt took 28728 ns [ 23.246217][ T371] device pim6reg1 entered promiscuous mode [ 23.276427][ T377] bond_slave_1: mtu less than device minimum [ 23.307676][ T380] device pim6reg1 entered promiscuous mode [ 23.332894][ T378] device pim6reg1 entered promiscuous mode [ 23.615710][ T405] bond_slave_1: mtu less than device minimum [ 23.714344][ T412] device pim6reg1 entered promiscuous mode [ 24.336090][ T438] bond_slave_1: mtu less than device minimum [ 24.460405][ T455] device pim6reg1 entered promiscuous mode [ 24.528984][ T451] device pim6reg1 entered promiscuous mode [ 24.632664][ T467] bond_slave_1: mtu less than device minimum [ 24.690952][ T471] bond_slave_1: mtu less than device minimum [ 24.806697][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 24.806713][ T30] audit: type=1400 audit(1757734011.144:115): avc: denied { create } for pid=486 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 24.972194][ T491] device pim6reg1 entered promiscuous mode [ 25.176724][ T504] device pim6reg1 entered promiscuous mode [ 25.912577][ T538] device pim6reg1 entered promiscuous mode [ 26.118384][ T554] device pim6reg1 entered promiscuous mode [ 26.607369][ T30] audit: type=1400 audit(1757734012.944:116): avc: denied { ioctl } for pid=568 comm="syz.4.101" path="socket:[16718]" dev="sockfs" ino=16718 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.642933][ T567] device sit0 entered promiscuous mode [ 27.251962][ T596] device sit0 entered promiscuous mode [ 27.639179][ T30] audit: type=1400 audit(1757734013.974:117): avc: denied { read } for pid=616 comm="syz.4.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.791517][ T635] device sit0 entered promiscuous mode [ 27.923426][ T639] device wg2 entered promiscuous mode [ 27.985916][ T650] device pim6reg1 entered promiscuous mode [ 28.199363][ T668] device pim6reg1 entered promiscuous mode [ 28.763724][ T700] device pim6reg1 entered promiscuous mode [ 28.871945][ T712] device pim6reg1 entered promiscuous mode [ 28.938110][ T30] audit: type=1400 audit(1757734015.274:118): avc: denied { write } for pid=724 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.395116][ T748] device pim6reg1 entered promiscuous mode [ 29.572909][ T753] device pim6reg1 entered promiscuous mode [ 29.770583][ T759] bond_slave_1: mtu less than device minimum [ 30.952164][ C0] sched: RT throttling activated [ 31.136078][ T778] device syzkaller0 entered promiscuous mode [ 31.339410][ T793] device pim6reg1 entered promiscuous mode [ 31.760169][ T816] bond_slave_1: mtu less than device minimum [ 32.736666][ T905] device pim6reg1 entered promiscuous mode [ 37.332336][ T30] audit: type=1400 audit(1757734023.674:119): avc: denied { create } for pid=995 comm="syz.3.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 37.783943][ T1034] device pim6reg1 entered promiscuous mode [ 38.114413][ T1065] device pim6reg1 entered promiscuous mode [ 38.145541][ T1063] device pim6reg1 entered promiscuous mode [ 38.450320][ T1078] device syzkaller0 entered promiscuous mode [ 38.667779][ T1100] device pim6reg1 entered promiscuous mode [ 39.813517][ T30] audit: type=1400 audit(1757734026.154:120): avc: denied { relabelfrom } for pid=1154 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 39.864910][ T30] audit: type=1400 audit(1757734026.154:121): avc: denied { relabelto } for pid=1154 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 40.337945][ T1239] device pim6reg1 entered promiscuous mode [ 40.377152][ T1243] device veth0_vlan left promiscuous mode [ 40.400289][ T1243] device veth0_vlan entered promiscuous mode [ 40.628121][ T1282] bond_slave_1: mtu less than device minimum [ 40.818780][ T1316] bond_slave_1: mtu less than device minimum [ 40.878553][ T1324] device pim6reg1 entered promiscuous mode [ 40.916032][ T30] audit: type=1400 audit(1757734027.254:122): avc: denied { ioctl } for pid=1329 comm="syz.4.436" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.113248][ T1349] bond_slave_1: mtu less than device minimum [ 41.210343][ T1351] device pim6reg1 entered promiscuous mode [ 41.933001][ T1440] device pim6reg1 entered promiscuous mode [ 42.022907][ T1448] syzkaller: port 1(erspan0) entered blocking state [ 42.035034][ T1448] syzkaller: port 1(erspan0) entered disabled state [ 42.052081][ T1448] device erspan0 entered promiscuous mode [ 42.254169][ T1484] syz.2.504[1484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.254262][ T1484] syz.2.504[1484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.316992][ T1487] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.598077][ T30] audit: type=1400 audit(1757734029.934:123): avc: denied { cpu } for pid=1575 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 43.802645][ T1582] device pim6reg1 entered promiscuous mode [ 43.852679][ T1594] device pim6reg1 entered promiscuous mode [ 44.527245][ T1628] device pim6reg1 entered promiscuous mode [ 44.554857][ T1632] bond_slave_1: mtu less than device minimum [ 44.853330][ T1665] bond_slave_1: mtu less than device minimum [ 44.893368][ T1667] device pim6reg1 entered promiscuous mode [ 45.084122][ T1681] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.092761][ T1681] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.196234][ T1685] device bridge_slave_1 left promiscuous mode [ 45.213040][ T1685] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.232525][ T1685] device bridge_slave_0 left promiscuous mode [ 45.245119][ T1685] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.288317][ T1694] bond_slave_1: mtu less than device minimum [ 45.360282][ T1706] device pim6reg1 entered promiscuous mode [ 46.011451][ T1748] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.018958][ T1748] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.089636][ T1578] syz.4.544 (1578) used greatest stack depth: 22752 bytes left [ 46.674741][ T1787] device pim6reg1 entered promiscuous mode [ 46.983967][ T1744] syz.3.619 (1744) used greatest stack depth: 22544 bytes left [ 47.863889][ T1820] device pim6reg1 entered promiscuous mode [ 47.966015][ T1824] syz.2.652[1824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.966093][ T1824] syz.2.652[1824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.039432][ T1828] bond_slave_1: mtu less than device minimum [ 48.650369][ T1850] device pim6reg1 entered promiscuous mode [ 48.657422][ T1862] bond_slave_1: mtu less than device minimum [ 48.929592][ T1902] bond_slave_1: mtu less than device minimum [ 49.399100][ T1932] bond_slave_1: mtu less than device minimum [ 49.676831][ T1972] bond_slave_1: mtu less than device minimum [ 49.904089][ T1998] bond_slave_1: mtu less than device minimum [ 50.065301][ T2013] device pim6reg1 entered promiscuous mode [ 50.557314][ T2057] device pim6reg1 entered promiscuous mode [ 51.204578][ T2120] device pim6reg1 entered promiscuous mode [ 51.453169][ T2131] device pim6reg1 entered promiscuous mode [ 52.068776][ T2162] device syzkaller0 entered promiscuous mode [ 52.091468][ T2176] device pim6reg1 entered promiscuous mode [ 52.414085][ T2217] device pim6reg1 entered promiscuous mode [ 52.974271][ T2279] device pim6reg1 entered promiscuous mode [ 53.052899][ T2283] device pim6reg1 entered promiscuous mode [ 53.781965][ T2350] device pim6reg1 entered promiscuous mode [ 54.711150][ T30] audit: type=1400 audit(1757734041.044:124): avc: denied { create } for pid=2427 comm="syz.1.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 54.764923][ T30] audit: type=1400 audit(1757734041.084:125): avc: denied { create } for pid=2427 comm="syz.1.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 55.024879][ T2451] device pim6reg1 entered promiscuous mode [ 56.682612][ T2599] device pim6reg1 entered promiscuous mode [ 57.305455][ T2630] bond_slave_1: mtu less than device minimum [ 57.581305][ T2657] device pim6reg1 entered promiscuous mode [ 57.637577][ T2663] bond_slave_1: mtu less than device minimum [ 57.672999][ T2662] device pim6reg1 entered promiscuous mode [ 57.926249][ T2694] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.933759][ T2694] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.984958][ T2690] device pim6reg1 entered promiscuous mode [ 58.064001][ T2705] device bridge_slave_1 left promiscuous mode [ 58.108048][ T2705] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.201316][ T2705] device bridge_slave_0 left promiscuous mode [ 58.277625][ T2705] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.537873][ T2737] device pim6reg1 entered promiscuous mode [ 58.684134][ T2749] device pim6reg1 entered promiscuous mode [ 59.766504][ T2859] device pim6reg1 entered promiscuous mode [ 60.118152][ T2907] device pim6reg1 entered promiscuous mode [ 60.199746][ T2905] device pim6reg1 entered promiscuous mode [ 60.541240][ T2957] device pim6reg1 entered promiscuous mode [ 60.545437][ T2966] syz.3.1154 uses obsolete (PF_INET,SOCK_PACKET) [ 61.071015][ T3008] bond_slave_1: mtu less than device minimum [ 61.551434][ T3036] bond_slave_1: mtu less than device minimum [ 61.694985][ T3060] device syzkaller0 entered promiscuous mode [ 61.807585][ T3078] device pim6reg1 entered promiscuous mode [ 61.832004][ T3082] device bridge_slave_1 left promiscuous mode [ 61.838511][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.846627][ T3082] device bridge_slave_0 left promiscuous mode [ 61.862059][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.947354][ T3103] device pim6reg1 entered promiscuous mode [ 62.080864][ T3124] device pim6reg1 entered promiscuous mode [ 62.207996][ T3149] device pim6reg1 entered promiscuous mode [ 62.381039][ T3180] bond_slave_1: mtu less than device minimum [ 62.404080][ T3184] device pim6reg1 entered promiscuous mode [ 62.822408][ T3252] device pim6reg1 entered promiscuous mode [ 62.936891][ T3275] device pim6reg1 entered promiscuous mode [ 62.947013][ T3279] -1: renamed from syzkaller0 [ 63.109587][ T3306] device pim6reg1 entered promiscuous mode [ 63.311878][ T3340] device syzkaller0 entered promiscuous mode [ 63.438361][ T3363] syz.3.1335[3363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.438444][ T3363] syz.3.1335[3363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.578280][ T3383] device syzkaller0 entered promiscuous mode [ 63.666732][ T3393] device pim6reg1 entered promiscuous mode [ 63.856487][ T3430] device syzkaller0 entered promiscuous mode [ 63.934570][ T3448] device pim6reg1 entered promiscuous mode [ 64.140729][ T3480] device syzkaller0 entered promiscuous mode [ 64.529395][ T3538] device syzkaller0 entered promiscuous mode [ 64.794952][ T3578] device pim6reg1 entered promiscuous mode [ 64.845675][ T3590] device syzkaller0 entered promiscuous mode [ 64.880908][ T30] audit: type=1400 audit(1757734051.214:126): avc: denied { write } for pid=3591 comm="syz.2.1441" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 64.909521][ T3599] syz.1.1444[3599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.909611][ T3599] syz.1.1444[3599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.555005][ T3678] device pim6reg1 entered promiscuous mode [ 65.803282][ T3715] device pim6reg1 entered promiscuous mode [ 67.012324][ T3746] device pim6reg1 entered promiscuous mode [ 71.045821][ T3844] device pim6reg1 entered promiscuous mode [ 71.142348][ T3851] ªªªªªª: renamed from vlan0 [ 71.331905][ T3872] device pim6reg1 entered promiscuous mode [ 71.435206][ T3882] device pim6reg1 entered promiscuous mode [ 71.468663][ T3881] device pim6reg1 entered promiscuous mode [ 71.690062][ T3906] device pim6reg1 entered promiscuous mode [ 71.761787][ T3922] device pim6reg1 entered promiscuous mode [ 72.064638][ T3969] device pim6reg1 entered promiscuous mode [ 72.303025][ T4003] syz.1.1633[4003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.303118][ T4003] syz.1.1633[4003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.835787][ T4081] device pim6reg1 entered promiscuous mode [ 73.371186][ T4141] device pim6reg1 entered promiscuous mode [ 73.464418][ T4155] device pim6reg1 entered promiscuous mode [ 73.804356][ T4194] device pim6reg1 entered promiscuous mode [ 73.862294][ T4199] device pim6reg1 entered promiscuous mode [ 74.004351][ T4224] device pim6reg1 entered promiscuous mode [ 74.279467][ T4253] device pim6reg1 entered promiscuous mode [ 74.327439][ T4261] device pim6reg1 entered promiscuous mode [ 74.550316][ T4295] device pim6reg1 entered promiscuous mode [ 74.806615][ T4338] device pim6reg1 entered promiscuous mode [ 74.815618][ T4342] bond_slave_1: mtu less than device minimum [ 74.974187][ T4363] device pim6reg1 entered promiscuous mode [ 75.043096][ T4377] device pim6reg1 entered promiscuous mode [ 75.087757][ T4383] device pim6reg1 entered promiscuous mode [ 75.248004][ T4407] device pim6reg1 entered promiscuous mode [ 75.353220][ T4418] device pim6reg1 entered promiscuous mode [ 75.403064][ T4426] device pim6reg1 entered promiscuous mode [ 75.512563][ T4446] device pim6reg1 entered promiscuous mode [ 75.664766][ T4465] device pim6reg1 entered promiscuous mode [ 76.065547][ T4515] device pim6reg1 entered promiscuous mode [ 76.285975][ T4548] device pim6reg1 entered promiscuous mode [ 76.366915][ T4569] device pim6reg1 entered promiscuous mode [ 76.662646][ T4613] device pim6reg1 entered promiscuous mode [ 76.902068][ T4636] device pim6reg1 entered promiscuous mode [ 77.041464][ T4658] device pim6reg1 entered promiscuous mode [ 77.250160][ T4675] device pim6reg1 entered promiscuous mode [ 77.259185][ T4677] device pim6reg1 entered promiscuous mode [ 77.270069][ T4679] pimreg: tun_chr_ioctl cmd 1074025677 [ 77.276572][ T4679] pimreg: linktype set to 512 [ 77.578750][ T4706] device pim6reg1 entered promiscuous mode [ 77.642698][ T4717] ªªªªªª: renamed from vlan0 [ 77.714780][ T4733] device pim6reg1 entered promiscuous mode [ 77.850835][ T4750] device pim6reg1 entered promiscuous mode [ 77.991964][ T4776] device pim6reg1 entered promiscuous mode [ 78.036656][ T4788] device pim6reg1 entered promiscuous mode [ 78.202701][ T4803] device pim6reg1 entered promiscuous mode [ 78.271063][ T4822] device pim6reg1 entered promiscuous mode [ 78.441627][ T4843] device pim6reg1 entered promiscuous mode [ 78.480863][ T4859] device pim6reg1 entered promiscuous mode [ 78.608949][ T4863] device pim6reg1 entered promiscuous mode [ 78.708789][ T4884] device pim6reg1 entered promiscuous mode [ 78.720700][ T4887] device pim6reg1 entered promiscuous mode [ 78.727687][ T4889] device pim6reg1 entered promiscuous mode [ 78.877702][ T4911] device pim6reg1 entered promiscuous mode [ 79.000432][ T4927] device pim6reg1 entered promiscuous mode [ 79.123362][ T4952] device pim6reg1 entered promiscuous mode [ 79.984378][ T5086] device pim6reg1 entered promiscuous mode [ 80.181009][ T5107] device pim6reg1 entered promiscuous mode [ 80.283378][ T5129] device pim6reg1 entered promiscuous mode [ 80.437543][ T5157] device pim6reg1 entered promiscuous mode [ 80.464937][ T5161] device pim6reg1 entered promiscuous mode [ 80.740131][ T5206] device syzkaller0 entered promiscuous mode [ 80.833418][ T5212] device pim6reg1 entered promiscuous mode [ 80.953927][ T5230] device pim6reg1 entered promiscuous mode [ 81.098851][ T5247] device syzkaller0 entered promiscuous mode [ 81.257794][ T5257] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.511585][ T5264] device pim6reg1 entered promiscuous mode [ 81.898898][ T5282] device syzkaller0 entered promiscuous mode [ 81.926774][ T5291] device pim6reg1 entered promiscuous mode [ 82.238686][ T5337] device pim6reg1 entered promiscuous mode [ 82.446628][ T5379] device pim6reg1 entered promiscuous mode [ 82.645790][ T5417] device pim6reg1 entered promiscuous mode [ 82.927009][ T5433] device bridge_slave_1 left promiscuous mode [ 82.972313][ T5433] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.024722][ T5433] device bridge_slave_0 left promiscuous mode [ 83.053598][ T5433] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.268544][ T5478] device pim6reg1 entered promiscuous mode [ 84.661150][ T5527] device pim6reg1 entered promiscuous mode [ 85.814791][ T5572] device pim6reg1 entered promiscuous mode [ 85.940465][ T5595] device syzkaller0 entered promiscuous mode [ 86.082794][ T5625] device pim6reg1 entered promiscuous mode [ 86.249697][ T5647] device syzkaller0 entered promiscuous mode [ 86.929757][ T5676] device pim6reg1 entered promiscuous mode [ 87.971290][ T5725] device pim6reg1 entered promiscuous mode [ 88.113705][ T5743] device syzkaller0 entered promiscuous mode [ 88.724797][ T5779] device pim6reg1 entered promiscuous mode [ 88.923043][ T5784] device syzkaller0 entered promiscuous mode [ 89.258306][ T5799] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.265974][ T5799] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.290144][ T5799] device bridge_slave_1 left promiscuous mode [ 89.296531][ T5799] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.304434][ T5799] device bridge_slave_0 left promiscuous mode [ 89.311988][ T5799] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.439385][ T5837] device pim6reg1 entered promiscuous mode [ 90.503264][ T5840] device syzkaller0 entered promiscuous mode [ 90.674025][ T5855] device pim6reg1 entered promiscuous mode [ 90.792833][ T5874] device pim6reg1 entered promiscuous mode [ 90.895431][ T5890] device syzkaller0 entered promiscuous mode [ 90.945023][ T5896] device pim6reg1 entered promiscuous mode [ 91.106389][ T5921] device pim6reg1 entered promiscuous mode [ 91.366343][ T5962] device syzkaller0 entered promiscuous mode [ 91.519544][ T5989] device pim6reg1 entered promiscuous mode [ 91.596557][ T6007] device pim6reg1 entered promiscuous mode [ 91.864696][ T6050] device pim6reg1 entered promiscuous mode [ 92.031761][ T6085] device pim6reg1 entered promiscuous mode [ 92.137873][ T6099] device syzkaller0 entered promiscuous mode [ 92.150686][ T6095] device pim6reg1 entered promiscuous mode [ 92.521500][ T6170] device pim6reg1 entered promiscuous mode [ 92.652173][ T6189] device pim6reg1 entered promiscuous mode [ 92.770779][ T6210] device pim6reg1 entered promiscuous mode [ 96.215877][ T6335] device pim6reg1 entered promiscuous mode [ 96.900579][ T6384] device pim6reg1 entered promiscuous mode [ 96.945666][ T6386] device pim6reg1 entered promiscuous mode [ 97.043136][ T6395] device pim6reg1 entered promiscuous mode [ 99.846925][ T6428] device pim6reg1 entered promiscuous mode [ 100.525741][ T6453] device pim6reg1 entered promiscuous mode [ 100.572903][ T6457] device pim6reg1 entered promiscuous mode [ 100.845451][ T6482] device pim6reg1 entered promiscuous mode [ 100.858462][ T6478] device sit0 left promiscuous mode [ 100.935736][ T6478] device sit0 entered promiscuous mode [ 102.024326][ T6575] device pim6reg1 entered promiscuous mode [ 102.398705][ T6617] device pim6reg1 entered promiscuous mode [ 103.968123][ T282] syz-executor (282) used greatest stack depth: 20736 bytes left [ 103.968248][ T6668] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.985215][ T6668] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.998937][ T6668] device bridge_slave_0 entered promiscuous mode [ 104.006692][ T6668] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.013946][ T6668] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.021952][ T6668] device bridge_slave_1 entered promiscuous mode [ 104.270814][ T6690] device pim6reg1 entered promiscuous mode [ 104.320012][ T30] audit: type=1400 audit(1757734090.654:127): avc: denied { create } for pid=6668 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.345973][ T30] audit: type=1400 audit(1757734090.654:128): avc: denied { write } for pid=6668 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.367191][ T30] audit: type=1400 audit(1757734090.654:129): avc: denied { read } for pid=6668 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.429986][ T6668] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.437453][ T6668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.444805][ T6668] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.452455][ T6668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.638407][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.685549][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.964347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.989504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.043069][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.066451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.075799][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.083105][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.093272][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.102568][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.110778][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.117889][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.141763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.150330][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.159430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.169251][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.196102][ T6668] device veth0_vlan entered promiscuous mode [ 105.204724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.215182][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.224396][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.232607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.256690][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.272526][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.292925][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.301442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.311616][ T6668] device veth1_macvtap entered promiscuous mode [ 105.323922][ T2679] device veth1_macvtap left promiscuous mode [ 105.351530][ T2679] device veth0_vlan left promiscuous mode [ 105.449963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.458280][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.467179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.481369][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.490892][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.592979][ T6796] device pim6reg1 entered promiscuous mode [ 105.827737][ T6808] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.835776][ T6808] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.843577][ T6808] device bridge_slave_0 entered promiscuous mode [ 105.859569][ T6808] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.868455][ T6808] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.876179][ T6808] device bridge_slave_1 entered promiscuous mode [ 105.969162][ T6840] device pim6reg1 entered promiscuous mode [ 106.319602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.327348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.340893][ T6881] device pim6reg1 entered promiscuous mode [ 106.365829][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.385725][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.395155][ T3834] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.402430][ T3834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.473385][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.488219][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.497666][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.506198][ T3834] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.513376][ T3834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.521257][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.529806][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.538406][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.546903][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.555407][ T6897] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.562742][ T6897] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.583213][ T6900] device bridge_slave_1 left promiscuous mode [ 106.628519][ T6900] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.724978][ T6900] device bridge_slave_0 left promiscuous mode [ 106.794081][ T6900] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.065472][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.075744][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.089556][ T6808] device veth0_vlan entered promiscuous mode [ 108.107280][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.126807][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.138316][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 108.154129][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.165961][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.174549][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.184429][ T6912] device pim6reg1 entered promiscuous mode [ 108.194075][ T6808] device veth1_macvtap entered promiscuous mode [ 108.215104][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.223118][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.231903][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.254571][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.264230][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.503297][ T2679] device veth1_macvtap left promiscuous mode [ 108.608322][ T6966] device pim6reg1 entered promiscuous mode [ 108.681550][ T6967] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.688962][ T6967] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.696667][ T6967] device bridge_slave_0 entered promiscuous mode [ 108.703885][ T6967] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.711141][ T6967] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.718755][ T6967] device bridge_slave_1 entered promiscuous mode [ 109.113327][ T7004] device pim6reg1 entered promiscuous mode [ 109.134607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.142680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.159951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.168551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.178044][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.185150][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.199106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.207988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.217089][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.224361][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.232071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.241519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.249720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.299790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.312506][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.327405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.348008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.378809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 109.394508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.410362][ T6967] device veth0_vlan entered promiscuous mode [ 109.420669][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.434900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.455237][ T6967] device veth1_macvtap entered promiscuous mode [ 109.466351][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.479261][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.496334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.998492][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.018241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.047842][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.056395][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.179609][ T7062] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.199882][ T7062] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.217888][ T7062] device bridge_slave_0 entered promiscuous mode [ 114.240123][ T7062] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.251754][ T7062] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.273808][ T7062] device bridge_slave_1 entered promiscuous mode [ 114.282919][ T2679] device erspan0 left promiscuous mode [ 114.288534][ T2679] syzkaller: port 1(erspan0) entered disabled state [ 114.475980][ T7062] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.483104][ T7062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.490402][ T7062] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.497507][ T7062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.535000][ T2679] device veth1_macvtap left promiscuous mode [ 114.708993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.717254][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.725201][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.755411][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.771220][ T3834] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.778534][ T3834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.798829][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.815862][ T3834] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.822983][ T3834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.837543][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.859665][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.884323][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.927305][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.941216][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.950809][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.997058][ T7062] device veth0_vlan entered promiscuous mode [ 115.113511][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.146574][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.179661][ T7062] device veth1_macvtap entered promiscuous mode [ 115.239259][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.253916][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.264257][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.274686][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.283639][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 117.190902][ T7236] bond_slave_1: mtu less than device minimum [ 117.289465][ T7243] device pim6reg1 entered promiscuous mode [ 120.300174][ T7270] device pim6reg1 entered promiscuous mode [ 121.992854][ T7266] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.000140][ T7266] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.008132][ T7266] device bridge_slave_0 entered promiscuous mode [ 122.033022][ T7266] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.040180][ T7266] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.049548][ T7266] device bridge_slave_1 entered promiscuous mode [ 122.065965][ T2679] device veth1_macvtap left promiscuous mode [ 122.224157][ T7299] device pim6reg1 entered promiscuous mode [ 122.662864][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.681811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.013454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.035767][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.076972][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.084064][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.145448][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.203876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.237087][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.244216][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.267354][ T7335] device pim6reg1 entered promiscuous mode [ 123.313194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.361347][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.369815][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.378312][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.409217][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.438643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.451757][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.495909][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.507440][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.572616][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.615272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.297577][ T7266] device veth0_vlan entered promiscuous mode [ 126.341082][ T7381] device pim6reg1 entered promiscuous mode [ 126.387005][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.399172][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.424918][ T7266] device veth1_macvtap entered promiscuous mode [ 126.437103][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.445243][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.454383][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.513096][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.529815][ T3834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.553119][ T7397] bond_slave_1: mtu less than device minimum [ 126.700241][ T7419] bond_slave_1: mtu less than device minimum [ 129.043838][ T7453] bond_slave_1: mtu less than device minimum [ 129.115627][ T2679] device veth1_macvtap left promiscuous mode [ 129.121871][ T2679] device veth0_vlan left promiscuous mode [ 129.477973][ T7506] bond_slave_1: mtu less than device minimum [ 131.021789][ T7533] device pim6reg1 entered promiscuous mode [ 131.051212][ T7537] device pim6reg1 entered promiscuous mode [ 131.175598][ T7551] device pim6reg1 entered promiscuous mode [ 132.609465][ T7579] device pim6reg1 entered promiscuous mode [ 132.770324][ T7592] device pim6reg1 entered promiscuous mode [ 133.490443][ T7615] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.497896][ T7615] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.510965][ T7615] device bridge_slave_1 left promiscuous mode [ 133.518475][ T7615] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.537605][ T7615] device bridge_slave_0 left promiscuous mode [ 133.554124][ T7615] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.772872][ T7626] bond_slave_1: mtu less than device minimum [ 136.067951][ T7653] bond_slave_1: mtu less than device minimum [ 136.260800][ T7676] device pim6reg1 entered promiscuous mode [ 138.072795][ T7695] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.080190][ T7695] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.095149][ T7695] device bridge_slave_1 left promiscuous mode [ 138.106447][ T7695] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.114211][ T7695] device bridge_slave_0 left promiscuous mode [ 138.120456][ T7695] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.612870][ T7741] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.620110][ T7741] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.638213][ T7741] device bridge_slave_1 left promiscuous mode [ 139.645435][ T7741] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.653100][ T7741] device bridge_slave_0 left promiscuous mode [ 139.659341][ T7741] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.237804][ T7780] device pim6reg1 entered promiscuous mode [ 143.126674][ T7802] bond_slave_1: mtu less than device minimum [ 143.180071][ T7812] device pim6reg1 entered promiscuous mode [ 145.014718][ T7818] device pim6reg1 entered promiscuous mode [ 145.033203][ T7824] device pim6reg1 entered promiscuous mode [ 150.015610][ T7885] bond_slave_1: mtu less than device minimum [ 150.034437][ T7882] device pim6reg1 entered promiscuous mode [ 150.075104][ T7890] device pim6reg1 entered promiscuous mode [ 150.121008][ T7896] device pim6reg1 entered promiscuous mode [ 150.313709][ T7915] bond_slave_1: mtu less than device minimum [ 150.377634][ T7921] device pim6reg1 entered promiscuous mode [ 150.543731][ T7943] bond_slave_1: mtu less than device minimum [ 150.933573][ T7963] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.940912][ T7963] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.956947][ T7963] device bridge_slave_1 left promiscuous mode [ 150.963442][ T7963] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.974006][ T7963] device bridge_slave_0 left promiscuous mode [ 150.980364][ T7963] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.389857][ T7993] device pim6reg1 entered promiscuous mode [ 151.993733][ T8036] device pim6reg1 entered promiscuous mode [ 152.032049][ T8040] device pim6reg1 entered promiscuous mode [ 152.232833][ T8050] device pim6reg1 entered promiscuous mode [ 152.548330][ T8065] device pim6reg1 entered promiscuous mode [ 152.751881][ T8081] device pim6reg1 entered promiscuous mode [ 152.947871][ T8105] device pim6reg1 entered promiscuous mode [ 154.073766][ T8125] device pim6reg1 entered promiscuous mode [ 154.083943][ T8129] device pim6reg1 entered promiscuous mode [ 156.092040][ T8179] device pim6reg1 entered promiscuous mode [ 162.054397][ T8343] device pim6reg1 entered promiscuous mode [ 164.037567][ T8353] device pim6reg1 entered promiscuous mode [ 164.295800][ T8374] bond_slave_1: mtu less than device minimum [ 165.307424][ T8428] device pim6reg1 entered promiscuous mode [ 165.327431][ T8430] bond_slave_1: mtu less than device minimum [ 165.959503][ T8461] device pim6reg1 entered promiscuous mode [ 166.017926][ T8465] bond_slave_1: mtu less than device minimum [ 166.256605][ T8476] device pim6reg1 entered promiscuous mode [ 166.879199][ T8524] device pim6reg1 entered promiscuous mode [ 167.097376][ T8547] bond_slave_1: mtu less than device minimum [ 167.958514][ T8611] device pim6reg1 entered promiscuous mode [ 168.042955][ T8617] bond_slave_1: mtu less than device minimum [ 168.359698][ T8639] device pim6reg1 entered promiscuous mode [ 168.485552][ T8649] bond_slave_1: mtu less than device minimum [ 171.203154][ T8779] device pim6reg1 entered promiscuous mode [ 171.647328][ T8827] device pim6reg1 entered promiscuous mode [ 172.681339][ T8877] device pim6reg1 entered promiscuous mode [ 174.473160][ T8997] device pim6reg1 entered promiscuous mode [ 175.189003][ T9058] bond_slave_1: mtu less than device minimum [ 175.270914][ T9063] device pim6reg1 entered promiscuous mode [ 175.310950][ T9067] device pim6reg1 entered promiscuous mode [ 175.540995][ T9082] bond_slave_1: mtu less than device minimum [ 175.774384][ T9098] device pim6reg1 entered promiscuous mode [ 175.867947][ T9108] bond_slave_1: mtu less than device minimum [ 176.142309][ T9137] device pim6reg1 entered promiscuous mode [ 176.788410][ T9170] bond_slave_1: mtu less than device minimum [ 179.309996][ T9376] bond_slave_1: mtu less than device minimum [ 179.403731][ T9388] device pim6reg1 entered promiscuous mode [ 180.406775][ T9458] device pim6reg1 entered promiscuous mode [ 180.718453][ T9496] device pim6reg1 entered promiscuous mode [ 180.769574][ T9503] bond_slave_1: mtu less than device minimum [ 181.165768][ T9534] device pim6reg1 entered promiscuous mode [ 181.175312][ T9560] device pim6reg1 entered promiscuous mode [ 187.454697][ T9736] device pim6reg1 entered promiscuous mode [ 188.536817][ T9793] bond_slave_1: mtu less than device minimum [ 188.805582][ T9809] device pim6reg1 entered promiscuous mode [ 188.895668][ T9817] device pim6reg1 entered promiscuous mode [ 189.033001][ T9830] device pim6reg1 entered promiscuous mode [ 189.675733][ T9856] device pim6reg1 entered promiscuous mode [ 189.741442][ T9864] device pim6reg1 entered promiscuous mode [ 189.768042][ T9870] device syzkaller0 entered promiscuous mode [ 190.774857][ T9953] device pim6reg1 entered promiscuous mode [ 190.828464][ T9961] device pim6reg1 entered promiscuous mode [ 191.167389][ T9998] device pim6reg1 entered promiscuous mode [ 191.240156][T10011] device pim6reg1 entered promiscuous mode [ 191.671975][T10052] device pim6reg1 entered promiscuous mode [ 191.780577][T10058] bond_slave_1: mtu less than device minimum [ 192.053321][T10086] device pim6reg1 entered promiscuous mode [ 193.701391][T10225] bond_slave_1: mtu less than device minimum [ 193.982050][T10257] bond_slave_1: mtu less than device minimum [ 194.196420][T10281] bond_slave_1: mtu less than device minimum [ 194.329194][T10299] bond_slave_1: mtu less than device minimum [ 194.362466][T10305] device pim6reg1 entered promiscuous mode [ 201.370525][T10498] device pim6reg1 entered promiscuous mode [ 201.594012][T10509] bond_slave_1: mtu less than device minimum [ 207.855097][T10604] device pim6reg1 entered promiscuous mode [ 208.046538][T10621] bond_slave_1: mtu less than device minimum [ 213.256830][T10714] bond_slave_1: mtu less than device minimum [ 213.426858][T10722] device pim6reg1 entered promiscuous mode [ 214.416140][T10783] device pim6reg1 entered promiscuous mode [ 214.577080][T10794] syz.0.4750[10794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.578821][T10794] syz.0.4750[10794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.616911][T10803] FAULT_INJECTION: forcing a failure. [ 214.616911][T10803] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 214.642270][T10803] CPU: 0 PID: 10803 Comm: syz.3.4756 Not tainted syzkaller #0 [ 214.649748][T10803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 214.659828][T10803] Call Trace: [ 214.663121][T10803] [ 214.666090][T10803] __dump_stack+0x21/0x30 [ 214.670435][T10803] dump_stack_lvl+0xee/0x150 [ 214.675045][T10803] ? show_regs_print_info+0x20/0x20 [ 214.680450][T10803] ? __activate_page+0xd40/0xd40 [ 214.685397][T10803] dump_stack+0x15/0x20 [ 214.689589][T10803] should_fail+0x3c1/0x510 [ 214.694022][T10803] should_fail_usercopy+0x1a/0x20 [ 214.699145][T10803] copy_page_from_iter_atomic+0x3fb/0x1350 [ 214.704977][T10803] ? pipe_zero+0x370/0x370 [ 214.709422][T10803] generic_perform_write+0x307/0x670 [ 214.714727][T10803] ? grab_cache_page_write_begin+0xb0/0xb0 [ 214.720723][T10803] ? file_remove_privs+0x590/0x590 [ 214.725934][T10803] ? rwsem_write_trylock+0x130/0x300 [ 214.731324][T10803] ? bpf_get_current_comm+0x44/0xa0 [ 214.736525][T10803] ? clear_nonspinnable+0x60/0x60 [ 214.741901][T10803] ? avc_policy_seqno+0x1b/0x70 [ 214.746778][T10803] __generic_file_write_iter+0x268/0x480 [ 214.752716][T10803] generic_file_write_iter+0xa9/0x1d0 [ 214.758235][T10803] vfs_write+0x802/0xf70 [ 214.762580][T10803] ? file_end_write+0x1b0/0x1b0 [ 214.767706][T10803] ? wait_for_completion_killable_timeout+0x10/0x10 [ 214.774313][T10803] ? __fget_files+0x2c4/0x320 [ 214.779108][T10803] ? __fdget_pos+0x2d2/0x380 [ 214.783700][T10803] ? ksys_write+0x71/0x240 [ 214.788117][T10803] ksys_write+0x140/0x240 [ 214.792450][T10803] ? __ia32_sys_read+0x90/0x90 [ 214.797229][T10803] ? debug_smp_processor_id+0x17/0x20 [ 214.802708][T10803] __x64_sys_write+0x7b/0x90 [ 214.807489][T10803] x64_sys_call+0x8ef/0x9a0 [ 214.812180][T10803] do_syscall_64+0x4c/0xa0 [ 214.816699][T10803] ? clear_bhb_loop+0x50/0xa0 [ 214.821399][T10803] ? clear_bhb_loop+0x50/0xa0 [ 214.826073][T10803] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.831964][T10803] RIP: 0033:0x7f8b0969dba9 [ 214.836383][T10803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.855992][T10803] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.864576][T10803] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 214.872655][T10803] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 214.880622][T10803] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 214.888686][T10803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 214.896739][T10803] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 214.904711][T10803] [ 215.109980][ T30] audit: type=1400 audit(1757734201.444:130): avc: denied { create } for pid=10824 comm="syz.1.4765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 215.648458][T10876] device pim6reg1 entered promiscuous mode [ 216.165524][T10917] device pim6reg1 entered promiscuous mode [ 216.294278][T10926] FAULT_INJECTION: forcing a failure. [ 216.294278][T10926] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.337505][T10926] CPU: 0 PID: 10926 Comm: syz.0.4808 Not tainted syzkaller #0 [ 216.345020][T10926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 216.355190][T10926] Call Trace: [ 216.358482][T10926] [ 216.361429][T10926] __dump_stack+0x21/0x30 [ 216.365779][T10926] dump_stack_lvl+0xee/0x150 [ 216.370383][T10926] ? show_regs_print_info+0x20/0x20 [ 216.375602][T10926] dump_stack+0x15/0x20 [ 216.379779][T10926] should_fail+0x3c1/0x510 [ 216.384217][T10926] should_fail_usercopy+0x1a/0x20 [ 216.389257][T10926] _copy_to_user+0x20/0x90 [ 216.393700][T10926] simple_read_from_buffer+0xe9/0x160 [ 216.399262][T10926] proc_fail_nth_read+0x19a/0x210 [ 216.404339][T10926] ? proc_fault_inject_write+0x2f0/0x2f0 [ 216.409985][T10926] ? security_file_permission+0x83/0xa0 [ 216.415636][T10926] ? proc_fault_inject_write+0x2f0/0x2f0 [ 216.421476][T10926] vfs_read+0x282/0xbe0 [ 216.425871][T10926] ? kernel_read+0x1f0/0x1f0 [ 216.430483][T10926] ? __kasan_check_write+0x14/0x20 [ 216.435715][T10926] ? mutex_lock+0x95/0x1a0 [ 216.440592][T10926] ? wait_for_completion_killable_timeout+0x10/0x10 [ 216.447316][T10926] ? __fget_files+0x2c4/0x320 [ 216.452044][T10926] ? __fdget_pos+0x2d2/0x380 [ 216.456655][T10926] ? ksys_read+0x71/0x240 [ 216.461008][T10926] ksys_read+0x140/0x240 [ 216.465268][T10926] ? vfs_write+0xf70/0xf70 [ 216.469691][T10926] ? debug_smp_processor_id+0x17/0x20 [ 216.475072][T10926] __x64_sys_read+0x7b/0x90 [ 216.479655][T10926] x64_sys_call+0x96d/0x9a0 [ 216.484155][T10926] do_syscall_64+0x4c/0xa0 [ 216.488568][T10926] ? clear_bhb_loop+0x50/0xa0 [ 216.493251][T10926] ? clear_bhb_loop+0x50/0xa0 [ 216.497936][T10926] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 216.503844][T10926] RIP: 0033:0x7f18a78905bc [ 216.508278][T10926] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 216.527971][T10926] RSP: 002b:00007f18a62fa030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 216.536570][T10926] RAX: ffffffffffffffda RBX: 00007f18a7ad8fa0 RCX: 00007f18a78905bc [ 216.544541][T10926] RDX: 000000000000000f RSI: 00007f18a62fa0a0 RDI: 0000000000000008 [ 216.552511][T10926] RBP: 00007f18a62fa090 R08: 0000000000000000 R09: 0000000000000000 [ 216.560639][T10926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.568630][T10926] R13: 00007f18a7ad9038 R14: 00007f18a7ad8fa0 R15: 00007fffa482c758 [ 216.576719][T10926] [ 216.720122][T10941] bond_slave_1: mtu less than device minimum [ 216.797645][T10946] device sit0 entered promiscuous mode [ 216.957368][T10957] syz.4.4822[10957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.957442][T10957] syz.4.4822[10957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.092573][T10961] device syzkaller0 entered promiscuous mode [ 217.201602][T10970] bond_slave_1: mtu less than device minimum [ 217.589429][T10996] FAULT_INJECTION: forcing a failure. [ 217.589429][T10996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.673412][T10996] CPU: 0 PID: 10996 Comm: syz.3.4839 Not tainted syzkaller #0 [ 217.681098][T10996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.691255][T10996] Call Trace: [ 217.694542][T10996] [ 217.697484][T10996] __dump_stack+0x21/0x30 [ 217.701847][T10996] dump_stack_lvl+0xee/0x150 [ 217.706458][T10996] ? show_regs_print_info+0x20/0x20 [ 217.711689][T10996] dump_stack+0x15/0x20 [ 217.715872][T10996] should_fail+0x3c1/0x510 [ 217.720380][T10996] should_fail_usercopy+0x1a/0x20 [ 217.725413][T10996] _copy_to_user+0x20/0x90 [ 217.729871][T10996] simple_read_from_buffer+0xe9/0x160 [ 217.735273][T10996] proc_fail_nth_read+0x19a/0x210 [ 217.740545][T10996] ? proc_fault_inject_write+0x2f0/0x2f0 [ 217.746291][T10996] ? security_file_permission+0x83/0xa0 [ 217.752042][T10996] ? proc_fault_inject_write+0x2f0/0x2f0 [ 217.757853][T10996] vfs_read+0x282/0xbe0 [ 217.762113][T10996] ? kernel_read+0x1f0/0x1f0 [ 217.766724][T10996] ? __kasan_check_write+0x14/0x20 [ 217.771847][T10996] ? mutex_lock+0x95/0x1a0 [ 217.776260][T10996] ? wait_for_completion_killable_timeout+0x10/0x10 [ 217.782935][T10996] ? __fget_files+0x2c4/0x320 [ 217.787630][T10996] ? __fdget_pos+0x2d2/0x380 [ 217.792215][T10996] ? ksys_read+0x71/0x240 [ 217.796548][T10996] ksys_read+0x140/0x240 [ 217.800960][T10996] ? vfs_write+0xf70/0xf70 [ 217.805555][T10996] ? debug_smp_processor_id+0x17/0x20 [ 217.811019][T10996] __x64_sys_read+0x7b/0x90 [ 217.815607][T10996] x64_sys_call+0x96d/0x9a0 [ 217.820103][T10996] do_syscall_64+0x4c/0xa0 [ 217.824523][T10996] ? clear_bhb_loop+0x50/0xa0 [ 217.829210][T10996] ? clear_bhb_loop+0x50/0xa0 [ 217.833972][T10996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.839880][T10996] RIP: 0033:0x7f8b0969c5bc [ 217.844299][T10996] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 217.864608][T10996] RSP: 002b:00007f8b08106030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 217.873024][T10996] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969c5bc [ 217.880990][T10996] RDX: 000000000000000f RSI: 00007f8b081060a0 RDI: 0000000000000007 [ 217.888956][T10996] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 217.896924][T10996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.904899][T10996] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 217.913045][T10996] [ 219.089706][T11059] FAULT_INJECTION: forcing a failure. [ 219.089706][T11059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 219.202456][T11059] CPU: 0 PID: 11059 Comm: syz.4.4862 Not tainted syzkaller #0 [ 219.209977][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 219.220227][T11059] Call Trace: [ 219.223617][T11059] [ 219.226551][T11059] __dump_stack+0x21/0x30 [ 219.230983][T11059] dump_stack_lvl+0xee/0x150 [ 219.235744][T11059] ? show_regs_print_info+0x20/0x20 [ 219.240957][T11059] ? vfs_write+0xc17/0xf70 [ 219.245378][T11059] dump_stack+0x15/0x20 [ 219.249528][T11059] should_fail+0x3c1/0x510 [ 219.254374][T11059] should_fail_usercopy+0x1a/0x20 [ 219.259406][T11059] _copy_from_user+0x20/0xd0 [ 219.264120][T11059] __sys_bpf+0x233/0x730 [ 219.268471][T11059] ? bpf_link_show_fdinfo+0x310/0x310 [ 219.273871][T11059] ? debug_smp_processor_id+0x17/0x20 [ 219.279519][T11059] __x64_sys_bpf+0x7c/0x90 [ 219.284023][T11059] x64_sys_call+0x4b9/0x9a0 [ 219.288609][T11059] do_syscall_64+0x4c/0xa0 [ 219.293047][T11059] ? clear_bhb_loop+0x50/0xa0 [ 219.297728][T11059] ? clear_bhb_loop+0x50/0xa0 [ 219.303031][T11059] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.308941][T11059] RIP: 0033:0x7f28ca69bba9 [ 219.313366][T11059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.333078][T11059] RSP: 002b:00007f28c9104038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.341499][T11059] RAX: ffffffffffffffda RBX: 00007f28ca8e2fa0 RCX: 00007f28ca69bba9 [ 219.349468][T11059] RDX: 0000000000000020 RSI: 0000200000000240 RDI: 0000000000000012 [ 219.357551][T11059] RBP: 00007f28c9104090 R08: 0000000000000000 R09: 0000000000000000 [ 219.365535][T11059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.373680][T11059] R13: 00007f28ca8e3038 R14: 00007f28ca8e2fa0 R15: 00007fff0cb056a8 [ 219.381841][T11059] [ 220.341565][T11100] device syzkaller0 entered promiscuous mode [ 220.558823][T11119] device macsec0 entered promiscuous mode [ 220.727095][T11125] bond_slave_1: mtu less than device minimum [ 221.547022][ T30] audit: type=1400 audit(1757734207.884:131): avc: denied { create } for pid=11164 comm="syz.1.4905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 222.693326][T11229] FAULT_INJECTION: forcing a failure. [ 222.693326][T11229] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.761766][T11229] CPU: 0 PID: 11229 Comm: syz.2.4929 Not tainted syzkaller #0 [ 222.769371][T11229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 222.779445][T11229] Call Trace: [ 222.782736][T11229] [ 222.785675][T11229] __dump_stack+0x21/0x30 [ 222.790031][T11229] dump_stack_lvl+0xee/0x150 [ 222.794636][T11229] ? show_regs_print_info+0x20/0x20 [ 222.799850][T11229] ? vfs_write+0xc17/0xf70 [ 222.804274][T11229] dump_stack+0x15/0x20 [ 222.808439][T11229] should_fail+0x3c1/0x510 [ 222.812871][T11229] should_fail_usercopy+0x1a/0x20 [ 222.817906][T11229] _copy_from_user+0x20/0xd0 [ 222.822506][T11229] __sys_bpf+0x233/0x730 [ 222.826766][T11229] ? bpf_link_show_fdinfo+0x310/0x310 [ 222.832163][T11229] ? debug_smp_processor_id+0x17/0x20 [ 222.837726][T11229] __x64_sys_bpf+0x7c/0x90 [ 222.842324][T11229] x64_sys_call+0x4b9/0x9a0 [ 222.846838][T11229] do_syscall_64+0x4c/0xa0 [ 222.851273][T11229] ? clear_bhb_loop+0x50/0xa0 [ 222.855962][T11229] ? clear_bhb_loop+0x50/0xa0 [ 222.860649][T11229] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 222.866560][T11229] RIP: 0033:0x7f46bf244ba9 [ 222.871003][T11229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.890710][T11229] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.899142][T11229] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 222.907126][T11229] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 222.915122][T11229] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 222.923110][T11229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.931190][T11229] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 222.939179][T11229] [ 222.964758][T11240] FAULT_INJECTION: forcing a failure. [ 222.964758][T11240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.009625][T11240] CPU: 0 PID: 11240 Comm: syz.0.4933 Not tainted syzkaller #0 [ 223.017244][T11240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.027413][T11240] Call Trace: [ 223.030715][T11240] [ 223.033655][T11240] __dump_stack+0x21/0x30 [ 223.038003][T11240] dump_stack_lvl+0xee/0x150 [ 223.042621][T11240] ? show_regs_print_info+0x20/0x20 [ 223.047948][T11240] dump_stack+0x15/0x20 [ 223.052116][T11240] should_fail+0x3c1/0x510 [ 223.056729][T11240] should_fail_usercopy+0x1a/0x20 [ 223.061771][T11240] _copy_from_user+0x20/0xd0 [ 223.066392][T11240] sock_do_ioctl+0x175/0x300 [ 223.071000][T11240] ? sock_show_fdinfo+0xa0/0xa0 [ 223.075862][T11240] ? selinux_file_ioctl+0x377/0x480 [ 223.081160][T11240] sock_ioctl+0x4bc/0x6b0 [ 223.085505][T11240] ? sock_poll+0x3d0/0x3d0 [ 223.089949][T11240] ? __fget_files+0x2c4/0x320 [ 223.094666][T11240] ? security_file_ioctl+0x84/0xa0 [ 223.099806][T11240] ? sock_poll+0x3d0/0x3d0 [ 223.104260][T11240] __se_sys_ioctl+0x121/0x1a0 [ 223.108973][T11240] __x64_sys_ioctl+0x7b/0x90 [ 223.113602][T11240] x64_sys_call+0x2f/0x9a0 [ 223.118051][T11240] do_syscall_64+0x4c/0xa0 [ 223.122481][T11240] ? clear_bhb_loop+0x50/0xa0 [ 223.127165][T11240] ? clear_bhb_loop+0x50/0xa0 [ 223.131865][T11240] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.137775][T11240] RIP: 0033:0x7f18a7891ba9 [ 223.142205][T11240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.162007][T11240] RSP: 002b:00007f18a62fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.170432][T11240] RAX: ffffffffffffffda RBX: 00007f18a7ad8fa0 RCX: 00007f18a7891ba9 [ 223.178403][T11240] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000a [ 223.186371][T11240] RBP: 00007f18a62fa090 R08: 0000000000000000 R09: 0000000000000000 [ 223.194426][T11240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.202394][T11240] R13: 00007f18a7ad9038 R14: 00007f18a7ad8fa0 R15: 00007fffa482c758 [ 223.210371][T11240] [ 223.253461][T11250] FAULT_INJECTION: forcing a failure. [ 223.253461][T11250] name failslab, interval 1, probability 0, space 0, times 1 [ 223.276495][T11250] CPU: 0 PID: 11250 Comm: syz.3.4939 Not tainted syzkaller #0 [ 223.284008][T11250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.294072][T11250] Call Trace: [ 223.297350][T11250] [ 223.300287][T11250] __dump_stack+0x21/0x30 [ 223.304644][T11250] dump_stack_lvl+0xee/0x150 [ 223.309244][T11250] ? show_regs_print_info+0x20/0x20 [ 223.314822][T11250] ? avc_has_perm_noaudit+0x2f4/0x460 [ 223.320209][T11250] dump_stack+0x15/0x20 [ 223.324450][T11250] should_fail+0x3c1/0x510 [ 223.328952][T11250] __should_failslab+0xa4/0xe0 [ 223.333716][T11250] should_failslab+0x9/0x20 [ 223.338223][T11250] slab_pre_alloc_hook+0x3b/0xe0 [ 223.343159][T11250] ? __alloc_skb+0xe0/0x740 [ 223.347748][T11250] kmem_cache_alloc+0x44/0x260 [ 223.352509][T11250] __alloc_skb+0xe0/0x740 [ 223.356856][T11250] alloc_skb_with_frags+0xa8/0x620 [ 223.361967][T11250] sock_alloc_send_pskb+0x853/0x980 [ 223.367264][T11250] ? is_bpf_text_address+0x177/0x190 [ 223.372570][T11250] ? __kernel_text_address+0xa0/0x100 [ 223.377959][T11250] ? sock_kzfree_s+0x60/0x60 [ 223.382551][T11250] ? stack_trace_save+0x98/0xe0 [ 223.387786][T11250] tun_get_user+0x4e6/0x33c0 [ 223.392562][T11250] ? __kasan_unpoison_object_data+0x20/0x20 [ 223.398450][T11250] ? kmem_cache_free+0x100/0x320 [ 223.403384][T11250] ? __x64_sys_openat+0x136/0x160 [ 223.408579][T11250] ? x64_sys_call+0x219/0x9a0 [ 223.413347][T11250] ? tun_do_read+0x1c40/0x1c40 [ 223.418110][T11250] ? kstrtouint_from_user+0x1a0/0x200 [ 223.423479][T11250] ? kstrtol_from_user+0x260/0x260 [ 223.428700][T11250] ? avc_policy_seqno+0x1b/0x70 [ 223.433567][T11250] ? selinux_file_permission+0x2aa/0x510 [ 223.439234][T11250] tun_chr_write_iter+0x1eb/0x2e0 [ 223.444356][T11250] vfs_write+0x802/0xf70 [ 223.448600][T11250] ? file_end_write+0x1b0/0x1b0 [ 223.453446][T11250] ? __fget_files+0x2c4/0x320 [ 223.458124][T11250] ? __fdget_pos+0x1f7/0x380 [ 223.462827][T11250] ? ksys_write+0x71/0x240 [ 223.467249][T11250] ksys_write+0x140/0x240 [ 223.471756][T11250] ? __ia32_sys_read+0x90/0x90 [ 223.476543][T11250] ? debug_smp_processor_id+0x17/0x20 [ 223.481917][T11250] __x64_sys_write+0x7b/0x90 [ 223.486590][T11250] x64_sys_call+0x8ef/0x9a0 [ 223.491115][T11250] do_syscall_64+0x4c/0xa0 [ 223.495714][T11250] ? clear_bhb_loop+0x50/0xa0 [ 223.500426][T11250] ? clear_bhb_loop+0x50/0xa0 [ 223.505201][T11250] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.511100][T11250] RIP: 0033:0x7f8b0969dba9 [ 223.515638][T11250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.535330][T11250] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 223.543756][T11250] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 223.552005][T11250] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 223.559970][T11250] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 223.567938][T11250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.575906][T11250] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 223.584053][T11250] [ 223.671417][T11275] FAULT_INJECTION: forcing a failure. [ 223.671417][T11275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.842429][T11275] CPU: 0 PID: 11275 Comm: syz.1.4948 Not tainted syzkaller #0 [ 223.849942][T11275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.860008][T11275] Call Trace: [ 223.863304][T11275] [ 223.866239][T11275] __dump_stack+0x21/0x30 [ 223.870587][T11275] dump_stack_lvl+0xee/0x150 [ 223.875179][T11275] ? show_regs_print_info+0x20/0x20 [ 223.880397][T11275] ? has_cap_mac_admin+0x330/0x330 [ 223.885604][T11275] dump_stack+0x15/0x20 [ 223.889770][T11275] should_fail+0x3c1/0x510 [ 223.894197][T11275] should_fail_usercopy+0x1a/0x20 [ 223.899318][T11275] _copy_from_user+0x20/0xd0 [ 223.903925][T11275] get_user_ifreq+0x6c/0x180 [ 223.908528][T11275] sock_ioctl+0x605/0x6b0 [ 223.912869][T11275] ? sock_poll+0x3d0/0x3d0 [ 223.917302][T11275] ? security_file_ioctl+0x84/0xa0 [ 223.922436][T11275] ? sock_poll+0x3d0/0x3d0 [ 223.926880][T11275] __se_sys_ioctl+0x121/0x1a0 [ 223.931826][T11275] __x64_sys_ioctl+0x7b/0x90 [ 223.936423][T11275] x64_sys_call+0x2f/0x9a0 [ 223.940936][T11275] do_syscall_64+0x4c/0xa0 [ 223.945360][T11275] ? clear_bhb_loop+0x50/0xa0 [ 223.950307][T11275] ? clear_bhb_loop+0x50/0xa0 [ 223.954986][T11275] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.960907][T11275] RIP: 0033:0x7fb3f8f66ba9 [ 223.965339][T11275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.985042][T11275] RSP: 002b:00007fb3f79cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.993483][T11275] RAX: ffffffffffffffda RBX: 00007fb3f91adfa0 RCX: 00007fb3f8f66ba9 [ 224.001458][T11275] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 224.009439][T11275] RBP: 00007fb3f79cf090 R08: 0000000000000000 R09: 0000000000000000 [ 224.017423][T11275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.025668][T11275] R13: 00007fb3f91ae038 R14: 00007fb3f91adfa0 R15: 00007ffc5f84e0f8 [ 224.034003][T11275] [ 224.069156][T11274] device pim6reg1 entered promiscuous mode [ 225.242637][ T30] audit: type=1400 audit(1757734211.554:132): avc: denied { create } for pid=11319 comm="syz.4.4966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 225.966612][T11324] FAULT_INJECTION: forcing a failure. [ 225.966612][T11324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.059005][T11324] CPU: 1 PID: 11324 Comm: syz.2.4967 Not tainted syzkaller #0 [ 226.066514][T11324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.076577][T11324] Call Trace: [ 226.079855][T11324] [ 226.082789][T11324] __dump_stack+0x21/0x30 [ 226.087124][T11324] dump_stack_lvl+0xee/0x150 [ 226.091721][T11324] ? show_regs_print_info+0x20/0x20 [ 226.097014][T11324] ? vfs_write+0xc17/0xf70 [ 226.101437][T11324] dump_stack+0x15/0x20 [ 226.105604][T11324] should_fail+0x3c1/0x510 [ 226.110021][T11324] should_fail_usercopy+0x1a/0x20 [ 226.115059][T11324] _copy_from_user+0x20/0xd0 [ 226.119742][T11324] __sys_bpf+0x233/0x730 [ 226.124076][T11324] ? bpf_link_show_fdinfo+0x310/0x310 [ 226.129456][T11324] ? debug_smp_processor_id+0x17/0x20 [ 226.135272][T11324] __x64_sys_bpf+0x7c/0x90 [ 226.139778][T11324] x64_sys_call+0x4b9/0x9a0 [ 226.144572][T11324] do_syscall_64+0x4c/0xa0 [ 226.148992][T11324] ? clear_bhb_loop+0x50/0xa0 [ 226.153677][T11324] ? clear_bhb_loop+0x50/0xa0 [ 226.158365][T11324] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.164261][T11324] RIP: 0033:0x7f46bf244ba9 [ 226.168690][T11324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.188484][T11324] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 226.196916][T11324] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 226.204901][T11324] RDX: 0000000000000010 RSI: 0000200000000740 RDI: 0000000000000011 [ 226.212874][T11324] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 226.221051][T11324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.229051][T11324] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 226.237045][T11324] [ 226.416248][T11355] FAULT_INJECTION: forcing a failure. [ 226.416248][T11355] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.475584][T11355] CPU: 0 PID: 11355 Comm: syz.2.4980 Not tainted syzkaller #0 [ 226.483099][T11355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.493367][T11355] Call Trace: [ 226.496660][T11355] [ 226.499602][T11355] __dump_stack+0x21/0x30 [ 226.504088][T11355] dump_stack_lvl+0xee/0x150 [ 226.508793][T11355] ? show_regs_print_info+0x20/0x20 [ 226.514001][T11355] ? vfs_write+0xc17/0xf70 [ 226.518429][T11355] dump_stack+0x15/0x20 [ 226.522590][T11355] should_fail+0x3c1/0x510 [ 226.527022][T11355] should_fail_usercopy+0x1a/0x20 [ 226.532079][T11355] _copy_from_user+0x20/0xd0 [ 226.536731][T11355] __sys_bpf+0x233/0x730 [ 226.540981][T11355] ? bpf_link_show_fdinfo+0x310/0x310 [ 226.546358][T11355] ? bpf_trace_run2+0xb5/0x1b0 [ 226.551131][T11355] ? __bpf_trace_sys_enter+0x62/0x70 [ 226.556426][T11355] __x64_sys_bpf+0x7c/0x90 [ 226.560846][T11355] x64_sys_call+0x4b9/0x9a0 [ 226.565380][T11355] do_syscall_64+0x4c/0xa0 [ 226.570011][T11355] ? clear_bhb_loop+0x50/0xa0 [ 226.574791][T11355] ? clear_bhb_loop+0x50/0xa0 [ 226.579477][T11355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.585468][T11355] RIP: 0033:0x7f46bf244ba9 [ 226.589889][T11355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.609678][T11355] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 226.618099][T11355] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 226.626079][T11355] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 226.634052][T11355] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 226.642031][T11355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.650091][T11355] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 226.658070][T11355] [ 226.822585][T11383] FAULT_INJECTION: forcing a failure. [ 226.822585][T11383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.835919][T11383] CPU: 0 PID: 11383 Comm: syz.3.4992 Not tainted syzkaller #0 [ 226.843411][T11383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.853596][T11383] Call Trace: [ 226.856888][T11383] [ 226.859813][T11383] __dump_stack+0x21/0x30 [ 226.864144][T11383] dump_stack_lvl+0xee/0x150 [ 226.868733][T11383] ? show_regs_print_info+0x20/0x20 [ 226.873938][T11383] ? kstrtouint_from_user+0x1a0/0x200 [ 226.879391][T11383] dump_stack+0x15/0x20 [ 226.883550][T11383] should_fail+0x3c1/0x510 [ 226.887966][T11383] should_fail_usercopy+0x1a/0x20 [ 226.892984][T11383] _copy_from_user+0x20/0xd0 [ 226.897571][T11383] ___sys_recvmsg+0x129/0x4f0 [ 226.902259][T11383] ? proc_fail_nth_read+0x210/0x210 [ 226.907456][T11383] ? __sys_recvmsg+0x250/0x250 [ 226.912218][T11383] ? vfs_write+0xc17/0xf70 [ 226.916631][T11383] ? __fdget+0x1a1/0x230 [ 226.920869][T11383] __x64_sys_recvmsg+0x1df/0x2a0 [ 226.925806][T11383] ? ___sys_recvmsg+0x4f0/0x4f0 [ 226.930737][T11383] ? ksys_write+0x1eb/0x240 [ 226.935320][T11383] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 226.941391][T11383] x64_sys_call+0x705/0x9a0 [ 226.946011][T11383] do_syscall_64+0x4c/0xa0 [ 226.950600][T11383] ? clear_bhb_loop+0x50/0xa0 [ 226.955274][T11383] ? clear_bhb_loop+0x50/0xa0 [ 226.959966][T11383] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.965882][T11383] RIP: 0033:0x7f8b0969dba9 [ 226.970298][T11383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.989899][T11383] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 226.998405][T11383] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 227.006375][T11383] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000005 [ 227.014342][T11383] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 227.022319][T11383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.030370][T11383] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 227.038339][T11383] [ 227.080194][T11367] device veth0_vlan left promiscuous mode [ 227.084359][ T30] audit: type=1400 audit(1757734213.424:133): avc: denied { create } for pid=11381 comm="syz.4.4991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 227.107738][T11367] device veth0_vlan entered promiscuous mode [ 227.110738][T11390] FAULT_INJECTION: forcing a failure. [ 227.110738][T11390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 227.136687][T11390] CPU: 1 PID: 11390 Comm: syz.1.4994 Not tainted syzkaller #0 [ 227.144177][T11390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.154415][T11390] Call Trace: [ 227.157819][T11390] [ 227.160765][T11390] __dump_stack+0x21/0x30 [ 227.165115][T11390] dump_stack_lvl+0xee/0x150 [ 227.169718][T11390] ? show_regs_print_info+0x20/0x20 [ 227.175101][T11390] ? __hrtimer_run_queues+0x97a/0x9e0 [ 227.180500][T11390] dump_stack+0x15/0x20 [ 227.184750][T11390] should_fail+0x3c1/0x510 [ 227.189183][T11390] should_fail_usercopy+0x1a/0x20 [ 227.194225][T11390] _copy_from_user+0x20/0xd0 [ 227.198830][T11390] __sys_bpf+0x233/0x730 [ 227.203089][T11390] ? bpf_link_show_fdinfo+0x310/0x310 [ 227.208480][T11390] __x64_sys_bpf+0x7c/0x90 [ 227.212920][T11390] x64_sys_call+0x4b9/0x9a0 [ 227.217440][T11390] do_syscall_64+0x4c/0xa0 [ 227.221878][T11390] ? clear_bhb_loop+0x50/0xa0 [ 227.226655][T11390] ? clear_bhb_loop+0x50/0xa0 [ 227.231428][T11390] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 227.237331][T11390] RIP: 0033:0x7fb3f8f66ba9 [ 227.241759][T11390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.261475][T11390] RSP: 002b:00007fb3f79cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 227.270001][T11390] RAX: ffffffffffffffda RBX: 00007fb3f91adfa0 RCX: 00007fb3f8f66ba9 [ 227.278075][T11390] RDX: 0000000000000050 RSI: 0000200000000040 RDI: 0000000000000000 [ 227.286071][T11390] RBP: 00007fb3f79cf090 R08: 0000000000000000 R09: 0000000000000000 [ 227.294055][T11390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.302127][T11390] R13: 00007fb3f91ae038 R14: 00007fb3f91adfa0 R15: 00007ffc5f84e0f8 [ 227.310128][T11390] [ 227.353620][T11391] device pim6reg1 entered promiscuous mode [ 227.374014][T11399] FAULT_INJECTION: forcing a failure. [ 227.374014][T11399] name failslab, interval 1, probability 0, space 0, times 0 [ 227.386852][T11399] CPU: 0 PID: 11399 Comm: syz.3.4997 Not tainted syzkaller #0 [ 227.394318][T11399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.404374][T11399] Call Trace: [ 227.407671][T11399] [ 227.410685][T11399] __dump_stack+0x21/0x30 [ 227.415032][T11399] dump_stack_lvl+0xee/0x150 [ 227.419749][T11399] ? show_regs_print_info+0x20/0x20 [ 227.424974][T11399] ? do_sys_openat2+0x6a7/0x7b0 [ 227.429848][T11399] ? x64_sys_call+0x219/0x9a0 [ 227.434529][T11399] dump_stack+0x15/0x20 [ 227.438694][T11399] should_fail+0x3c1/0x510 [ 227.443109][T11399] __should_failslab+0xa4/0xe0 [ 227.447870][T11399] should_failslab+0x9/0x20 [ 227.452368][T11399] slab_pre_alloc_hook+0x3b/0xe0 [ 227.457342][T11399] ? __sigqueue_alloc+0x137/0x210 [ 227.462368][T11399] kmem_cache_alloc+0x44/0x260 [ 227.467219][T11399] __sigqueue_alloc+0x137/0x210 [ 227.472065][T11399] __send_signal+0x212/0xc30 [ 227.476712][T11399] send_signal+0x422/0x580 [ 227.481130][T11399] force_sig_info_to_task+0x31c/0x3f0 [ 227.486504][T11399] force_sig+0xb7/0x100 [ 227.490741][T11399] ? send_sig+0x70/0x70 [ 227.494910][T11399] ? show_signal+0x1b0/0x1b0 [ 227.499802][T11399] ? ksys_write+0x1eb/0x240 [ 227.504411][T11399] ? __ia32_sys_read+0x90/0x90 [ 227.509182][T11399] exc_general_protection+0xee/0x270 [ 227.514468][T11399] ? debug_smp_processor_id+0x17/0x20 [ 227.519841][T11399] ? do_syscall_64+0x58/0xa0 [ 227.524432][T11399] asm_exc_general_protection+0x27/0x30 [ 227.529982][T11399] RIP: 0033:0x7f8b096766f9 [ 227.534392][T11399] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 227.554104][T11399] RSP: 002b:00007f8b081057c8 EFLAGS: 00010283 [ 227.560255][T11399] RAX: 0000000000000999 RBX: 00007f8b08105d30 RCX: 00007f8b098a7120 [ 227.568312][T11399] RDX: 9999999999999999 RSI: 00007f8b09720b31 RDI: 9999999999999999 [ 227.576281][T11399] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 227.584422][T11399] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 227.592388][T11399] R13: 00007f8b08105eb0 R14: 9999999999999999 R15: 0000000000000000 [ 227.600363][T11399] [ 227.728200][T11413] FAULT_INJECTION: forcing a failure. [ 227.728200][T11413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 227.744462][T11413] CPU: 1 PID: 11413 Comm: syz.0.5002 Not tainted syzkaller #0 [ 227.751985][T11413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.762130][T11413] Call Trace: [ 227.765503][T11413] [ 227.768459][T11413] __dump_stack+0x21/0x30 [ 227.772794][T11413] dump_stack_lvl+0xee/0x150 [ 227.777384][T11413] ? show_regs_print_info+0x20/0x20 [ 227.782596][T11413] ? __kasan_check_write+0x14/0x20 [ 227.787714][T11413] ? proc_fail_nth_write+0x17a/0x1f0 [ 227.793086][T11413] ? proc_fail_nth_read+0x210/0x210 [ 227.798302][T11413] dump_stack+0x15/0x20 [ 227.802454][T11413] should_fail+0x3c1/0x510 [ 227.806879][T11413] should_fail_usercopy+0x1a/0x20 [ 227.811902][T11413] _copy_from_user+0x20/0xd0 [ 227.816494][T11413] perf_copy_attr+0x154/0x870 [ 227.821176][T11413] __se_sys_perf_event_open+0xcb/0x1b80 [ 227.826807][T11413] ? __kasan_check_write+0x14/0x20 [ 227.831931][T11413] ? mutex_unlock+0x89/0x220 [ 227.836518][T11413] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 227.842158][T11413] ? __ia32_sys_read+0x90/0x90 [ 227.846917][T11413] __x64_sys_perf_event_open+0xbf/0xd0 [ 227.852377][T11413] x64_sys_call+0x50d/0x9a0 [ 227.856878][T11413] do_syscall_64+0x4c/0xa0 [ 227.861378][T11413] ? clear_bhb_loop+0x50/0xa0 [ 227.866053][T11413] ? clear_bhb_loop+0x50/0xa0 [ 227.870726][T11413] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 227.876619][T11413] RIP: 0033:0x7f18a7891ba9 [ 227.881115][T11413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.900805][T11413] RSP: 002b:00007f18a62fa038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 227.909221][T11413] RAX: ffffffffffffffda RBX: 00007f18a7ad8fa0 RCX: 00007f18a7891ba9 [ 227.917386][T11413] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000100 [ 227.925531][T11413] RBP: 00007f18a62fa090 R08: 0000000000000000 R09: 0000000000000000 [ 227.933563][T11413] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 227.941548][T11413] R13: 00007f18a7ad9038 R14: 00007f18a7ad8fa0 R15: 00007fffa482c758 [ 227.949518][T11413] [ 228.355047][T11433] FAULT_INJECTION: forcing a failure. [ 228.355047][T11433] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.393837][T11433] CPU: 1 PID: 11433 Comm: syz.2.5010 Not tainted syzkaller #0 [ 228.401435][T11433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 228.411585][T11433] Call Trace: [ 228.414974][T11433] [ 228.417999][T11433] __dump_stack+0x21/0x30 [ 228.422566][T11433] dump_stack_lvl+0xee/0x150 [ 228.427186][T11433] ? show_regs_print_info+0x20/0x20 [ 228.432408][T11433] dump_stack+0x15/0x20 [ 228.436595][T11433] should_fail+0x3c1/0x510 [ 228.441025][T11433] should_fail_usercopy+0x1a/0x20 [ 228.446162][T11433] _copy_from_user+0x20/0xd0 [ 228.450768][T11433] sock_do_ioctl+0x175/0x300 [ 228.455374][T11433] ? sock_show_fdinfo+0xa0/0xa0 [ 228.460767][T11433] ? selinux_file_ioctl+0x377/0x480 [ 228.466091][T11433] sock_ioctl+0x4bc/0x6b0 [ 228.470434][T11433] ? sock_poll+0x3d0/0x3d0 [ 228.474855][T11433] ? __fget_files+0x2c4/0x320 [ 228.479544][T11433] ? security_file_ioctl+0x84/0xa0 [ 228.484845][T11433] ? sock_poll+0x3d0/0x3d0 [ 228.489267][T11433] __se_sys_ioctl+0x121/0x1a0 [ 228.493952][T11433] __x64_sys_ioctl+0x7b/0x90 [ 228.498555][T11433] x64_sys_call+0x2f/0x9a0 [ 228.502978][T11433] do_syscall_64+0x4c/0xa0 [ 228.507492][T11433] ? clear_bhb_loop+0x50/0xa0 [ 228.512181][T11433] ? clear_bhb_loop+0x50/0xa0 [ 228.516865][T11433] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 228.522767][T11433] RIP: 0033:0x7f46bf244ba9 [ 228.527202][T11433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.546822][T11433] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 228.555256][T11433] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 228.563329][T11433] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 228.571396][T11433] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 228.579383][T11433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.587365][T11433] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 228.595558][T11433] [ 228.661743][T11434] device syzkaller0 entered promiscuous mode [ 228.726490][T11437] device pim6reg1 entered promiscuous mode [ 228.815197][T11443] device syzkaller0 entered promiscuous mode [ 229.340345][T11458] FAULT_INJECTION: forcing a failure. [ 229.340345][T11458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.377296][T11458] CPU: 0 PID: 11458 Comm: syz.2.5020 Not tainted syzkaller #0 [ 229.384967][T11458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 229.395027][T11458] Call Trace: [ 229.398319][T11458] [ 229.401265][T11458] __dump_stack+0x21/0x30 [ 229.405606][T11458] dump_stack_lvl+0xee/0x150 [ 229.410202][T11458] ? show_regs_print_info+0x20/0x20 [ 229.415406][T11458] ? vfs_write+0xc17/0xf70 [ 229.419916][T11458] dump_stack+0x15/0x20 [ 229.424088][T11458] should_fail+0x3c1/0x510 [ 229.428640][T11458] should_fail_usercopy+0x1a/0x20 [ 229.433760][T11458] _copy_from_user+0x20/0xd0 [ 229.438363][T11458] __sys_bpf+0x233/0x730 [ 229.442637][T11458] ? bpf_link_show_fdinfo+0x310/0x310 [ 229.448015][T11458] ? debug_smp_processor_id+0x17/0x20 [ 229.459131][T11458] __x64_sys_bpf+0x7c/0x90 [ 229.463553][T11458] x64_sys_call+0x4b9/0x9a0 [ 229.468063][T11458] do_syscall_64+0x4c/0xa0 [ 229.472500][T11458] ? clear_bhb_loop+0x50/0xa0 [ 229.477186][T11458] ? clear_bhb_loop+0x50/0xa0 [ 229.481877][T11458] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.487780][T11458] RIP: 0033:0x7f46bf244ba9 [ 229.492203][T11458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.512562][T11458] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 229.521186][T11458] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 229.529172][T11458] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 229.537185][T11458] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 229.545160][T11458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.553147][T11458] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 229.561233][T11458] [ 230.312594][T11502] device pim6reg1 entered promiscuous mode [ 230.326526][T11504] FAULT_INJECTION: forcing a failure. [ 230.326526][T11504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.403711][T11504] CPU: 1 PID: 11504 Comm: syz.4.5037 Not tainted syzkaller #0 [ 230.411409][T11504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 230.421484][T11504] Call Trace: [ 230.424866][T11504] [ 230.427805][T11504] __dump_stack+0x21/0x30 [ 230.432259][T11504] dump_stack_lvl+0xee/0x150 [ 230.436952][T11504] ? show_regs_print_info+0x20/0x20 [ 230.442358][T11504] ? vfs_write+0xc17/0xf70 [ 230.446829][T11504] dump_stack+0x15/0x20 [ 230.451054][T11504] should_fail+0x3c1/0x510 [ 230.455483][T11504] should_fail_usercopy+0x1a/0x20 [ 230.460529][T11504] _copy_from_user+0x20/0xd0 [ 230.465148][T11504] __sys_bpf+0x233/0x730 [ 230.469546][T11504] ? bpf_link_show_fdinfo+0x310/0x310 [ 230.475118][T11504] ? debug_smp_processor_id+0x17/0x20 [ 230.480542][T11504] __x64_sys_bpf+0x7c/0x90 [ 230.485090][T11504] x64_sys_call+0x4b9/0x9a0 [ 230.489613][T11504] do_syscall_64+0x4c/0xa0 [ 230.494056][T11504] ? clear_bhb_loop+0x50/0xa0 [ 230.498770][T11504] ? clear_bhb_loop+0x50/0xa0 [ 230.503469][T11504] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 230.509373][T11504] RIP: 0033:0x7f28ca69bba9 [ 230.513805][T11504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.533630][T11504] RSP: 002b:00007f28c9104038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 230.542079][T11504] RAX: ffffffffffffffda RBX: 00007f28ca8e2fa0 RCX: 00007f28ca69bba9 [ 230.550062][T11504] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 230.558135][T11504] RBP: 00007f28c9104090 R08: 0000000000000000 R09: 0000000000000000 [ 230.566108][T11504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.574079][T11504] R13: 00007f28ca8e3038 R14: 00007f28ca8e2fa0 R15: 00007fff0cb056a8 [ 230.582317][T11504] [ 230.659752][T11516] FAULT_INJECTION: forcing a failure. [ 230.659752][T11516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.673532][T11516] CPU: 1 PID: 11516 Comm: syz.4.5042 Not tainted syzkaller #0 [ 230.681017][T11516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 230.691091][T11516] Call Trace: [ 230.694381][T11516] [ 230.697330][T11516] __dump_stack+0x21/0x30 [ 230.701677][T11516] dump_stack_lvl+0xee/0x150 [ 230.706270][T11516] ? show_regs_print_info+0x20/0x20 [ 230.711477][T11516] dump_stack+0x15/0x20 [ 230.715633][T11516] should_fail+0x3c1/0x510 [ 230.720057][T11516] should_fail_usercopy+0x1a/0x20 [ 230.725083][T11516] _copy_from_user+0x20/0xd0 [ 230.729770][T11516] sock_do_ioctl+0x175/0x300 [ 230.734449][T11516] ? sock_show_fdinfo+0xa0/0xa0 [ 230.739331][T11516] ? selinux_file_ioctl+0x377/0x480 [ 230.744530][T11516] sock_ioctl+0x4bc/0x6b0 [ 230.748860][T11516] ? sock_poll+0x3d0/0x3d0 [ 230.753286][T11516] ? __fget_files+0x2c4/0x320 [ 230.757965][T11516] ? security_file_ioctl+0x84/0xa0 [ 230.763074][T11516] ? sock_poll+0x3d0/0x3d0 [ 230.767663][T11516] __se_sys_ioctl+0x121/0x1a0 [ 230.772349][T11516] __x64_sys_ioctl+0x7b/0x90 [ 230.776938][T11516] x64_sys_call+0x2f/0x9a0 [ 230.781351][T11516] do_syscall_64+0x4c/0xa0 [ 230.785793][T11516] ? clear_bhb_loop+0x50/0xa0 [ 230.790643][T11516] ? clear_bhb_loop+0x50/0xa0 [ 230.795317][T11516] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 230.801210][T11516] RIP: 0033:0x7f28ca69bba9 [ 230.805688][T11516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.825389][T11516] RSP: 002b:00007f28c9104038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 230.833802][T11516] RAX: ffffffffffffffda RBX: 00007f28ca8e2fa0 RCX: 00007f28ca69bba9 [ 230.841782][T11516] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000a [ 230.849767][T11516] RBP: 00007f28c9104090 R08: 0000000000000000 R09: 0000000000000000 [ 230.857744][T11516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.865808][T11516] R13: 00007f28ca8e3038 R14: 00007f28ca8e2fa0 R15: 00007fff0cb056a8 [ 230.873783][T11516] [ 231.451730][T11542] device pim6reg1 entered promiscuous mode [ 231.695742][T11553] FAULT_INJECTION: forcing a failure. [ 231.695742][T11553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 231.719307][T11553] CPU: 1 PID: 11553 Comm: syz.3.5057 Not tainted syzkaller #0 [ 231.727003][T11553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 231.737077][T11553] Call Trace: [ 231.740370][T11553] [ 231.743699][T11553] __dump_stack+0x21/0x30 [ 231.748056][T11553] dump_stack_lvl+0xee/0x150 [ 231.752647][T11553] ? show_regs_print_info+0x20/0x20 [ 231.757852][T11553] dump_stack+0x15/0x20 [ 231.762001][T11553] should_fail+0x3c1/0x510 [ 231.766511][T11553] should_fail_usercopy+0x1a/0x20 [ 231.771560][T11553] _copy_from_user+0x20/0xd0 [ 231.776150][T11553] sock_do_ioctl+0x175/0x300 [ 231.780741][T11553] ? sock_show_fdinfo+0xa0/0xa0 [ 231.785614][T11553] ? selinux_file_ioctl+0x377/0x480 [ 231.790819][T11553] sock_ioctl+0x4bc/0x6b0 [ 231.795147][T11553] ? sock_poll+0x3d0/0x3d0 [ 231.799606][T11553] ? __fget_files+0x2c4/0x320 [ 231.804297][T11553] ? security_file_ioctl+0x84/0xa0 [ 231.809408][T11553] ? sock_poll+0x3d0/0x3d0 [ 231.813910][T11553] __se_sys_ioctl+0x121/0x1a0 [ 231.818585][T11553] __x64_sys_ioctl+0x7b/0x90 [ 231.823178][T11553] x64_sys_call+0x2f/0x9a0 [ 231.827686][T11553] do_syscall_64+0x4c/0xa0 [ 231.832133][T11553] ? clear_bhb_loop+0x50/0xa0 [ 231.836816][T11553] ? clear_bhb_loop+0x50/0xa0 [ 231.841494][T11553] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.847469][T11553] RIP: 0033:0x7f8b0969dba9 [ 231.851879][T11553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.871662][T11553] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 231.880077][T11553] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 231.888132][T11553] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 0000000000000005 [ 231.896104][T11553] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 231.904073][T11553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.912046][T11553] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 231.920511][T11553] [ 232.794762][T11578] device pim6reg1 entered promiscuous mode [ 233.122481][T11594] FAULT_INJECTION: forcing a failure. [ 233.122481][T11594] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 233.182403][T11594] CPU: 0 PID: 11594 Comm: syz.3.5072 Not tainted syzkaller #0 [ 233.189912][T11594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 233.200079][T11594] Call Trace: [ 233.203366][T11594] [ 233.206299][T11594] __dump_stack+0x21/0x30 [ 233.210643][T11594] dump_stack_lvl+0xee/0x150 [ 233.215334][T11594] ? show_regs_print_info+0x20/0x20 [ 233.220563][T11594] ? path_openat+0xfcf/0x2f10 [ 233.225251][T11594] ? do_sys_openat2+0x14c/0x7b0 [ 233.230109][T11594] ? __x64_sys_openat+0x136/0x160 [ 233.235233][T11594] ? x64_sys_call+0x219/0x9a0 [ 233.240124][T11594] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 233.246223][T11594] dump_stack+0x15/0x20 [ 233.250400][T11594] should_fail+0x3c1/0x510 [ 233.254839][T11594] should_fail_alloc_page+0x55/0x80 [ 233.260305][T11594] prepare_alloc_pages+0x156/0x600 [ 233.265554][T11594] ? __alloc_pages_bulk+0xab0/0xab0 [ 233.270765][T11594] __alloc_pages+0x10a/0x440 [ 233.275362][T11594] ? prep_new_page+0x110/0x110 [ 233.280222][T11594] handle_pte_fault+0xe89/0x2680 [ 233.285166][T11594] ? fault_around_bytes_set+0xc0/0xc0 [ 233.290544][T11594] do_handle_mm_fault+0x1a6d/0x1d50 [ 233.295766][T11594] ? kasan_set_track+0x5b/0x70 [ 233.300535][T11594] ? numa_migrate_prep+0xd0/0xd0 [ 233.305508][T11594] ? __kasan_slab_free+0x11/0x20 [ 233.310457][T11594] ? vmacache_update+0xb7/0x120 [ 233.315319][T11594] ? __find_vma+0x13b/0x150 [ 233.319829][T11594] do_user_addr_fault+0x841/0x1180 [ 233.325155][T11594] ? do_kern_addr_fault+0x80/0x80 [ 233.330212][T11594] ? proc_fail_nth_write+0x17a/0x1f0 [ 233.335517][T11594] ? replace_fd+0x160/0x160 [ 233.340046][T11594] ? __kasan_check_write+0x14/0x20 [ 233.345354][T11594] ? _raw_spin_lock+0x8e/0xe0 [ 233.350145][T11594] ? _raw_spin_trylock_bh+0x130/0x130 [ 233.355539][T11594] ? _find_next_bit+0x106/0x200 [ 233.360841][T11594] exc_page_fault+0x51/0xb0 [ 233.365359][T11594] asm_exc_page_fault+0x27/0x30 [ 233.370219][T11594] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 233.375952][T11594] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 233.395649][T11594] RSP: 0018:ffffc90000af7e60 EFLAGS: 00050297 [ 233.401822][T11594] RAX: 0000000000000008 RBX: 00007fffffffeffd RCX: 00002000000010c0 [ 233.409802][T11594] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000000 [ 233.417790][T11594] RBP: ffffc90000af7ec8 R08: dffffc0000000000 R09: ffffed1021d9d115 [ 233.425781][T11594] R10: ffffed1021d9d115 R11: 1ffff11021d9d114 R12: 0000000000000002 [ 233.434021][T11594] R13: 00002000000010c0 R14: 0000000000000008 R15: 0000000000000000 [ 233.442180][T11594] ? __sys_socketpair+0xac/0x590 [ 233.447143][T11594] __x64_sys_socketpair+0x9b/0xb0 [ 233.452173][T11594] x64_sys_call+0x36/0x9a0 [ 233.456598][T11594] do_syscall_64+0x4c/0xa0 [ 233.461017][T11594] ? clear_bhb_loop+0x50/0xa0 [ 233.465700][T11594] ? clear_bhb_loop+0x50/0xa0 [ 233.470389][T11594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 233.476286][T11594] RIP: 0033:0x7f8b0969dba9 [ 233.480707][T11594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.500326][T11594] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 233.508750][T11594] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 233.516733][T11594] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 233.524708][T11594] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 233.532701][T11594] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 233.540728][T11594] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 233.548998][T11594] [ 233.601161][ T30] audit: type=1400 audit(1757734219.934:134): avc: denied { create } for pid=11597 comm="syz.2.5073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 233.762168][T11609] device pim6reg1 entered promiscuous mode [ 233.784724][T11614] device pim6reg1 entered promiscuous mode [ 233.804641][T11623] bond_slave_1: mtu less than device minimum [ 234.114649][T11634] bond_slave_1: mtu less than device minimum [ 234.246177][T11642] FAULT_INJECTION: forcing a failure. [ 234.246177][T11642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.292240][T11642] CPU: 0 PID: 11642 Comm: syz.4.5091 Not tainted syzkaller #0 [ 234.299757][T11642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 234.309818][T11642] Call Trace: [ 234.313132][T11642] [ 234.316070][T11642] __dump_stack+0x21/0x30 [ 234.320412][T11642] dump_stack_lvl+0xee/0x150 [ 234.325093][T11642] ? show_regs_print_info+0x20/0x20 [ 234.330292][T11642] dump_stack+0x15/0x20 [ 234.334440][T11642] should_fail+0x3c1/0x510 [ 234.338854][T11642] should_fail_usercopy+0x1a/0x20 [ 234.343873][T11642] _copy_from_user+0x20/0xd0 [ 234.348471][T11642] sock_do_ioctl+0x175/0x300 [ 234.353055][T11642] ? sock_show_fdinfo+0xa0/0xa0 [ 234.357901][T11642] ? selinux_file_ioctl+0x377/0x480 [ 234.363109][T11642] sock_ioctl+0x4bc/0x6b0 [ 234.367501][T11642] ? sock_poll+0x3d0/0x3d0 [ 234.371914][T11642] ? __fget_files+0x2c4/0x320 [ 234.376591][T11642] ? security_file_ioctl+0x84/0xa0 [ 234.381697][T11642] ? sock_poll+0x3d0/0x3d0 [ 234.386113][T11642] __se_sys_ioctl+0x121/0x1a0 [ 234.390788][T11642] __x64_sys_ioctl+0x7b/0x90 [ 234.395487][T11642] x64_sys_call+0x2f/0x9a0 [ 234.399901][T11642] do_syscall_64+0x4c/0xa0 [ 234.404315][T11642] ? clear_bhb_loop+0x50/0xa0 [ 234.408990][T11642] ? clear_bhb_loop+0x50/0xa0 [ 234.413674][T11642] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.419660][T11642] RIP: 0033:0x7f28ca69bba9 [ 234.424091][T11642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.443834][T11642] RSP: 002b:00007f28c9104038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 234.452260][T11642] RAX: ffffffffffffffda RBX: 00007f28ca8e2fa0 RCX: 00007f28ca69bba9 [ 234.460245][T11642] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 234.468213][T11642] RBP: 00007f28c9104090 R08: 0000000000000000 R09: 0000000000000000 [ 234.476176][T11642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.484157][T11642] R13: 00007f28ca8e3038 R14: 00007f28ca8e2fa0 R15: 00007fff0cb056a8 [ 234.492144][T11642] [ 234.594883][T11653] bond_slave_1: mtu less than device minimum [ 234.675457][T11663] FAULT_INJECTION: forcing a failure. [ 234.675457][T11663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.690073][T11668] device pim6reg1 entered promiscuous mode [ 234.700809][T11663] CPU: 0 PID: 11663 Comm: syz.3.5100 Not tainted syzkaller #0 [ 234.708303][T11663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 234.712600][T11669] bond_slave_1: mtu less than device minimum [ 234.718360][T11663] Call Trace: [ 234.718371][T11663] [ 234.718378][T11663] __dump_stack+0x21/0x30 [ 234.735150][T11663] dump_stack_lvl+0xee/0x150 [ 234.739748][T11663] ? show_regs_print_info+0x20/0x20 [ 234.745056][T11663] ? vfs_write+0xc17/0xf70 [ 234.749502][T11663] dump_stack+0x15/0x20 [ 234.753684][T11663] should_fail+0x3c1/0x510 [ 234.758099][T11663] should_fail_usercopy+0x1a/0x20 [ 234.763118][T11663] _copy_from_user+0x20/0xd0 [ 234.767707][T11663] __sys_bpf+0x233/0x730 [ 234.771944][T11663] ? bpf_link_show_fdinfo+0x310/0x310 [ 234.777313][T11663] ? debug_smp_processor_id+0x17/0x20 [ 234.782708][T11663] __x64_sys_bpf+0x7c/0x90 [ 234.787120][T11663] x64_sys_call+0x4b9/0x9a0 [ 234.791616][T11663] do_syscall_64+0x4c/0xa0 [ 234.796028][T11663] ? clear_bhb_loop+0x50/0xa0 [ 234.800708][T11663] ? clear_bhb_loop+0x50/0xa0 [ 234.805395][T11663] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.811413][T11663] RIP: 0033:0x7f8b0969dba9 [ 234.815959][T11663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.835651][T11663] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 234.844065][T11663] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 234.852145][T11663] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 234.860112][T11663] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 234.868080][T11663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.876049][T11663] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 234.884020][T11663] [ 236.016568][T11708] device pim6reg1 entered promiscuous mode [ 236.240849][T11729] device veth0_vlan left promiscuous mode [ 236.282225][T11729] device veth0_vlan entered promiscuous mode [ 236.524613][T11737] FAULT_INJECTION: forcing a failure. [ 236.524613][T11737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 236.537905][T11737] CPU: 1 PID: 11737 Comm: syz.1.5130 Not tainted syzkaller #0 [ 236.545515][T11737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 236.555589][T11737] Call Trace: [ 236.558886][T11737] [ 236.561832][T11737] __dump_stack+0x21/0x30 [ 236.566180][T11737] dump_stack_lvl+0xee/0x150 [ 236.570779][T11737] ? show_regs_print_info+0x20/0x20 [ 236.576005][T11737] ? __activate_page+0xd40/0xd40 [ 236.580954][T11737] dump_stack+0x15/0x20 [ 236.585132][T11737] should_fail+0x3c1/0x510 [ 236.589568][T11737] should_fail_usercopy+0x1a/0x20 [ 236.594602][T11737] copy_page_from_iter_atomic+0x3fb/0x1350 [ 236.600440][T11737] ? pipe_zero+0x370/0x370 [ 236.604878][T11737] generic_perform_write+0x307/0x670 [ 236.610180][T11737] ? grab_cache_page_write_begin+0xb0/0xb0 [ 236.616005][T11737] ? file_remove_privs+0x590/0x590 [ 236.621217][T11737] ? rwsem_write_trylock+0x130/0x300 [ 236.626514][T11737] ? clear_nonspinnable+0x60/0x60 [ 236.631549][T11737] ? avc_policy_seqno+0x1b/0x70 [ 236.636413][T11737] __generic_file_write_iter+0x268/0x480 [ 236.642142][T11737] generic_file_write_iter+0xa9/0x1d0 [ 236.647708][T11737] vfs_write+0x802/0xf70 [ 236.651961][T11737] ? file_end_write+0x1b0/0x1b0 [ 236.656825][T11737] ? wait_for_completion_killable_timeout+0x10/0x10 [ 236.663519][T11737] ? __fget_files+0x2c4/0x320 [ 236.668313][T11737] ? __fdget_pos+0x2d2/0x380 [ 236.672912][T11737] ? ksys_write+0x71/0x240 [ 236.677334][T11737] ksys_write+0x140/0x240 [ 236.681778][T11737] ? __ia32_sys_read+0x90/0x90 [ 236.686548][T11737] ? debug_smp_processor_id+0x17/0x20 [ 236.691938][T11737] __x64_sys_write+0x7b/0x90 [ 236.696535][T11737] x64_sys_call+0x8ef/0x9a0 [ 236.701155][T11737] do_syscall_64+0x4c/0xa0 [ 236.705581][T11737] ? clear_bhb_loop+0x50/0xa0 [ 236.710270][T11737] ? clear_bhb_loop+0x50/0xa0 [ 236.714952][T11737] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 236.720862][T11737] RIP: 0033:0x7fb3f8f66ba9 [ 236.725290][T11737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 236.744922][T11737] RSP: 002b:00007fb3f79cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 236.753580][T11737] RAX: ffffffffffffffda RBX: 00007fb3f91adfa0 RCX: 00007fb3f8f66ba9 [ 236.761566][T11737] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 236.769530][T11737] RBP: 00007fb3f79cf090 R08: 0000000000000000 R09: 0000000000000000 [ 236.777491][T11737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 236.785452][T11737] R13: 00007fb3f91ae038 R14: 00007fb3f91adfa0 R15: 00007ffc5f84e0f8 [ 236.793439][T11737] [ 236.938712][T11747] device pim6reg1 entered promiscuous mode [ 237.156540][T11775] FAULT_INJECTION: forcing a failure. [ 237.156540][T11775] name failslab, interval 1, probability 0, space 0, times 0 [ 237.169173][T11775] CPU: 1 PID: 11775 Comm: syz.1.5148 Not tainted syzkaller #0 [ 237.176840][T11775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 237.186914][T11775] Call Trace: [ 237.190293][T11775] [ 237.193230][T11775] __dump_stack+0x21/0x30 [ 237.197659][T11775] dump_stack_lvl+0xee/0x150 [ 237.202260][T11775] ? show_regs_print_info+0x20/0x20 [ 237.207470][T11775] ? do_sys_openat2+0x6a7/0x7b0 [ 237.212328][T11775] ? x64_sys_call+0x219/0x9a0 [ 237.217102][T11775] dump_stack+0x15/0x20 [ 237.221268][T11775] should_fail+0x3c1/0x510 [ 237.225697][T11775] __should_failslab+0xa4/0xe0 [ 237.230565][T11775] should_failslab+0x9/0x20 [ 237.235187][T11775] slab_pre_alloc_hook+0x3b/0xe0 [ 237.240236][T11775] ? __sigqueue_alloc+0x137/0x210 [ 237.245383][T11775] kmem_cache_alloc+0x44/0x260 [ 237.250542][T11775] __sigqueue_alloc+0x137/0x210 [ 237.255497][T11775] __send_signal+0x212/0xc30 [ 237.260101][T11775] send_signal+0x422/0x580 [ 237.264709][T11775] force_sig_info_to_task+0x31c/0x3f0 [ 237.270283][T11775] force_sig+0xb7/0x100 [ 237.274452][T11775] ? send_sig+0x70/0x70 [ 237.278623][T11775] ? show_signal+0x1b0/0x1b0 [ 237.283310][T11775] ? ksys_write+0x1eb/0x240 [ 237.287850][T11775] ? __ia32_sys_read+0x90/0x90 [ 237.292622][T11775] exc_general_protection+0xee/0x270 [ 237.297919][T11775] ? debug_smp_processor_id+0x17/0x20 [ 237.303308][T11775] ? do_syscall_64+0x58/0xa0 [ 237.307920][T11775] asm_exc_general_protection+0x27/0x30 [ 237.313739][T11775] RIP: 0033:0x7fb3f8f3f6f9 [ 237.318169][T11775] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 237.338171][T11775] RSP: 002b:00007fb3f79ce7c8 EFLAGS: 00010283 [ 237.344345][T11775] RAX: 0000000000000999 RBX: 00007fb3f79ced30 RCX: 00007fb3f9170120 [ 237.352352][T11775] RDX: 9999999999999999 RSI: 00007fb3f8fe9b31 RDI: 9999999999999999 [ 237.360335][T11775] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 237.368316][T11775] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 237.376303][T11775] R13: 00007fb3f79ceeb0 R14: 9999999999999999 R15: 0000000000000000 [ 237.384382][T11775] [ 237.555075][T11792] device pim6reg1 entered promiscuous mode [ 237.823472][T11820] FAULT_INJECTION: forcing a failure. [ 237.823472][T11820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 237.857574][T11820] CPU: 0 PID: 11820 Comm: syz.2.5166 Not tainted syzkaller #0 [ 237.865121][T11820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 237.876009][T11820] Call Trace: [ 237.879573][T11820] [ 237.882579][T11820] __dump_stack+0x21/0x30 [ 237.886953][T11820] dump_stack_lvl+0xee/0x150 [ 237.891861][T11820] ? show_regs_print_info+0x20/0x20 [ 237.897368][T11820] ? vfs_write+0xc17/0xf70 [ 237.901926][T11820] dump_stack+0x15/0x20 [ 237.906115][T11820] should_fail+0x3c1/0x510 [ 237.910690][T11820] should_fail_usercopy+0x1a/0x20 [ 237.915744][T11820] _copy_from_user+0x20/0xd0 [ 237.920351][T11820] __sys_bpf+0x233/0x730 [ 237.924599][T11820] ? bpf_link_show_fdinfo+0x310/0x310 [ 237.930103][T11820] ? debug_smp_processor_id+0x17/0x20 [ 237.935614][T11820] __x64_sys_bpf+0x7c/0x90 [ 237.940064][T11820] x64_sys_call+0x4b9/0x9a0 [ 237.944611][T11820] do_syscall_64+0x4c/0xa0 [ 237.949035][T11820] ? clear_bhb_loop+0x50/0xa0 [ 237.953719][T11820] ? clear_bhb_loop+0x50/0xa0 [ 237.958482][T11820] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 237.964463][T11820] RIP: 0033:0x7f46bf244ba9 [ 237.968877][T11820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.988658][T11820] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 237.997365][T11820] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 238.005426][T11820] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000001 [ 238.013584][T11820] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 238.021573][T11820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.029546][T11820] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 238.037523][T11820] [ 238.078941][T11834] FAULT_INJECTION: forcing a failure. [ 238.078941][T11834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.117859][T11834] CPU: 1 PID: 11834 Comm: syz.2.5171 Not tainted syzkaller #0 [ 238.125368][T11834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 238.135475][T11834] Call Trace: [ 238.138755][T11834] [ 238.141692][T11834] __dump_stack+0x21/0x30 [ 238.146034][T11834] dump_stack_lvl+0xee/0x150 [ 238.150651][T11834] ? show_regs_print_info+0x20/0x20 [ 238.155850][T11834] ? has_cap_mac_admin+0x330/0x330 [ 238.160971][T11834] dump_stack+0x15/0x20 [ 238.165121][T11834] should_fail+0x3c1/0x510 [ 238.169533][T11834] should_fail_usercopy+0x1a/0x20 [ 238.174549][T11834] _copy_from_user+0x20/0xd0 [ 238.179136][T11834] get_user_ifreq+0x6c/0x180 [ 238.183724][T11834] sock_ioctl+0x605/0x6b0 [ 238.188047][T11834] ? sock_poll+0x3d0/0x3d0 [ 238.192466][T11834] ? security_file_ioctl+0x84/0xa0 [ 238.197571][T11834] ? sock_poll+0x3d0/0x3d0 [ 238.201993][T11834] __se_sys_ioctl+0x121/0x1a0 [ 238.206667][T11834] __x64_sys_ioctl+0x7b/0x90 [ 238.211369][T11834] x64_sys_call+0x2f/0x9a0 [ 238.215808][T11834] do_syscall_64+0x4c/0xa0 [ 238.220239][T11834] ? clear_bhb_loop+0x50/0xa0 [ 238.225198][T11834] ? clear_bhb_loop+0x50/0xa0 [ 238.229875][T11834] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 238.235768][T11834] RIP: 0033:0x7f46bf244ba9 [ 238.240215][T11834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.260004][T11834] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 238.268427][T11834] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 238.276426][T11834] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 238.284398][T11834] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 238.292368][T11834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.300355][T11834] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 238.308362][T11834] [ 238.607718][T11849] bond_slave_1: mtu less than device minimum [ 238.854200][T11876] bond_slave_1: mtu less than device minimum [ 239.047858][T11889] FAULT_INJECTION: forcing a failure. [ 239.047858][T11889] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.074927][T11886] bond_slave_1: mtu less than device minimum [ 239.142298][T11889] CPU: 0 PID: 11889 Comm: syz.1.5196 Not tainted syzkaller #0 [ 239.149815][T11889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 239.160246][T11889] Call Trace: [ 239.163535][T11889] [ 239.166469][T11889] __dump_stack+0x21/0x30 [ 239.170818][T11889] dump_stack_lvl+0xee/0x150 [ 239.175547][T11889] ? show_regs_print_info+0x20/0x20 [ 239.180871][T11889] ? has_cap_mac_admin+0x330/0x330 [ 239.185983][T11889] dump_stack+0x15/0x20 [ 239.190155][T11889] should_fail+0x3c1/0x510 [ 239.194570][T11889] should_fail_usercopy+0x1a/0x20 [ 239.199598][T11889] _copy_from_user+0x20/0xd0 [ 239.204205][T11889] get_user_ifreq+0x6c/0x180 [ 239.208803][T11889] sock_ioctl+0x605/0x6b0 [ 239.213226][T11889] ? sock_poll+0x3d0/0x3d0 [ 239.217852][T11889] ? security_file_ioctl+0x84/0xa0 [ 239.223058][T11889] ? sock_poll+0x3d0/0x3d0 [ 239.227663][T11889] __se_sys_ioctl+0x121/0x1a0 [ 239.232347][T11889] __x64_sys_ioctl+0x7b/0x90 [ 239.236956][T11889] x64_sys_call+0x2f/0x9a0 [ 239.241403][T11889] do_syscall_64+0x4c/0xa0 [ 239.245851][T11889] ? clear_bhb_loop+0x50/0xa0 [ 239.250542][T11889] ? clear_bhb_loop+0x50/0xa0 [ 239.255391][T11889] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 239.261369][T11889] RIP: 0033:0x7fb3f8f66ba9 [ 239.265790][T11889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.286370][T11889] RSP: 002b:00007fb3f79cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.295012][T11889] RAX: ffffffffffffffda RBX: 00007fb3f91adfa0 RCX: 00007fb3f8f66ba9 [ 239.303184][T11889] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 239.311179][T11889] RBP: 00007fb3f79cf090 R08: 0000000000000000 R09: 0000000000000000 [ 239.319169][T11889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.327141][T11889] R13: 00007fb3f91ae038 R14: 00007fb3f91adfa0 R15: 00007ffc5f84e0f8 [ 239.335118][T11889] [ 239.498960][T11905] bond_slave_1: mtu less than device minimum [ 240.586997][T11984] device pim6reg1 entered promiscuous mode [ 240.776919][T12001] FAULT_INJECTION: forcing a failure. [ 240.776919][T12001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.822633][T12001] CPU: 1 PID: 12001 Comm: syz.1.5244 Not tainted syzkaller #0 [ 240.830326][T12001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 240.840389][T12001] Call Trace: [ 240.843765][T12001] [ 240.846699][T12001] __dump_stack+0x21/0x30 [ 240.851044][T12001] dump_stack_lvl+0xee/0x150 [ 240.855645][T12001] ? show_regs_print_info+0x20/0x20 [ 240.860859][T12001] ? stack_trace_save+0x98/0xe0 [ 240.865722][T12001] ? __stack_depot_save+0x34/0x480 [ 240.870869][T12001] dump_stack+0x15/0x20 [ 240.875036][T12001] should_fail+0x3c1/0x510 [ 240.879470][T12001] should_fail_usercopy+0x1a/0x20 [ 240.884502][T12001] _copy_from_user+0x20/0xd0 [ 240.889226][T12001] __copy_msghdr_from_user+0xaf/0x5e0 [ 240.894695][T12001] ? _kstrtoull+0x3c0/0x4d0 [ 240.899299][T12001] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 240.904594][T12001] ? kstrtouint_from_user+0x1a0/0x200 [ 240.910009][T12001] ___sys_sendmsg+0x156/0x260 [ 240.914801][T12001] ? __sys_sendmsg+0x250/0x250 [ 240.919700][T12001] ? __fdget+0x1a1/0x230 [ 240.923958][T12001] __x64_sys_sendmsg+0x1e2/0x2a0 [ 240.928910][T12001] ? ___sys_sendmsg+0x260/0x260 [ 240.933768][T12001] ? ksys_write+0x1eb/0x240 [ 240.938286][T12001] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 240.944370][T12001] x64_sys_call+0x4b/0x9a0 [ 240.948792][T12001] do_syscall_64+0x4c/0xa0 [ 240.953313][T12001] ? clear_bhb_loop+0x50/0xa0 [ 240.958176][T12001] ? clear_bhb_loop+0x50/0xa0 [ 240.962884][T12001] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 240.968879][T12001] RIP: 0033:0x7fb3f8f66ba9 [ 240.973419][T12001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.993039][T12001] RSP: 002b:00007fb3f79cf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 241.001572][T12001] RAX: ffffffffffffffda RBX: 00007fb3f91adfa0 RCX: 00007fb3f8f66ba9 [ 241.009752][T12001] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000004 [ 241.017837][T12001] RBP: 00007fb3f79cf090 R08: 0000000000000000 R09: 0000000000000000 [ 241.025818][T12001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.033805][T12001] R13: 00007fb3f91ae038 R14: 00007fb3f91adfa0 R15: 00007ffc5f84e0f8 [ 241.041801][T12001] [ 241.193206][T12022] FAULT_INJECTION: forcing a failure. [ 241.193206][T12022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 241.276994][T12022] CPU: 0 PID: 12022 Comm: syz.4.5253 Not tainted syzkaller #0 [ 241.284686][T12022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 241.294759][T12022] Call Trace: [ 241.298067][T12022] [ 241.301027][T12022] __dump_stack+0x21/0x30 [ 241.305423][T12022] dump_stack_lvl+0xee/0x150 [ 241.310030][T12022] ? show_regs_print_info+0x20/0x20 [ 241.315584][T12022] dump_stack+0x15/0x20 [ 241.319740][T12022] should_fail+0x3c1/0x510 [ 241.324150][T12022] should_fail_usercopy+0x1a/0x20 [ 241.329278][T12022] _copy_from_user+0x20/0xd0 [ 241.333893][T12022] sock_do_ioctl+0x175/0x300 [ 241.338524][T12022] ? sock_show_fdinfo+0xa0/0xa0 [ 241.343371][T12022] ? selinux_file_ioctl+0x377/0x480 [ 241.348667][T12022] sock_ioctl+0x4bc/0x6b0 [ 241.352989][T12022] ? sock_poll+0x3d0/0x3d0 [ 241.357398][T12022] ? __fget_files+0x2c4/0x320 [ 241.362184][T12022] ? security_file_ioctl+0x84/0xa0 [ 241.367306][T12022] ? sock_poll+0x3d0/0x3d0 [ 241.371757][T12022] __se_sys_ioctl+0x121/0x1a0 [ 241.376537][T12022] __x64_sys_ioctl+0x7b/0x90 [ 241.381126][T12022] x64_sys_call+0x2f/0x9a0 [ 241.385625][T12022] do_syscall_64+0x4c/0xa0 [ 241.390264][T12022] ? clear_bhb_loop+0x50/0xa0 [ 241.395105][T12022] ? clear_bhb_loop+0x50/0xa0 [ 241.399795][T12022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 241.405711][T12022] RIP: 0033:0x7f28ca69bba9 [ 241.410163][T12022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.430343][T12022] RSP: 002b:00007f28c9104038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.438780][T12022] RAX: ffffffffffffffda RBX: 00007f28ca8e2fa0 RCX: 00007f28ca69bba9 [ 241.446830][T12022] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 241.454821][T12022] RBP: 00007f28c9104090 R08: 0000000000000000 R09: 0000000000000000 [ 241.462794][T12022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.471088][T12022] R13: 00007f28ca8e3038 R14: 00007f28ca8e2fa0 R15: 00007fff0cb056a8 [ 241.479454][T12022] [ 241.545882][T12031] device pim6reg1 entered promiscuous mode [ 242.653459][ T30] audit: type=1400 audit(1757734228.984:135): avc: denied { create } for pid=12062 comm="syz.2.5269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 242.775589][T12076] FAULT_INJECTION: forcing a failure. [ 242.775589][T12076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.808645][T12082] device pim6reg1 entered promiscuous mode [ 242.827462][T12078] device syzkaller0 entered promiscuous mode [ 242.852127][T12076] CPU: 0 PID: 12076 Comm: syz.3.5272 Not tainted syzkaller #0 [ 242.859633][T12076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 242.869804][T12076] Call Trace: [ 242.873093][T12076] [ 242.876042][T12076] __dump_stack+0x21/0x30 [ 242.880373][T12076] dump_stack_lvl+0xee/0x150 [ 242.885060][T12076] ? show_regs_print_info+0x20/0x20 [ 242.890470][T12076] ? has_cap_mac_admin+0x330/0x330 [ 242.895665][T12076] dump_stack+0x15/0x20 [ 242.899903][T12076] should_fail+0x3c1/0x510 [ 242.904753][T12076] should_fail_usercopy+0x1a/0x20 [ 242.909794][T12076] _copy_from_user+0x20/0xd0 [ 242.914760][T12076] get_user_ifreq+0x6c/0x180 [ 242.919435][T12076] sock_ioctl+0x605/0x6b0 [ 242.923851][T12076] ? sock_poll+0x3d0/0x3d0 [ 242.928276][T12076] ? security_file_ioctl+0x84/0xa0 [ 242.933393][T12076] ? sock_poll+0x3d0/0x3d0 [ 242.938260][T12076] __se_sys_ioctl+0x121/0x1a0 [ 242.942937][T12076] __x64_sys_ioctl+0x7b/0x90 [ 242.947530][T12076] x64_sys_call+0x2f/0x9a0 [ 242.952037][T12076] do_syscall_64+0x4c/0xa0 [ 242.956469][T12076] ? clear_bhb_loop+0x50/0xa0 [ 242.961143][T12076] ? clear_bhb_loop+0x50/0xa0 [ 242.965963][T12076] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 242.972038][T12076] RIP: 0033:0x7f8b0969dba9 [ 242.976458][T12076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 242.996148][T12076] RSP: 002b:00007f8b08106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.005082][T12076] RAX: ffffffffffffffda RBX: 00007f8b098e4fa0 RCX: 00007f8b0969dba9 [ 243.013336][T12076] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 243.021450][T12076] RBP: 00007f8b08106090 R08: 0000000000000000 R09: 0000000000000000 [ 243.029695][T12076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.037680][T12076] R13: 00007f8b098e5038 R14: 00007f8b098e4fa0 R15: 00007ffdf8d3c7b8 [ 243.045658][T12076] [ 243.081881][ T30] audit: type=1400 audit(1757734229.414:136): avc: denied { create } for pid=12083 comm="syz.1.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 243.761070][T12120] bond_slave_1: mtu less than device minimum [ 243.812174][T12122] device pim6reg1 entered promiscuous mode [ 244.375525][T12150] device pim6reg1 entered promiscuous mode [ 244.509167][T12159] device pim6reg1 entered promiscuous mode [ 245.009918][T12201] device pim6reg1 entered promiscuous mode [ 245.161178][T12217] syz.3.5329[12217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.161254][T12217] syz.3.5329[12217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.786750][T12252] FAULT_INJECTION: forcing a failure. [ 245.786750][T12252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.883063][T12252] CPU: 1 PID: 12252 Comm: syz.1.5341 Not tainted syzkaller #0 [ 245.890589][T12252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 245.900770][T12252] Call Trace: [ 245.904149][T12252] [ 245.907118][T12252] __dump_stack+0x21/0x30 [ 245.911639][T12252] dump_stack_lvl+0xee/0x150 [ 245.916331][T12252] ? show_regs_print_info+0x20/0x20 [ 245.921637][T12252] ? vfs_write+0xc17/0xf70 [ 245.926072][T12252] dump_stack+0x15/0x20 [ 245.930239][T12252] should_fail+0x3c1/0x510 [ 245.934665][T12252] should_fail_usercopy+0x1a/0x20 [ 245.939700][T12252] _copy_from_user+0x20/0xd0 [ 245.944310][T12252] __sys_bpf+0x233/0x730 [ 245.948656][T12252] ? bpf_link_show_fdinfo+0x310/0x310 [ 245.954041][T12252] ? debug_smp_processor_id+0x17/0x20 [ 245.959430][T12252] __x64_sys_bpf+0x7c/0x90 [ 245.963852][T12252] x64_sys_call+0x4b9/0x9a0 [ 245.968364][T12252] do_syscall_64+0x4c/0xa0 [ 245.972787][T12252] ? clear_bhb_loop+0x50/0xa0 [ 245.977477][T12252] ? clear_bhb_loop+0x50/0xa0 [ 245.982247][T12252] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.988146][T12252] RIP: 0033:0x7fb3f8f66ba9 [ 245.992573][T12252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.012574][T12252] RSP: 002b:00007fb3f79cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 246.021023][T12252] RAX: ffffffffffffffda RBX: 00007fb3f91adfa0 RCX: 00007fb3f8f66ba9 [ 246.029095][T12252] RDX: 0000000000000048 RSI: 0000200000000140 RDI: 2000000000000000 [ 246.037168][T12252] RBP: 00007fb3f79cf090 R08: 0000000000000000 R09: 0000000000000000 [ 246.045142][T12252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.053116][T12252] R13: 00007fb3f91ae038 R14: 00007fb3f91adfa0 R15: 00007ffc5f84e0f8 [ 246.061201][T12252] [ 246.117102][T12264] bond_slave_1: mtu less than device minimum [ 246.352905][T12296] bond_slave_1: mtu less than device minimum [ 246.408016][T12300] FAULT_INJECTION: forcing a failure. [ 246.408016][T12300] name failslab, interval 1, probability 0, space 0, times 0 [ 246.422778][T12300] CPU: 0 PID: 12300 Comm: syz.2.5365 Not tainted syzkaller #0 [ 246.430604][T12300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 246.440775][T12300] Call Trace: [ 246.444172][T12300] [ 246.447230][T12300] __dump_stack+0x21/0x30 [ 246.451596][T12300] dump_stack_lvl+0xee/0x150 [ 246.456227][T12300] ? show_regs_print_info+0x20/0x20 [ 246.461464][T12300] ? avc_has_perm_noaudit+0x2f4/0x460 [ 246.467072][T12300] dump_stack+0x15/0x20 [ 246.471262][T12300] should_fail+0x3c1/0x510 [ 246.475800][T12300] __should_failslab+0xa4/0xe0 [ 246.480796][T12300] should_failslab+0x9/0x20 [ 246.485408][T12300] slab_pre_alloc_hook+0x3b/0xe0 [ 246.490370][T12300] ? __alloc_skb+0xe0/0x740 [ 246.494868][T12300] kmem_cache_alloc+0x44/0x260 [ 246.499719][T12300] __alloc_skb+0xe0/0x740 [ 246.504222][T12300] alloc_skb_with_frags+0xa8/0x620 [ 246.509375][T12300] sock_alloc_send_pskb+0x853/0x980 [ 246.514598][T12300] ? is_bpf_text_address+0x177/0x190 [ 246.520338][T12300] ? __kernel_text_address+0xa0/0x100 [ 246.525732][T12300] ? sock_kzfree_s+0x60/0x60 [ 246.530351][T12300] ? stack_trace_save+0x98/0xe0 [ 246.535478][T12300] tun_get_user+0x4e6/0x33c0 [ 246.540176][T12300] ? __kasan_unpoison_object_data+0x20/0x20 [ 246.546079][T12300] ? kmem_cache_free+0x100/0x320 [ 246.551024][T12300] ? __x64_sys_openat+0x136/0x160 [ 246.556141][T12300] ? x64_sys_call+0x219/0x9a0 [ 246.560813][T12300] ? tun_do_read+0x1c40/0x1c40 [ 246.565685][T12300] ? kstrtouint_from_user+0x1a0/0x200 [ 246.571167][T12300] ? kstrtol_from_user+0x260/0x260 [ 246.576273][T12300] ? avc_policy_seqno+0x1b/0x70 [ 246.581121][T12300] ? selinux_file_permission+0x2aa/0x510 [ 246.586748][T12300] tun_chr_write_iter+0x1eb/0x2e0 [ 246.591857][T12300] vfs_write+0x802/0xf70 [ 246.596179][T12300] ? file_end_write+0x1b0/0x1b0 [ 246.601045][T12300] ? __fget_files+0x2c4/0x320 [ 246.605894][T12300] ? __fdget_pos+0x1f7/0x380 [ 246.610482][T12300] ? ksys_write+0x71/0x240 [ 246.614939][T12300] ksys_write+0x140/0x240 [ 246.619263][T12300] ? __ia32_sys_read+0x90/0x90 [ 246.624151][T12300] ? __bpf_trace_sys_enter+0x62/0x70 [ 246.629433][T12300] __x64_sys_write+0x7b/0x90 [ 246.634017][T12300] x64_sys_call+0x8ef/0x9a0 [ 246.638517][T12300] do_syscall_64+0x4c/0xa0 [ 246.643022][T12300] ? clear_bhb_loop+0x50/0xa0 [ 246.647697][T12300] ? clear_bhb_loop+0x50/0xa0 [ 246.652377][T12300] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.658268][T12300] RIP: 0033:0x7f46bf244ba9 [ 246.662681][T12300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.682461][T12300] RSP: 002b:00007f46bdcad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 246.690891][T12300] RAX: ffffffffffffffda RBX: 00007f46bf48bfa0 RCX: 00007f46bf244ba9 [ 246.699048][T12300] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 246.707164][T12300] RBP: 00007f46bdcad090 R08: 0000000000000000 R09: 0000000000000000 [ 246.715145][T12300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.723201][T12300] R13: 00007f46bf48c038 R14: 00007f46bf48bfa0 R15: 00007fff89591b08 [ 246.731176][T12300]