last executing test programs: 3.561790449s ago: executing program 0 (id=2904): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x3, 0x7, 0x2000, r2, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000080), &(0x7f0000000300)=r3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x37, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xba, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r4}, 0x10) 2.736042855s ago: executing program 0 (id=2908): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000081000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xfffffffc}, 0x94) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) socketpair(0x27, 0x80000, 0x101, &(0x7f00000001c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x9, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r7}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x48, 0x2000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r9, &(0x7f0000000980), 0x20000992) (async) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000580)="88b9b85be8f5", 0x6}], 0x2, 0x0, 0x0, 0x20040000}, 0x4) 2.366807092s ago: executing program 0 (id=2912): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r0, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f00000006c0), 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="0c0000000400000004000000be3a000000000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ff1d42ff0000000000000000000000000000000000060000d4f2126eccf65f3b7da3fce7b2febf817734c9757d59d633335172407045528a6996d2929ae945a14060d4f7f5b553d5a8d63a093894f7e74f09b4f1314973f1b0e6d18faeeb93464e51cc3e83db62d39568a581f60856d1300ba550f6cd9c1fcb8146cdc5f391acc7157cdaecc726ddfc22a30f40b88f59237eb69ba7f8557abd0e4eef72d0aa4e5f23cd6b4fe8e5c660581d579c44f24ebbd08a47e485755f91e69f8e0935872c230df0a7aca276f8112b40e43e217f1269c79cc005f5760fb9c6a2b5163ef18feb"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 1.705228396s ago: executing program 1 (id=2916): r0 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x2, 0xf9, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x58}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x7, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x1a}, 0x11014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, r0, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1, @ANYRES32, @ANYRESHEX=r0], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0x5, 0x0, &(0x7f0000000000)="76389e1475", 0x0, 0xfb, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000f495c956a06499cd000018110000", @ANYRES32=r3, @ANYRESHEX=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000340)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0, 0x2}, 0x218201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) 1.396407672s ago: executing program 1 (id=2921): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001000000000000000000000071180a000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000700000000000009209500000000000000f7315374ce569ec55869bfbcfa7c4e8f52e6288f2fbc43a3af3c6b881320c24423492f2fc14c9de730f42434dfa11c77edc1f06776d8"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_kthread_work_queue_work\x00', r8}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r6, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x87, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x85, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000009c0), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000b40)={0x400, 0x0}, 0x8) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)=@o_path={&(0x7f0000000b80)='./file0\x00', 0x0, 0x4010, r4}, 0x18) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@bloom_filter={0x1e, 0x6, 0x9, 0x0, 0x20, r5, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x0, 0xc}, 0x50) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000700000000000000", @ANYRES32=r2, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x7, 0x1, &(0x7f0000000300)=@raw=[@generic={0xff, 0x2, 0x4, 0xffff, 0xf}], &(0x7f0000000380)='GPL\x00', 0x0, 0xa0, &(0x7f00000006c0)=""/160, 0x41000, 0x18, '\x00', r10, @fallback=0x7, r11, 0x8, &(0x7f0000000a00)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x5, 0xe, 0x7}, 0x10, r12, 0xffffffffffffffff, 0x0, &(0x7f0000000d00)=[r2, r3, r2, r13, r14, r15, r2], 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.350917973s ago: executing program 3 (id=2923): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffff800, 0x75}, 0x4, 0xc8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x31, &(0x7f0000000bc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfff}, {}, {}, [@alu={0x4, 0x1, 0x2, 0xb, 0x5, 0xffffffffffffffb2, 0xfffffffffffffff0}, @ldst={0x1, 0x1, 0x1, 0x3, 0x7, 0x4, 0xffffffffffffffff}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb20}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query, @call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000000000000000800a401327a3ee2bf8fc35f6521880000b70400000000000085006f068200000095000400"/85], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.group_wait_time\x00', 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) (async, rerun: 32) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) (rerun: 32) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28, 0x9, 0xaa, 0xfffff004}, {0x6}]}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090000000000000000000000c50000000ea20000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r7}, 0x10) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='afs_make_fs_call\x00', r7, 0x0, 0x451b}, 0x18) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa0000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r9}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0xe, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r4}]}, &(0x7f0000000480)='syzkaller\x00', 0x3, 0x59, &(0x7f00000004c0)=""/89, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x40001, 0xfffffffb, 0x7}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f00000005c0)=[{0x0, 0x1, 0x80000001}, {0x3, 0x4, 0x3, 0xc}, {0x3, 0x3, 0x2, 0x6}, {0x1, 0x400003, 0x2, 0xc}], 0x10, 0x2}, 0x94) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000020000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) (rerun: 64) 1.280649334s ago: executing program 3 (id=2924): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x0, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61156c00000000006113500000000000bfa000000000000016000f00080000002d0301"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cpu.stat\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=r1], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000b00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r6, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r7}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0f000000040000000400000012000000000000008c105937c0419bddddea1f7c1c6cae6ea964751defe883c2b3f30fe054f41cfe92255479cd72a96423460631174c8de21e100e67ce746e2e3f4976b6e6046ce4b7da59f130e600"/106, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r11}, &(0x7f00000006c0), &(0x7f0000000700)=r10}, 0x20) sendmsg$inet(r9, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x20040046) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x3, 0x11, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @map_val={0x18, 0x6, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x1, 0xb, 0x1, 0x9, 0xffffffffffffffe0, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x88}]}, &(0x7f0000000200)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x5, 0xfffffff8, 0x7}, 0x10, 0x0, r0, 0x0, &(0x7f0000000f40)=[r8, r4, r4], 0x0, 0x10, 0x5}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000001bc0)=ANY=[@ANYRES64=r4, @ANYRESOCT=r5, @ANYRESDEC, @ANYBLOB="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", @ANYRES8=r8, @ANYRESHEX=r2, @ANYRES64=r4], &(0x7f0000000380)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r14}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000d80)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r15}, @generic={0x79}, @initr0, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x2}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$sock(r16, &(0x7f0000000800)={&(0x7f0000000700)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000780)}], 0x1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.202171226s ago: executing program 3 (id=2925): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.139536307s ago: executing program 3 (id=2926): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61129900000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf150000000000003d650000000000006507000002000000070700004c0000001f750000000000006154000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) (rerun: 64) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000070000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f4395494cdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e00"/241], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x80) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2}, 0x48) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa00}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) 1.029386869s ago: executing program 3 (id=2929): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 838.295973ms ago: executing program 3 (id=2931): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018200000000000006c0000006c0000000200000000000000000000070000000000000000070000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d700000000000000000000000000000000a1d8faf5bd23dd800008"], 0x0, 0x86, 0x0, 0x0, 0xb4}, 0x28) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x90800, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff892f"], 0x3e) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000000), &(0x7f0000000280)=r3}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x40000000, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1050f0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2904, 0x4, 0x4, 0x0, 0x0, 0xfffffffe, 0xffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYRESDEC=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000002c0), 0xb, r6}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x3, r6}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x88029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x1, @perf_config_ext={0xc95, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000090400000000000000000000010500000008000000000000000000000300000000020000000100000012000000000000000000000b"], 0x0, 0x5a}, 0x28) close(r7) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 707.161726ms ago: executing program 4 (id=2933): bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="160000000000000004000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00'}, 0x10) (async) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe0300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x100000, 0x0, 0xfffffffe, 0x6, 0x1ff, 0x7, 0x6, 0x0, 0xfffffffe}, 0x0, 0xffffffc000000002, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) 658.605696ms ago: executing program 4 (id=2934): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x2, 0x9, 0x0, 0x100, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080)="898e82ca1b916663c3f33bd2206e6dc228b3640f94223d4e4fb18ddc6e220f580024925fc008b02ab1dd0c014d0aeb3d9c02a368fa0d6b00341c42deb51fd5f5cbf44183def3f51897e88206eb133cdab4cbe5ab8333d9d781586afe0393b174116e9521456561237f6d10e9d5ed0b5496ee5b7b07662e1c84373783e69be2cd4f0f207622d4d5fc7531", &(0x7f0000000140)=""/34}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x20, &(0x7f0000000700)={&(0x7f0000000600)=""/92, 0x5c, 0x0, &(0x7f0000000680)=""/103, 0x67}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0x0, 0x30, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x6, 0x21, &(0x7f0000000240)=""/33, 0x41100, 0x28, '\x00', r1, 0x1b, r3, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, r4, 0x0, 0x0, &(0x7f00000007c0)=[r5], 0x0, 0x10, 0x400}, 0x94) (async, rerun: 32) sendmsg$tipc(r3, &(0x7f0000000b40)={&(0x7f00000008c0)=@id={0x1e, 0x3, 0x2, {0x4e20, 0x3}}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000900)="4620c1f9f4afdd60686bd894abe593431593c92cd6df4eb907814f0ce6fd480beca26febd50e9f02d1761a9adb7164d2c4b72595f39b96388b213716022dffe4525f3cae824a11a48990b917895d0aae6d2e3e7277412f4db811ae9ee5e5cff8f69915e3545f4d9ef406074a60cfb124f983affda782dfe366ada3cefa4e652b55863fdf045602c83e980c7c6a841ed4f5fdc4d58b97", 0x96}, {&(0x7f00000009c0)="7284db658b3717e74f5f536b3a14f7feefc8ffdbbf61d1fccc97e93a2a770b088137d6d641dd6174788fe46cb4b8b82f599e10cb76eb8eb7b29df117c61d6a0befb748cd17f77b5a120d", 0x4a}], 0x2, &(0x7f0000000a80)="9645e1e4fcdcdbe921185c99df97848872cbb6f665228ce7e7fcb0e4a0d296e96e530d9bf4061123a547232dc347fe9a1bfc6b0f408fb951937832d6a7e2f5b44485fcc2d3ead9f360a2d42576d6e94b7ab69c5bc61e0f4a3b531d222498874c0b4afab6595b678f2363bf6f25846f56663b77eb351ff08b2732a465c1591323fc9cc83124c0b9bacc6e287c3306aad9c491017e25ecbfa32758917170ad2316feaa4cc872ff4c1149a0f5cc3ad8ea95", 0xb0, 0x20000040}, 0x800) (rerun: 32) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d00)=r2, 0x4) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e00)={0x6, 0x10, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xaf}, [@alu={0x4, 0x1, 0x5, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x3, 0x1, 0x7, 0x10, 0x10}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x63}, @generic={0x2, 0x5, 0x5, 0x4, 0x4}, @ldst={0x2, 0x3, 0x2, 0x8, 0x3, 0x0, 0x4}, @exit, @ldst={0x2, 0x0, 0x0, 0x9, 0xb, 0x20, 0x8}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000c00)='GPL\x00', 0x5, 0xa6, &(0x7f0000000c40)=""/166, 0x41100, 0x10, '\x00', r1, 0x25, r6, 0x8, &(0x7f0000000d40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000d80)=[{0x4, 0x3, 0x3, 0x7}, {0x5, 0x4, 0xe, 0x9}, {0x1, 0x4, 0x9, 0x1}, {0x4, 0x3, 0x3, 0x7}, {0x5, 0x5, 0xe}, {0x5, 0x1, 0x6, 0xc}], 0x10, 0x6}, 0x94) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ec0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x9, '\x00', r1, r6, 0x1, 0x1}, 0x50) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) (async) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000000f40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb2, 0xb2, 0x5, [@var={0xb, 0x0, 0x0, 0xe, 0x1, 0x2}, @datasec={0x1, 0x3, 0x0, 0xf, 0x2, [{0x5, 0x5, 0xb}, {0x4, 0x401, 0x4}, {0x4, 0xe9, 0x2}], "0bfc"}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}, @const={0xb, 0x0, 0x0, 0xa, 0x4}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x1}}, @const={0xb}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @typedef={0xa, 0x0, 0x0, 0x8, 0x5}, @const={0xb, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f, 0x61, 0x61]}}, &(0x7f0000001040)=""/229, 0xd1, 0xe5, 0x0, 0x2}, 0x28) (async) recvmsg(r3, &(0x7f0000002300)={&(0x7f0000001180)=@hci, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001200)=""/142, 0x8e}], 0x1, &(0x7f0000001300)=""/4096, 0x1000}, 0x2100) (async, rerun: 32) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002380)=@generic={&(0x7f0000002340)='./file0\x00'}, 0x18) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000023c0)={0x0, r9}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000025c0)={r8, 0x20, &(0x7f0000002580)={&(0x7f0000002400)=""/94, 0x5e, 0x0, &(0x7f0000002480)=""/197, 0xc5}}, 0x10) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002640)=@o_path={&(0x7f0000002600)='./file0\x00', 0x0, 0x0, r7}, 0x18) (async, rerun: 32) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000002680)={r3}, 0x8) (rerun: 32) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000027c0)={@cgroup=r3, 0x1, 0x0, 0x1, &(0x7f00000026c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000002700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002740)=[0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000002800)={@ifindex=r1, r11, 0xd, 0x0, 0x0, @void, @value=r3, @void, @void, r13}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000028c0)={{r12}, &(0x7f0000002840), &(0x7f0000002880)='%pK \x00'}, 0x20) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002900)='ns/user\x00') (async, rerun: 64) recvmsg(r3, &(0x7f0000002ac0)={&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000002a80)=[{&(0x7f00000029c0)=""/180, 0xb4}], 0x1}, 0x0) (async, rerun: 64) write$cgroup_int(r3, &(0x7f0000002b00)=0x6, 0x12) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002b40)) (async, rerun: 64) write$cgroup_subtree(r3, &(0x7f0000002b80)={[{0x2d, 'rdma'}, {0x2d, 'blkio'}, {0x2d, 'net'}, {0x2b, 'hugetlb'}, {0x2d, 'perf_event'}, {0x2b, 'io'}, {0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x2d, 'rdma'}]}, 0x3f) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002c00)={&(0x7f0000002bc0)='sched_pi_setprio\x00', r9, 0x0, 0xd9}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002c80)=@generic={&(0x7f0000002c40)='./file0\x00', r10}, 0x18) openat$cgroup_ro(r3, &(0x7f0000002cc0)='cpuacct.usage_sys\x00', 0x0, 0x0) 658.235217ms ago: executing program 0 (id=2935): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xe211}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 596.677678ms ago: executing program 4 (id=2936): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000200)="b9ff03076804268c989e14f088a847e08906", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="0200000004000000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000006000000080000000800000000000000", @ANYRES32, @ANYBLOB="0001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x180, &(0x7f00000003c0)="79b057b3c538502912f24e3a13f0fcab1bfd859366d115e67b", 0x19, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000580)="3a59cf77f9397d1113898dc9ca5ebb58e5a6a751a35a809a8357694ac6dadb93f9a50bc99b5742011b32c33acdbe763d210cb1a03edaee52811c654d2b97e0b4ef889bd7cb6032c88831b3dbca832c1e64eaad23b1") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="000000f6ff7be4a0f9133b95ba56d71c7d05c1c3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28], 0x48) 530.899559ms ago: executing program 2 (id=2937): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 526.397419ms ago: executing program 1 (id=2938): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x140400c0}, 0x2000081) 481.85473ms ago: executing program 2 (id=2939): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x0, 0x0, 0x0, 0x1, 0x2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) close(r3) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r6}, &(0x7f0000000800), &(0x7f0000000840)=r7}, 0x20) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xa}, 0xa000, 0xc8, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0xa) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 481.27478ms ago: executing program 1 (id=2940): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, 0x0, &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&&&\t&&') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000001180)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f00000011c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000500960398575fc289667fdb678d8ed09a974c3d951ac8000a05c254624f57000000080000000000000e050000f2f900000007000000"], &(0x7f0000001080)=""/149, 0x45, 0x95, 0x0, 0x8000, 0x10000, @value=r4}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r5}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 450.377261ms ago: executing program 4 (id=2941): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)='%pK \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 369.430502ms ago: executing program 0 (id=2942): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x3, 0x7, 0x2000, r2, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000080), &(0x7f0000000300)=r3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x37, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xba, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r4}, 0x10) 344.621623ms ago: executing program 4 (id=2943): r0 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$TUNSETTXFILTER(r1, 0x401054d5, &(0x7f0000000380)=ANY=[]) (async) r2 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) 204.224635ms ago: executing program 0 (id=2944): r0 = perf_event_open(&(0x7f0000000380)={0x4, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x2, 0xf9, 0x0, 0x7, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x7, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x1a}, 0x11014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, r0, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x9, 0x0, 0x0, 0x19002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0xd90}, 0x10498a, 0xc8, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x8000000000, 0xffffffffffffffff, 0xe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000), 0xffc0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r11}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@fallback, 0x11, 0x0, 0xf2, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x4, 0x2, 0xffffffffffffffff, @void, @value, @void, @void, r15}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@fallback=r12, r8, 0xa, 0x10, 0x0, @void, @value=r4, @void, @void, r15}, 0x20) write$cgroup_subtree(r14, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@fallback=r1, 0x16, 0x1, 0xb91c, &(0x7f0000000180)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 203.742265ms ago: executing program 2 (id=2945): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000002d007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) 202.902766ms ago: executing program 1 (id=2946): gettid() r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x10, 0x4, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000500), 0x5}, 0x24, 0xf9e, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffd}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000080)=[0x0], &(0x7f0000000140)=[0x0], 0x0, 0x44, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f00000001c0), &(0x7f0000000340), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x62005000, 0x0, 0x0, 0x0, 0x0, 0x0) 158.384347ms ago: executing program 2 (id=2947): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x101, 0x10}, 0xc) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) perf_event_open(&(0x7f0000001080)={0x6, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0xfffffffffffffbff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00', @random="0b917cdc5d72"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x200, 0x11, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r6, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) close(0xffffffffffffffff) (async) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 80.557508ms ago: executing program 2 (id=2948): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 77.147428ms ago: executing program 2 (id=2949): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x20, &(0x7f00000001c0)={&(0x7f00000002c0)=""/67, 0x43, 0x0, &(0x7f0000000380)=""/171, 0xab}}, 0x10) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Kr\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) unlink(&(0x7f0000000200)='./cgroup\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (rerun: 64) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x9, 0x9, 0x3, 0x0, 0x8, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x110000, 0x7, 0x9, 0x1, 0x100000000, 0x8, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xf, r7, 0xc35b42fd65b6e448) unlink(&(0x7f0000000140)='./cgroup\x00') (async, rerun: 64) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000340)=0xa) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r8}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x7}, 0x1002, 0xc8, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 369.92µs ago: executing program 4 (id=2950): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100800}, 0x2000, 0x0, 0x6, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100", @ANYRES32], 0x48) 0s ago: executing program 1 (id=2951): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000200)="b9ff03076804268c989e14f088a847e08906", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="0200000004000000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000006000000080000000800000000000000", @ANYRES32, @ANYBLOB="0001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x180, &(0x7f00000003c0)="79b057b3c538502912f24e3a13f0fcab1bfd859366d115e67b", 0x19, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000580)="3a59cf77f9397d1113898dc9ca5ebb58e5a6a751a35a809a8357694ac6dadb93f9a50bc99b5742011b32c33acdbe763d210cb1a03edaee52811c654d2b97e0b4ef889bd7cb6032c88831b3dbca832c1e64eaad23b1") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="000000f6ff7be4a0f9133b95ba56d71c7d05c1c3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28], 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.133' (ED25519) to the list of known hosts. [ 19.765306][ T30] audit: type=1400 audit(1756778527.376:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.766390][ T273] cgroup: Unknown subsys name 'net' [ 19.768675][ T30] audit: type=1400 audit(1756778527.376:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.772606][ T30] audit: type=1400 audit(1756778527.376:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.772746][ T273] cgroup: Unknown subsys name 'devices' [ 19.892438][ T273] cgroup: Unknown subsys name 'hugetlb' [ 19.898047][ T273] cgroup: Unknown subsys name 'rlimit' [ 20.094544][ T30] audit: type=1400 audit(1756778527.706:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.117799][ T30] audit: type=1400 audit(1756778527.706:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.126242][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.142738][ T30] audit: type=1400 audit(1756778527.706:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.172473][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.174232][ T30] audit: type=1400 audit(1756778527.766:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.208141][ T30] audit: type=1400 audit(1756778527.766:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.233721][ T30] audit: type=1400 audit(1756778527.786:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.259185][ T30] audit: type=1400 audit(1756778527.786:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.052608][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.059655][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.067102][ T281] device bridge_slave_0 entered promiscuous mode [ 21.074842][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.081961][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.089288][ T281] device bridge_slave_1 entered promiscuous mode [ 21.155468][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.162551][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.169915][ T282] device bridge_slave_0 entered promiscuous mode [ 21.180364][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.187560][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.194899][ T284] device bridge_slave_0 entered promiscuous mode [ 21.201752][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.208771][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.216199][ T284] device bridge_slave_1 entered promiscuous mode [ 21.226366][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.233517][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.241055][ T282] device bridge_slave_1 entered promiscuous mode [ 21.319852][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.326919][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.334262][ T283] device bridge_slave_0 entered promiscuous mode [ 21.351560][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.358596][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.366739][ T283] device bridge_slave_1 entered promiscuous mode [ 21.380514][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.387604][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.395011][ T285] device bridge_slave_0 entered promiscuous mode [ 21.414903][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.422014][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.429380][ T285] device bridge_slave_1 entered promiscuous mode [ 21.537398][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.544469][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.551769][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.558782][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.587369][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.594460][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.601760][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.608774][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.622397][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.629433][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.636703][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.643730][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.664099][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.671186][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.678407][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.685438][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.705307][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.712372][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.719619][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.726657][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.759701][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.766918][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.774177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.782088][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.789264][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.796521][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.803765][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.811095][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.818303][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.825550][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.832905][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.861291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.869308][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.877186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.885666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.894002][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.901055][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.908492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.916680][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.923713][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.931097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.939183][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.946209][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.953537][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.961762][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.968763][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.976181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.984095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.992159][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.000232][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.007256][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.014546][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.022727][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.029754][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.057646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.066144][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.073719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.082244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.090329][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.097368][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.105205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.113746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.121822][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.128817][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.136240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.144661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.152886][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.159887][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.167255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.175457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.183494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.191493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.199316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.207423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.215532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.223618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.231820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.239916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.248020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.255932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.264355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.272594][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.279600][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.292883][ T284] device veth0_vlan entered promiscuous mode [ 22.301205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.309524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.317960][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.325794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.333934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.342104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.349970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.358064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.375563][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.383012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.397555][ T283] device veth0_vlan entered promiscuous mode [ 22.409816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.418754][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.427255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.435567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.443407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.451445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.459665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.468120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.476104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.486763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.494839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.502237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.509565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.517210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.524696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.532084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.539535][ T282] device veth0_vlan entered promiscuous mode [ 22.549656][ T284] device veth1_macvtap entered promiscuous mode [ 22.557006][ T285] device veth0_vlan entered promiscuous mode [ 22.563780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.571975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.579990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.587675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.595945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.607964][ T281] device veth0_vlan entered promiscuous mode [ 22.620116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.628070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.636023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.644374][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.652676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.661209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.669503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.677231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.688315][ T283] device veth1_macvtap entered promiscuous mode [ 22.698355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.710431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.718761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.728846][ T285] device veth1_macvtap entered promiscuous mode [ 22.740213][ T281] device veth1_macvtap entered promiscuous mode [ 22.747606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.755810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.763572][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.771753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.779891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.789318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.797694][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.812487][ T282] device veth1_macvtap entered promiscuous mode [ 22.821397][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 22.831698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.840001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.861853][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.870217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.879386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.891105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.902428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.910721][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.919631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.928338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.936885][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.946080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.020761][ C0] hrtimer: interrupt took 26502 ns [ 24.850464][ T382] GPL: port 1(erspan0) entered blocking state [ 24.856727][ T382] GPL: port 1(erspan0) entered disabled state [ 24.863720][ T382] device erspan0 entered promiscuous mode [ 24.869835][ T382] GPL: port 1(erspan0) entered blocking state [ 24.875960][ T382] GPL: port 1(erspan0) entered forwarding state [ 25.259351][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 25.259365][ T30] audit: type=1400 audit(1756778532.866:112): avc: denied { create } for pid=393 comm="syz.2.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 26.598561][ T30] audit: type=1400 audit(1756778534.206:113): avc: denied { ioctl } for pid=413 comm="syz.3.24" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.758002][ T30] audit: type=1400 audit(1756778535.366:114): avc: denied { create } for pid=401 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 28.309175][ T30] audit: type=1400 audit(1756778535.916:115): avc: denied { write } for pid=423 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.515825][ T30] audit: type=1400 audit(1756778536.096:116): avc: denied { write } for pid=423 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.554662][ T424] syz.3.26[424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.554735][ T424] syz.3.26[424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.780993][ T30] audit: type=1400 audit(1756778536.126:117): avc: denied { create } for pid=423 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.151145][ T30] audit: type=1400 audit(1756778536.736:118): avc: denied { cpu } for pid=427 comm="syz.3.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.422260][ T431] device pim6reg1 entered promiscuous mode [ 29.926678][ T30] audit: type=1400 audit(1756778537.526:119): avc: denied { ioctl } for pid=432 comm="syz.3.29" path="pid:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 32.055815][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.063052][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.148141][ T30] audit: type=1400 audit(1756778539.756:120): avc: denied { create } for pid=437 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 33.630919][ T450] device sit0 entered promiscuous mode [ 35.438375][ T484] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 39.127431][ T30] audit: type=1400 audit(1756778546.736:121): avc: denied { tracepoint } for pid=515 comm="syz.2.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 44.425395][ T578] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.432623][ T578] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.767656][ T578] device bridge_slave_1 left promiscuous mode [ 44.868346][ T578] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.943828][ T578] device bridge_slave_0 left promiscuous mode [ 44.950000][ T578] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.095016][ T618] syz.2.84 (618) used greatest stack depth: 22384 bytes left [ 50.383934][ T634] device veth1_macvtap left promiscuous mode [ 54.980886][ T741] FAULT_INJECTION: forcing a failure. [ 54.980886][ T741] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 55.024785][ T741] CPU: 0 PID: 741 Comm: syz.2.126 Not tainted syzkaller #0 [ 55.032028][ T741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 55.042095][ T741] Call Trace: [ 55.045373][ T741] [ 55.048306][ T741] __dump_stack+0x21/0x30 [ 55.052641][ T741] dump_stack_lvl+0xee/0x150 [ 55.057229][ T741] ? show_regs_print_info+0x20/0x20 [ 55.062425][ T741] ? stack_trace_save+0x98/0xe0 [ 55.067263][ T741] ? __stack_depot_save+0x34/0x480 [ 55.072361][ T741] dump_stack+0x15/0x20 [ 55.076501][ T741] should_fail+0x3c1/0x510 [ 55.080896][ T741] should_fail_usercopy+0x1a/0x20 [ 55.085911][ T741] _copy_from_user+0x20/0xd0 [ 55.090503][ T741] __copy_msghdr_from_user+0xaf/0x5e0 [ 55.095877][ T741] ? _kstrtoull+0x3c0/0x4d0 [ 55.100455][ T741] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 55.105734][ T741] ? kstrtouint_from_user+0x1a0/0x200 [ 55.111086][ T741] ___sys_sendmsg+0x156/0x260 [ 55.115750][ T741] ? __sys_sendmsg+0x250/0x250 [ 55.120512][ T741] ? __fdget+0x1a1/0x230 [ 55.124753][ T741] __x64_sys_sendmsg+0x1e2/0x2a0 [ 55.129887][ T741] ? ___sys_sendmsg+0x260/0x260 [ 55.134737][ T741] ? ksys_write+0x1eb/0x240 [ 55.139315][ T741] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 55.145373][ T741] x64_sys_call+0x4b/0x9a0 [ 55.149771][ T741] do_syscall_64+0x4c/0xa0 [ 55.154179][ T741] ? clear_bhb_loop+0x50/0xa0 [ 55.158842][ T741] ? clear_bhb_loop+0x50/0xa0 [ 55.163501][ T741] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.169391][ T741] RIP: 0033:0x7f9498b01be9 [ 55.173792][ T741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.193382][ T741] RSP: 002b:00007f949756a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.201789][ T741] RAX: ffffffffffffffda RBX: 00007f9498d38fa0 RCX: 00007f9498b01be9 [ 55.209743][ T741] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 55.217698][ T741] RBP: 00007f949756a090 R08: 0000000000000000 R09: 0000000000000000 [ 55.225672][ T741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.233852][ T741] R13: 00007f9498d39038 R14: 00007f9498d38fa0 R15: 00007fffaa11e158 [ 55.241823][ T741] [ 55.948420][ T778] FAULT_INJECTION: forcing a failure. [ 55.948420][ T778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.067631][ T778] CPU: 1 PID: 778 Comm: syz.0.140 Not tainted syzkaller #0 [ 56.074862][ T778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 56.084913][ T778] Call Trace: [ 56.088178][ T778] [ 56.091090][ T778] __dump_stack+0x21/0x30 [ 56.095415][ T778] dump_stack_lvl+0xee/0x150 [ 56.099988][ T778] ? show_regs_print_info+0x20/0x20 [ 56.105168][ T778] ? stack_trace_save+0x98/0xe0 [ 56.109998][ T778] ? __stack_depot_save+0x34/0x480 [ 56.115093][ T778] dump_stack+0x15/0x20 [ 56.119231][ T778] should_fail+0x3c1/0x510 [ 56.123628][ T778] should_fail_usercopy+0x1a/0x20 [ 56.128630][ T778] _copy_from_user+0x20/0xd0 [ 56.133202][ T778] __copy_msghdr_from_user+0x448/0x5e0 [ 56.138642][ T778] ? _kstrtoull+0x3c0/0x4d0 [ 56.143123][ T778] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 56.148500][ T778] ? kstrtouint_from_user+0x1a0/0x200 [ 56.153851][ T778] ___sys_sendmsg+0x156/0x260 [ 56.158512][ T778] ? __sys_sendmsg+0x250/0x250 [ 56.163260][ T778] ? __fdget+0x1a1/0x230 [ 56.167487][ T778] __x64_sys_sendmsg+0x1e2/0x2a0 [ 56.172405][ T778] ? ___sys_sendmsg+0x260/0x260 [ 56.177239][ T778] ? ksys_write+0x1eb/0x240 [ 56.181724][ T778] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 56.187773][ T778] x64_sys_call+0x4b/0x9a0 [ 56.192169][ T778] do_syscall_64+0x4c/0xa0 [ 56.196565][ T778] ? clear_bhb_loop+0x50/0xa0 [ 56.201229][ T778] ? clear_bhb_loop+0x50/0xa0 [ 56.205887][ T778] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.211760][ T778] RIP: 0033:0x7fb6e83aabe9 [ 56.216155][ T778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.235738][ T778] RSP: 002b:00007fb6e6e13038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.244133][ T778] RAX: ffffffffffffffda RBX: 00007fb6e85e1fa0 RCX: 00007fb6e83aabe9 [ 56.252088][ T778] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 56.260062][ T778] RBP: 00007fb6e6e13090 R08: 0000000000000000 R09: 0000000000000000 [ 56.268014][ T778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.275971][ T778] R13: 00007fb6e85e2038 R14: 00007fb6e85e1fa0 R15: 00007ffd951ea208 [ 56.283933][ T778] [ 56.586245][ T820] FAULT_INJECTION: forcing a failure. [ 56.586245][ T820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.679103][ T820] CPU: 1 PID: 820 Comm: syz.0.152 Not tainted syzkaller #0 [ 56.686422][ T820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 56.696483][ T820] Call Trace: [ 56.699773][ T820] [ 56.702706][ T820] __dump_stack+0x21/0x30 [ 56.707038][ T820] dump_stack_lvl+0xee/0x150 [ 56.711626][ T820] ? show_regs_print_info+0x20/0x20 [ 56.716906][ T820] ? stack_trace_save+0x98/0xe0 [ 56.721844][ T820] dump_stack+0x15/0x20 [ 56.725997][ T820] should_fail+0x3c1/0x510 [ 56.730415][ T820] should_fail_usercopy+0x1a/0x20 [ 56.735648][ T820] _copy_from_user+0x20/0xd0 [ 56.740597][ T820] iovec_from_user+0x1bc/0x2f0 [ 56.745353][ T820] ? __copy_msghdr_from_user+0x302/0x5e0 [ 56.750983][ T820] ? _kstrtoull+0x3c0/0x4d0 [ 56.755480][ T820] __import_iovec+0x71/0x400 [ 56.760073][ T820] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 56.765353][ T820] ? kstrtouint_from_user+0x1a0/0x200 [ 56.770718][ T820] import_iovec+0x7c/0xb0 [ 56.775041][ T820] ___sys_sendmsg+0x1b9/0x260 [ 56.779716][ T820] ? __sys_sendmsg+0x250/0x250 [ 56.784500][ T820] ? __fdget+0x1a1/0x230 [ 56.788750][ T820] __x64_sys_sendmsg+0x1e2/0x2a0 [ 56.793679][ T820] ? ___sys_sendmsg+0x260/0x260 [ 56.798609][ T820] ? ksys_write+0x1eb/0x240 [ 56.803109][ T820] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 56.809172][ T820] x64_sys_call+0x4b/0x9a0 [ 56.813583][ T820] do_syscall_64+0x4c/0xa0 [ 56.818084][ T820] ? clear_bhb_loop+0x50/0xa0 [ 56.822752][ T820] ? clear_bhb_loop+0x50/0xa0 [ 56.827428][ T820] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.833321][ T820] RIP: 0033:0x7fb6e83aabe9 [ 56.838412][ T820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.858024][ T820] RSP: 002b:00007fb6e6e13038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.866437][ T820] RAX: ffffffffffffffda RBX: 00007fb6e85e1fa0 RCX: 00007fb6e83aabe9 [ 56.874402][ T820] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 56.882367][ T820] RBP: 00007fb6e6e13090 R08: 0000000000000000 R09: 0000000000000000 [ 56.890334][ T820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.898296][ T820] R13: 00007fb6e85e2038 R14: 00007fb6e85e1fa0 R15: 00007ffd951ea208 [ 56.906269][ T820] [ 56.966756][ T836] syz.0.158[836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.966824][ T836] syz.0.158[836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.070228][ T842] device sit0 entered promiscuous mode [ 57.983729][ T875] FAULT_INJECTION: forcing a failure. [ 57.983729][ T875] name failslab, interval 1, probability 0, space 0, times 1 [ 58.060631][ T875] CPU: 1 PID: 875 Comm: syz.1.168 Not tainted syzkaller #0 [ 58.067890][ T875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 58.077955][ T875] Call Trace: [ 58.081236][ T875] [ 58.084168][ T875] __dump_stack+0x21/0x30 [ 58.088504][ T875] dump_stack_lvl+0xee/0x150 [ 58.093099][ T875] ? show_regs_print_info+0x20/0x20 [ 58.098299][ T875] ? unwind_get_return_address+0x4d/0x90 [ 58.103942][ T875] ? stack_trace_save+0xe0/0xe0 [ 58.108837][ T875] ? arch_stack_walk+0xee/0x140 [ 58.113692][ T875] dump_stack+0x15/0x20 [ 58.117857][ T875] should_fail+0x3c1/0x510 [ 58.122279][ T875] __should_failslab+0xa4/0xe0 [ 58.127138][ T875] should_failslab+0x9/0x20 [ 58.131665][ T875] slab_pre_alloc_hook+0x3b/0xe0 [ 58.136612][ T875] ? __alloc_skb+0xe0/0x740 [ 58.141136][ T875] kmem_cache_alloc+0x44/0x260 [ 58.145910][ T875] __alloc_skb+0xe0/0x740 [ 58.150349][ T875] tipc_buf_acquire+0x2b/0xe0 [ 58.155033][ T875] tipc_msg_build+0x544/0xfb0 [ 58.159900][ T875] __tipc_sendmsg+0x19dd/0x2680 [ 58.164792][ T875] ? _raw_spin_lock+0xe0/0xe0 [ 58.169477][ T875] ? local_bh_enable+0x30/0x30 [ 58.174249][ T875] ? __bad_area_nosemaphore+0xb5/0x460 [ 58.179716][ T875] ? wait_woken+0x170/0x170 [ 58.184218][ T875] ? avc_has_perm+0x158/0x240 [ 58.188897][ T875] ? __kasan_check_write+0x14/0x20 [ 58.194010][ T875] ? _raw_spin_lock_bh+0x8e/0xe0 [ 58.198954][ T875] ? _raw_spin_lock_irq+0xe0/0xe0 [ 58.203976][ T875] ? unwind_get_return_address+0x4d/0x90 [ 58.209699][ T875] ? __local_bh_enable_ip+0x58/0x80 [ 58.215152][ T875] ? lock_sock_nested+0x1f1/0x290 [ 58.220161][ T875] ? sock_init_data+0xc0/0xc0 [ 58.224855][ T875] tipc_sendmsg+0x55/0x70 [ 58.229167][ T875] ? tipc_recvmsg+0x13a0/0x13a0 [ 58.233997][ T875] ____sys_sendmsg+0x5a2/0x8c0 [ 58.238751][ T875] ? __sys_sendmsg_sock+0x40/0x40 [ 58.244025][ T875] ? import_iovec+0x7c/0xb0 [ 58.248511][ T875] ___sys_sendmsg+0x1f0/0x260 [ 58.253171][ T875] ? __sys_sendmsg+0x250/0x250 [ 58.257919][ T875] ? __fdget+0x1a1/0x230 [ 58.262145][ T875] __x64_sys_sendmsg+0x1e2/0x2a0 [ 58.267068][ T875] ? ___sys_sendmsg+0x260/0x260 [ 58.271896][ T875] ? ksys_write+0x1eb/0x240 [ 58.276381][ T875] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 58.282428][ T875] x64_sys_call+0x4b/0x9a0 [ 58.286827][ T875] do_syscall_64+0x4c/0xa0 [ 58.291223][ T875] ? clear_bhb_loop+0x50/0xa0 [ 58.295890][ T875] ? clear_bhb_loop+0x50/0xa0 [ 58.300545][ T875] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.306434][ T875] RIP: 0033:0x7fe72100bbe9 [ 58.310835][ T875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.330509][ T875] RSP: 002b:00007fe71fa74038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 58.338914][ T875] RAX: ffffffffffffffda RBX: 00007fe721242fa0 RCX: 00007fe72100bbe9 [ 58.346869][ T875] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 58.354823][ T875] RBP: 00007fe71fa74090 R08: 0000000000000000 R09: 0000000000000000 [ 58.362782][ T875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.370733][ T875] R13: 00007fe721243038 R14: 00007fe721242fa0 R15: 00007fff030323c8 [ 58.378697][ T875] [ 59.830433][ T928] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.841682][ T928] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.036062][ T30] audit: type=1400 audit(1756778567.646:122): avc: denied { read } for pid=955 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 60.070870][ T958] device sit0 entered promiscuous mode [ 60.140697][ T30] audit: type=1400 audit(1756778567.716:123): avc: denied { create } for pid=959 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 60.334329][ T30] audit: type=1400 audit(1756778567.726:124): avc: denied { create } for pid=961 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 61.345568][ T986] FAULT_INJECTION: forcing a failure. [ 61.345568][ T986] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.472388][ T986] CPU: 1 PID: 986 Comm: syz.4.207 Not tainted syzkaller #0 [ 61.479655][ T986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 61.489720][ T986] Call Trace: [ 61.493007][ T986] [ 61.495929][ T986] __dump_stack+0x21/0x30 [ 61.500265][ T986] dump_stack_lvl+0xee/0x150 [ 61.504857][ T986] ? show_regs_print_info+0x20/0x20 [ 61.510060][ T986] dump_stack+0x15/0x20 [ 61.514223][ T986] should_fail+0x3c1/0x510 [ 61.518648][ T986] should_fail_usercopy+0x1a/0x20 [ 61.523676][ T986] _copy_from_iter+0x21a/0x1050 [ 61.528540][ T986] ? copy_mc_pipe_to_iter+0x770/0x770 [ 61.533909][ T986] ? kasan_unpoison+0x67/0x90 [ 61.538592][ T986] ? check_stack_object+0x81/0x140 [ 61.543703][ T986] ? __check_object_size+0x2f4/0x3c0 [ 61.548996][ T986] tipc_msg_build+0x893/0xfb0 [ 61.553679][ T986] __tipc_sendmsg+0x19dd/0x2680 [ 61.558533][ T986] ? _raw_spin_lock+0xe0/0xe0 [ 61.563210][ T986] ? local_bh_enable+0x30/0x30 [ 61.567970][ T986] ? wait_woken+0x170/0x170 [ 61.572468][ T986] ? avc_has_perm+0x158/0x240 [ 61.577142][ T986] ? __kasan_check_write+0x14/0x20 [ 61.582256][ T986] ? _raw_spin_lock_bh+0x8e/0xe0 [ 61.587194][ T986] ? _raw_spin_lock_irq+0xe0/0xe0 [ 61.592218][ T986] ? unwind_get_return_address+0x4d/0x90 [ 61.597861][ T986] ? stack_trace_save+0xe0/0xe0 [ 61.602711][ T986] ? __local_bh_enable_ip+0x58/0x80 [ 61.607905][ T986] ? lock_sock_nested+0x1f1/0x290 [ 61.612913][ T986] ? sock_init_data+0xc0/0xc0 [ 61.617577][ T986] ? stack_trace_save+0x98/0xe0 [ 61.622417][ T986] tipc_sendmsg+0x55/0x70 [ 61.626734][ T986] ? tipc_recvmsg+0x13a0/0x13a0 [ 61.631594][ T986] ____sys_sendmsg+0x5a2/0x8c0 [ 61.636355][ T986] ? __sys_sendmsg_sock+0x40/0x40 [ 61.641367][ T986] ? import_iovec+0x7c/0xb0 [ 61.645856][ T986] ___sys_sendmsg+0x1f0/0x260 [ 61.650516][ T986] ? __sys_sendmsg+0x250/0x250 [ 61.655270][ T986] ? __fdget+0x1a1/0x230 [ 61.659500][ T986] __x64_sys_sendmsg+0x1e2/0x2a0 [ 61.664423][ T986] ? ___sys_sendmsg+0x260/0x260 [ 61.669278][ T986] ? ksys_write+0x1eb/0x240 [ 61.673768][ T986] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 61.679826][ T986] x64_sys_call+0x4b/0x9a0 [ 61.684227][ T986] do_syscall_64+0x4c/0xa0 [ 61.688627][ T986] ? clear_bhb_loop+0x50/0xa0 [ 61.693287][ T986] ? clear_bhb_loop+0x50/0xa0 [ 61.697949][ T986] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 61.703832][ T986] RIP: 0033:0x7f51513ffbe9 [ 61.708244][ T986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.727836][ T986] RSP: 002b:00007f514fe68038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.736239][ T986] RAX: ffffffffffffffda RBX: 00007f5151636fa0 RCX: 00007f51513ffbe9 [ 61.744194][ T986] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 61.752147][ T986] RBP: 00007f514fe68090 R08: 0000000000000000 R09: 0000000000000000 [ 61.760103][ T986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.768057][ T986] R13: 00007f5151637038 R14: 00007f5151636fa0 R15: 00007ffc7e329768 [ 61.776019][ T986] [ 62.507914][ T30] audit: type=1400 audit(1756778570.106:125): avc: denied { create } for pid=1021 comm="syz.4.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 62.966888][ T1033] device pim6reg1 entered promiscuous mode [ 65.219710][ T30] audit: type=1400 audit(1756778572.826:126): avc: denied { relabelfrom } for pid=1149 comm="syz.4.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 65.275384][ T30] audit: type=1400 audit(1756778572.846:127): avc: denied { relabelto } for pid=1149 comm="syz.4.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 65.499997][ T1141] device wg2 entered promiscuous mode [ 65.835707][ T30] audit: type=1400 audit(1756778573.446:128): avc: denied { create } for pid=1174 comm="syz.3.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 66.376179][ T1189] device pim6reg1 entered promiscuous mode [ 66.770653][ T1210] device syzkaller0 entered promiscuous mode [ 66.942679][ T1229] Â: renamed from pim6reg1 [ 68.148708][ T30] audit: type=1400 audit(1756778575.696:129): avc: denied { create } for pid=1299 comm="syz.2.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 68.367765][ T1305] device veth1_macvtap entered promiscuous mode [ 68.431101][ T1305] device macsec0 entered promiscuous mode [ 68.437439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.613416][ T30] audit: type=1400 audit(1756778576.226:130): avc: denied { create } for pid=1310 comm="syz.2.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 69.605978][ T1355] -1: renamed from syzkaller0 [ 69.753349][ T30] audit: type=1400 audit(1756778577.366:131): avc: denied { ioctl } for pid=1371 comm="syz.0.334" path="socket:[20596]" dev="sockfs" ino=20596 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 70.589806][ T1386] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.597063][ T1386] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.837081][ T1543] device sit0 left promiscuous mode [ 74.846808][ T1543] device sit0 entered promiscuous mode [ 75.141140][ T1558] device pim6reg1 entered promiscuous mode [ 76.172491][ T1562] device pim6reg1 entered promiscuous mode [ 77.552035][ T1584] device syzkaller0 entered promiscuous mode [ 80.517929][ T1663] device syzkaller0 entered promiscuous mode [ 81.133588][ T1687] device pim6reg1 entered promiscuous mode [ 81.360174][ T1710] syz.2.441 (1710) used greatest stack depth: 20832 bytes left [ 82.438669][ T1750] device syzkaller0 entered promiscuous mode [ 83.597345][ T1794] FAULT_INJECTION: forcing a failure. [ 83.597345][ T1794] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 83.598893][ T1791] device veth0_vlan left promiscuous mode [ 83.619515][ T1791] device veth0_vlan entered promiscuous mode [ 83.635303][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.646870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.663626][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.671444][ T1794] CPU: 1 PID: 1794 Comm: syz.2.472 Not tainted syzkaller #0 [ 83.678821][ T1794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 83.688894][ T1794] Call Trace: [ 83.692344][ T1794] [ 83.695272][ T1794] __dump_stack+0x21/0x30 [ 83.699600][ T1794] dump_stack_lvl+0xee/0x150 [ 83.704274][ T1794] ? show_regs_print_info+0x20/0x20 [ 83.709595][ T1794] ? stack_trace_save+0x98/0xe0 [ 83.714464][ T1794] dump_stack+0x15/0x20 [ 83.718636][ T1794] should_fail+0x3c1/0x510 [ 83.723063][ T1794] should_fail_alloc_page+0x55/0x80 [ 83.728273][ T1794] prepare_alloc_pages+0x156/0x600 [ 83.733393][ T1794] ? __alloc_pages_bulk+0xab0/0xab0 [ 83.738645][ T1794] __alloc_pages+0x10a/0x440 [ 83.743245][ T1794] ? prep_new_page+0x110/0x110 [ 83.748005][ T1794] kmalloc_order+0x4c/0x160 [ 83.752496][ T1794] ? alloc_skb_with_frags+0xa8/0x620 [ 83.757874][ T1794] kmalloc_order_trace+0x18/0xb0 [ 83.762809][ T1794] __kmalloc_track_caller+0x198/0x2c0 [ 83.768179][ T1794] ? kmem_cache_alloc+0xf7/0x260 [ 83.773137][ T1794] ? alloc_skb_with_frags+0xa8/0x620 [ 83.778479][ T1794] __alloc_skb+0x21a/0x740 [ 83.782895][ T1794] alloc_skb_with_frags+0xa8/0x620 [ 83.788014][ T1794] sock_alloc_send_pskb+0x853/0x980 [ 83.793211][ T1794] ? is_bpf_text_address+0x177/0x190 [ 83.798506][ T1794] ? __kernel_text_address+0xa0/0x100 [ 83.803866][ T1794] ? sock_kzfree_s+0x60/0x60 [ 83.808441][ T1794] ? stack_trace_save+0x98/0xe0 [ 83.813280][ T1794] tun_get_user+0x4e6/0x33c0 [ 83.817857][ T1794] ? __kasan_init_slab_obj+0x10/0x40 [ 83.823124][ T1794] ? kmem_cache_free+0x100/0x320 [ 83.828047][ T1794] ? __x64_sys_openat+0x136/0x160 [ 83.833057][ T1794] ? x64_sys_call+0x219/0x9a0 [ 83.837736][ T1794] ? tun_do_read+0x1c40/0x1c40 [ 83.842593][ T1794] ? kstrtouint_from_user+0x1a0/0x200 [ 83.848099][ T1794] ? kstrtol_from_user+0x260/0x260 [ 83.853230][ T1794] ? putname+0x111/0x160 [ 83.857460][ T1794] ? bpf_probe_read_user+0x4a/0x70 [ 83.862580][ T1794] ? avc_policy_seqno+0x1b/0x70 [ 83.867425][ T1794] ? selinux_file_permission+0x2aa/0x510 [ 83.873069][ T1794] tun_chr_write_iter+0x1eb/0x2e0 [ 83.878181][ T1794] vfs_write+0x802/0xf70 [ 83.882414][ T1794] ? file_end_write+0x1b0/0x1b0 [ 83.887257][ T1794] ? __fget_files+0x2c4/0x320 [ 83.891919][ T1794] ? __fdget_pos+0x1f7/0x380 [ 83.896486][ T1794] ? ksys_write+0x71/0x240 [ 83.900882][ T1794] ksys_write+0x140/0x240 [ 83.905194][ T1794] ? __ia32_sys_read+0x90/0x90 [ 83.909936][ T1794] ? debug_smp_processor_id+0x17/0x20 [ 83.915472][ T1794] __x64_sys_write+0x7b/0x90 [ 83.920046][ T1794] x64_sys_call+0x8ef/0x9a0 [ 83.924529][ T1794] do_syscall_64+0x4c/0xa0 [ 83.928926][ T1794] ? clear_bhb_loop+0x50/0xa0 [ 83.933590][ T1794] ? clear_bhb_loop+0x50/0xa0 [ 83.938252][ T1794] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.944124][ T1794] RIP: 0033:0x7f9498b01be9 [ 83.948534][ T1794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.968291][ T1794] RSP: 002b:00007f949756a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 83.976699][ T1794] RAX: ffffffffffffffda RBX: 00007f9498d38fa0 RCX: 00007f9498b01be9 [ 83.984670][ T1794] RDX: 000000000000ffc0 RSI: 0000200000000000 RDI: 00000000000000c8 [ 83.992627][ T1794] RBP: 00007f949756a090 R08: 0000000000000000 R09: 0000000000000000 [ 84.000670][ T1794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.008627][ T1794] R13: 00007f9498d39038 R14: 00007f9498d38fa0 R15: 00007fffaa11e158 [ 84.016767][ T1794] [ 84.618050][ T1830] FAULT_INJECTION: forcing a failure. [ 84.618050][ T1830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.759241][ T1830] CPU: 1 PID: 1830 Comm: syz.3.486 Not tainted syzkaller #0 [ 84.766555][ T1830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 84.776605][ T1830] Call Trace: [ 84.779876][ T1830] [ 84.782899][ T1830] __dump_stack+0x21/0x30 [ 84.787245][ T1830] dump_stack_lvl+0xee/0x150 [ 84.791918][ T1830] ? show_regs_print_info+0x20/0x20 [ 84.797125][ T1830] dump_stack+0x15/0x20 [ 84.801277][ T1830] should_fail+0x3c1/0x510 [ 84.805817][ T1830] should_fail_usercopy+0x1a/0x20 [ 84.810944][ T1830] _copy_from_iter+0x21a/0x1050 [ 84.815791][ T1830] ? __kasan_check_write+0x14/0x20 [ 84.820906][ T1830] ? skb_set_owner_w+0x24d/0x370 [ 84.825852][ T1830] ? copy_mc_pipe_to_iter+0x770/0x770 [ 84.831235][ T1830] ? __kernel_text_address+0xa0/0x100 [ 84.836614][ T1830] ? check_stack_object+0x81/0x140 [ 84.841735][ T1830] ? __kasan_check_read+0x11/0x20 [ 84.846760][ T1830] ? __check_object_size+0x2f4/0x3c0 [ 84.852044][ T1830] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 84.857762][ T1830] ? skb_put+0x10e/0x1f0 [ 84.862008][ T1830] tun_get_user+0xc3c/0x33c0 [ 84.866810][ T1830] ? __kasan_init_slab_obj+0x10/0x40 [ 84.872101][ T1830] ? kmem_cache_free+0x100/0x320 [ 84.877047][ T1830] ? __x64_sys_openat+0x136/0x160 [ 84.882080][ T1830] ? x64_sys_call+0x219/0x9a0 [ 84.886771][ T1830] ? tun_do_read+0x1c40/0x1c40 [ 84.891540][ T1830] ? kstrtouint_from_user+0x1a0/0x200 [ 84.896913][ T1830] ? kstrtol_from_user+0x260/0x260 [ 84.902022][ T1830] ? putname+0x111/0x160 [ 84.906264][ T1830] ? bpf_probe_read_user+0x4a/0x70 [ 84.911377][ T1830] ? avc_policy_seqno+0x1b/0x70 [ 84.916241][ T1830] ? selinux_file_permission+0x2aa/0x510 [ 84.921870][ T1830] tun_chr_write_iter+0x1eb/0x2e0 [ 84.926895][ T1830] vfs_write+0x802/0xf70 [ 84.931137][ T1830] ? file_end_write+0x1b0/0x1b0 [ 84.935985][ T1830] ? __fget_files+0x2c4/0x320 [ 84.940660][ T1830] ? __fdget_pos+0x1f7/0x380 [ 84.945258][ T1830] ? ksys_write+0x71/0x240 [ 84.949672][ T1830] ksys_write+0x140/0x240 [ 84.953996][ T1830] ? __ia32_sys_read+0x90/0x90 [ 84.958753][ T1830] ? debug_smp_processor_id+0x17/0x20 [ 84.964125][ T1830] __x64_sys_write+0x7b/0x90 [ 84.968712][ T1830] x64_sys_call+0x8ef/0x9a0 [ 84.973216][ T1830] do_syscall_64+0x4c/0xa0 [ 84.977638][ T1830] ? clear_bhb_loop+0x50/0xa0 [ 84.982318][ T1830] ? clear_bhb_loop+0x50/0xa0 [ 84.987000][ T1830] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 84.992899][ T1830] RIP: 0033:0x7f3d1cb7abe9 [ 84.997318][ T1830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.016922][ T1830] RSP: 002b:00007f3d1b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 85.025342][ T1830] RAX: ffffffffffffffda RBX: 00007f3d1cdb1fa0 RCX: 00007f3d1cb7abe9 [ 85.033318][ T1830] RDX: 000000000000ffc0 RSI: 0000200000000000 RDI: 00000000000000c8 [ 85.041290][ T1830] RBP: 00007f3d1b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 85.049259][ T1830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.057333][ T1830] R13: 00007f3d1cdb2038 R14: 00007f3d1cdb1fa0 R15: 00007ffec22b0a68 [ 85.065313][ T1830] [ 86.735964][ T1894] device syzkaller0 entered promiscuous mode [ 88.074484][ T1936] bond_slave_1: mtu less than device minimum [ 88.351002][ T1947] ªªªªªª: renamed from vlan0 [ 90.040816][ T1983] device sit0 left promiscuous mode [ 90.072856][ T1982] device sit0 entered promiscuous mode [ 90.573866][ T30] audit: type=1400 audit(1756778598.186:132): avc: denied { create } for pid=2021 comm="syz.4.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.004723][ T30] audit: type=1400 audit(1756778599.616:133): avc: denied { create } for pid=2074 comm="syz.4.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 92.716543][ T30] audit: type=1400 audit(1756778600.326:134): avc: denied { create } for pid=2119 comm="syz.4.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 92.746747][ T2116] device pim6reg1 entered promiscuous mode [ 92.785464][ T2120] device veth1_macvtap left promiscuous mode [ 92.915977][ T2133] device veth1_macvtap entered promiscuous mode [ 92.922363][ T2133] device macsec0 entered promiscuous mode [ 93.538509][ T2149] device sit0 entered promiscuous mode [ 94.643363][ T2178] device syzkaller0 entered promiscuous mode [ 94.810230][ T2187] device wg2 entered promiscuous mode [ 95.397131][ T2205] device sit0 left promiscuous mode [ 96.852348][ T2241] device sit0 entered promiscuous mode [ 97.449112][ T2258] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.456431][ T2258] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.700965][ T2276] GPL: port 2(veth1_macvtap) entered blocking state [ 97.721894][ T2276] GPL: port 2(veth1_macvtap) entered disabled state [ 98.198826][ T2291] device sit0 left promiscuous mode [ 98.265447][ T2282] device sit0 entered promiscuous mode [ 98.852218][ T2319] GPL: port 1(erspan0) entered blocking state [ 98.878879][ T2319] GPL: port 1(erspan0) entered disabled state [ 98.899722][ T2319] device erspan0 entered promiscuous mode [ 98.954613][ T2313] ref_ctr_offset mismatch. inode: 0x2d0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 99.000455][ T2325] device pim6reg1 entered promiscuous mode [ 99.597327][ T30] audit: type=1400 audit(1756778607.206:135): avc: denied { create } for pid=2327 comm="syz.2.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 100.401131][ T2353] device sit0 left promiscuous mode [ 100.510584][ T2357] device sit0 entered promiscuous mode [ 100.963776][ T2369] device sit0 left promiscuous mode [ 100.978226][ T2355] device wg2 entered promiscuous mode [ 101.007671][ T2369] device sit0 entered promiscuous mode [ 103.361987][ T2417] device veth0_vlan left promiscuous mode [ 103.456565][ T2417] device veth0_vlan entered promiscuous mode [ 103.579051][ T2416] device veth1_macvtap left promiscuous mode [ 103.585293][ T2416] device macsec0 left promiscuous mode [ 104.799953][ T2450] device sit0 left promiscuous mode [ 105.688715][ T2468] device sit0 left promiscuous mode [ 105.893799][ T2468] device sit0 entered promiscuous mode [ 108.387293][ T2555] device lo entered promiscuous mode [ 108.643070][ T2573] device pim6reg1 entered promiscuous mode [ 108.796065][ T30] audit: type=1400 audit(1756778616.406:136): avc: denied { create } for pid=2577 comm="syz.0.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 109.745715][ T2612] device sit0 left promiscuous mode [ 110.248188][ T2644] device syzkaller0 entered promiscuous mode [ 111.013884][ T2712] €Â0: renamed from pim6reg1 [ 111.418778][ T2727] device sit0 entered promiscuous mode [ 111.633737][ T30] audit: type=1400 audit(1756778619.246:137): avc: denied { create } for pid=2729 comm="syz.4.762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 115.552715][ T2779] device syzkaller0 entered promiscuous mode [ 116.604032][ T2789] device wg2 entered promiscuous mode [ 116.956701][ T2801] device syzkaller0 entered promiscuous mode [ 117.338928][ T2804] device wg2 left promiscuous mode [ 117.579031][ T30] audit: type=1400 audit(1756778625.186:138): avc: denied { create } for pid=2811 comm="syz.1.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 117.981610][ T2812] ------------[ cut here ]------------ [ 117.987100][ T2812] trace type BPF program uses run-time allocation [ 118.081422][ T2812] WARNING: CPU: 1 PID: 2812 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 118.255652][ T2826] device sit0 entered promiscuous mode [ 118.302587][ T2812] Modules linked in: [ 118.306515][ T2812] CPU: 0 PID: 2812 Comm: syz.1.786 Not tainted syzkaller #0 [ 118.566605][ T2812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 118.742782][ T2812] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 118.749507][ T2812] Code: ee ff 48 c7 c6 80 e8 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 06 4d ee ff c6 05 13 90 6b 05 01 48 c7 c7 e0 e4 47 85 e8 33 e3 24 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 118.950161][ T2812] RSP: 0018:ffffc90000cdf428 EFLAGS: 00010246 [ 118.969590][ T2812] RAX: 0d538b2a1319ae00 RBX: 0000000000000001 RCX: 0000000000080000 [ 118.993125][ T2812] RDX: ffffc9000179c000 RSI: 0000000000003a68 RDI: 0000000000003a69 [ 119.013163][ T2812] RBP: ffffc90000cdf470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 119.029823][ T2812] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff888131968000 [ 119.037986][ T2812] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881168e1800 [ 119.046476][ T2812] FS: 00007fe71fa746c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 119.055504][ T2812] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.115933][ T2812] CR2: 0000000100000000 CR3: 000000013b339000 CR4: 00000000003506a0 [ 119.240800][ T2812] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 119.248803][ T2812] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 119.421000][ T2812] Call Trace: [ 119.461219][ T2812] [ 119.542874][ T2812] resolve_pseudo_ldimm64+0x685/0x11d0 [ 119.548423][ T2812] ? check_attach_btf_id+0xde0/0xde0 [ 119.726710][ T2812] ? __mark_reg_known+0x1b0/0x1b0 [ 119.791679][ T2812] ? security_capable+0x87/0xb0 [ 119.796571][ T2812] bpf_check+0x2c25/0xf280 [ 119.801783][ T2812] ? 0xffffffffa0028c54 [ 119.805984][ T2812] ? is_bpf_text_address+0x177/0x190 [ 119.811765][ T2812] ? bpf_get_btf_vmlinux+0x60/0x60 [ 119.817005][ T2812] ? unwind_get_return_address+0x4d/0x90 [ 119.822905][ T2812] ? stack_trace_save+0xe0/0xe0 [ 119.841523][ T2812] ? arch_stack_walk+0xee/0x140 [ 119.846411][ T2812] ? stack_trace_save+0x98/0xe0 [ 119.851346][ T2812] ? __stack_depot_save+0x34/0x480 [ 119.856464][ T2812] ? __kasan_slab_alloc+0x69/0xf0 [ 119.861546][ T2812] ? __kasan_kmalloc+0xec/0x110 [ 119.866401][ T2812] ? __kasan_kmalloc+0xda/0x110 [ 119.932845][ T2812] ? kmem_cache_alloc_trace+0x119/0x270 [ 119.938560][ T2812] ? selinux_bpf_prog_alloc+0x51/0x140 [ 120.020767][ T2812] ? security_bpf_prog_alloc+0x62/0x90 [ 120.026286][ T2812] ? bpf_prog_load+0x97c/0x1550 [ 120.111081][ T2812] ? __sys_bpf+0x4c3/0x730 [ 120.115540][ T2812] ? __x64_sys_bpf+0x7c/0x90 [ 120.120128][ T2812] ? x64_sys_call+0x4b9/0x9a0 [ 120.225605][ T2812] ? do_syscall_64+0x4c/0xa0 [ 120.230243][ T2812] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 120.370793][ T2812] ? check_stack_object+0x81/0x140 [ 120.375966][ T2812] ? memset+0x35/0x40 [ 120.411125][ T2812] ? bpf_obj_name_cpy+0x193/0x1e0 [ 120.416373][ T2812] bpf_prog_load+0x1042/0x1550 [ 120.470900][ T2812] ? __kasan_check_write+0x14/0x20 [ 120.476087][ T2812] ? map_freeze+0x360/0x360 [ 120.480605][ T2812] ? selinux_bpf+0xc7/0xf0 [ 120.580960][ T2812] ? security_bpf+0x82/0xa0 [ 120.651012][ T2812] __sys_bpf+0x4c3/0x730 [ 120.700953][ T2812] ? bpf_link_show_fdinfo+0x310/0x310 [ 120.706378][ T2812] ? __kasan_check_write+0x14/0x20 [ 120.712376][ T2850] device veth0_vlan left promiscuous mode [ 120.791517][ T2812] ? switch_fpu_return+0x15d/0x2c0 [ 120.841464][ T2850] device veth0_vlan entered promiscuous mode [ 120.850949][ T2812] __x64_sys_bpf+0x7c/0x90 [ 120.875976][ T2812] x64_sys_call+0x4b9/0x9a0 [ 120.906659][ T2812] do_syscall_64+0x4c/0xa0 [ 120.936964][ T2812] ? clear_bhb_loop+0x50/0xa0 [ 120.987658][ T2812] ? clear_bhb_loop+0x50/0xa0 [ 121.039434][ T2812] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 121.120419][ T2812] RIP: 0033:0x7fe72100bbe9 [ 121.186042][ T2812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.192254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.312189][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 121.319926][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.327414][ T2812] RSP: 002b:00007fe71fa74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.399781][ T2812] RAX: ffffffffffffffda RBX: 00007fe721242fa0 RCX: 00007fe72100bbe9 [ 121.570737][ T2812] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 121.599030][ T2812] RBP: 00007fe72108ee19 R08: 0000000000000000 R09: 0000000000000000 [ 121.730924][ T2812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 121.738929][ T2812] R13: 00007fe721243038 R14: 00007fe721242fa0 R15: 00007fff030323c8 [ 121.850864][ T2812] [ 121.878166][ T2812] ---[ end trace 8d6d4e7bf6791bd8 ]--- [ 124.512361][ T2955] device sit0 left promiscuous mode [ 128.801351][ T30] audit: type=1400 audit(1756778636.386:139): avc: denied { create } for pid=3002 comm="syz.4.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 128.931991][ T3012] @ÿ: renamed from bond_slave_0 [ 129.149038][ T3014] tap0: tun_chr_ioctl cmd 2147767520 [ 129.376891][ T3015] tap0: tun_chr_ioctl cmd 1074025677 [ 129.402866][ T3015] tap0: linktype set to 1 [ 130.020016][ T3055] device sit0 left promiscuous mode [ 130.043200][ T3049] device sit0 entered promiscuous mode [ 131.537806][ T3103] device pim6reg1 entered promiscuous mode [ 133.062203][ T3150] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 134.838313][ T30] audit: type=1400 audit(1756778642.446:140): avc: denied { create } for pid=3183 comm="syz.3.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 136.197618][ T3213] bond_slave_1: mtu less than device minimum [ 137.041437][ T3227] device macsec0 entered promiscuous mode [ 137.288366][ T3231] ip6_vti0: mtu greater than device maximum [ 138.285826][ T3276] FAULT_INJECTION: forcing a failure. [ 138.285826][ T3276] name failslab, interval 1, probability 0, space 0, times 0 [ 138.298473][ T3276] CPU: 1 PID: 3276 Comm: syz.4.932 Tainted: G W syzkaller #0 [ 138.307150][ T3276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 138.317196][ T3276] Call Trace: [ 138.320470][ T3276] [ 138.323391][ T3276] __dump_stack+0x21/0x30 [ 138.327721][ T3276] dump_stack_lvl+0xee/0x150 [ 138.332305][ T3276] ? show_regs_print_info+0x20/0x20 [ 138.337527][ T3276] ? perf_swevent_hrtimer+0x46f/0x530 [ 138.342890][ T3276] ? x64_sys_call+0x219/0x9a0 [ 138.347563][ T3276] dump_stack+0x15/0x20 [ 138.351715][ T3276] should_fail+0x3c1/0x510 [ 138.356126][ T3276] __should_failslab+0xa4/0xe0 [ 138.360885][ T3276] should_failslab+0x9/0x20 [ 138.365376][ T3276] slab_pre_alloc_hook+0x3b/0xe0 [ 138.370309][ T3276] ? __sigqueue_alloc+0x137/0x210 [ 138.375326][ T3276] kmem_cache_alloc+0x44/0x260 [ 138.380080][ T3276] __sigqueue_alloc+0x137/0x210 [ 138.384970][ T3276] __send_signal+0x212/0xc30 [ 138.389561][ T3276] send_signal+0x422/0x580 [ 138.393979][ T3276] force_sig_info_to_task+0x31c/0x3f0 [ 138.399353][ T3276] force_sig+0xb7/0x100 [ 138.403515][ T3276] ? send_sig+0x70/0x70 [ 138.407693][ T3276] ? show_signal+0x1b0/0x1b0 [ 138.412279][ T3276] ? ksys_write+0x1eb/0x240 [ 138.416792][ T3276] ? __ia32_sys_read+0x90/0x90 [ 138.421647][ T3276] exc_general_protection+0xee/0x270 [ 138.426932][ T3276] ? debug_smp_processor_id+0x17/0x20 [ 138.432307][ T3276] ? do_syscall_64+0x58/0xa0 [ 138.436899][ T3276] asm_exc_general_protection+0x27/0x30 [ 138.442441][ T3276] RIP: 0033:0x7f51513d8739 [ 138.446851][ T3276] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 138.466451][ T3276] RSP: 002b:00007f514fe677c8 EFLAGS: 00010283 [ 138.472519][ T3276] RAX: 0000000000000999 RBX: 00007f514fe67d30 RCX: 00007f51515f9120 [ 138.480493][ T3276] RDX: 9999999999999999 RSI: 00007f5151482b31 RDI: 9999999999999999 [ 138.488467][ T3276] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 138.496439][ T3276] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 138.504405][ T3276] R13: 00007f514fe67eb0 R14: 9999999999999999 R15: 0000000000000000 [ 138.512364][ T3276] [ 140.047101][ T30] audit: type=1400 audit(1756778647.656:141): avc: denied { create } for pid=3317 comm="syz.1.945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 140.848507][ T3365] device pim6reg1 entered promiscuous mode [ 141.746371][ T3418] device sit0 left promiscuous mode [ 141.854278][ T3412] device sit0 entered promiscuous mode [ 141.973858][ T30] audit: type=1400 audit(1756778649.586:142): avc: denied { create } for pid=3411 comm="syz.2.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 143.129421][ T3445] FAULT_INJECTION: forcing a failure. [ 143.129421][ T3445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.228525][ T3445] CPU: 1 PID: 3445 Comm: syz.3.978 Tainted: G W syzkaller #0 [ 143.237238][ T3445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.247278][ T3445] Call Trace: [ 143.250540][ T3445] [ 143.253450][ T3445] __dump_stack+0x21/0x30 [ 143.257773][ T3445] dump_stack_lvl+0xee/0x150 [ 143.262341][ T3445] ? show_regs_print_info+0x20/0x20 [ 143.267521][ T3445] dump_stack+0x15/0x20 [ 143.271664][ T3445] should_fail+0x3c1/0x510 [ 143.276062][ T3445] should_fail_usercopy+0x1a/0x20 [ 143.281071][ T3445] _copy_from_user+0x20/0xd0 [ 143.285644][ T3445] __tun_chr_ioctl+0x1ed/0x1eb0 [ 143.290487][ T3445] ? tun_flow_create+0x320/0x320 [ 143.295412][ T3445] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 143.301553][ T3445] ? tun_chr_ioctl+0x17/0x40 [ 143.306126][ T3445] tun_chr_ioctl+0x2a/0x40 [ 143.311045][ T3445] ? tun_chr_poll+0x720/0x720 [ 143.315702][ T3445] __se_sys_ioctl+0x121/0x1a0 [ 143.320364][ T3445] __x64_sys_ioctl+0x7b/0x90 [ 143.324944][ T3445] x64_sys_call+0x2f/0x9a0 [ 143.329343][ T3445] do_syscall_64+0x4c/0xa0 [ 143.333737][ T3445] ? clear_bhb_loop+0x50/0xa0 [ 143.338396][ T3445] ? clear_bhb_loop+0x50/0xa0 [ 143.343063][ T3445] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.348936][ T3445] RIP: 0033:0x7f3d1cb7abe9 [ 143.353338][ T3445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.372920][ T3445] RSP: 002b:00007f3d1b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.381315][ T3445] RAX: ffffffffffffffda RBX: 00007f3d1cdb1fa0 RCX: 00007f3d1cb7abe9 [ 143.389272][ T3445] RDX: 0000200000000140 RSI: 00000000400454ca RDI: 000000000000000c [ 143.397224][ T3445] RBP: 00007f3d1b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 143.405183][ T3445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.413222][ T3445] R13: 00007f3d1cdb2038 R14: 00007f3d1cdb1fa0 R15: 00007ffec22b0a68 [ 143.421192][ T3445] [ 144.184876][ T3471] IPv6: : Disabled Multicast RS [ 151.065812][ T3681] FAULT_INJECTION: forcing a failure. [ 151.065812][ T3681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.081871][ T3681] CPU: 1 PID: 3681 Comm: syz.3.1054 Tainted: G W syzkaller #0 [ 151.090655][ T3681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 151.100717][ T3681] Call Trace: [ 151.103997][ T3681] [ 151.106930][ T3681] __dump_stack+0x21/0x30 [ 151.111267][ T3681] dump_stack_lvl+0xee/0x150 [ 151.115872][ T3681] ? show_regs_print_info+0x20/0x20 [ 151.121124][ T3681] ? has_cap_mac_admin+0x330/0x330 [ 151.126239][ T3681] dump_stack+0x15/0x20 [ 151.130401][ T3681] should_fail+0x3c1/0x510 [ 151.134817][ T3681] should_fail_usercopy+0x1a/0x20 [ 151.139835][ T3681] _copy_from_user+0x20/0xd0 [ 151.144445][ T3681] get_user_ifreq+0x6c/0x180 [ 151.149033][ T3681] sock_ioctl+0x605/0x6b0 [ 151.153360][ T3681] ? sock_poll+0x3d0/0x3d0 [ 151.157782][ T3681] ? __se_sys_ioctl+0x114/0x1a0 [ 151.162630][ T3681] ? sock_poll+0x3d0/0x3d0 [ 151.167047][ T3681] __se_sys_ioctl+0x121/0x1a0 [ 151.171723][ T3681] __x64_sys_ioctl+0x7b/0x90 [ 151.176308][ T3681] x64_sys_call+0x2f/0x9a0 [ 151.180719][ T3681] do_syscall_64+0x4c/0xa0 [ 151.185129][ T3681] ? clear_bhb_loop+0x50/0xa0 [ 151.189801][ T3681] ? clear_bhb_loop+0x50/0xa0 [ 151.194470][ T3681] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 151.200358][ T3681] RIP: 0033:0x7f3d1cb7abe9 [ 151.204783][ T3681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.224392][ T3681] RSP: 002b:00007f3d1b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 151.232935][ T3681] RAX: ffffffffffffffda RBX: 00007f3d1cdb1fa0 RCX: 00007f3d1cb7abe9 [ 151.240901][ T3681] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000010 [ 151.248868][ T3681] RBP: 00007f3d1b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 151.256859][ T3681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.265446][ T3681] R13: 00007f3d1cdb2038 R14: 00007f3d1cdb1fa0 R15: 00007ffec22b0a68 [ 151.273432][ T3681] [ 151.283718][ T3679] device wg2 entered promiscuous mode [ 151.666209][ T3711] device syzkaller0 entered promiscuous mode [ 151.672385][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 152.031783][ T3724] FAULT_INJECTION: forcing a failure. [ 152.031783][ T3724] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.045522][ T3724] CPU: 0 PID: 3724 Comm: syz.1.1069 Tainted: G W syzkaller #0 [ 152.054326][ T3724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 152.064379][ T3724] Call Trace: [ 152.067648][ T3724] [ 152.071084][ T3724] __dump_stack+0x21/0x30 [ 152.075404][ T3724] dump_stack_lvl+0xee/0x150 [ 152.079973][ T3724] ? show_regs_print_info+0x20/0x20 [ 152.085148][ T3724] ? __switch_to_asm+0x3a/0x60 [ 152.089891][ T3724] dump_stack+0x15/0x20 [ 152.094029][ T3724] should_fail+0x3c1/0x510 [ 152.098427][ T3724] should_fail_usercopy+0x1a/0x20 [ 152.103432][ T3724] _copy_from_user+0x20/0xd0 [ 152.108005][ T3724] br_dev_siocdevprivate+0xee/0x1320 [ 152.113273][ T3724] ? br_handle_local_finish+0x1f0/0x1f0 [ 152.118804][ T3724] ? irqentry_exit+0x37/0x40 [ 152.123809][ T3724] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 152.129685][ T3724] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 152.135824][ T3724] ? strcmp+0x29/0xb0 [ 152.139786][ T3724] dev_ifsioc+0xaf5/0xe70 [ 152.144098][ T3724] ? dev_ioctl+0xd10/0xd10 [ 152.148496][ T3724] ? __mutex_lock_slowpath+0xe/0x10 [ 152.153676][ T3724] ? mutex_lock+0x100/0x1a0 [ 152.158246][ T3724] ? wait_for_completion_killable_timeout+0x10/0x10 [ 152.164812][ T3724] ? __rcu_read_unlock+0x5e/0xa0 [ 152.169734][ T3724] dev_ioctl+0x5fd/0xd10 [ 152.174085][ T3724] sock_ioctl+0x64a/0x6b0 [ 152.178406][ T3724] ? sock_poll+0x3d0/0x3d0 [ 152.182817][ T3724] ? __se_sys_ioctl+0x62/0x1a0 [ 152.187586][ T3724] ? sock_poll+0x3d0/0x3d0 [ 152.192002][ T3724] __se_sys_ioctl+0x121/0x1a0 [ 152.196668][ T3724] __x64_sys_ioctl+0x7b/0x90 [ 152.201251][ T3724] x64_sys_call+0x2f/0x9a0 [ 152.205652][ T3724] do_syscall_64+0x4c/0xa0 [ 152.210052][ T3724] ? clear_bhb_loop+0x50/0xa0 [ 152.214715][ T3724] ? clear_bhb_loop+0x50/0xa0 [ 152.219378][ T3724] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 152.225255][ T3724] RIP: 0033:0x7fe72100bbe9 [ 152.230105][ T3724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.249790][ T3724] RSP: 002b:00007fe71fa74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 152.258189][ T3724] RAX: ffffffffffffffda RBX: 00007fe721242fa0 RCX: 00007fe72100bbe9 [ 152.266149][ T3724] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000010 [ 152.274101][ T3724] RBP: 00007fe71fa74090 R08: 0000000000000000 R09: 0000000000000000 [ 152.282057][ T3724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.290017][ T3724] R13: 00007fe721243038 R14: 00007fe721242fa0 R15: 00007fff030323c8 [ 152.297985][ T3724] [ 152.502746][ T3730] device syzkaller0 entered promiscuous mode [ 153.258899][ T3767] device veth0_vlan left promiscuous mode [ 153.365751][ T3767] device veth0_vlan entered promiscuous mode [ 153.539614][ T3782] FAULT_INJECTION: forcing a failure. [ 153.539614][ T3782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.592203][ T3782] CPU: 1 PID: 3782 Comm: syz.4.1088 Tainted: G W syzkaller #0 [ 153.601001][ T3782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 153.611050][ T3782] Call Trace: [ 153.614324][ T3782] [ 153.617248][ T3782] __dump_stack+0x21/0x30 [ 153.621569][ T3782] dump_stack_lvl+0xee/0x150 [ 153.626143][ T3782] ? show_regs_print_info+0x20/0x20 [ 153.631341][ T3782] ? dev_ioctl+0xd10/0xd10 [ 153.635752][ T3782] dump_stack+0x15/0x20 [ 153.639891][ T3782] should_fail+0x3c1/0x510 [ 153.644297][ T3782] should_fail_usercopy+0x1a/0x20 [ 153.649305][ T3782] _copy_to_user+0x20/0x90 [ 153.653701][ T3782] put_user_ifreq+0x78/0xc0 [ 153.658188][ T3782] sock_ioctl+0x67c/0x6b0 [ 153.662538][ T3782] ? sock_poll+0x3d0/0x3d0 [ 153.666942][ T3782] ? security_file_ioctl+0x84/0xa0 [ 153.672036][ T3782] ? sock_poll+0x3d0/0x3d0 [ 153.676436][ T3782] __se_sys_ioctl+0x121/0x1a0 [ 153.681101][ T3782] __x64_sys_ioctl+0x7b/0x90 [ 153.685674][ T3782] x64_sys_call+0x2f/0x9a0 [ 153.690072][ T3782] do_syscall_64+0x4c/0xa0 [ 153.694469][ T3782] ? clear_bhb_loop+0x50/0xa0 [ 153.699129][ T3782] ? clear_bhb_loop+0x50/0xa0 [ 153.703790][ T3782] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 153.709670][ T3782] RIP: 0033:0x7f51513ffbe9 [ 153.714069][ T3782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.733658][ T3782] RSP: 002b:00007f514fe68038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.742056][ T3782] RAX: ffffffffffffffda RBX: 00007f5151636fa0 RCX: 00007f51513ffbe9 [ 153.750013][ T3782] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000010 [ 153.757963][ T3782] RBP: 00007f514fe68090 R08: 0000000000000000 R09: 0000000000000000 [ 153.765923][ T3782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.773874][ T3782] R13: 00007f5151637038 R14: 00007f5151636fa0 R15: 00007ffc7e329768 [ 153.781834][ T3782] [ 153.932126][ T3792] FAULT_INJECTION: forcing a failure. [ 153.932126][ T3792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.985300][ T3792] CPU: 1 PID: 3792 Comm: syz.4.1091 Tainted: G W syzkaller #0 [ 153.994099][ T3792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 154.004151][ T3792] Call Trace: [ 154.007429][ T3792] [ 154.010356][ T3792] __dump_stack+0x21/0x30 [ 154.014782][ T3792] dump_stack_lvl+0xee/0x150 [ 154.019371][ T3792] ? show_regs_print_info+0x20/0x20 [ 154.024560][ T3792] ? stack_trace_save+0x98/0xe0 [ 154.029494][ T3792] ? __stack_depot_save+0x34/0x480 [ 154.034602][ T3792] dump_stack+0x15/0x20 [ 154.038755][ T3792] should_fail+0x3c1/0x510 [ 154.043170][ T3792] should_fail_usercopy+0x1a/0x20 [ 154.048229][ T3792] _copy_from_user+0x20/0xd0 [ 154.052817][ T3792] __copy_msghdr_from_user+0xaf/0x5e0 [ 154.058185][ T3792] ? _kstrtoull+0x3c0/0x4d0 [ 154.062690][ T3792] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 154.067976][ T3792] ? kstrtouint_from_user+0x1a0/0x200 [ 154.073346][ T3792] ___sys_sendmsg+0x156/0x260 [ 154.078033][ T3792] ? __sys_sendmsg+0x250/0x250 [ 154.082800][ T3792] ? __fdget+0x1a1/0x230 [ 154.087059][ T3792] __x64_sys_sendmsg+0x1e2/0x2a0 [ 154.092010][ T3792] ? ___sys_sendmsg+0x260/0x260 [ 154.096854][ T3792] ? ksys_write+0x1eb/0x240 [ 154.101349][ T3792] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 154.107414][ T3792] x64_sys_call+0x4b/0x9a0 [ 154.111829][ T3792] do_syscall_64+0x4c/0xa0 [ 154.116238][ T3792] ? clear_bhb_loop+0x50/0xa0 [ 154.120909][ T3792] ? clear_bhb_loop+0x50/0xa0 [ 154.125584][ T3792] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.131475][ T3792] RIP: 0033:0x7f51513ffbe9 [ 154.135887][ T3792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.155486][ T3792] RSP: 002b:00007f514fe68038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 154.163900][ T3792] RAX: ffffffffffffffda RBX: 00007f5151636fa0 RCX: 00007f51513ffbe9 [ 154.171865][ T3792] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 154.179827][ T3792] RBP: 00007f514fe68090 R08: 0000000000000000 R09: 0000000000000000 [ 154.187790][ T3792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.195753][ T3792] R13: 00007f5151637038 R14: 00007f5151636fa0 R15: 00007ffc7e329768 [ 154.203728][ T3792] [ 154.685907][ T3809] device erspan0 left promiscuous mode [ 154.735051][ T3809] GPL: port 1(erspan0) entered disabled state [ 154.934653][ T3820] FAULT_INJECTION: forcing a failure. [ 154.934653][ T3820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.024834][ T3820] CPU: 1 PID: 3820 Comm: syz.4.1101 Tainted: G W syzkaller #0 [ 155.033626][ T3820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 155.043677][ T3820] Call Trace: [ 155.046948][ T3820] [ 155.049871][ T3820] __dump_stack+0x21/0x30 [ 155.054377][ T3820] dump_stack_lvl+0xee/0x150 [ 155.058962][ T3820] ? show_regs_print_info+0x20/0x20 [ 155.064156][ T3820] dump_stack+0x15/0x20 [ 155.068307][ T3820] should_fail+0x3c1/0x510 [ 155.072720][ T3820] should_fail_usercopy+0x1a/0x20 [ 155.077739][ T3820] _copy_to_user+0x20/0x90 [ 155.082152][ T3820] simple_read_from_buffer+0xe9/0x160 [ 155.087522][ T3820] proc_fail_nth_read+0x19a/0x210 [ 155.092549][ T3820] ? proc_fault_inject_write+0x2f0/0x2f0 [ 155.098180][ T3820] ? security_file_permission+0x83/0xa0 [ 155.103739][ T3820] ? proc_fault_inject_write+0x2f0/0x2f0 [ 155.109385][ T3820] vfs_read+0x282/0xbe0 [ 155.113535][ T3820] ? kernel_read+0x1f0/0x1f0 [ 155.118131][ T3820] ? __kasan_check_write+0x14/0x20 [ 155.123252][ T3820] ? mutex_lock+0x95/0x1a0 [ 155.127664][ T3820] ? wait_for_completion_killable_timeout+0x10/0x10 [ 155.134249][ T3820] ? __fget_files+0x2c4/0x320 [ 155.138930][ T3820] ? __fdget_pos+0x2d2/0x380 [ 155.143513][ T3820] ? ksys_read+0x71/0x240 [ 155.147856][ T3820] ksys_read+0x140/0x240 [ 155.152114][ T3820] ? vfs_write+0xf70/0xf70 [ 155.156525][ T3820] __x64_sys_read+0x7b/0x90 [ 155.161026][ T3820] x64_sys_call+0x96d/0x9a0 [ 155.165522][ T3820] do_syscall_64+0x4c/0xa0 [ 155.169934][ T3820] ? clear_bhb_loop+0x50/0xa0 [ 155.174607][ T3820] ? clear_bhb_loop+0x50/0xa0 [ 155.179279][ T3820] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 155.185167][ T3820] RIP: 0033:0x7f51513fe5fc [ 155.189575][ T3820] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 155.209176][ T3820] RSP: 002b:00007f514fe68030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 155.217593][ T3820] RAX: ffffffffffffffda RBX: 00007f5151636fa0 RCX: 00007f51513fe5fc [ 155.225572][ T3820] RDX: 000000000000000f RSI: 00007f514fe680a0 RDI: 0000000000000011 [ 155.233539][ T3820] RBP: 00007f514fe68090 R08: 0000000000000000 R09: 0000000000000000 [ 155.241506][ T3820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.249475][ T3820] R13: 00007f5151637038 R14: 00007f5151636fa0 R15: 00007ffc7e329768 [ 155.257455][ T3820] [ 156.277791][ T3852] FAULT_INJECTION: forcing a failure. [ 156.277791][ T3852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.402111][ T3852] CPU: 1 PID: 3852 Comm: syz.4.1109 Tainted: G W syzkaller #0 [ 156.410913][ T3852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 156.420968][ T3852] Call Trace: [ 156.424247][ T3852] [ 156.427171][ T3852] __dump_stack+0x21/0x30 [ 156.431508][ T3852] dump_stack_lvl+0xee/0x150 [ 156.436095][ T3852] ? show_regs_print_info+0x20/0x20 [ 156.441288][ T3852] ? stack_trace_save+0x98/0xe0 [ 156.446133][ T3852] ? __stack_depot_save+0x34/0x480 [ 156.451240][ T3852] dump_stack+0x15/0x20 [ 156.455394][ T3852] should_fail+0x3c1/0x510 [ 156.459806][ T3852] should_fail_usercopy+0x1a/0x20 [ 156.464825][ T3852] _copy_from_user+0x20/0xd0 [ 156.469415][ T3852] __copy_msghdr_from_user+0x448/0x5e0 [ 156.474879][ T3852] ? _kstrtoull+0x3c0/0x4d0 [ 156.479376][ T3852] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 156.484652][ T3852] ? kstrtouint_from_user+0x1a0/0x200 [ 156.490025][ T3852] ___sys_sendmsg+0x156/0x260 [ 156.494697][ T3852] ? __sys_sendmsg+0x250/0x250 [ 156.499458][ T3852] ? __fdget+0x1a1/0x230 [ 156.503696][ T3852] __x64_sys_sendmsg+0x1e2/0x2a0 [ 156.508627][ T3852] ? ___sys_sendmsg+0x260/0x260 [ 156.513476][ T3852] ? ksys_write+0x1eb/0x240 [ 156.517974][ T3852] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 156.524039][ T3852] x64_sys_call+0x4b/0x9a0 [ 156.528481][ T3852] do_syscall_64+0x4c/0xa0 [ 156.532896][ T3852] ? clear_bhb_loop+0x50/0xa0 [ 156.537566][ T3852] ? clear_bhb_loop+0x50/0xa0 [ 156.542241][ T3852] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.548125][ T3852] RIP: 0033:0x7f51513ffbe9 [ 156.552537][ T3852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.572143][ T3852] RSP: 002b:00007f514fe68038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.580653][ T3852] RAX: ffffffffffffffda RBX: 00007f5151636fa0 RCX: 00007f51513ffbe9 [ 156.588797][ T3852] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 156.596880][ T3852] RBP: 00007f514fe68090 R08: 0000000000000000 R09: 0000000000000000 [ 156.604850][ T3852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.612814][ T3852] R13: 00007f5151637038 R14: 00007f5151636fa0 R15: 00007ffc7e329768 [ 156.620876][ T3852] [ 158.695437][ T3903] FAULT_INJECTION: forcing a failure. [ 158.695437][ T3903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.881654][ T3903] CPU: 1 PID: 3903 Comm: syz.2.1125 Tainted: G W syzkaller #0 [ 158.890451][ T3903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 158.900517][ T3903] Call Trace: [ 158.903795][ T3903] [ 158.906816][ T3903] __dump_stack+0x21/0x30 [ 158.911241][ T3903] dump_stack_lvl+0xee/0x150 [ 158.915836][ T3903] ? show_regs_print_info+0x20/0x20 [ 158.921040][ T3903] ? stack_trace_save+0x98/0xe0 [ 158.925917][ T3903] dump_stack+0x15/0x20 [ 158.930072][ T3903] should_fail+0x3c1/0x510 [ 158.934489][ T3903] should_fail_usercopy+0x1a/0x20 [ 158.939515][ T3903] _copy_from_user+0x20/0xd0 [ 158.944118][ T3903] iovec_from_user+0x1bc/0x2f0 [ 158.948886][ T3903] ? __copy_msghdr_from_user+0x302/0x5e0 [ 158.954522][ T3903] ? _kstrtoull+0x3c0/0x4d0 [ 158.959028][ T3903] __import_iovec+0x71/0x400 [ 158.963626][ T3903] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 158.968919][ T3903] ? kstrtouint_from_user+0x1a0/0x200 [ 158.974294][ T3903] import_iovec+0x7c/0xb0 [ 158.978628][ T3903] ___sys_sendmsg+0x1b9/0x260 [ 158.983311][ T3903] ? __sys_sendmsg+0x250/0x250 [ 158.988086][ T3903] ? __fdget+0x1a1/0x230 [ 158.992333][ T3903] __x64_sys_sendmsg+0x1e2/0x2a0 [ 158.997273][ T3903] ? ___sys_sendmsg+0x260/0x260 [ 159.002112][ T3903] ? ksys_write+0x1eb/0x240 [ 159.006687][ T3903] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 159.012738][ T3903] x64_sys_call+0x4b/0x9a0 [ 159.017165][ T3903] do_syscall_64+0x4c/0xa0 [ 159.021656][ T3903] ? clear_bhb_loop+0x50/0xa0 [ 159.026351][ T3903] ? clear_bhb_loop+0x50/0xa0 [ 159.031014][ T3903] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 159.036894][ T3903] RIP: 0033:0x7f9498b01be9 [ 159.041296][ T3903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.060890][ T3903] RSP: 002b:00007f949756a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 159.069293][ T3903] RAX: ffffffffffffffda RBX: 00007f9498d38fa0 RCX: 00007f9498b01be9 [ 159.077253][ T3903] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 159.085209][ T3903] RBP: 00007f949756a090 R08: 0000000000000000 R09: 0000000000000000 [ 159.093250][ T3903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.101206][ T3903] R13: 00007f9498d39038 R14: 00007f9498d38fa0 R15: 00007fffaa11e158 [ 159.109169][ T3903] [ 160.483318][ T3914] device syzkaller0 entered promiscuous mode [ 161.052346][ T3922] FAULT_INJECTION: forcing a failure. [ 161.052346][ T3922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 161.241013][ T3922] CPU: 0 PID: 3922 Comm: syz.3.1131 Tainted: G W syzkaller #0 [ 161.249833][ T3922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 161.259904][ T3922] Call Trace: [ 161.263225][ T3922] [ 161.266285][ T3922] __dump_stack+0x21/0x30 [ 161.270820][ T3922] dump_stack_lvl+0xee/0x150 [ 161.275684][ T3922] ? show_regs_print_info+0x20/0x20 [ 161.280899][ T3922] ? avc_has_extended_perms+0x95f/0xdc0 [ 161.286458][ T3922] dump_stack+0x15/0x20 [ 161.290915][ T3922] should_fail+0x3c1/0x510 [ 161.295671][ T3922] should_fail_usercopy+0x1a/0x20 [ 161.300726][ T3922] _copy_from_user+0x20/0xd0 [ 161.305360][ T3922] ip6_tnl_siocdevprivate+0x3cc/0xe40 [ 161.310772][ T3922] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 161.316409][ T3922] ? ip6_tnl_start_xmit+0x1320/0x1320 [ 161.321905][ T3922] ? kstrtol_from_user+0x260/0x260 [ 161.327023][ T3922] ? full_name_hash+0xa0/0xf0 [ 161.331712][ T3922] dev_ifsioc+0xaf5/0xe70 [ 161.336053][ T3922] ? dev_ioctl+0xd10/0xd10 [ 161.340658][ T3922] ? __kasan_check_write+0x14/0x20 [ 161.345770][ T3922] ? mutex_lock+0x95/0x1a0 [ 161.350194][ T3922] ? wait_for_completion_killable_timeout+0x10/0x10 [ 161.356782][ T3922] ? dev_get_by_name_rcu+0xc8/0xf0 [ 161.361900][ T3922] dev_ioctl+0x5fd/0xd10 [ 161.366236][ T3922] sock_ioctl+0x64a/0x6b0 [ 161.370563][ T3922] ? sock_poll+0x3d0/0x3d0 [ 161.374974][ T3922] ? security_file_ioctl+0x84/0xa0 [ 161.380079][ T3922] ? sock_poll+0x3d0/0x3d0 [ 161.384494][ T3922] __se_sys_ioctl+0x121/0x1a0 [ 161.389168][ T3922] __x64_sys_ioctl+0x7b/0x90 [ 161.393757][ T3922] x64_sys_call+0x2f/0x9a0 [ 161.398213][ T3922] do_syscall_64+0x4c/0xa0 [ 161.402625][ T3922] ? clear_bhb_loop+0x50/0xa0 [ 161.407647][ T3922] ? clear_bhb_loop+0x50/0xa0 [ 161.412330][ T3922] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.418227][ T3922] RIP: 0033:0x7f3d1cb7abe9 [ 161.422641][ T3922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.442246][ T3922] RSP: 002b:00007f3d1b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.450662][ T3922] RAX: ffffffffffffffda RBX: 00007f3d1cdb1fa0 RCX: 00007f3d1cb7abe9 [ 161.458649][ T3922] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 161.466621][ T3922] RBP: 00007f3d1b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 161.474593][ T3922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.482569][ T3922] R13: 00007f3d1cdb2038 R14: 00007f3d1cdb1fa0 R15: 00007ffec22b0a68 [ 161.490545][ T3922] [ 163.282566][ T3954] device bridge_slave_1 left promiscuous mode [ 163.288761][ T3954] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.553016][ T3954] device bridge_slave_0 left promiscuous mode [ 163.559187][ T3954] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.591023][ T3972] device pim6reg1 entered promiscuous mode [ 164.901732][ T3989] syz.4.1153[3989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.901829][ T3989] syz.4.1153[3989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.177708][ T3998] device pim6reg1 entered promiscuous mode [ 166.840678][ C1] sched: RT throttling activated [ 166.923918][ T4020] device veth1_macvtap left promiscuous mode [ 166.954169][ T4020] device veth1_macvtap entered promiscuous mode [ 166.992549][ T4020] device macsec0 entered promiscuous mode [ 167.060290][ T4026] device sit0 left promiscuous mode [ 167.166300][ T4026] device sit0 entered promiscuous mode [ 169.002379][ T4079] device veth1_macvtap entered promiscuous mode [ 169.020569][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.936104][ T4099] device syzkaller0 entered promiscuous mode [ 172.808326][ T30] audit: type=1400 audit(1756778680.416:143): avc: denied { create } for pid=4159 comm="syz.1.1205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 173.225375][ T4170] device sit0 entered promiscuous mode [ 174.620097][ T30] audit: type=1400 audit(1756778682.226:144): avc: denied { associate } for pid=4220 comm="syz.1.1225" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 178.834122][ T30] audit: type=1400 audit(1756778686.416:145): avc: denied { read } for pid=4287 comm="syz.2.1246" dev="nsfs" ino=4026532463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 179.058117][ T30] audit: type=1400 audit(1756778686.446:146): avc: denied { open } for pid=4287 comm="syz.2.1246" path="cgroup:[4026532463]" dev="nsfs" ino=4026532463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 179.690851][ T4300] device sit0 left promiscuous mode [ 180.172274][ T30] audit: type=1400 audit(1756778687.766:147): avc: denied { create } for pid=4303 comm="syz.0.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 180.847620][ T4333] syz.3.1259[4333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.847721][ T4333] syz.3.1259[4333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.031800][ T4333] syz.3.1259[4333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.053434][ T4333] syz.3.1259[4333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.851524][ T4368] device sit0 entered promiscuous mode [ 182.735820][ T30] audit: type=1400 audit(1756778690.346:148): avc: denied { create } for pid=4404 comm="syz.1.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 182.917838][ T4413] device sit0 left promiscuous mode [ 183.142313][ T4415] device sit0 entered promiscuous mode [ 186.851064][ T4515] device veth1_macvtap left promiscuous mode [ 186.858953][ T4515] device macsec0 entered promiscuous mode [ 187.516620][ T4537] device sit0 left promiscuous mode [ 187.536954][ T4543] device sit0 entered promiscuous mode [ 187.773856][ T30] audit: type=1400 audit(1756778695.386:149): avc: denied { ioctl } for pid=4541 comm="syz.1.1320" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 189.385760][ T4575] device syzkaller0 entered promiscuous mode [ 189.530964][ T4572] device veth0_vlan left promiscuous mode [ 189.580907][ T4572] device veth0_vlan entered promiscuous mode [ 189.994534][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.152132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.159736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.958827][ T30] audit: type=1400 audit(1756778700.566:150): avc: denied { append } for pid=4675 comm="syz.0.1358" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 193.106090][ T30] audit: type=1400 audit(1756778700.716:151): avc: denied { create } for pid=4677 comm="syz.0.1359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 194.116143][ T4700] device syzkaller0 entered promiscuous mode [ 195.836260][ T4730] syz.1.1373[4730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.836359][ T4730] syz.1.1373[4730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.974128][ T30] audit: type=1400 audit(1756778703.586:152): avc: denied { write } for pid=4729 comm="syz.1.1373" name="cgroup.subtree_control" dev="cgroup2" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 196.410995][ T30] audit: type=1400 audit(1756778703.586:153): avc: denied { open } for pid=4729 comm="syz.1.1373" path="" dev="cgroup2" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 199.513857][ T4833] device sit0 entered promiscuous mode [ 199.726250][ T4855] device sit0 left promiscuous mode [ 199.871716][ T4845] device sit0 left promiscuous mode [ 200.262588][ T4864] device sit0 entered promiscuous mode [ 200.857237][ T4863] device sit0 entered promiscuous mode [ 201.540453][ T4894] device sit0 left promiscuous mode [ 202.371864][ T4890] device sit0 entered promiscuous mode [ 202.500191][ T4922] device wg2 left promiscuous mode [ 202.524922][ T4922] device wg2 entered promiscuous mode [ 202.924562][ T30] audit: type=1400 audit(1756778710.536:154): avc: denied { create } for pid=4948 comm="syz.4.1431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 204.084723][ T4983] device sit0 left promiscuous mode [ 204.558829][ T5021] device pim6reg1 entered promiscuous mode [ 205.193745][ T5069] device wg2 left promiscuous mode [ 205.278342][ T5079] device pim6reg1 entered promiscuous mode [ 205.333179][ T5079] syz.4.1471[5079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.333250][ T5079] syz.4.1471[5079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.921606][ T101] udevd[101]: worker [822] terminated by signal 33 (Unknown signal 33) [ 205.974457][ T101] udevd[101]: worker [822] failed while handling '/devices/virtual/block/loop4' [ 208.423413][ T5187] ip6_vti0: mtu greater than device maximum [ 208.430412][ T5187] ip6_vti0: mtu greater than device maximum [ 208.449007][ T5187] ip6_vti0: mtu greater than device maximum [ 208.461293][ T5187] ip6_vti0: mtu greater than device maximum [ 208.473847][ T5187] ip6_vti0: mtu greater than device maximum [ 208.490138][ T30] audit: type=1400 audit(1756778716.096:155): avc: denied { create } for pid=5190 comm="syz.2.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 208.511805][ T5187] ip6_vti0: mtu greater than device maximum [ 208.517752][ T5187] ip6_vti0: mtu greater than device maximum [ 208.536300][ T5187] ip6_vti0: mtu greater than device maximum [ 208.556398][ T5187] ip6_vti0: mtu greater than device maximum [ 208.590751][ T5187] ip6_vti0: mtu greater than device maximum [ 208.969183][ T5203] device sit0 entered promiscuous mode [ 209.593950][ T5231] device veth1_macvtap left promiscuous mode [ 209.599973][ T5231] device macsec0 left promiscuous mode [ 211.208302][ T5245] device pim6reg1 entered promiscuous mode [ 211.826347][ T5264] device sit0 left promiscuous mode [ 211.920951][ T5267] device sit0 entered promiscuous mode [ 216.725322][ T5425] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 216.790898][ T5425] syzkaller0: owner set to 1 [ 218.575634][ T5532] tap0: tun_chr_ioctl cmd 2147767521 [ 220.440613][ T5574] GPL: port 1(erspan0) entered blocking state [ 220.447245][ T5574] GPL: port 1(erspan0) entered disabled state [ 220.466476][ T5574] device erspan0 entered promiscuous mode [ 220.478626][ T5574] GPL: port 1(erspan0) entered blocking state [ 220.484831][ T5574] GPL: port 1(erspan0) entered forwarding state [ 220.790784][ T30] audit: type=1400 audit(1756778728.396:156): avc: denied { create } for pid=5596 comm="syz.1.1625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 221.358534][ T5622] device sit0 left promiscuous mode [ 221.617466][ T5622] device sit0 entered promiscuous mode [ 222.620620][ T5671] device wg2 left promiscuous mode [ 222.715342][ T5684] bridge0: port 3(veth0) entered blocking state [ 222.756022][ T5684] bridge0: port 3(veth0) entered disabled state [ 222.771249][ T5684] device veth0 entered promiscuous mode [ 223.010927][ T30] audit: type=1400 audit(1756778730.616:157): avc: denied { create } for pid=5705 comm="syz.4.1654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 225.941619][ T5792] device sit0 left promiscuous mode [ 226.186932][ T5792] device sit0 entered promiscuous mode [ 226.964711][ T5821] device syzkaller0 entered promiscuous mode [ 228.800508][ T5856] device sit0 left promiscuous mode [ 229.196203][ T5884] syz.0.1702[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.196272][ T5884] syz.0.1702[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.930317][ T5925] syz.1.1719[5925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.090859][ T5925] syz.1.1719[5925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.491623][ T6200] device syzkaller0 entered promiscuous mode [ 238.238255][ T6236] syz.2.1815[6236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.060820][ T6279] device veth0_vlan left promiscuous mode [ 240.082393][ T6279] device veth0_vlan entered promiscuous mode [ 240.091491][ T6278] device bridge_slave_1 left promiscuous mode [ 240.097910][ T6278] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.106906][ T6278] device bridge_slave_0 left promiscuous mode [ 240.113275][ T6278] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.350067][ T6350] device veth0_vlan left promiscuous mode [ 241.378918][ T6350] device veth0_vlan entered promiscuous mode [ 241.474314][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.483089][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.491616][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.229632][ T6391] device syzkaller0 entered promiscuous mode [ 242.627843][ T6429] device sit0 left promiscuous mode [ 243.231856][ T6443] device pim6reg1 entered promiscuous mode [ 243.276754][ T6448] syz.2.1886[6448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.276852][ T6448] syz.2.1886[6448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.551981][ T6511] device veth0_vlan left promiscuous mode [ 244.655420][ T6511] device veth0_vlan entered promiscuous mode [ 244.845812][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.870097][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.880037][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 247.342852][ T30] audit: type=1400 audit(1756778754.956:158): avc: denied { ioctl } for pid=6633 comm="syz.2.1944" path="" dev="cgroup2" ino=178 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 248.418926][ T6671] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 248.608625][ T6671] syzkaller0: Linktype set failed because interface is up [ 249.169913][ T6684] device veth0_vlan left promiscuous mode [ 249.176706][ T6684] device veth0_vlan entered promiscuous mode [ 249.797171][ T6715] Â: renamed from pim6reg1 [ 249.982661][ T6721] device veth1_macvtap entered promiscuous mode [ 250.005787][ T6721] device macsec0 entered promiscuous mode [ 250.041680][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.248552][ T6732] device sit0 left promiscuous mode [ 250.412946][ T6732] device sit0 entered promiscuous mode [ 250.765807][ T6742] device wg2 entered promiscuous mode [ 251.701544][ T6788] device syzkaller0 entered promiscuous mode [ 253.276347][ T6876] device sit0 left promiscuous mode [ 253.361585][ T6868] device syzkaller0 entered promiscuous mode [ 253.405863][ T6876] device sit0 entered promiscuous mode [ 257.555383][ T6969] FAULT_INJECTION: forcing a failure. [ 257.555383][ T6969] name failslab, interval 1, probability 0, space 0, times 0 [ 257.569546][ T6975] device sit0 left promiscuous mode [ 257.585048][ T6969] CPU: 1 PID: 6969 Comm: syz.0.2053 Tainted: G W syzkaller #0 [ 257.593858][ T6969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 257.603925][ T6969] Call Trace: [ 257.607778][ T6969] [ 257.610711][ T6969] __dump_stack+0x21/0x30 [ 257.615056][ T6969] dump_stack_lvl+0xee/0x150 [ 257.619642][ T6969] ? show_regs_print_info+0x20/0x20 [ 257.624860][ T6969] ? dump_stack+0x9/0x20 [ 257.629132][ T6969] ? dump_stack_lvl+0x1/0x150 [ 257.633822][ T6969] dump_stack+0x15/0x20 [ 257.638064][ T6969] should_fail+0x3c1/0x510 [ 257.642475][ T6969] __should_failslab+0xa4/0xe0 [ 257.647331][ T6969] should_failslab+0x9/0x20 [ 257.652029][ T6969] slab_pre_alloc_hook+0x3b/0xe0 [ 257.656977][ T6969] ? sk_prot_alloc+0x5f/0x320 [ 257.661667][ T6969] kmem_cache_alloc+0x44/0x260 [ 257.666436][ T6969] sk_prot_alloc+0x5f/0x320 [ 257.670933][ T6969] sk_alloc+0x38/0x430 [ 257.674999][ T6969] __vsock_create+0x3e/0x940 [ 257.679598][ T6969] vsock_create+0x13b/0x3f0 [ 257.684110][ T6969] __sock_create+0x38d/0x7a0 [ 257.688703][ T6969] __sys_socketpair+0x1a1/0x590 [ 257.693555][ T6969] __x64_sys_socketpair+0x9b/0xb0 [ 257.698580][ T6969] x64_sys_call+0x36/0x9a0 [ 257.703009][ T6969] do_syscall_64+0x4c/0xa0 [ 257.707436][ T6969] ? clear_bhb_loop+0x50/0xa0 [ 257.712120][ T6969] ? clear_bhb_loop+0x50/0xa0 [ 257.716796][ T6969] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 257.722948][ T6969] RIP: 0033:0x7fb6e83aabe9 [ 257.727384][ T6969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.747017][ T6969] RSP: 002b:00007fb6e6e13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 257.755444][ T6969] RAX: ffffffffffffffda RBX: 00007fb6e85e1fa0 RCX: 00007fb6e83aabe9 [ 257.763416][ T6969] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000028 [ 257.771394][ T6969] RBP: 00007fb6e6e13090 R08: 0000000000000000 R09: 0000000000000000 [ 257.779382][ T6969] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 257.787363][ T6969] R13: 00007fb6e85e2038 R14: 00007fb6e85e1fa0 R15: 00007ffd951ea208 [ 257.795446][ T6969] [ 257.808896][ T6982] device sit0 entered promiscuous mode [ 258.630049][ T7019] device wg2 entered promiscuous mode [ 259.491493][ T30] audit: type=1400 audit(1756778767.106:159): avc: denied { create } for pid=7046 comm="syz.3.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 260.123537][ T7055] device pim6reg1 entered promiscuous mode [ 260.243693][ T7063] device pim6reg1 entered promiscuous mode [ 261.015146][ T7081] device syzkaller0 entered promiscuous mode [ 262.219046][ T7147] device veth1_macvtap left promiscuous mode [ 263.242530][ T7172] device sit0 entered promiscuous mode [ 263.356464][ T7213] device syzkaller0 entered promiscuous mode [ 265.461404][ T7259] device sit0 left promiscuous mode [ 266.788134][ T7273] device wg2 left promiscuous mode [ 267.356608][ T7286] GPL: port 1(veth0_to_team) entered blocking state [ 267.396959][ T7286] GPL: port 1(veth0_to_team) entered disabled state [ 267.432978][ T7286] device veth0_to_team entered promiscuous mode [ 268.057816][ T7307] device syzkaller0 entered promiscuous mode [ 268.378567][ T7321] device veth0_vlan left promiscuous mode [ 268.431584][ T7321] device veth0_vlan entered promiscuous mode [ 268.446696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.455198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.462737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.478533][ T7325] device wg2 left promiscuous mode [ 269.135705][ T7372] device veth0_vlan left promiscuous mode [ 269.180085][ T7372] device veth0_vlan entered promiscuous mode [ 269.206811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.215200][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.231421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 271.741145][ T7473] device sit0 left promiscuous mode [ 272.023083][ T7463] device syzkaller0 entered promiscuous mode [ 273.440785][ T7548] device pim6reg1 entered promiscuous mode [ 274.056097][ T7564] device syzkaller0 entered promiscuous mode [ 278.492246][ T7653] device pim6reg1 entered promiscuous mode [ 278.616629][ T7659] device sit0 left promiscuous mode [ 278.807762][ T7659] device sit0 entered promiscuous mode [ 279.879234][ T7680] device sit0 left promiscuous mode [ 280.284772][ T7680] device sit0 entered promiscuous mode [ 281.733065][ T7722] FAULT_INJECTION: forcing a failure. [ 281.733065][ T7722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.889422][ T7722] CPU: 1 PID: 7722 Comm: syz.1.2310 Tainted: G W syzkaller #0 [ 281.898395][ T7722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 281.908481][ T7722] Call Trace: [ 281.911760][ T7722] [ 281.914696][ T7722] __dump_stack+0x21/0x30 [ 281.919032][ T7722] dump_stack_lvl+0xee/0x150 [ 281.923619][ T7722] ? show_regs_print_info+0x20/0x20 [ 281.928816][ T7722] dump_stack+0x15/0x20 [ 281.932964][ T7722] should_fail+0x3c1/0x510 [ 281.937393][ T7722] should_fail_usercopy+0x1a/0x20 [ 281.942415][ T7722] _copy_to_user+0x20/0x90 [ 281.946832][ T7722] simple_read_from_buffer+0xe9/0x160 [ 281.952220][ T7722] proc_fail_nth_read+0x19a/0x210 [ 281.957271][ T7722] ? proc_fault_inject_write+0x2f0/0x2f0 [ 281.962898][ T7722] ? security_file_permission+0x83/0xa0 [ 281.968440][ T7722] ? proc_fault_inject_write+0x2f0/0x2f0 [ 281.974070][ T7722] vfs_read+0x282/0xbe0 [ 281.978223][ T7722] ? kernel_read+0x1f0/0x1f0 [ 281.982813][ T7722] ? __kasan_check_write+0x14/0x20 [ 281.987924][ T7722] ? mutex_lock+0x95/0x1a0 [ 281.992343][ T7722] ? wait_for_completion_killable_timeout+0x10/0x10 [ 281.998947][ T7722] ? __fget_files+0x2c4/0x320 [ 282.003811][ T7722] ? __fdget_pos+0x2d2/0x380 [ 282.008394][ T7722] ? ksys_read+0x71/0x240 [ 282.012722][ T7722] ksys_read+0x140/0x240 [ 282.016957][ T7722] ? vfs_write+0xf70/0xf70 [ 282.021375][ T7722] ? debug_smp_processor_id+0x17/0x20 [ 282.026746][ T7722] __x64_sys_read+0x7b/0x90 [ 282.031280][ T7722] x64_sys_call+0x96d/0x9a0 [ 282.035788][ T7722] do_syscall_64+0x4c/0xa0 [ 282.040197][ T7722] ? clear_bhb_loop+0x50/0xa0 [ 282.044877][ T7722] ? clear_bhb_loop+0x50/0xa0 [ 282.049553][ T7722] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 282.055440][ T7722] RIP: 0033:0x7fe72100a5fc [ 282.059854][ T7722] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 282.079460][ T7722] RSP: 002b:00007fe71fa74030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.087879][ T7722] RAX: ffffffffffffffda RBX: 00007fe721242fa0 RCX: 00007fe72100a5fc [ 282.095847][ T7722] RDX: 000000000000000f RSI: 00007fe71fa740a0 RDI: 0000000000000009 [ 282.103822][ T7722] RBP: 00007fe71fa74090 R08: 0000000000000000 R09: 0000000000000000 [ 282.111792][ T7722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.119758][ T7722] R13: 00007fe721243038 R14: 00007fe721242fa0 R15: 00007fff030323c8 [ 282.127738][ T7722] [ 282.287346][ T7730] device sit0 left promiscuous mode [ 282.426435][ T7730] device sit0 entered promiscuous mode [ 283.037824][ T7750] device syzkaller0 left promiscuous mode [ 286.213197][ T7793] device pim6reg1 entered promiscuous mode [ 286.888412][ T7822] device pim6reg1 entered promiscuous mode [ 290.866838][ T7866] device pim6reg1 entered promiscuous mode [ 292.936001][ T7889] device pim6reg1 entered promiscuous mode [ 293.133145][ T7893] device syzkaller0 entered promiscuous mode [ 295.486203][ T7930] device syzkaller0 entered promiscuous mode [ 297.453275][ T8044] syz.3.2425[8044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.453392][ T8044] syz.3.2425[8044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.848542][ T8081] device syzkaller0 entered promiscuous mode [ 299.715433][ T8156] syz.4.2459[8156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.378790][ T8166] device veth0_vlan left promiscuous mode [ 300.514451][ T8166] device veth0_vlan entered promiscuous mode [ 300.523191][ T8165] device veth0_vlan left promiscuous mode [ 300.529438][ T8165] device veth0_vlan entered promiscuous mode [ 300.546524][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.556746][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.577642][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 300.587305][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.608425][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.619750][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.628887][ T8172] device sit0 entered promiscuous mode [ 301.440983][ T8207] syz.1.2475[8207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.526036][ T8220] device syzkaller0 entered promiscuous mode [ 303.445316][ T8257] device syzkaller0 entered promiscuous mode [ 305.336915][ T8325] device syzkaller0 entered promiscuous mode [ 305.626126][ T8339] device syzkaller0 entered promiscuous mode [ 306.955313][ T8408] device pim6reg1 entered promiscuous mode [ 308.582061][ T8495] device veth1_macvtap left promiscuous mode [ 308.588151][ T8495] device macsec0 left promiscuous mode [ 308.651035][ T8499] syz.1.2572[8499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.651112][ T8499] syz.1.2572[8499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.677231][ T8499] syz.1.2572[8499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.699921][ T8499] syz.1.2572[8499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.868379][ T30] audit: type=1400 audit(1756778816.476:160): avc: denied { create } for pid=8510 comm="syz.4.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 309.545056][ T8526] device pim6reg1 entered promiscuous mode [ 314.152494][ T30] audit: type=1400 audit(1756778821.756:161): avc: denied { create } for pid=8627 comm="syz.1.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 314.570088][ T8670] device sit0 left promiscuous mode [ 314.582812][ T8668] device veth0_vlan left promiscuous mode [ 314.590367][ T8668] device veth0_vlan entered promiscuous mode [ 314.606987][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.618831][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 314.632542][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.653567][ T8670] device sit0 entered promiscuous mode [ 318.110059][ T8822] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 318.116086][ T8822] syzkaller1: linktype set to 780 [ 318.369277][ T8843] device syzkaller0 entered promiscuous mode [ 318.701314][ T8854] device wg2 left promiscuous mode [ 318.822093][ T8854] device wg2 entered promiscuous mode [ 320.068015][ T8883] FAULT_INJECTION: forcing a failure. [ 320.068015][ T8883] name failslab, interval 1, probability 0, space 0, times 0 [ 320.300872][ T8883] CPU: 0 PID: 8883 Comm: syz.4.2709 Tainted: G W syzkaller #0 [ 320.309670][ T8883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 320.319723][ T8883] Call Trace: [ 320.323001][ T8883] [ 320.325931][ T8883] __dump_stack+0x21/0x30 [ 320.330259][ T8883] dump_stack_lvl+0xee/0x150 [ 320.334845][ T8883] ? show_regs_print_info+0x20/0x20 [ 320.340042][ T8883] ? avc_has_perm_noaudit+0x2f4/0x460 [ 320.345421][ T8883] dump_stack+0x15/0x20 [ 320.349580][ T8883] should_fail+0x3c1/0x510 [ 320.353995][ T8883] __should_failslab+0xa4/0xe0 [ 320.358766][ T8883] should_failslab+0x9/0x20 [ 320.363276][ T8883] slab_pre_alloc_hook+0x3b/0xe0 [ 320.368222][ T8883] ? __alloc_skb+0xe0/0x740 [ 320.372729][ T8883] kmem_cache_alloc+0x44/0x260 [ 320.377497][ T8883] __alloc_skb+0xe0/0x740 [ 320.381827][ T8883] alloc_skb_with_frags+0xa8/0x620 [ 320.386937][ T8883] ? cmp_ex_search+0x1e/0x80 [ 320.391534][ T8883] ? bsearch+0x96/0xc0 [ 320.395596][ T8883] ? search_extable+0xd0/0xd0 [ 320.400271][ T8883] ? strncpy_from_kernel_nofault+0x8a/0x1c0 [ 320.406170][ T8883] sock_alloc_send_pskb+0x853/0x980 [ 320.411369][ T8883] ? strncpy_from_kernel_nofault+0x8a/0x1c0 [ 320.417266][ T8883] ? is_bpf_text_address+0x177/0x190 [ 320.422645][ T8883] ? __kernel_text_address+0xa0/0x100 [ 320.428023][ T8883] ? sock_kzfree_s+0x60/0x60 [ 320.432616][ T8883] ? kernelmode_fixup_or_oops+0x85/0xd0 [ 320.438174][ T8883] tun_get_user+0x4e6/0x33c0 [ 320.442772][ T8883] ? tun_do_read+0x1c40/0x1c40 [ 320.447540][ T8883] ? kstrtouint_from_user+0x1a0/0x200 [ 320.452911][ T8883] ? kstrtol_from_user+0x260/0x260 [ 320.458156][ T8883] ? bpf_probe_read_compat_str+0x156/0x180 [ 320.463966][ T8883] ? avc_policy_seqno+0x1b/0x70 [ 320.468908][ T8883] ? selinux_file_permission+0x2aa/0x510 [ 320.474542][ T8883] tun_chr_write_iter+0x1eb/0x2e0 [ 320.479582][ T8883] vfs_write+0x802/0xf70 [ 320.483829][ T8883] ? file_end_write+0x1b0/0x1b0 [ 320.488942][ T8883] ? __fget_files+0x2c4/0x320 [ 320.493628][ T8883] ? __fdget_pos+0x1f7/0x380 [ 320.498219][ T8883] ? ksys_write+0x71/0x240 [ 320.502837][ T8883] ksys_write+0x140/0x240 [ 320.507172][ T8883] ? __ia32_sys_read+0x90/0x90 [ 320.512116][ T8883] ? debug_smp_processor_id+0x17/0x20 [ 320.517502][ T8883] __x64_sys_write+0x7b/0x90 [ 320.522097][ T8883] x64_sys_call+0x8ef/0x9a0 [ 320.526617][ T8883] do_syscall_64+0x4c/0xa0 [ 320.531037][ T8883] ? clear_bhb_loop+0x50/0xa0 [ 320.535807][ T8883] ? clear_bhb_loop+0x50/0xa0 [ 320.540488][ T8883] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 320.546410][ T8883] RIP: 0033:0x7f51513ffbe9 [ 320.550836][ T8883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.570445][ T8883] RSP: 002b:00007f514fe68038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.578868][ T8883] RAX: ffffffffffffffda RBX: 00007f5151636fa0 RCX: 00007f51513ffbe9 [ 320.586842][ T8883] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 320.594999][ T8883] RBP: 00007f514fe68090 R08: 0000000000000000 R09: 0000000000000000 [ 320.602971][ T8883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.610942][ T8883] R13: 00007f5151637038 R14: 00007f5151636fa0 R15: 00007ffc7e329768 [ 320.618924][ T8883] [ 322.631670][ T8920] FAULT_INJECTION: forcing a failure. [ 322.631670][ T8920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.904247][ T8920] CPU: 0 PID: 8920 Comm: syz.2.2723 Tainted: G W syzkaller #0 [ 322.913219][ T8920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 322.923274][ T8920] Call Trace: [ 322.926556][ T8920] [ 322.929492][ T8920] __dump_stack+0x21/0x30 [ 322.934060][ T8920] dump_stack_lvl+0xee/0x150 [ 322.938652][ T8920] ? show_regs_print_info+0x20/0x20 [ 322.943850][ T8920] ? stack_trace_save+0x98/0xe0 [ 322.948699][ T8920] dump_stack+0x15/0x20 [ 322.952857][ T8920] should_fail+0x3c1/0x510 [ 322.957272][ T8920] should_fail_alloc_page+0x55/0x80 [ 322.962553][ T8920] prepare_alloc_pages+0x156/0x600 [ 322.967662][ T8920] ? __alloc_pages_bulk+0xab0/0xab0 [ 322.972856][ T8920] __alloc_pages+0x10a/0x440 [ 322.977438][ T8920] ? prep_new_page+0x110/0x110 [ 322.982199][ T8920] kmalloc_order+0x4c/0x160 [ 322.986706][ T8920] ? alloc_skb_with_frags+0xa8/0x620 [ 322.991987][ T8920] kmalloc_order_trace+0x18/0xb0 [ 322.996958][ T8920] __kmalloc_track_caller+0x198/0x2c0 [ 323.002322][ T8920] ? kmem_cache_alloc+0xf7/0x260 [ 323.007253][ T8920] ? alloc_skb_with_frags+0xa8/0x620 [ 323.012621][ T8920] __alloc_skb+0x21a/0x740 [ 323.017045][ T8920] alloc_skb_with_frags+0xa8/0x620 [ 323.022149][ T8920] ? cmp_ex_search+0x1e/0x80 [ 323.026820][ T8920] ? bsearch+0x96/0xc0 [ 323.030969][ T8920] ? search_extable+0xd0/0xd0 [ 323.035642][ T8920] ? strncpy_from_kernel_nofault+0x8a/0x1c0 [ 323.041541][ T8920] sock_alloc_send_pskb+0x853/0x980 [ 323.046737][ T8920] ? strncpy_from_kernel_nofault+0x8a/0x1c0 [ 323.052638][ T8920] ? is_bpf_text_address+0x177/0x190 [ 323.057943][ T8920] ? __kernel_text_address+0xa0/0x100 [ 323.063321][ T8920] ? sock_kzfree_s+0x60/0x60 [ 323.068002][ T8920] ? kernelmode_fixup_or_oops+0x85/0xd0 [ 323.073569][ T8920] tun_get_user+0x4e6/0x33c0 [ 323.078168][ T8920] ? tun_do_read+0x1c40/0x1c40 [ 323.082934][ T8920] ? kstrtouint_from_user+0x1a0/0x200 [ 323.088303][ T8920] ? kstrtol_from_user+0x260/0x260 [ 323.093441][ T8920] ? bpf_probe_read_compat_str+0x156/0x180 [ 323.099244][ T8920] ? avc_policy_seqno+0x1b/0x70 [ 323.104094][ T8920] ? selinux_file_permission+0x2aa/0x510 [ 323.109726][ T8920] tun_chr_write_iter+0x1eb/0x2e0 [ 323.114748][ T8920] vfs_write+0x802/0xf70 [ 323.118984][ T8920] ? file_end_write+0x1b0/0x1b0 [ 323.123827][ T8920] ? __fget_files+0x2c4/0x320 [ 323.128514][ T8920] ? __fdget_pos+0x1f7/0x380 [ 323.133101][ T8920] ? ksys_write+0x71/0x240 [ 323.137510][ T8920] ksys_write+0x140/0x240 [ 323.141850][ T8920] ? __ia32_sys_read+0x90/0x90 [ 323.146607][ T8920] ? debug_smp_processor_id+0x17/0x20 [ 323.151986][ T8920] __x64_sys_write+0x7b/0x90 [ 323.156569][ T8920] x64_sys_call+0x8ef/0x9a0 [ 323.161086][ T8920] do_syscall_64+0x4c/0xa0 [ 323.165496][ T8920] ? clear_bhb_loop+0x50/0xa0 [ 323.170165][ T8920] ? clear_bhb_loop+0x50/0xa0 [ 323.174846][ T8920] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 323.180787][ T8920] RIP: 0033:0x7f9498b01be9 [ 323.185285][ T8920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.204892][ T8920] RSP: 002b:00007f949756a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.213478][ T8920] RAX: ffffffffffffffda RBX: 00007f9498d38fa0 RCX: 00007f9498b01be9 [ 323.221472][ T8920] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 323.229539][ T8920] RBP: 00007f949756a090 R08: 0000000000000000 R09: 0000000000000000 [ 323.237601][ T8920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.245582][ T8920] R13: 00007f9498d39038 R14: 00007f9498d38fa0 R15: 00007fffaa11e158 [ 323.253665][ T8920] [ 324.290808][ T8926] device syzkaller0 entered promiscuous mode [ 325.714561][ T8997] FAULT_INJECTION: forcing a failure. [ 325.714561][ T8997] name failslab, interval 1, probability 0, space 0, times 0 [ 325.727304][ T8997] CPU: 0 PID: 8997 Comm: syz.0.2749 Tainted: G W syzkaller #0 [ 325.736070][ T8997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 325.746130][ T8997] Call Trace: [ 325.749411][ T8997] [ 325.752336][ T8997] __dump_stack+0x21/0x30 [ 325.756670][ T8997] dump_stack_lvl+0xee/0x150 [ 325.761258][ T8997] ? show_regs_print_info+0x20/0x20 [ 325.766488][ T8997] ? fib6_select_path+0x107/0x620 [ 325.771513][ T8997] dump_stack+0x15/0x20 [ 325.775673][ T8997] should_fail+0x3c1/0x510 [ 325.780093][ T8997] __should_failslab+0xa4/0xe0 [ 325.784859][ T8997] should_failslab+0x9/0x20 [ 325.789365][ T8997] slab_pre_alloc_hook+0x3b/0xe0 [ 325.794299][ T8997] ? __alloc_skb+0xe0/0x740 [ 325.798821][ T8997] kmem_cache_alloc+0x44/0x260 [ 325.803584][ T8997] __alloc_skb+0xe0/0x740 [ 325.808050][ T8997] alloc_skb_with_frags+0xa8/0x620 [ 325.813259][ T8997] ? fib6_lookup+0x2a0/0x2a0 [ 325.817873][ T8997] ? __rt6_find_exception_rcu+0x252/0x320 [ 325.823695][ T8997] sock_alloc_send_pskb+0x853/0x980 [ 325.828923][ T8997] ? sock_kzfree_s+0x60/0x60 [ 325.833520][ T8997] ? __local_bh_enable_ip+0x58/0x80 [ 325.838906][ T8997] ? local_bh_enable+0x1f/0x30 [ 325.843675][ T8997] ? ip6_dst_lookup_tail+0xd01/0x1370 [ 325.849061][ T8997] sock_alloc_send_skb+0x32/0x40 [ 325.854096][ T8997] __ip6_append_data+0x252e/0x37e0 [ 325.859218][ T8997] ? icmpv6_route_lookup+0x457/0x4e0 [ 325.864598][ T8997] ? ip6_setup_cork+0x1290/0x1290 [ 325.869653][ T8997] ? __kasan_check_read+0x11/0x20 [ 325.874676][ T8997] ? ip6_setup_cork+0xd10/0x1290 [ 325.879619][ T8997] ip6_append_data+0x1d0/0x330 [ 325.884379][ T8997] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 325.889669][ T8997] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 325.894952][ T8997] icmp6_send+0xeb8/0x14c0 [ 325.899380][ T8997] ? icmpv6_push_pending_frames+0x440/0x440 [ 325.905364][ T8997] ? numa_migrate_prep+0xd0/0xd0 [ 325.910392][ T8997] ? __skb_flow_dissect+0x520c/0x5930 [ 325.915768][ T8997] icmpv6_param_prob+0x2f/0x40 [ 325.920624][ T8997] ip6_parse_tlv+0x1a4c/0x1ba0 [ 325.925476][ T8997] ipv6_parse_hopopts+0x2a3/0x580 [ 325.930500][ T8997] ip6_rcv_core+0xca7/0x1390 [ 325.935094][ T8997] ipv6_rcv+0xca/0x210 [ 325.939157][ T8997] ? irqentry_exit+0x37/0x40 [ 325.943760][ T8997] ? exc_page_fault+0x5e/0xb0 [ 325.948472][ T8997] ? ip6_rcv_finish+0x360/0x360 [ 325.953329][ T8997] ? asm_exc_page_fault+0x27/0x30 [ 325.958355][ T8997] ? _copy_from_iter+0x181/0x1050 [ 325.963377][ T8997] ? ip6_rcv_finish+0x360/0x360 [ 325.968228][ T8997] __netif_receive_skb+0xc8/0x280 [ 325.973263][ T8997] ? _copy_from_iter+0x4ae/0x1050 [ 325.978285][ T8997] ? __kasan_check_write+0x14/0x20 [ 325.983484][ T8997] netif_receive_skb+0x98/0x3d0 [ 325.988334][ T8997] ? netif_receive_skb_core+0x100/0x100 [ 325.993964][ T8997] ? __kernel_text_address+0xa0/0x100 [ 325.999340][ T8997] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 326.004892][ T8997] tun_rx_batched+0x5e8/0x710 [ 326.010002][ T8997] ? local_bh_enable+0x30/0x30 [ 326.014801][ T8997] tun_get_user+0x279c/0x33c0 [ 326.019477][ T8997] ? __kasan_init_slab_obj+0x10/0x40 [ 326.024756][ T8997] ? kmem_cache_free+0x100/0x320 [ 326.029697][ T8997] ? __x64_sys_openat+0x136/0x160 [ 326.034812][ T8997] ? x64_sys_call+0x219/0x9a0 [ 326.039491][ T8997] ? tun_do_read+0x1c40/0x1c40 [ 326.044265][ T8997] ? kstrtouint_from_user+0x1a0/0x200 [ 326.049736][ T8997] ? kstrtol_from_user+0x260/0x260 [ 326.054896][ T8997] ? avc_policy_seqno+0x1b/0x70 [ 326.059756][ T8997] ? selinux_file_permission+0x2aa/0x510 [ 326.065391][ T8997] tun_chr_write_iter+0x1eb/0x2e0 [ 326.070426][ T8997] vfs_write+0x802/0xf70 [ 326.074663][ T8997] ? file_end_write+0x1b0/0x1b0 [ 326.079514][ T8997] ? __fget_files+0x2c4/0x320 [ 326.084220][ T8997] ? __fdget_pos+0x1f7/0x380 [ 326.088948][ T8997] ? ksys_write+0x71/0x240 [ 326.093366][ T8997] ksys_write+0x140/0x240 [ 326.097726][ T8997] ? __ia32_sys_read+0x90/0x90 [ 326.102489][ T8997] ? debug_smp_processor_id+0x17/0x20 [ 326.107859][ T8997] __x64_sys_write+0x7b/0x90 [ 326.112437][ T8997] x64_sys_call+0x8ef/0x9a0 [ 326.116922][ T8997] do_syscall_64+0x4c/0xa0 [ 326.121318][ T8997] ? clear_bhb_loop+0x50/0xa0 [ 326.125982][ T8997] ? clear_bhb_loop+0x50/0xa0 [ 326.130644][ T8997] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 326.136523][ T8997] RIP: 0033:0x7fb6e83aabe9 [ 326.140922][ T8997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.160607][ T8997] RSP: 002b:00007fb6e6e13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 326.169016][ T8997] RAX: ffffffffffffffda RBX: 00007fb6e85e1fa0 RCX: 00007fb6e83aabe9 [ 326.176976][ T8997] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 326.184933][ T8997] RBP: 00007fb6e6e13090 R08: 0000000000000000 R09: 0000000000000000 [ 326.192888][ T8997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.200842][ T8997] R13: 00007fb6e85e2038 R14: 00007fb6e85e1fa0 R15: 00007ffd951ea208 [ 326.208812][ T8997] [ 326.463385][ T9021] device sit0 left promiscuous mode [ 326.707193][ T9021] device sit0 entered promiscuous mode [ 326.725449][ T9039] FAULT_INJECTION: forcing a failure. [ 326.725449][ T9039] name failslab, interval 1, probability 0, space 0, times 0 [ 326.738199][ T9039] CPU: 0 PID: 9039 Comm: syz.3.2764 Tainted: G W syzkaller #0 [ 326.746962][ T9039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 326.757019][ T9039] Call Trace: [ 326.760304][ T9039] [ 326.763231][ T9039] __dump_stack+0x21/0x30 [ 326.767580][ T9039] dump_stack_lvl+0xee/0x150 [ 326.772178][ T9039] ? show_regs_print_info+0x20/0x20 [ 326.777400][ T9039] dump_stack+0x15/0x20 [ 326.781640][ T9039] should_fail+0x3c1/0x510 [ 326.786055][ T9039] ? alloc_skb_with_frags+0xa8/0x620 [ 326.791332][ T9039] __should_failslab+0xa4/0xe0 [ 326.796106][ T9039] should_failslab+0x9/0x20 [ 326.800628][ T9039] slab_pre_alloc_hook+0x3b/0xe0 [ 326.805596][ T9039] ? alloc_skb_with_frags+0xa8/0x620 [ 326.810875][ T9039] ? alloc_skb_with_frags+0xa8/0x620 [ 326.816165][ T9039] __kmalloc_track_caller+0x6c/0x2c0 [ 326.821444][ T9039] ? alloc_skb_with_frags+0xa8/0x620 [ 326.826712][ T9039] ? alloc_skb_with_frags+0xa8/0x620 [ 326.832072][ T9039] __alloc_skb+0x21a/0x740 [ 326.836490][ T9039] alloc_skb_with_frags+0xa8/0x620 [ 326.841594][ T9039] ? fib6_lookup+0x2a0/0x2a0 [ 326.846175][ T9039] ? __rt6_find_exception_rcu+0x252/0x320 [ 326.851909][ T9039] sock_alloc_send_pskb+0x853/0x980 [ 326.857096][ T9039] ? sock_kzfree_s+0x60/0x60 [ 326.861669][ T9039] ? __local_bh_enable_ip+0x58/0x80 [ 326.866859][ T9039] ? local_bh_enable+0x1f/0x30 [ 326.871607][ T9039] ? ip6_dst_lookup_tail+0xd01/0x1370 [ 326.876965][ T9039] sock_alloc_send_skb+0x32/0x40 [ 326.881889][ T9039] __ip6_append_data+0x252e/0x37e0 [ 326.887001][ T9039] ? icmpv6_route_lookup+0x457/0x4e0 [ 326.892273][ T9039] ? ip6_setup_cork+0x1290/0x1290 [ 326.897297][ T9039] ? __kasan_check_read+0x11/0x20 [ 326.902338][ T9039] ? ip6_setup_cork+0xd10/0x1290 [ 326.907305][ T9039] ip6_append_data+0x1d0/0x330 [ 326.912231][ T9039] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 326.917508][ T9039] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 326.922783][ T9039] icmp6_send+0xeb8/0x14c0 [ 326.927186][ T9039] ? icmpv6_push_pending_frames+0x440/0x440 [ 326.933068][ T9039] ? numa_migrate_prep+0xd0/0xd0 [ 326.937991][ T9039] ? __skb_flow_dissect+0x520c/0x5930 [ 326.943348][ T9039] icmpv6_param_prob+0x2f/0x40 [ 326.948135][ T9039] ip6_parse_tlv+0x1a4c/0x1ba0 [ 326.953001][ T9039] ipv6_parse_hopopts+0x2a3/0x580 [ 326.963313][ T9039] ip6_rcv_core+0xca7/0x1390 [ 326.967906][ T9039] ipv6_rcv+0xca/0x210 [ 326.972063][ T9039] ? irqentry_exit+0x37/0x40 [ 326.976640][ T9039] ? exc_page_fault+0x5e/0xb0 [ 326.981301][ T9039] ? ip6_rcv_finish+0x360/0x360 [ 326.986271][ T9039] ? asm_exc_page_fault+0x27/0x30 [ 326.991314][ T9039] ? _copy_from_iter+0x181/0x1050 [ 326.996356][ T9039] ? ip6_rcv_finish+0x360/0x360 [ 327.001323][ T9039] __netif_receive_skb+0xc8/0x280 [ 327.006359][ T9039] ? _copy_from_iter+0x4ae/0x1050 [ 327.011382][ T9039] ? __kasan_check_write+0x14/0x20 [ 327.016490][ T9039] netif_receive_skb+0x98/0x3d0 [ 327.021419][ T9039] ? netif_receive_skb_core+0x100/0x100 [ 327.026947][ T9039] ? __kernel_text_address+0xa0/0x100 [ 327.032303][ T9039] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 327.037835][ T9039] tun_rx_batched+0x5e8/0x710 [ 327.042498][ T9039] ? local_bh_enable+0x30/0x30 [ 327.047250][ T9039] tun_get_user+0x279c/0x33c0 [ 327.051999][ T9039] ? __kasan_init_slab_obj+0x10/0x40 [ 327.057271][ T9039] ? kmem_cache_free+0x100/0x320 [ 327.062194][ T9039] ? __x64_sys_openat+0x136/0x160 [ 327.067209][ T9039] ? x64_sys_call+0x219/0x9a0 [ 327.071876][ T9039] ? tun_do_read+0x1c40/0x1c40 [ 327.076628][ T9039] ? kstrtouint_from_user+0x1a0/0x200 [ 327.081983][ T9039] ? kstrtol_from_user+0x260/0x260 [ 327.087080][ T9039] ? avc_policy_seqno+0x1b/0x70 [ 327.091919][ T9039] ? selinux_file_permission+0x2aa/0x510 [ 327.097591][ T9039] tun_chr_write_iter+0x1eb/0x2e0 [ 327.102606][ T9039] vfs_write+0x802/0xf70 [ 327.107006][ T9039] ? file_end_write+0x1b0/0x1b0 [ 327.111838][ T9039] ? __fget_files+0x2c4/0x320 [ 327.116499][ T9039] ? __fdget_pos+0x1f7/0x380 [ 327.121071][ T9039] ? ksys_write+0x71/0x240 [ 327.125471][ T9039] ksys_write+0x140/0x240 [ 327.129785][ T9039] ? __ia32_sys_read+0x90/0x90 [ 327.134540][ T9039] ? debug_smp_processor_id+0x17/0x20 [ 327.139910][ T9039] __x64_sys_write+0x7b/0x90 [ 327.144564][ T9039] x64_sys_call+0x8ef/0x9a0 [ 327.149138][ T9039] do_syscall_64+0x4c/0xa0 [ 327.153555][ T9039] ? clear_bhb_loop+0x50/0xa0 [ 327.158236][ T9039] ? clear_bhb_loop+0x50/0xa0 [ 327.162906][ T9039] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 327.168794][ T9039] RIP: 0033:0x7f3d1cb7abe9 [ 327.173366][ T9039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.192961][ T9039] RSP: 002b:00007f3d1b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 327.201366][ T9039] RAX: ffffffffffffffda RBX: 00007f3d1cdb1fa0 RCX: 00007f3d1cb7abe9 [ 327.209320][ T9039] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 327.217279][ T9039] RBP: 00007f3d1b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 327.225407][ T9039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.233360][ T9039] R13: 00007f3d1cdb2038 R14: 00007f3d1cdb1fa0 R15: 00007ffec22b0a68 [ 327.241763][ T9039] [ 328.158029][ T30] audit: type=1400 audit(1756778835.756:162): avc: denied { create } for pid=9064 comm="syz.1.2773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 328.350244][ T9071] device sit0 left promiscuous mode [ 328.378901][ T9073] FAULT_INJECTION: forcing a failure. [ 328.378901][ T9073] name failslab, interval 1, probability 0, space 0, times 0 [ 328.391730][ T9073] CPU: 1 PID: 9073 Comm: syz.2.2776 Tainted: G W syzkaller #0 [ 328.400718][ T9073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 328.411152][ T9073] Call Trace: [ 328.414578][ T9073] [ 328.417518][ T9073] __dump_stack+0x21/0x30 [ 328.422268][ T9073] dump_stack_lvl+0xee/0x150 [ 328.427073][ T9073] ? show_regs_print_info+0x20/0x20 [ 328.432289][ T9073] ? ip6_append_data+0x1d0/0x330 [ 328.437302][ T9073] ? icmpv6_param_prob+0x2f/0x40 [ 328.442364][ T9073] ? ip6_parse_tlv+0x1a4c/0x1ba0 [ 328.447419][ T9073] ? ipv6_parse_hopopts+0x2a3/0x580 [ 328.452901][ T9073] ? ipv6_rcv+0xca/0x210 [ 328.457147][ T9073] ? __netif_receive_skb+0xc8/0x280 [ 328.462357][ T9073] ? netif_receive_skb+0x98/0x3d0 [ 328.467749][ T9073] dump_stack+0x15/0x20 [ 328.472186][ T9073] should_fail+0x3c1/0x510 [ 328.476696][ T9073] __should_failslab+0xa4/0xe0 [ 328.481503][ T9073] should_failslab+0x9/0x20 [ 328.486103][ T9073] slab_pre_alloc_hook+0x3b/0xe0 [ 328.491042][ T9073] __kmalloc+0x6d/0x2c0 [ 328.495476][ T9073] ? ___neigh_create+0x6f2/0x1be0 [ 328.501025][ T9073] ___neigh_create+0x6f2/0x1be0 [ 328.506151][ T9073] ? __local_bh_enable_ip+0x58/0x80 [ 328.511582][ T9073] ? __kasan_check_read+0x11/0x20 [ 328.516743][ T9073] __neigh_create+0x31/0x40 [ 328.521539][ T9073] ip6_finish_output2+0xab3/0x1760 [ 328.526646][ T9073] ? __ip6_finish_output+0x7d0/0x7d0 [ 328.531917][ T9073] ? __local_bh_enable_ip+0x58/0x80 [ 328.537104][ T9073] ? local_bh_enable+0x1f/0x30 [ 328.542290][ T9073] __ip6_finish_output+0x61e/0x7d0 [ 328.547395][ T9073] ip6_finish_output+0x31/0x240 [ 328.552402][ T9073] ? ip6_output+0x384/0x3b0 [ 328.556955][ T9073] ip6_output+0x1d1/0x3b0 [ 328.561483][ T9073] ? ac6_seq_show+0xf0/0xf0 [ 328.565965][ T9073] ? ip6_output+0x3b0/0x3b0 [ 328.570728][ T9073] ip6_local_out+0x21a/0x3d0 [ 328.575312][ T9073] ? dst_output+0x80/0x80 [ 328.579715][ T9073] ? __ip6_local_out+0x350/0x350 [ 328.584827][ T9073] ? __kasan_check_read+0x11/0x20 [ 328.589852][ T9073] ? ip6_setup_cork+0xd10/0x1290 [ 328.594891][ T9073] ip6_push_pending_frames+0x17d/0x2d0 [ 328.600428][ T9073] icmpv6_push_pending_frames+0x29f/0x440 [ 328.606147][ T9073] icmp6_send+0xf6d/0x14c0 [ 328.610556][ T9073] ? icmpv6_push_pending_frames+0x440/0x440 [ 328.616450][ T9073] ? numa_migrate_prep+0xd0/0xd0 [ 328.621468][ T9073] ? __skb_flow_dissect+0x520c/0x5930 [ 328.626826][ T9073] icmpv6_param_prob+0x2f/0x40 [ 328.631575][ T9073] ip6_parse_tlv+0x1a4c/0x1ba0 [ 328.636333][ T9073] ipv6_parse_hopopts+0x2a3/0x580 [ 328.641527][ T9073] ip6_rcv_core+0xca7/0x1390 [ 328.646680][ T9073] ipv6_rcv+0xca/0x210 [ 328.650846][ T9073] ? irqentry_exit+0x37/0x40 [ 328.655457][ T9073] ? exc_page_fault+0x5e/0xb0 [ 328.660118][ T9073] ? ip6_rcv_finish+0x360/0x360 [ 328.665142][ T9073] ? asm_exc_page_fault+0x27/0x30 [ 328.670153][ T9073] ? _copy_from_iter+0x181/0x1050 [ 328.675288][ T9073] ? ip6_rcv_finish+0x360/0x360 [ 328.680236][ T9073] __netif_receive_skb+0xc8/0x280 [ 328.685254][ T9073] ? _copy_from_iter+0x4ae/0x1050 [ 328.690298][ T9073] ? __kasan_check_write+0x14/0x20 [ 328.695411][ T9073] netif_receive_skb+0x98/0x3d0 [ 328.700339][ T9073] ? netif_receive_skb_core+0x100/0x100 [ 328.705872][ T9073] ? __kernel_text_address+0xa0/0x100 [ 328.711241][ T9073] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 328.716785][ T9073] tun_rx_batched+0x5e8/0x710 [ 328.721468][ T9073] ? local_bh_enable+0x30/0x30 [ 328.726217][ T9073] tun_get_user+0x279c/0x33c0 [ 328.730880][ T9073] ? __kasan_init_slab_obj+0x10/0x40 [ 328.736148][ T9073] ? kmem_cache_free+0x100/0x320 [ 328.741073][ T9073] ? __x64_sys_openat+0x136/0x160 [ 328.746086][ T9073] ? x64_sys_call+0x219/0x9a0 [ 328.750757][ T9073] ? tun_do_read+0x1c40/0x1c40 [ 328.755622][ T9073] ? kstrtouint_from_user+0x1a0/0x200 [ 328.760978][ T9073] ? kstrtol_from_user+0x260/0x260 [ 328.766075][ T9073] ? avc_policy_seqno+0x1b/0x70 [ 328.770919][ T9073] ? selinux_file_permission+0x2aa/0x510 [ 328.776539][ T9073] tun_chr_write_iter+0x1eb/0x2e0 [ 328.781553][ T9073] vfs_write+0x802/0xf70 [ 328.785778][ T9073] ? file_end_write+0x1b0/0x1b0 [ 328.790609][ T9073] ? __fget_files+0x2c4/0x320 [ 328.795392][ T9073] ? __fdget_pos+0x1f7/0x380 [ 328.799971][ T9073] ? ksys_write+0x71/0x240 [ 328.804368][ T9073] ksys_write+0x140/0x240 [ 328.808679][ T9073] ? __ia32_sys_read+0x90/0x90 [ 328.813470][ T9073] ? __bpf_trace_sys_enter+0x62/0x70 [ 328.818752][ T9073] __x64_sys_write+0x7b/0x90 [ 328.823334][ T9073] x64_sys_call+0x8ef/0x9a0 [ 328.827832][ T9073] do_syscall_64+0x4c/0xa0 [ 328.832235][ T9073] ? clear_bhb_loop+0x50/0xa0 [ 328.836894][ T9073] ? clear_bhb_loop+0x50/0xa0 [ 328.841572][ T9073] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 328.847469][ T9073] RIP: 0033:0x7f9498b01be9 [ 328.852313][ T9073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.872342][ T9073] RSP: 002b:00007f949756a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 328.880763][ T9073] RAX: ffffffffffffffda RBX: 00007f9498d38fa0 RCX: 00007f9498b01be9 [ 328.888721][ T9073] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 328.896802][ T9073] RBP: 00007f949756a090 R08: 0000000000000000 R09: 0000000000000000 [ 328.904930][ T9073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.912886][ T9073] R13: 00007f9498d39038 R14: 00007f9498d38fa0 R15: 00007fffaa11e158 [ 328.920867][ T9073] [ 328.926795][ T9071] device sit0 entered promiscuous mode [ 330.262945][ T9128] device pim6reg1 entered promiscuous mode [ 331.052039][ T9169] device sit0 left promiscuous mode [ 332.034376][ T9199] net_ratelimit: 23 callbacks suppressed [ 332.034395][ T9199] bond_slave_1: mtu less than device minimum [ 333.435484][ T9274] device syzkaller0 entered promiscuous mode [ 333.534409][ T9291] device syzkaller0 entered promiscuous mode [ 334.380281][ T30] audit: type=1400 audit(1756778841.946:163): avc: denied { setattr } for pid=9332 comm="syz.0.2867" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 334.865651][ T30] audit: type=1400 audit(1756778842.476:164): avc: denied { mounton } for pid=9351 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 335.323082][ T9371] FAULT_INJECTION: forcing a failure. [ 335.323082][ T9371] name failslab, interval 1, probability 0, space 0, times 0 [ 335.335734][ T9371] CPU: 1 PID: 9371 Comm: syz.2.2879 Tainted: G W syzkaller #0 [ 335.344506][ T9371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 335.355227][ T9371] Call Trace: [ 335.358747][ T9371] [ 335.362192][ T9371] __dump_stack+0x21/0x30 [ 335.366780][ T9371] dump_stack_lvl+0xee/0x150 [ 335.371458][ T9371] ? show_regs_print_info+0x20/0x20 [ 335.376844][ T9371] ? unwind_get_return_address+0x4d/0x90 [ 335.385169][ T9371] ? stack_trace_save+0xe0/0xe0 [ 335.390036][ T9371] dump_stack+0x15/0x20 [ 335.394212][ T9371] should_fail+0x3c1/0x510 [ 335.398642][ T9371] __should_failslab+0xa4/0xe0 [ 335.403420][ T9371] should_failslab+0x9/0x20 [ 335.407935][ T9371] slab_pre_alloc_hook+0x3b/0xe0 [ 335.412940][ T9371] ? dst_alloc+0x15c/0x1d0 [ 335.417463][ T9371] kmem_cache_alloc+0x44/0x260 [ 335.422231][ T9371] ? ipv6_sysctl_rtcache_flush+0x100/0x100 [ 335.428048][ T9371] dst_alloc+0x15c/0x1d0 [ 335.432306][ T9371] icmp6_dst_alloc+0xf5/0x560 [ 335.437021][ T9371] ? security_sk_classify_flow+0x7b/0x90 [ 335.442751][ T9371] ? icmpv6_flow_init+0xd2/0x130 [ 335.447728][ T9371] ndisc_send_skb+0x258/0xc70 [ 335.452491][ T9371] ? x64_sys_call+0x8ef/0x9a0 [ 335.457165][ T9371] ? do_syscall_64+0x4c/0xa0 [ 335.461847][ T9371] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.467917][ T9371] ? ndisc_alloc_skb+0x2b0/0x2b0 [ 335.472858][ T9371] ? memcpy+0x56/0x70 [ 335.476843][ T9371] ndisc_send_ns+0x842/0xaf0 [ 335.481430][ T9371] ? ndisc_send_skb+0xc70/0xc70 [ 335.486317][ T9371] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 335.491776][ T9371] ndisc_solicit+0x30a/0x440 [ 335.496365][ T9371] ? ndisc_cleanup+0x40/0x40 [ 335.500950][ T9371] ? skb_clone+0x202/0x360 [ 335.505375][ T9371] ? ndisc_cleanup+0x40/0x40 [ 335.510152][ T9371] __neigh_event_send+0xcc3/0x11c0 [ 335.515266][ T9371] neigh_resolve_output+0x1e1/0x770 [ 335.520460][ T9371] ? __local_bh_enable_ip+0x58/0x80 [ 335.525667][ T9371] ? local_bh_enable+0x1f/0x30 [ 335.530518][ T9371] ? __kasan_check_read+0x11/0x20 [ 335.535547][ T9371] ? selinux_ip_postroute+0x24c/0xe10 [ 335.540977][ T9371] ip6_finish_output2+0x10b7/0x1760 [ 335.546184][ T9371] ? __ip6_finish_output+0x7d0/0x7d0 [ 335.551465][ T9371] ? __local_bh_enable_ip+0x58/0x80 [ 335.556665][ T9371] ? local_bh_enable+0x1f/0x30 [ 335.561538][ T9371] __ip6_finish_output+0x61e/0x7d0 [ 335.566669][ T9371] ip6_finish_output+0x31/0x240 [ 335.571527][ T9371] ? ip6_output+0x384/0x3b0 [ 335.576036][ T9371] ip6_output+0x1d1/0x3b0 [ 335.580403][ T9371] ? ac6_seq_show+0xf0/0xf0 [ 335.584907][ T9371] ? ip6_output+0x3b0/0x3b0 [ 335.589426][ T9371] ip6_local_out+0x21a/0x3d0 [ 335.594028][ T9371] ? dst_output+0x80/0x80 [ 335.598365][ T9371] ? __ip6_local_out+0x350/0x350 [ 335.603310][ T9371] ? __kasan_check_read+0x11/0x20 [ 335.608349][ T9371] ? ip6_setup_cork+0xd10/0x1290 [ 335.613304][ T9371] ip6_push_pending_frames+0x17d/0x2d0 [ 335.619297][ T9371] icmpv6_push_pending_frames+0x29f/0x440 [ 335.625042][ T9371] icmp6_send+0xf6d/0x14c0 [ 335.629479][ T9371] ? icmpv6_push_pending_frames+0x440/0x440 [ 335.635501][ T9371] ? numa_migrate_prep+0xd0/0xd0 [ 335.640754][ T9371] ? __skb_flow_dissect+0x520c/0x5930 [ 335.646215][ T9371] icmpv6_param_prob+0x2f/0x40 [ 335.651017][ T9371] ip6_parse_tlv+0x1a4c/0x1ba0 [ 335.655788][ T9371] ipv6_parse_hopopts+0x2a3/0x580 [ 335.661127][ T9371] ip6_rcv_core+0xca7/0x1390 [ 335.665775][ T9371] ipv6_rcv+0xca/0x210 [ 335.669860][ T9371] ? irqentry_exit+0x37/0x40 [ 335.674556][ T9371] ? exc_page_fault+0x5e/0xb0 [ 335.679331][ T9371] ? ip6_rcv_finish+0x360/0x360 [ 335.684197][ T9371] ? asm_exc_page_fault+0x27/0x30 [ 335.689231][ T9371] ? _copy_from_iter+0x181/0x1050 [ 335.694357][ T9371] ? ip6_rcv_finish+0x360/0x360 [ 335.699312][ T9371] __netif_receive_skb+0xc8/0x280 [ 335.704340][ T9371] ? _copy_from_iter+0x4ae/0x1050 [ 335.709368][ T9371] ? __kasan_check_write+0x14/0x20 [ 335.714673][ T9371] netif_receive_skb+0x98/0x3d0 [ 335.719628][ T9371] ? netif_receive_skb_core+0x100/0x100 [ 335.725177][ T9371] ? __kernel_text_address+0xa0/0x100 [ 335.730564][ T9371] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 335.736154][ T9371] tun_rx_batched+0x5e8/0x710 [ 335.740825][ T9371] ? local_bh_enable+0x30/0x30 [ 335.745586][ T9371] tun_get_user+0x279c/0x33c0 [ 335.750258][ T9371] ? __kasan_init_slab_obj+0x10/0x40 [ 335.756164][ T9371] ? kmem_cache_free+0x100/0x320 [ 335.761187][ T9371] ? __x64_sys_openat+0x136/0x160 [ 335.766299][ T9371] ? x64_sys_call+0x219/0x9a0 [ 335.770977][ T9371] ? tun_do_read+0x1c40/0x1c40 [ 335.775749][ T9371] ? kstrtouint_from_user+0x1a0/0x200 [ 335.781120][ T9371] ? kstrtol_from_user+0x260/0x260 [ 335.786239][ T9371] ? avc_policy_seqno+0x1b/0x70 [ 335.791262][ T9371] ? selinux_file_permission+0x2aa/0x510 [ 335.796964][ T9371] tun_chr_write_iter+0x1eb/0x2e0 [ 335.801993][ T9371] vfs_write+0x802/0xf70 [ 335.806245][ T9371] ? file_end_write+0x1b0/0x1b0 [ 335.811105][ T9371] ? __fget_files+0x2c4/0x320 [ 335.815788][ T9371] ? __fdget_pos+0x1f7/0x380 [ 335.820376][ T9371] ? ksys_write+0x71/0x240 [ 335.824794][ T9371] ksys_write+0x140/0x240 [ 335.829124][ T9371] ? __ia32_sys_read+0x90/0x90 [ 335.833892][ T9371] ? debug_smp_processor_id+0x17/0x20 [ 335.839282][ T9371] __x64_sys_write+0x7b/0x90 [ 335.843974][ T9371] x64_sys_call+0x8ef/0x9a0 [ 335.848483][ T9371] do_syscall_64+0x4c/0xa0 [ 335.852920][ T9371] ? clear_bhb_loop+0x50/0xa0 [ 335.857612][ T9371] ? clear_bhb_loop+0x50/0xa0 [ 335.862407][ T9371] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.868312][ T9371] RIP: 0033:0x7f9498b01be9 [ 335.873016][ T9371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.893002][ T9371] RSP: 002b:00007f949756a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 335.901426][ T9371] RAX: ffffffffffffffda RBX: 00007f9498d38fa0 RCX: 00007f9498b01be9 [ 335.909430][ T9371] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 335.917421][ T9371] RBP: 00007f949756a090 R08: 0000000000000000 R09: 0000000000000000 [ 335.925400][ T9371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.933374][ T9371] R13: 00007f9498d39038 R14: 00007f9498d38fa0 R15: 00007fffaa11e158 [ 335.941352][ T9371] [ 335.949272][ T9351] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.970374][ T9351] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.008309][ T9351] device bridge_slave_0 entered promiscuous mode [ 336.151139][ T9351] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.199550][ T9351] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.252666][ T9351] device bridge_slave_1 entered promiscuous mode [ 337.185008][ T30] audit: type=1400 audit(1756778844.796:165): avc: denied { create } for pid=9351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 337.264630][ T9418] FAULT_INJECTION: forcing a failure. [ 337.264630][ T9418] name failslab, interval 1, probability 0, space 0, times 0 [ 337.277416][ T9418] CPU: 0 PID: 9418 Comm: syz.0.2894 Tainted: G W syzkaller #0 [ 337.286200][ T9418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 337.296256][ T9418] Call Trace: [ 337.299539][ T9418] [ 337.302471][ T9418] __dump_stack+0x21/0x30 [ 337.306813][ T9418] dump_stack_lvl+0xee/0x150 [ 337.311413][ T9418] ? show_regs_print_info+0x20/0x20 [ 337.316609][ T9418] dump_stack+0x15/0x20 [ 337.320760][ T9418] should_fail+0x3c1/0x510 [ 337.325177][ T9418] ? ndisc_send_ns+0x343/0xaf0 [ 337.329937][ T9418] __should_failslab+0xa4/0xe0 [ 337.334699][ T9418] should_failslab+0x9/0x20 [ 337.339207][ T9418] slab_pre_alloc_hook+0x3b/0xe0 [ 337.344154][ T9418] ? ndisc_send_ns+0x343/0xaf0 [ 337.348909][ T9418] ? ndisc_send_ns+0x343/0xaf0 [ 337.353678][ T9418] __kmalloc_track_caller+0x6c/0x2c0 [ 337.358984][ T9418] ? ndisc_send_ns+0x343/0xaf0 [ 337.363749][ T9418] ? ndisc_send_ns+0x343/0xaf0 [ 337.368515][ T9418] __alloc_skb+0x21a/0x740 [ 337.372934][ T9418] ndisc_send_ns+0x343/0xaf0 [ 337.377511][ T9418] ? ndisc_send_skb+0xc70/0xc70 [ 337.382357][ T9418] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 337.387919][ T9418] ndisc_solicit+0x30a/0x440 [ 337.392515][ T9418] ? ndisc_cleanup+0x40/0x40 [ 337.397109][ T9418] ? skb_clone+0x202/0x360 [ 337.401569][ T9418] ? ndisc_cleanup+0x40/0x40 [ 337.406206][ T9418] __neigh_event_send+0xcc3/0x11c0 [ 337.411432][ T9418] ? __local_bh_enable_ip+0x58/0x80 [ 337.416747][ T9418] neigh_resolve_output+0x1e1/0x770 [ 337.421954][ T9418] ? __local_bh_enable_ip+0x58/0x80 [ 337.427167][ T9418] ip6_finish_output2+0x10b7/0x1760 [ 337.432370][ T9418] ? __ip6_finish_output+0x7d0/0x7d0 [ 337.437677][ T9418] ? __local_bh_enable_ip+0x58/0x80 [ 337.442870][ T9418] ? local_bh_enable+0x1f/0x30 [ 337.447628][ T9418] __ip6_finish_output+0x61e/0x7d0 [ 337.452732][ T9418] ip6_finish_output+0x31/0x240 [ 337.457578][ T9418] ? ip6_output+0x384/0x3b0 [ 337.462084][ T9418] ip6_output+0x1d1/0x3b0 [ 337.466418][ T9418] ? ac6_seq_show+0xf0/0xf0 [ 337.470908][ T9418] ? ip6_output+0x3b0/0x3b0 [ 337.475405][ T9418] ip6_local_out+0x21a/0x3d0 [ 337.480017][ T9418] ? dst_output+0x80/0x80 [ 337.484506][ T9418] ? __ip6_local_out+0x350/0x350 [ 337.489439][ T9418] ? __kasan_check_read+0x11/0x20 [ 337.494454][ T9418] ? ip6_setup_cork+0xd10/0x1290 [ 337.499810][ T9418] ip6_push_pending_frames+0x17d/0x2d0 [ 337.505271][ T9418] icmpv6_push_pending_frames+0x29f/0x440 [ 337.510986][ T9418] icmp6_send+0xf6d/0x14c0 [ 337.515485][ T9418] ? icmpv6_push_pending_frames+0x440/0x440 [ 337.521370][ T9418] ? numa_migrate_prep+0xd0/0xd0 [ 337.526297][ T9418] ? __skb_flow_dissect+0x520c/0x5930 [ 337.531659][ T9418] icmpv6_param_prob+0x2f/0x40 [ 337.536413][ T9418] ip6_parse_tlv+0x1a4c/0x1ba0 [ 337.541170][ T9418] ipv6_parse_hopopts+0x2a3/0x580 [ 337.546182][ T9418] ip6_rcv_core+0xca7/0x1390 [ 337.550764][ T9418] ipv6_rcv+0xca/0x210 [ 337.554818][ T9418] ? irqentry_exit+0x37/0x40 [ 337.559417][ T9418] ? exc_page_fault+0x5e/0xb0 [ 337.564162][ T9418] ? ip6_rcv_finish+0x360/0x360 [ 337.568998][ T9418] ? asm_exc_page_fault+0x27/0x30 [ 337.574006][ T9418] ? _copy_from_iter+0x181/0x1050 [ 337.579099][ T9418] ? ip6_rcv_finish+0x360/0x360 [ 337.583946][ T9418] __netif_receive_skb+0xc8/0x280 [ 337.588959][ T9418] ? _copy_from_iter+0x4ae/0x1050 [ 337.593968][ T9418] ? __kasan_check_write+0x14/0x20 [ 337.599075][ T9418] netif_receive_skb+0x98/0x3d0 [ 337.603906][ T9418] ? netif_receive_skb_core+0x100/0x100 [ 337.609442][ T9418] ? __kernel_text_address+0xa0/0x100 [ 337.614800][ T9418] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 337.620359][ T9418] tun_rx_batched+0x5e8/0x710 [ 337.625021][ T9418] ? local_bh_enable+0x30/0x30 [ 337.629781][ T9418] tun_get_user+0x279c/0x33c0 [ 337.634443][ T9418] ? __kasan_init_slab_obj+0x10/0x40 [ 337.639714][ T9418] ? kmem_cache_free+0x100/0x320 [ 337.644733][ T9418] ? __x64_sys_openat+0x136/0x160 [ 337.649759][ T9418] ? x64_sys_call+0x219/0x9a0 [ 337.654435][ T9418] ? tun_do_read+0x1c40/0x1c40 [ 337.659212][ T9418] ? kstrtouint_from_user+0x1a0/0x200 [ 337.664569][ T9418] ? kstrtol_from_user+0x260/0x260 [ 337.669666][ T9418] ? avc_policy_seqno+0x1b/0x70 [ 337.674498][ T9418] ? selinux_file_permission+0x2aa/0x510 [ 337.680115][ T9418] tun_chr_write_iter+0x1eb/0x2e0 [ 337.685129][ T9418] vfs_write+0x802/0xf70 [ 337.689377][ T9418] ? file_end_write+0x1b0/0x1b0 [ 337.694230][ T9418] ? __fget_files+0x2c4/0x320 [ 337.698895][ T9418] ? __fdget_pos+0x1f7/0x380 [ 337.703471][ T9418] ? ksys_write+0x71/0x240 [ 337.707875][ T9418] ksys_write+0x140/0x240 [ 337.712187][ T9418] ? __ia32_sys_read+0x90/0x90 [ 337.716938][ T9418] ? debug_smp_processor_id+0x17/0x20 [ 337.722301][ T9418] __x64_sys_write+0x7b/0x90 [ 337.726879][ T9418] x64_sys_call+0x8ef/0x9a0 [ 337.731368][ T9418] do_syscall_64+0x4c/0xa0 [ 337.735785][ T9418] ? clear_bhb_loop+0x50/0xa0 [ 337.740448][ T9418] ? clear_bhb_loop+0x50/0xa0 [ 337.745126][ T9418] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.751011][ T9418] RIP: 0033:0x7fb6e83aabe9 [ 337.755423][ T9418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.775139][ T9418] RSP: 002b:00007fb6e6e13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 337.783551][ T9418] RAX: ffffffffffffffda RBX: 00007fb6e85e1fa0 RCX: 00007fb6e83aabe9 [ 337.791517][ T9418] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 337.799481][ T9418] RBP: 00007fb6e6e13090 R08: 0000000000000000 R09: 0000000000000000 [ 337.807441][ T9418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 337.815407][ T9418] R13: 00007fb6e85e2038 R14: 00007fb6e85e1fa0 R15: 00007ffd951ea208 [ 337.823375][ T9418] [ 337.922030][ T30] audit: type=1400 audit(1756778844.836:166): avc: denied { write } for pid=9351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.161263][ T30] audit: type=1400 audit(1756778844.836:167): avc: denied { read } for pid=9351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.232087][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.240360][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.324688][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.441362][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.508768][ T1095] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.515937][ T1095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.530786][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.545762][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.562941][ T1095] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.570022][ T1095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.590951][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.620560][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.639193][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.654689][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.667070][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.833967][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.893754][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.012828][ T9351] device veth0_vlan entered promiscuous mode [ 339.091178][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.119970][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.212428][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.301060][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.426910][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 339.543960][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 339.663929][ T9351] device veth1_macvtap entered promiscuous mode [ 339.697518][ T444] device veth0_to_team left promiscuous mode [ 339.704036][ T444] GPL: port 1(veth0_to_team) entered disabled state [ 339.793469][ T444] device bridge_slave_1 left promiscuous mode [ 339.799639][ T444] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.965280][ T444] device bridge_slave_0 left promiscuous mode [ 339.986720][ T444] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.994626][ T444] device veth1_macvtap left promiscuous mode [ 340.360838][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.368830][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.396940][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.407484][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.416329][ T1095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.429017][ T30] audit: type=1400 audit(1756778848.046:168): avc: denied { unmount } for pid=9351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 342.519311][ T9578] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 342.727293][ T9588] device wg2 left promiscuous mode [ 342.952160][ T9583] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.959370][ T9583] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.969077][ T9583] device bridge_slave_0 entered promiscuous mode [ 342.995905][ T9583] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.010982][ T9583] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.026576][ T9583] device bridge_slave_1 entered promiscuous mode [ 343.168803][ T444] GPL: port 1(erspan0) entered disabled state [ 343.201315][ T444] device erspan0 left promiscuous mode [ 343.206820][ T444] GPL: port 1(erspan0) entered disabled state [ 343.451872][ T444] device veth1_macvtap left promiscuous mode