last executing test programs: 4.761092969s ago: executing program 1 (id=6369): perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5f}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x1e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x1b}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(0x5) 4.57502693s ago: executing program 1 (id=6374): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='mctp_key_release\x00', r2, 0x0, 0x9}, 0x18) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 32) bpf$LINK_DETACH(0x22, 0x0, 0x0) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='spi_message_done\x00'}, 0x18) 4.493253696s ago: executing program 1 (id=6375): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x35, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRES16=r0, @ANYBLOB="d0d7856f1bc0a20154bf332077e6856f188bb94244ff427d455e13ab117bfcd28c5f4b34f14de612b43ad06ceb8982e3f22f71b4302bc8e4383dca6eb279d7638a7a319e28ad96069aaf7a428d3bbc9aebfd54c9d8db1262c66917092d4b67b8611cb5fae83418e713e870afbf84c7e4fe6cb129cab075913a1c46d24b729d107d8c6bf712d263e53091fc6261d9054cea8c376557722785db0d0b13b5b5b50be9253c20e350df157aed8bebf32825479aab99af8afd6ca0b4ee3484fe", @ANYRES8=r2], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="0900000000000000000000000000000000000000c2351ccf0cab6c677e746bf2eb4972383a12cb73d7f66cdcbb28e6e7a4e19b", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="01000000030000000500"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 4.405301042s ago: executing program 1 (id=6376): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="375f29c4ba75", @ANYRES32], 0x48) (async) close(0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0x1}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r4, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xe6, &(0x7f0000000400), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000500), 0xce, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r6}, 0x10) (async, rerun: 32) socketpair(0x3, 0xa, 0x0, &(0x7f0000000040)) (rerun: 32) 3.874401247s ago: executing program 1 (id=6378): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 3.873749367s ago: executing program 1 (id=6379): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x5, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x50) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="10000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="10000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) (async) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x1, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) write$cgroup_freezer_state(r7, 0x0, 0x0) (async) write$cgroup_freezer_state(r7, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000001c0)='xprtrdma_mrs_zap\x00', r9}, 0xf) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000001c0)='xprtrdma_mrs_zap\x00', r9}, 0xf) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYRES16=r7, @ANYRES16=r1], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYRES16=r7, @ANYRES16=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='devfreq_monitor\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='devfreq_monitor\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) 1.154201705s ago: executing program 4 (id=6417): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000780)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r8 = syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000400073011100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r8, @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffef8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r8, @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffef8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) mkdir(&(0x7f0000000380)='./file0\x00', 0x8) (async) mkdir(&(0x7f0000000380)='./file0\x00', 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) socketpair(0x29, 0x6, 0x2e6d, 0x0) socketpair(0x27, 0x1, 0xfffffff8, &(0x7f0000000000)) (async) socketpair(0x27, 0x1, 0xfffffff8, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r7, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x94, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x73, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r10, r11, 0x2, 0x3, 0x7fffffff}, 0x50) 874.242993ms ago: executing program 2 (id=6424): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB='1-1,'], 0x31) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r1, 0x0, 0xe6, &(0x7f0000000780)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44\x02\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,\xe8\x9fh\x92\xe3\xf0\x8dR\x1a\xe3\xcb\xb9\x1d\t\xa3\xad\x9f\xa6\x9d\x82\x82\xbd\xfa\bR\x04_6\x19\xc0\xc3\x13\x12\x15\xf9[\x85\x06\'>3G\x96\xa2eq\xda\xb2\xfd2\x80\xc9\xf3j\xfd\xf7\xc3\x84.\xcd\xaa\xb5\xa6\xefR\xde\t\a_\x83\xa2\x9c\xdb\xbe# \xe6K\xb2\xc9\xcf\xe4~\xa7\xb8\xb1\x9a\xd6\xd4\x1c\xac[\xbbtA\x16\xadU6\xc2\x1de\xcd1\xba\x8ac\x82\xda\xa5\x83\xf1\xf4^\x9ew\x14j\xd5\x8e\xaal\xbc\x1ap0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x1eb, 0x10001}, 0x2018, 0x0, 0x0, 0x2, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) 729.533253ms ago: executing program 0 (id=6427): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0x1, 0x3, 0x2, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000700000000000009209500000000000000f7315374ce569ec55869bfbcfa7c4e8f52e6288f2fbc43a3af3c6b881320c24423492f2fc14c9de730f42434dfa11c77edc1f06776d8"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="00951439fb00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="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"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4e6, 0x0, 0x8, 0x0, 0x39, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r10 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r11 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x4, 0x52, 0xe, 0x0, 0xfff, 0x2028, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xad5a, 0x1, @perf_config_ext={0x7, 0x100000000}, 0x102100, 0x8, 0x9, 0x9, 0xffffffff, 0x4, 0x9, 0x0, 0x0, 0x0, 0xa}, r11, 0x0, r10, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x5, 0x5, 0x2, 0x6, 0x0, 0x0, 0x401, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000840), 0x3}, 0x48, 0x9c00, 0x20007fff, 0x4, 0x5, 0x3, 0x5, 0x0, 0x9, 0x0, 0x5}, r11, 0x3, r9, 0x81e6afa799c105f6) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2}, 0x18) close(r1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0e00000004000000080000000180000004000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000830ccc006950720e000000000000000001454b0e5d34bd15c7281b93e802cb5f8e983e4efe9f72d0ff2085a85a5a4ff6aca867393c6b81b9cca59011d6ca34f591b9b6cee25232e9a312c2c0a643da3244023a8f384e6f9d829e9b46dd62435d07832559"], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000380)=[0x0, 0x0], 0x0, 0x92, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', r13, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xe4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r12, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000001000000030000000000002d0000000648a4000000000000"], 0x50) 708.939804ms ago: executing program 2 (id=6428): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x210c02, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x19, 0x4c}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x27}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x49, 0x10, &(0x7f0000000000), 0x3}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000008400000000010000010000", @ANYRESHEX=r3], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xe) 623.99822ms ago: executing program 0 (id=6429): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 551.058275ms ago: executing program 0 (id=6430): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x50, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x810, 0x0, 0x5, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f1"], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x7ff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 548.775535ms ago: executing program 3 (id=6431): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b0000040000000000000004"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x626f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x9}, 0x104002, 0xa1b7, 0x0, 0x0, 0x6f00000000000, 0xffffffff, 0x0, 0x0, 0xffffbffe, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 547.227415ms ago: executing program 2 (id=6432): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0xa, 0x2, 0x11, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) socketpair(0x1, 0x1, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="09000000060000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) sendmsg$inet(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 504.156858ms ago: executing program 3 (id=6433): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000"], 0x48) (async) r7 = bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r7, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={r6, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1e, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5423}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000b00)=""/4096, 0x0, 0x28, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000680)=[r0, r9, r6, r1], &(0x7f0000000800)=[{0x1, 0x4, 0xd, 0x1}, {0x0, 0x2, 0xb, 0xc}, {0x2, 0x2, 0x3, 0xa}, {0x5, 0x1, 0xe, 0x1}], 0x10, 0x10000}, 0x94) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x200000}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="16000000d3ec66ecc053c5da"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r10, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 465.78855ms ago: executing program 4 (id=6435): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6c69f68dc1cf3e78, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000180)=r9, 0x4) sendmsg$inet(r11, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 375.811826ms ago: executing program 3 (id=6436): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x100000, 0x0, 0x6, 0x4, 0x0, 0x0, 0x3}, 0x0, 0xfffffdfffdffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async, rerun: 64) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000001000), &(0x7f00000003c0)=r0}, 0x20) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="feffffff00"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) close(0x3) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@base={0x2, 0x4, 0x0, 0x143, 0x48d5, 0xffffffffffffffff, 0xffff}, 0x50) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b06000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), 0x0}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0xa) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000024000000040000000100000000000000", @ANYRES32=r7], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r8, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r7}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r9, &(0x7f0000000180), 0x0}, 0x20) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x0, 0xf00}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) (rerun: 64) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 375.459666ms ago: executing program 0 (id=6437): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 361.158197ms ago: executing program 3 (id=6438): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x9, 0x4, 0x0, 0x0, 0x2, 0x4023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x409, 0x8000000000000040, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x200000fc}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4300, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x110) 355.957027ms ago: executing program 0 (id=6439): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000007, 0x0, 0xa}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 252.691874ms ago: executing program 4 (id=6440): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x2000}) (async, rerun: 32) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) (rerun: 32) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90002, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 252.101694ms ago: executing program 2 (id=6441): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x16, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x1, 0x1, 0x4, 0x9, 0x10, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x7, 0x8, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x7f69, 0xbf, &(0x7f0000000100)=""/191, 0x41000, 0x43, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0x1, 0x1, 0x1], 0x0, 0x10, 0x8}, 0x94) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@fallback=0xffffffffffffffff, 0x1, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={@ifindex=r4, r0, 0x6, 0x0, r1, @void, @value, @void, @void, r3}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000880)={&(0x7f00000005c0)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000600)="37f80bf3b5572529bcea428e40aef3d3219d9339db90f94d8fdb5a683153a822287b41684c474f3b9c1df497e6ea0fcab44e2600ae34c547c6a3df975e8eb061226a00c35a7c7343c3d934cd7b39191de2850366b89e1a53493c7897f918a04a136e9eb1f562a1c5c829b29243d70a0b4b8b12602c612ba69af8e1dc692e069c67f43a499a8b11e3042a19e1eed951c1ea59ec3a076b3f7c140f0c9b6f76c27a06e18ef4faf589f0e6e806936db7a84b2ef04bb231f3576bb34e90bfd66a2f918b76ce1d1a5f0bb4588075", 0xcb}, {&(0x7f0000000700)="4bf39253c4e06b6568538a84351649d80de6026e1b37e92b9a89b31b2372c65d3e972fbd75938f01c73e87738e86ed7550fad8ba7d99322f6c6aed517366e9decfaf7d23f2590fc42adbeb53ea", 0x4d}, {&(0x7f0000000780)="ac58720fc8dc461349ee8c8b270ff75aacdc3401d4ed8c7cc91ee61da558f60b21aad35f0442c07e322bd320ebd5e61a9b990d12b737323c1e28c2cb6ed84bf84df516268f8fdcc736766b1ff98e9abe62bfbbf72218614a646577fd786bc971a82f6a02fdad4adce29d99571b06559073041bee2853daa263548e00a4b0976b8330682fc73f338dbf85c5a5", 0x8c}], 0x3}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x0, 0xfffffe01, 0x9, 0x52583, r2, 0xfffffa82, '\x00', r4, r2, 0x4, 0x2, 0x5, 0x6, @void, @value, @value=r2}, 0x50) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000980), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r2, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f00000009c0)=r7}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000bc0)={0x6bd, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_lsm={0x1d, 0x12, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000b40)=""/3, 0x0, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, r9, 0x0, 0x0, &(0x7f0000000c00)=[r8, r6], 0x0, 0x10, 0x9}, 0x94) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002100)={0x6, 0x11, &(0x7f0000000ec0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xdea}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @generic={0x0, 0x8, 0x9, 0x2, 0x6717}, @map_val={0x18, 0x9, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xffff}]}, &(0x7f0000000f80)='syzkaller\x00', 0x10000, 0x1000, &(0x7f0000000fc0)=""/4096, 0x41100, 0x1, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002000)={0x2, 0x10, 0xe8e00000, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002040)=[r2], &(0x7f0000002080)=[{0x5, 0x5, 0x2, 0x7}, {0x0, 0x5, 0xa, 0x5}, {0x2, 0x2, 0x1, 0x8}, {0x1, 0x5, 0x7}, {0x1, 0x4, 0x4, 0x6}], 0x10, 0x80000001}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002240)={0x13, 0x8, &(0x7f0000000d00)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x56e}, @func], &(0x7f0000000d40)='GPL\x00', 0x3, 0xab, &(0x7f0000000d80)=""/171, 0x40f00, 0x57, '\x00', r4, @fallback=0x40ad7b38676e9d60, r2, 0x8, &(0x7f0000000e40)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000e80)={0x5, 0xf, 0x6, 0x2}, 0x10, r9, r10, 0x0, &(0x7f00000021c0)=[r8, r6, r5], &(0x7f0000002200), 0x10, 0x2}, 0x94) write$cgroup_subtree(r2, &(0x7f0000002300)={[{0x2d, 'cpuacct'}, {0x2d, 'devices'}, {0x2b, 'freezer'}, {0x2d, 'memory'}, {0x2b, 'cpuset'}, {0x2d, 'rlimit'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2d, 'net_prio'}]}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000002380), 0x4) openat$cgroup_subtree(r2, &(0x7f00000023c0), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000002400)='&\'\\,{-.*\x00') r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_tracing={0x1a, 0x5, &(0x7f0000002440)=@raw=[@tail_call], &(0x7f0000002480)='GPL\x00', 0x59dd, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, 0x17, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000024c0)={0x1, 0xb, 0xd, 0xe90}, 0x10, 0x204df, r2, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) sendmsg$inet(r2, &(0x7f0000002a40)={&(0x7f00000025c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000029c0)=[{&(0x7f0000002600)="606de782b67802e568e34dba1104", 0xe}, {&(0x7f0000002640)="d190afb3cc6a7a7018681fad3a30b1c2b9e8f17feb119b455f9969ebdcf9d7da36f86fa347f07016627092c92555dc38c6ec1fe66c19c5dcebcd4e1ca0428f78cb82c17b09b257eff33c5338faf158bc1092ec58e3936dd920b2e48e374a47dc3dbbc7e8dc5c47b8f363466e6e3e8f01b9706d4d0c903eafd101821269ea1eeee650cf41af8532c05581119054e9", 0x8e}, {&(0x7f0000002700)="bba5c5f21b4ff55a746913740523b1474f2e400985e44768484aa9c3abc3e2936c6e7a20670db1bcee9fdd0c422a184719648b4123b90c3fe7a2c1caa6ae02cb789f7be5eec13a2ab464b3786ac3d29edcf8481a3c116fb46b81f998a02a68a958085aabc9513486397c360f1b7d57bc46fe96675fb0009ccebd0eca8d1d75f46d21852aa24d27ddb37b5e874d544d0e251d4bb290494b299f7f5e32a299dedfa4da0363d14c0b63f797fa663eaffd6e54a955f3819ddd40a3b884074d7912be9dd79f21488d2b60ca0f425e94e84dcd4b555a", 0xd3}, {&(0x7f0000002800)="906a77490dacf23a8b7bf097456f2e8f464eb5ef1f7852808129d05bff71222519738f8bc3c58dc84af1c6da3c29737704b7a82ceb4849aa8aca8caeb782f789862ea76ca878f281c9", 0x49}, {&(0x7f0000002880)="01c9be8d8ff16d9a0dbbcf782d5e89d86e488a00fa20f0587d4f476df202b5f97279e52bc1dd8e6dc62e77e9700f1718c0e60a", 0x33}, {&(0x7f00000028c0)="6ea8c5aa32c2bce3256273c304a56519936437835c65c7d7", 0x18}, {&(0x7f0000002900)="fe634fa726a85e1107a4470064b8718f8097ccec3ce5443b4b70016ae3c827da1f2de2a8585a0a1071258a8c24515b7ef2bac9b29b0b898ca65e28275c8d0459323d74df4e5018035d759f1ce4f00a2257d9ea802bfbb4bd7ededb4ba36d51a30a9cb9a6937f7849721056a236beca416ce67ca92ad363250684cc7084eb94de35df44f1b6e17e1475548a466e48b7c819", 0x91}], 0x7}, 0x400c804) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002a80)={r2, 0xffffffffffffffff}, 0x4) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002dc0)={&(0x7f0000002c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x3, [@func={0x3, 0x0, 0x0, 0xc, 0x3}, @ptr={0x9, 0x0, 0x0, 0x2, 0x1}, @struct={0xd, 0x4, 0x0, 0x4, 0x1, 0x4, [{0x8, 0x2}, {0xb, 0x2, 0x6f}, {0xe, 0x1, 0x9}, {0x2, 0x4, 0x6}]}, @fwd={0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x2}}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x1}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xe, 0x1}, {0x9}, {0x10, 0x2}]}]}, {0x0, [0x5f]}}, &(0x7f0000002d00)=""/180, 0xcb, 0xb4, 0x1, 0xe9, 0x10000, @value=r2}, 0x28) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003100)={0x11, 0xc, &(0x7f0000002e80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x7}, [@exit, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}]}, &(0x7f0000002f00)='syzkaller\x00', 0x9, 0xd3, &(0x7f0000002f40)=""/211, 0xa78d9036a9d2481b, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003040)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000003080)={0x4, 0x3, 0x3, 0x7fff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000030c0)=[0xffffffffffffffff, r2], 0x0, 0x10, 0xfffffff7}, 0x94) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000031c0)={0x3, 0x4, 0x4, 0xa, 0x0, r11, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000003300)={0x32, 0x11, &(0x7f0000002ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x511d}}, @map_val={0x18, 0x9, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0xfffffffa}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000002b80)='GPL\x00', 0x500, 0x39, &(0x7f0000002bc0)=""/57, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x26, r13, 0x8, &(0x7f0000002e00)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002e40)={0x4, 0xd, 0x0, 0x4}, 0x10, 0x0, r14, 0x5, &(0x7f0000003240)=[r6, r6, r6, r15, 0xffffffffffffffff, r2, r8, r6], &(0x7f0000003280)=[{0x0, 0x4, 0x4, 0xb}, {0x0, 0x3, 0x1, 0x5}, {0x3, 0x2, 0xa, 0xa}, {0x2, 0x2, 0x4, 0x8}, {0x4, 0x4, 0xc}], 0x10, 0x5}, 0x94) write$cgroup_type(r2, &(0x7f00000033c0), 0x9) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r4, r2, 0x2, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000003580)={0x18, 0x8, &(0x7f0000003400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x96c, 0x0, 0x0, 0x0, 0x400}, [@alu={0x7, 0x1, 0x4, 0x0, 0x9, 0x50, 0x4}, @jmp={0x5, 0x0, 0xc, 0x3, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @alu={0x4, 0x1, 0xf, 0x4, 0x7, 0x1, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000003440)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x38, '\x00', r4, @fallback=0x21, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, r10, 0x2, &(0x7f0000003500)=[r15, r16, r8], &(0x7f0000003540)=[{0x1, 0x2, 0xe, 0x4}, {0x2, 0x3, 0x5, 0x1b}], 0x10, 0x4}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003840)={r12, &(0x7f0000003640)="12bc6dcc08f5ef9d96ce7becdc99e43824fe554eedc5c925d5ae6c96c3eb19f15c5ca2f41fd21989d74b3a6b49d347f957fcc43b27dd3aa33b617277004187951fdea56b0afd44d91397113a2d70bc6614cb5ecd914ff42b9c05853ce06d873b0602908d4e8a4e704ea0e5b3dbb1b243f7b307ff67956b7197ab184eb91d4d9a8e4ab9df97812102e18c075f13a73aebc387ebbbe393b8396472496919cebb675a7346eb5a659a2db868f307bf25dd58e5827341622b418b35d47ed59f0b98fcef2aedce1c9dad7929c0bddaf2a27f656609bfa6b54a5b6f67b1e4331cceeddf48df67be540d5a858fe8d9ad", &(0x7f0000003740)=""/243}, 0x20) write$cgroup_subtree(r15, &(0x7f0000003880)={[{0x2b, 'pids'}, {0x2b, 'hugetlb'}, {0x2b, 'net'}, {0x2b, 'net_prio'}, {0x2b, 'cpuacct'}, {0x2b, 'cpuacct'}]}, 0x30) 251.584114ms ago: executing program 4 (id=6442): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xef, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0xf0, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x1f7b, 0x83f, 0x9, 0x2024, 0xffffffffffffffff, 0x2, '\x00', r0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x50) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540)=r1, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x10, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x401}, [@alu={0x4, 0x1, 0x1, 0x7, 0x1, 0x20, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_val={0x18, 0x9, 0x2, 0x0, r2}, @ldst={0x1, 0x2, 0x2, 0x5, 0x6, 0xfffffffffffffffc, 0x10}]}, &(0x7f0000000400)='GPL\x00', 0x8, 0xfd, &(0x7f0000000440)=""/253, 0x41100, 0x8, '\x00', r0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x1, 0x9e4457f3, 0x2}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000005c0)=[r2, r2, r2, r2], &(0x7f0000000600)=[{0x1, 0x4, 0x1, 0x1}, {0x4, 0x1, 0x6, 0x4}, {0x5, 0x5, 0x2, 0xb}, {0x4, 0x3, 0x1, 0x3}, {0x5, 0x1, 0x10, 0x4}, {0x0, 0x1, 0x4, 0x9}, {0x4, 0x5, 0x6, 0x9}], 0x10, 0x5}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r2, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0xd, &(0x7f0000000780)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x98b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}], &(0x7f0000000800)='GPL\x00', 0x10001, 0x4a, &(0x7f0000000840)=""/74, 0x41000, 0x8, '\x00', r7, 0x0, r3, 0x8, &(0x7f0000000980)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x10, 0x0, 0x8}, 0x10, 0x14827, r4, 0x1, &(0x7f0000000a00)=[r2, r2], &(0x7f0000000a40)=[{0x1, 0x1, 0xd, 0x8}], 0x10, 0x8}, 0x94) syz_clone(0xb0088200, &(0x7f0000000b40)="4d309188dd716c781ec466861c791eeeb159e98d544b1d1607472f5f6551da1f22e456ebee645412829444f89d5470a18990b9d4c4c5b28c429128f28b73144495ef07f766", 0x45, &(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)="1a1baeeea2bba09969f1039f9b6e55bffad281434d687eeff9e4b6332eccd0475bc6029f7beb6baa701ec23411b2a8d088b7179ef0fb192bed63c73d140bbe1e8237b7f40ef58c03dd9cd0d6a0c4db1350f75af73101cf7377030d3ee8eb216b3ce182073e58f4942a96104b45af8a3e0d0f2126dfc664ebd4a093") bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001000)={r3, 0x20, &(0x7f0000000fc0)={&(0x7f0000000e40)=""/252, 0xfc, 0x0, &(0x7f0000000f40)=""/123, 0x7b}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r2, 0xffffffffffffffff}, &(0x7f0000001040), &(0x7f0000001080)=r4}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001100)={r2, 0xffffffffffffffff}, 0x4) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001140)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x200, '\x00', r7, r3, 0x2, 0x5, 0x1}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=@base={0x7, 0x4, 0x5, 0x3, 0x10400, r2, 0x1, '\x00', r0, r3, 0x5, 0x0, 0x1, 0x0, @void, @value, @value=r2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1f, 0x3, &(0x7f0000000cc0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_fd={0x18, 0x8, 0x1, 0x0, r2}], &(0x7f0000000d00)='GPL\x00', 0x0, 0xa1, &(0x7f0000000d40)=""/161, 0x41000, 0x2, '\x00', r0, @fallback=0x36, r3, 0x8, &(0x7f0000000e00)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, r9, r8, 0x1, &(0x7f0000001240)=[r10, r11, r12, r2, r2, r2, r13, r2, r5], &(0x7f0000001280)=[{0x3, 0x5, 0xe, 0xb}], 0x10, 0xffffffa5}, 0x94) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xf76d, '\x00', r7, r3, 0x0, 0x5, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @ldst={0x1, 0x1, 0x5, 0x2, 0x8, 0x1, 0x1}, @jmp={0x5, 0x0, 0x2, 0x9, 0x3, 0xfffffffffffffff8, 0x1}]}, &(0x7f0000001400)='GPL\x00', 0x0, 0xe9, &(0x7f0000001440)=""/233, 0x41000, 0x29, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001580)={0x2, 0x0, 0x4, 0x8}, 0x10, r1, 0x0, 0x4, &(0x7f0000001640)=[r14, r2], &(0x7f0000001680)=[{0x1, 0x1, 0x8, 0x3}, {0x2, 0x1, 0xd}, {0x3, 0x3, 0xc, 0x6}, {0x1, 0x3, 0xe, 0x9}], 0x10, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001800)={{r2, 0xffffffffffffffff}, &(0x7f0000001780), &(0x7f00000017c0)=r8}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002940)=@bpf_lsm={0x1d, 0x7, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x62}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}]}, &(0x7f0000001880)='GPL\x00', 0x80, 0x1000, &(0x7f00000018c0)=""/4096, 0x41100, 0x41, '\x00', r0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000028c0)={0x2, 0x10, 0x0, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000002900)=[r11, r13], 0x0, 0x10, 0x3}, 0x94) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002c00)={r6, 0x8000, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000002cc0)={0x7, 0x4, &(0x7f0000002a00)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xd6d}, @jmp={0x5, 0x0, 0xa, 0x8, 0x1, 0xc, 0xffffffffffffffff}, @exit], &(0x7f0000002a40)='GPL\x00', 0x2, 0xe0, &(0x7f0000002a80)=""/224, 0x40f00, 0x69, '\x00', r0, @fallback=0x5, r3, 0x8, &(0x7f0000002b80)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000002bc0)={0x3, 0x10, 0x1, 0x8}, 0x10, 0x0, r8, 0x1, &(0x7f0000002c40)=[r11, r14, r10, r16, r2], &(0x7f0000002c80)=[{0x2, 0x5, 0x9, 0x3}], 0x10, 0xceeb}, 0x94) socketpair(0x33, 0x6, 0x6, &(0x7f0000002d80)) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000002dc0), 0x200200, 0x0) ioctl$SIOCSIFHWADDR(r17, 0x8924, &(0x7f0000002e00)={'syzkaller0\x00', @broadcast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003100)={0x18, 0x19, &(0x7f0000002e80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xf}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002f80)='syzkaller\x00', 0x1, 0xb, &(0x7f0000002fc0)=""/11, 0x40f00, 0x15, '\x00', 0x0, 0x0, r12, 0x8, &(0x7f0000003000)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000003040)={0x3, 0x2, 0x0, 0x7fff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000003080)=[r12, r16, r12, r2, r11], &(0x7f00000030c0)=[{0x4, 0x4, 0x8}], 0x10, 0x9}, 0x94) openat$cgroup_pressure(r5, &(0x7f00000031c0)='cpu.pressure\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003200)) ioctl$TUNSETOFFLOAD(r17, 0x400454d0, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003440)={0x6, 0x6, &(0x7f0000003240)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r15}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}], &(0x7f0000003280)='syzkaller\x00', 0x0, 0x51, &(0x7f00000032c0)=""/81, 0x40f00, 0x25, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000003340)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000003380)={0x5, 0x9, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000033c0)=[r11], &(0x7f0000003400)=[{0x2, 0x2, 0x6, 0x1}, {0x1, 0x3, 0x6, 0xa}, {0x0, 0x4, 0xf, 0x2}], 0x10, 0x72d0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000046c0)={&(0x7f0000003500)="74a34555a3ff5a28dcd80d4fd1e819f8168e26c956b74eada80ecb42cd99d57b0f3ac9b13f546811f6751968", &(0x7f0000003540)=""/4096, &(0x7f0000004540)="0a379bdac49f2ad840d0ac7bd495b0756de2947ede49c2f30a3eda7120f335e760309ac947b0783b29a91d7a7e8434ed270a2a156bd0bcb92e5597ec58d27509b31823a928b7", &(0x7f00000045c0)="673476e31c231732f5d4690ee81ceffb478b66dbda622f477f50a3b0d5ac022536273709ce7e50e5eea20f3ea6c1a1a20f71d94070ad6779f92c2f9d19a89805968dcfc593698e85421bebc1c699429a31f7dde3113a9ceb0689790c65aad1ffd67588ccfd7e4431db4cafeee338584ce7d1aab15e20c4b05351f021b17e020b41a0dc6c3d47bd200cb894bce33058ff0f309ab36a05239d197d3ff1d6d4a599f0ae018ef9e24f6218975e34540805e79c86c42365e2d1f6ae30e7149af818760675e74b453ff123ae8d5f1a1a20f88adbb33c0afe9e1af64ec5a2bbf8e134c10f2291ec", 0x7fffffff, r11, 0x4}, 0x38) 240.070655ms ago: executing program 2 (id=6443): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={&(0x7f00000000c0)="21ea", &(0x7f0000000100)=""/101, &(0x7f0000000180), 0x0, 0xffffff51, 0xffffffffffffffff, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8000}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x5, r0}, 0x38) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='mm_page_alloc\x00', r5, 0x0, 0x7ff}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r6) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_ext={0x1c, 0x14, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2a5da37a9aef6451}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='GPL\x00', 0x8, 0x7e, &(0x7f0000000800)=""/126, 0x0, 0x10, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000340)={0x6}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x4, 0x20c1}, 0x10, 0x5e43, r6, 0x5, &(0x7f0000000880)=[r0, r4, r3, r4, r0, r6, r6, r6, r4], &(0x7f00000008c0)=[{0x5, 0x1, 0x2}, {0x4, 0x1, 0x0, 0xc}, {0x0, 0x3, 0x4}, {0x0, 0x3, 0xb}, {0x3, 0x5, 0xe, 0x1}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r8, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup=r9, 0x24, 0x0, 0xffff, &(0x7f0000000000)=[0x0], 0x40e8, 0x0, 0x0, 0x0, 0x0}, 0x40) 227.279936ms ago: executing program 4 (id=6444): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xba98575a95aeb70d) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = getpid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x4, 0xc}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r5}, &(0x7f0000000000), &(0x7f0000000200)=r6}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) (async) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) openat$cgroup_freezer_state(r4, &(0x7f00000005c0), 0x2, 0x0) r9 = openat$cgroup_freezer_state(r4, &(0x7f0000000340), 0x2, 0x0) close(r9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408200000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x7, 0x5, 0x6, 0x3, 0x0, 0x9, 0x810, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x200, 0x2}, 0x5010, 0x5, 0x4, 0x2, 0x1, 0x7, 0x89, 0x0, 0x6, 0x0, 0x7}, r3, 0xc, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r10 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2c5e}, 0x0, 0xbfffffffffffffff, r10, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2c5e}, 0x0, 0xbfffffffffffffff, r10, 0x0) r11 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r10, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r10, 0x8) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r10, 0x8) close(r11) (async) close(r11) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 465.05µs ago: executing program 4 (id=6445): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) (async) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/64, 0x40}], 0x1}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='thermal_power_allocator_pid\x00', r3, 0x0, 0xffffffff}, 0x18) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) (async) openat$cgroup_freezer_state(r6, &(0x7f00000003c0), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8912, &(0x7f0000000080)) 0s ago: executing program 2 (id=6446): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xa000, 0xc8, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r4}, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x1}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r9}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0, r7}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r5, r9, 0x4, r8}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)='%+9llu \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r10}, 0x10) write$cgroup_int(r5, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.241' (ED25519) to the list of known hosts. [ 18.913731][ T24] audit: type=1400 audit(1759899381.640:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.914679][ T267] cgroup: Unknown subsys name 'net' [ 18.921755][ T24] audit: type=1400 audit(1759899381.640:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.931361][ T24] audit: type=1400 audit(1759899381.660:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.931631][ T267] cgroup: Unknown subsys name 'devices' [ 19.128684][ T267] cgroup: Unknown subsys name 'hugetlb' [ 19.134295][ T267] cgroup: Unknown subsys name 'rlimit' [ 19.301134][ T24] audit: type=1400 audit(1759899382.030:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.324363][ T24] audit: type=1400 audit(1759899382.030:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.329788][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.349237][ T24] audit: type=1400 audit(1759899382.030:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.380727][ T24] audit: type=1400 audit(1759899382.090:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.406248][ T24] audit: type=1400 audit(1759899382.090:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.441066][ T24] audit: type=1400 audit(1759899382.170:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.466605][ T24] audit: type=1400 audit(1759899382.170:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.492701][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.005126][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.012249][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.019722][ T275] device bridge_slave_0 entered promiscuous mode [ 20.037266][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.044303][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.051716][ T275] device bridge_slave_1 entered promiscuous mode [ 20.098782][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.105837][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.113425][ T276] device bridge_slave_0 entered promiscuous mode [ 20.121344][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.128496][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.135737][ T276] device bridge_slave_1 entered promiscuous mode [ 20.144183][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.151238][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.158596][ T277] device bridge_slave_0 entered promiscuous mode [ 20.166334][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.173433][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.180790][ T277] device bridge_slave_1 entered promiscuous mode [ 20.224895][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.232154][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.239665][ T280] device bridge_slave_0 entered promiscuous mode [ 20.258821][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.265867][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.273280][ T280] device bridge_slave_1 entered promiscuous mode [ 20.349827][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.356876][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.364522][ T278] device bridge_slave_0 entered promiscuous mode [ 20.373916][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.380990][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.388315][ T278] device bridge_slave_1 entered promiscuous mode [ 20.415375][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.422436][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.429716][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.436832][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.467709][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.474757][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.482052][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.489164][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.497518][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.504661][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.511954][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.519009][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.536594][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.543663][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.550946][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.557989][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.591003][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.598402][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.605485][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.613337][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.620591][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.627760][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.634948][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.642355][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.649468][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.669478][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.676943][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.684493][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.692876][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.699918][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.707541][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.715694][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.722737][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.730084][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.737840][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.745918][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.753039][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.777467][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.785370][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.793555][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.800584][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.808638][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.816877][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.823941][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.848594][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.856695][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.863724][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.871233][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.879566][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.887940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.895834][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.903784][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.911959][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.919014][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.926325][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.934664][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.941842][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.959684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.968432][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.976663][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.002551][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.011267][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.019340][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.026636][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.034676][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.048006][ T276] device veth0_vlan entered promiscuous mode [ 21.054541][ T280] device veth0_vlan entered promiscuous mode [ 21.061563][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.069011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.076350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.084687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.092897][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.100970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.109202][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.116610][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.124277][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.131782][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.140963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.149147][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.157242][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.165206][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.174257][ T275] device veth0_vlan entered promiscuous mode [ 21.187889][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.196339][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.204688][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.211732][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.219622][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.228337][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.236660][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.243692][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.251065][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.261411][ T276] device veth1_macvtap entered promiscuous mode [ 21.269408][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.277715][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.285803][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.297982][ T280] device veth1_macvtap entered promiscuous mode [ 21.306349][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.315100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.323639][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.333622][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.341853][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.358619][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.366879][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.375406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.383826][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.392508][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.400787][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.408767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.416689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.424779][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.433121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.445233][ T275] device veth1_macvtap entered promiscuous mode [ 21.452992][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.460760][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.469640][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.482847][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.491891][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.493377][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 21.513044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.522142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.530699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.539588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.555409][ T277] device veth0_vlan entered promiscuous mode [ 21.565444][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.566743][ T278] device veth0_vlan entered promiscuous mode [ 21.583384][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.593322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.606805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.614827][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.623088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.631195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.639444][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.646868][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.654896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.662345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.688893][ T277] device veth1_macvtap entered promiscuous mode [ 21.708456][ T278] device veth1_macvtap entered promiscuous mode [ 21.715136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.726975][ C0] hrtimer: interrupt took 25528 ns [ 21.734091][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.742460][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.763494][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.792319][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.801230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.846194][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.854812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.863353][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.871711][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.932865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.943768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.962934][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.977858][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.306724][ T327] cgroup: syz.0.12 (327) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 22.337167][ T327] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 22.365654][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 23.355890][ T369] device syzkaller0 entered promiscuous mode [ 24.188497][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 24.188504][ T24] audit: type=1400 audit(1759899386.920:113): avc: denied { read } for pid=411 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 24.349745][ T440] tun0: tun_chr_ioctl cmd 1074025678 [ 24.355124][ T440] tun0: group set to 17 [ 24.363531][ T24] audit: type=1400 audit(1759899387.090:114): avc: denied { create } for pid=435 comm="syz.2.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 24.546621][ T24] audit: type=1400 audit(1759899387.270:115): avc: denied { read } for pid=446 comm="syz.3.46" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.575174][ T24] audit: type=1400 audit(1759899387.270:116): avc: denied { open } for pid=446 comm="syz.3.46" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.598291][ T24] audit: type=1400 audit(1759899387.300:117): avc: denied { ioctl } for pid=446 comm="syz.3.46" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.929772][ T459] device syzkaller0 entered promiscuous mode [ 24.959676][ T470] device syzkaller0 left promiscuous mode [ 25.066661][ T487] device pim6reg1 entered promiscuous mode [ 25.560351][ T496] device syzkaller0 entered promiscuous mode [ 26.464723][ T561] device veth0_vlan left promiscuous mode [ 26.475460][ T24] audit: type=1400 audit(1759899389.210:118): avc: denied { create } for pid=560 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.498153][ T561] device veth0_vlan entered promiscuous mode [ 26.531694][ T564] device syzkaller0 entered promiscuous mode [ 26.661398][ T583] cgroup: fork rejected by pids controller in /syz3 [ 26.710496][ T593] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.717758][ T593] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.740794][ T593] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.747891][ T593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.755196][ T593] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.762252][ T593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.774987][ T24] audit: type=1400 audit(1759899389.490:119): avc: denied { create } for pid=594 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 26.801703][ T593] device bridge0 entered promiscuous mode [ 26.970705][ T24] audit: type=1400 audit(1759899389.700:120): avc: denied { create } for pid=739 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.524806][ T755] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.648995][ T755] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.697741][ T755] device bridge_slave_0 entered promiscuous mode [ 27.745799][ T755] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.792221][ T755] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.825843][ T755] device bridge_slave_1 entered promiscuous mode [ 27.899424][ T24] audit: type=1400 audit(1759899390.630:121): avc: denied { create } for pid=755 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.930227][ T24] audit: type=1400 audit(1759899390.650:122): avc: denied { write } for pid=755 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.974427][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.002445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.044203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.100019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.313450][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.320551][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.390561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.757597][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.766368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.775319][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.782386][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.808833][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.820327][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.828829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.837606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.881957][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.904118][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.920139][ T755] device veth0_vlan entered promiscuous mode [ 28.935607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.945925][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.962227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.969891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.994021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.002350][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.012085][ T755] device veth1_macvtap entered promiscuous mode [ 29.035736][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.043558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.052280][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.070874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.088628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.374883][ T9] device bridge_slave_1 left promiscuous mode [ 29.387060][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.397870][ T9] device bridge_slave_0 left promiscuous mode [ 29.404456][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.414268][ T9] device veth1_macvtap left promiscuous mode [ 29.690169][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 29.690180][ T24] audit: type=1400 audit(1759899392.420:126): avc: denied { relabelfrom } for pid=829 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.735826][ T24] audit: type=1400 audit(1759899392.420:127): avc: denied { relabelto } for pid=829 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.236356][ T24] audit: type=1400 audit(1759899392.960:128): avc: denied { write } for pid=875 comm="syz.2.140" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.342668][ T874] device sit0 entered promiscuous mode [ 30.873051][ T902] device pim6reg1 entered promiscuous mode [ 31.056301][ T933] ------------[ cut here ]------------ [ 31.107352][ T933] trace type BPF program uses run-time allocation [ 31.159099][ T933] WARNING: CPU: 1 PID: 933 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 31.173758][ T933] Modules linked in: [ 31.177928][ T933] CPU: 1 PID: 933 Comm: syz.2.158 Not tainted syzkaller #0 [ 31.185242][ T933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 31.195968][ T933] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 31.205048][ T933] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 c0 77 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 31.225116][ T933] RSP: 0018:ffffc9000134f468 EFLAGS: 00010246 [ 31.237124][ T933] RAX: ccafdff369e59600 RBX: 0000000000000001 RCX: 0000000000080000 [ 31.245882][ T933] RDX: ffffc900024ff000 RSI: 00000000000021c2 RDI: 00000000000021c3 [ 31.256875][ T933] RBP: ffffc9000134f4b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 31.265095][ T933] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff8881163d0000 [ 31.273677][ T933] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888116f58000 [ 31.288298][ T933] FS: 00007f19d2b616c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 31.312242][ T933] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.329577][ T933] CR2: 0000001b2df23ffc CR3: 00000001160aa000 CR4: 00000000003506b0 [ 31.398089][ T933] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 31.438766][ T933] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 31.481742][ T933] Call Trace: [ 31.496806][ T933] ? __fdget+0x1a1/0x230 [ 31.551512][ T933] resolve_pseudo_ldimm64+0x526/0x1020 [ 31.607153][ T933] ? bpf_check+0xd680/0xd680 [ 31.647056][ T933] ? kvmalloc_node+0x88/0x130 [ 31.651772][ T933] bpf_check+0x8d4b/0xd680 [ 31.656199][ T933] ? bpf_get_btf_vmlinux+0x60/0x60 [ 31.786382][ T933] ? is_bpf_text_address+0x177/0x190 [ 31.826864][ T933] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.837005][ T933] ? __kernel_text_address+0xa0/0x100 [ 31.842500][ T933] ? unwind_get_return_address+0x4d/0x90 [ 31.896613][ T933] ? stack_trace_save+0xe0/0xe0 [ 31.907022][ T961] syz.3.164 (961) used obsolete PPPIOCDETACH ioctl [ 31.944730][ T24] audit: type=1400 audit(1759899394.670:129): avc: denied { create } for pid=964 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.964184][ T933] ? arch_stack_walk+0xee/0x140 [ 31.971900][ T933] ? stack_trace_save+0x98/0xe0 [ 31.976782][ T933] ? stack_trace_snprint+0xf0/0xf0 [ 32.012649][ T933] ? __kasan_slab_alloc+0x69/0xf0 [ 32.026707][ T933] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.054787][ T933] ? __kasan_kmalloc+0xec/0x110 [ 32.075837][ T933] ? __kasan_kmalloc+0xda/0x110 [ 32.101187][ T933] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 32.106786][ T933] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.128672][ T933] ? security_bpf_prog_alloc+0x62/0x90 [ 32.134163][ T933] ? bpf_prog_load+0x949/0x1420 [ 32.139266][ T933] ? __se_sys_bpf+0x442/0x680 [ 32.144309][ T933] ? __x64_sys_bpf+0x7b/0x90 [ 32.149607][ T933] ? do_syscall_64+0x31/0x40 [ 32.154223][ T933] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.160738][ T933] ? memset+0x35/0x40 [ 32.164731][ T933] ? bpf_obj_name_cpy+0x193/0x1e0 [ 32.170094][ T933] bpf_prog_load+0xf5a/0x1420 [ 32.174847][ T933] ? map_freeze+0x320/0x320 [ 32.195743][ T933] ? selinux_bpf+0xc7/0xf0 [ 32.201625][ T933] ? security_bpf+0x82/0xa0 [ 32.220999][ T933] __se_sys_bpf+0x442/0x680 [ 32.231955][ T933] ? __x64_sys_bpf+0x90/0x90 [ 32.236815][ T933] ? __bpf_trace_sys_enter+0x62/0x70 [ 32.242658][ T933] __x64_sys_bpf+0x7b/0x90 [ 32.247465][ T933] do_syscall_64+0x31/0x40 [ 32.252011][ T933] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.260188][ T933] RIP: 0033:0x7f19d40f8ec9 [ 32.265129][ T933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.292590][ T933] RSP: 002b:00007f19d2b61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.317048][ T933] RAX: ffffffffffffffda RBX: 00007f19d434ffa0 RCX: 00007f19d40f8ec9 [ 32.368300][ T933] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 32.410869][ T933] RBP: 00007f19d417bf91 R08: 0000000000000000 R09: 0000000000000000 [ 32.437433][ T933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 32.456050][ T933] R13: 00007f19d4350038 R14: 00007f19d434ffa0 R15: 00007ffd22965428 [ 32.466815][ T933] ---[ end trace 40601789b2c6be0c ]--- [ 32.510037][ T1005] device syzkaller0 entered promiscuous mode [ 32.870173][ T1022] @0Ù: renamed from bond_slave_1 [ 33.032177][ T1046] device pim6reg1 entered promiscuous mode [ 34.279298][ T1120] device syzkaller0 entered promiscuous mode [ 34.412888][ T24] audit: type=1400 audit(1759899397.140:130): avc: denied { ioctl } for pid=1137 comm="syz.1.219" path="mnt:[4026532367]" dev="nsfs" ino=4026532367 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.432094][ T1192] device syzkaller0 entered promiscuous mode [ 35.929263][ T24] audit: type=1400 audit(1759899398.660:131): avc: denied { ioctl } for pid=1225 comm="syz.3.247" path="socket:[18150]" dev="sockfs" ino=18150 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.930765][ T1219] device wg2 entered promiscuous mode [ 36.137672][ T1246] device syzkaller0 entered promiscuous mode [ 36.282853][ T1255] device sit0 entered promiscuous mode [ 36.452604][ T1267] device syzkaller0 entered promiscuous mode [ 37.370203][ T24] audit: type=1400 audit(1759899400.100:132): avc: denied { create } for pid=1308 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 37.634506][ T1338] device veth0_vlan left promiscuous mode [ 37.641025][ T1338] device veth0_vlan entered promiscuous mode [ 37.654899][ T1333] device sit0 entered promiscuous mode [ 37.661450][ T24] audit: type=1400 audit(1759899400.400:133): avc: denied { create } for pid=1337 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 37.759817][ T1347] device veth1_macvtap left promiscuous mode [ 38.010452][ T1352] device syzkaller0 entered promiscuous mode [ 38.159515][ T24] audit: type=1400 audit(1759899400.890:134): avc: denied { create } for pid=1380 comm="syz.2.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 38.211623][ T24] audit: type=1400 audit(1759899400.940:135): avc: denied { tracepoint } for pid=1392 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.413001][ T1402] FAULT_INJECTION: forcing a failure. [ 38.413001][ T1402] name failslab, interval 1, probability 0, space 0, times 1 [ 38.441427][ T1402] CPU: 0 PID: 1402 Comm: syz.4.300 Tainted: G W syzkaller #0 [ 38.450138][ T1402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 38.460195][ T1402] Call Trace: [ 38.463503][ T1402] __dump_stack+0x21/0x24 [ 38.467826][ T1402] dump_stack_lvl+0x169/0x1d8 [ 38.472491][ T1402] ? show_regs_print_info+0x18/0x18 [ 38.477680][ T1402] dump_stack+0x15/0x1c [ 38.481820][ T1402] should_fail+0x3c1/0x510 [ 38.486249][ T1402] ? security_inode_alloc+0x33/0x110 [ 38.491549][ T1402] __should_failslab+0xa4/0xe0 [ 38.496327][ T1402] should_failslab+0x9/0x20 [ 38.500843][ T1402] kmem_cache_alloc+0x3d/0x2e0 [ 38.505632][ T1402] security_inode_alloc+0x33/0x110 [ 38.510739][ T1402] inode_init_always+0x70a/0x9b0 [ 38.515757][ T1402] new_inode_pseudo+0x91/0x210 [ 38.520510][ T1402] __sock_create+0x12c/0x770 [ 38.525090][ T1402] __sys_socketpair+0x1a1/0x590 [ 38.529928][ T1402] __x64_sys_socketpair+0x9b/0xb0 [ 38.534939][ T1402] do_syscall_64+0x31/0x40 [ 38.539462][ T1402] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 38.545348][ T1402] RIP: 0033:0x7f7a04d95ec9 [ 38.549761][ T1402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.569392][ T1402] RSP: 002b:00007f7a037fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 38.577904][ T1402] RAX: ffffffffffffffda RBX: 00007f7a04fecfa0 RCX: 00007f7a04d95ec9 [ 38.585873][ T1402] RDX: 0000000000001000 RSI: 0000000000000002 RDI: 0000000000000021 [ 38.593843][ T1402] RBP: 00007f7a037fe090 R08: 0000000000000000 R09: 0000000000000000 [ 38.601818][ T1402] R10: 00002000000030c0 R11: 0000000000000246 R12: 0000000000000001 [ 38.609776][ T1402] R13: 00007f7a04fed038 R14: 00007f7a04fecfa0 R15: 00007ffd68dd9b38 [ 38.633611][ T1402] socket: no more sockets [ 38.662201][ T1412] FAULT_INJECTION: forcing a failure. [ 38.662201][ T1412] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 38.675408][ T1412] CPU: 0 PID: 1412 Comm: syz.4.302 Tainted: G W syzkaller #0 [ 38.684215][ T1412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 38.694271][ T1412] Call Trace: [ 38.697572][ T1412] __dump_stack+0x21/0x24 [ 38.701900][ T1412] dump_stack_lvl+0x169/0x1d8 [ 38.706585][ T1412] ? thaw_kernel_threads+0x220/0x220 [ 38.711882][ T1412] ? show_regs_print_info+0x18/0x18 [ 38.717066][ T1412] dump_stack+0x15/0x1c [ 38.721207][ T1412] should_fail+0x3c1/0x510 [ 38.725612][ T1412] should_fail_usercopy+0x1a/0x20 [ 38.730624][ T1412] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 38.736683][ T1412] generic_perform_write+0x326/0x510 [ 38.742093][ T1412] ? atime_needs_update+0x5b0/0x5b0 [ 38.747305][ T1412] ? grab_cache_page_write_begin+0xb0/0xb0 [ 38.753124][ T1412] ? file_remove_privs+0x580/0x580 [ 38.758234][ T1412] ? __fsnotify_parent+0x5f5/0x6c0 [ 38.763347][ T1412] ? __kasan_check_write+0x14/0x20 [ 38.768454][ T1412] ? down_write+0xac/0x110 [ 38.772867][ T1412] __generic_file_write_iter+0x24b/0x480 [ 38.778574][ T1412] ? generic_write_checks+0x3d4/0x480 [ 38.783933][ T1412] generic_file_write_iter+0xa9/0x1d0 [ 38.789295][ T1412] vfs_write+0x725/0xd60 [ 38.793526][ T1412] ? __kasan_slab_free+0x11/0x20 [ 38.798492][ T1412] ? kernel_write+0x3c0/0x3c0 [ 38.803157][ T1412] ? mutex_trylock+0xa0/0xa0 [ 38.807733][ T1412] ? __fget_files+0x2c4/0x320 [ 38.812399][ T1412] ? __fdget_pos+0x2d2/0x380 [ 38.816984][ T1412] ? ksys_write+0x71/0x240 [ 38.821568][ T1412] ksys_write+0x140/0x240 [ 38.826157][ T1412] ? __ia32_sys_read+0x90/0x90 [ 38.830909][ T1412] ? debug_smp_processor_id+0x17/0x20 [ 38.836271][ T1412] __x64_sys_write+0x7b/0x90 [ 38.840846][ T1412] do_syscall_64+0x31/0x40 [ 38.845253][ T1412] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 38.851230][ T1412] RIP: 0033:0x7f7a04d95ec9 [ 38.855659][ T1412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.875411][ T1412] RSP: 002b:00007f7a037fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 38.883830][ T1412] RAX: ffffffffffffffda RBX: 00007f7a04fecfa0 RCX: 00007f7a04d95ec9 [ 38.891795][ T1412] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 38.900024][ T1412] RBP: 00007f7a037fe090 R08: 0000000000000000 R09: 0000000000000000 [ 38.907994][ T1412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.916047][ T1412] R13: 00007f7a04fed038 R14: 00007f7a04fecfa0 R15: 00007ffd68dd9b38 [ 38.951740][ T1415] device macsec0 entered promiscuous mode [ 39.082075][ T24] audit: type=1400 audit(1759899401.810:136): avc: denied { create } for pid=1425 comm="syz.4.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 39.560855][ T1467] FAULT_INJECTION: forcing a failure. [ 39.560855][ T1467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 39.573997][ T1467] CPU: 1 PID: 1467 Comm: syz.2.318 Tainted: G W syzkaller #0 [ 39.582678][ T1467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 39.592830][ T1467] Call Trace: [ 39.596128][ T1467] __dump_stack+0x21/0x24 [ 39.600463][ T1467] dump_stack_lvl+0x169/0x1d8 [ 39.605143][ T1467] ? thaw_kernel_threads+0x220/0x220 [ 39.610429][ T1467] ? show_regs_print_info+0x18/0x18 [ 39.615627][ T1467] dump_stack+0x15/0x1c [ 39.619797][ T1467] should_fail+0x3c1/0x510 [ 39.624211][ T1467] should_fail_usercopy+0x1a/0x20 [ 39.629238][ T1467] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 39.635307][ T1467] generic_perform_write+0x326/0x510 [ 39.640629][ T1467] ? grab_cache_page_write_begin+0xb0/0xb0 [ 39.646440][ T1467] ? file_remove_privs+0x580/0x580 [ 39.651554][ T1467] ? __fsnotify_parent+0x5f5/0x6c0 [ 39.656665][ T1467] ? __kasan_check_write+0x14/0x20 [ 39.661770][ T1467] ? down_write+0xac/0x110 [ 39.666189][ T1467] __generic_file_write_iter+0x24b/0x480 [ 39.671819][ T1467] ? generic_write_checks+0x3d4/0x480 [ 39.677198][ T1467] generic_file_write_iter+0xa9/0x1d0 [ 39.682578][ T1467] vfs_write+0x725/0xd60 [ 39.686816][ T1467] ? __kasan_slab_free+0x11/0x20 [ 39.691840][ T1467] ? kernel_write+0x3c0/0x3c0 [ 39.696514][ T1467] ? mutex_trylock+0xa0/0xa0 [ 39.701099][ T1467] ? __fget_files+0x2c4/0x320 [ 39.705774][ T1467] ? __fdget_pos+0x2d2/0x380 [ 39.710364][ T1467] ? ksys_write+0x71/0x240 [ 39.714777][ T1467] ksys_write+0x140/0x240 [ 39.719108][ T1467] ? __ia32_sys_read+0x90/0x90 [ 39.723879][ T1467] ? debug_smp_processor_id+0x17/0x20 [ 39.729249][ T1467] __x64_sys_write+0x7b/0x90 [ 39.733837][ T1467] do_syscall_64+0x31/0x40 [ 39.738257][ T1467] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.744233][ T1467] RIP: 0033:0x7f19d40f8ec9 [ 39.748647][ T1467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.768341][ T1467] RSP: 002b:00007f19d2b61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 39.776763][ T1467] RAX: ffffffffffffffda RBX: 00007f19d434ffa0 RCX: 00007f19d40f8ec9 [ 39.784772][ T1467] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 39.792749][ T1467] RBP: 00007f19d2b61090 R08: 0000000000000000 R09: 0000000000000000 [ 39.800721][ T1467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 39.808692][ T1467] R13: 00007f19d4350038 R14: 00007f19d434ffa0 R15: 00007ffd22965428 [ 39.892897][ T1469] device sit0 left promiscuous mode [ 40.010506][ T1472] device sit0 entered promiscuous mode [ 40.235134][ T1488] device sit0 entered promiscuous mode [ 40.591874][ T24] audit: type=1400 audit(1759899403.320:137): avc: denied { create } for pid=1539 comm="syz.3.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 41.592574][ T1580] device sit0 left promiscuous mode [ 43.061163][ T1652] device sit0 left promiscuous mode [ 43.173071][ T1653] device sit0 entered promiscuous mode [ 43.243952][ T1659] FAULT_INJECTION: forcing a failure. [ 43.243952][ T1659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.257095][ T1659] CPU: 0 PID: 1659 Comm: syz.3.371 Tainted: G W syzkaller #0 [ 43.265772][ T1659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 43.275841][ T1659] Call Trace: [ 43.279135][ T1659] __dump_stack+0x21/0x24 [ 43.283469][ T1659] dump_stack_lvl+0x169/0x1d8 [ 43.288240][ T1659] ? thaw_kernel_threads+0x220/0x220 [ 43.293524][ T1659] ? show_regs_print_info+0x18/0x18 [ 43.298733][ T1659] dump_stack+0x15/0x1c [ 43.302908][ T1659] should_fail+0x3c1/0x510 [ 43.307324][ T1659] should_fail_usercopy+0x1a/0x20 [ 43.312349][ T1659] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 43.318438][ T1659] generic_perform_write+0x326/0x510 [ 43.323735][ T1659] ? grab_cache_page_write_begin+0xb0/0xb0 [ 43.329542][ T1659] ? file_remove_privs+0x580/0x580 [ 43.334839][ T1659] ? __fsnotify_parent+0x5f5/0x6c0 [ 43.339955][ T1659] ? __kasan_check_write+0x14/0x20 [ 43.345155][ T1659] ? down_write+0xac/0x110 [ 43.349579][ T1659] __generic_file_write_iter+0x24b/0x480 [ 43.355212][ T1659] ? generic_write_checks+0x3d4/0x480 [ 43.360585][ T1659] generic_file_write_iter+0xa9/0x1d0 [ 43.365954][ T1659] vfs_write+0x725/0xd60 [ 43.370204][ T1659] ? __kasan_slab_free+0x11/0x20 [ 43.375149][ T1659] ? kernel_write+0x3c0/0x3c0 [ 43.379828][ T1659] ? mutex_trylock+0xa0/0xa0 [ 43.384419][ T1659] ? __fget_files+0x2c4/0x320 [ 43.389105][ T1659] ? __fdget_pos+0x2d2/0x380 [ 43.393691][ T1659] ? ksys_write+0x71/0x240 [ 43.398192][ T1659] ksys_write+0x140/0x240 [ 43.402530][ T1659] ? __ia32_sys_read+0x90/0x90 [ 43.407293][ T1659] ? debug_smp_processor_id+0x17/0x20 [ 43.412663][ T1659] __x64_sys_write+0x7b/0x90 [ 43.417251][ T1659] do_syscall_64+0x31/0x40 [ 43.421680][ T1659] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.427580][ T1659] RIP: 0033:0x7f009c05aec9 [ 43.431995][ T1659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.451604][ T1659] RSP: 002b:00007f009aac3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 43.460027][ T1659] RAX: ffffffffffffffda RBX: 00007f009c2b1fa0 RCX: 00007f009c05aec9 [ 43.468000][ T1659] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 43.475968][ T1659] RBP: 00007f009aac3090 R08: 0000000000000000 R09: 0000000000000000 [ 43.483941][ T1659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 43.491918][ T1659] R13: 00007f009c2b2038 R14: 00007f009c2b1fa0 R15: 00007ffe79184618 [ 44.154357][ T1703] FAULT_INJECTION: forcing a failure. [ 44.154357][ T1703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.167916][ T1703] CPU: 0 PID: 1703 Comm: syz.1.384 Tainted: G W syzkaller #0 [ 44.176593][ T1703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 44.186657][ T1703] Call Trace: [ 44.189961][ T1703] __dump_stack+0x21/0x24 [ 44.194304][ T1703] dump_stack_lvl+0x169/0x1d8 [ 44.198990][ T1703] ? thaw_kernel_threads+0x220/0x220 [ 44.204281][ T1703] ? show_regs_print_info+0x18/0x18 [ 44.209493][ T1703] dump_stack+0x15/0x1c [ 44.213651][ T1703] should_fail+0x3c1/0x510 [ 44.218078][ T1703] should_fail_usercopy+0x1a/0x20 [ 44.223108][ T1703] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 44.229183][ T1703] generic_perform_write+0x326/0x510 [ 44.234470][ T1703] ? atime_needs_update+0x5b0/0x5b0 [ 44.239676][ T1703] ? grab_cache_page_write_begin+0xb0/0xb0 [ 44.245484][ T1703] ? file_remove_privs+0x580/0x580 [ 44.250602][ T1703] ? __fsnotify_parent+0x5f5/0x6c0 [ 44.255720][ T1703] ? __kasan_check_write+0x14/0x20 [ 44.260851][ T1703] ? down_write+0xac/0x110 [ 44.265272][ T1703] __generic_file_write_iter+0x24b/0x480 [ 44.270911][ T1703] ? generic_write_checks+0x3d4/0x480 [ 44.276295][ T1703] generic_file_write_iter+0xa9/0x1d0 [ 44.281673][ T1703] vfs_write+0x725/0xd60 [ 44.285917][ T1703] ? __kasan_slab_free+0x11/0x20 [ 44.290859][ T1703] ? kernel_write+0x3c0/0x3c0 [ 44.295544][ T1703] ? mutex_trylock+0xa0/0xa0 [ 44.300143][ T1703] ? __fget_files+0x2c4/0x320 [ 44.304827][ T1703] ? __fdget_pos+0x2d2/0x380 [ 44.309443][ T1703] ? ksys_write+0x71/0x240 [ 44.313866][ T1703] ksys_write+0x140/0x240 [ 44.318198][ T1703] ? __ia32_sys_read+0x90/0x90 [ 44.322965][ T1703] ? debug_smp_processor_id+0x17/0x20 [ 44.328337][ T1703] __x64_sys_write+0x7b/0x90 [ 44.332930][ T1703] do_syscall_64+0x31/0x40 [ 44.337356][ T1703] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.343245][ T1703] RIP: 0033:0x7fbf7cdbeec9 [ 44.347668][ T1703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.367287][ T1703] RSP: 002b:00007fbf7b827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 44.375722][ T1703] RAX: ffffffffffffffda RBX: 00007fbf7d015fa0 RCX: 00007fbf7cdbeec9 [ 44.383883][ T1703] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 44.391862][ T1703] RBP: 00007fbf7b827090 R08: 0000000000000000 R09: 0000000000000000 [ 44.399841][ T1703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.407823][ T1703] R13: 00007fbf7d016038 R14: 00007fbf7d015fa0 R15: 00007ffd2f25ce58 [ 45.180579][ T1760] FAULT_INJECTION: forcing a failure. [ 45.180579][ T1760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.193761][ T1760] CPU: 1 PID: 1760 Comm: syz.3.399 Tainted: G W syzkaller #0 [ 45.202809][ T1760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.212867][ T1760] Call Trace: [ 45.216165][ T1760] __dump_stack+0x21/0x24 [ 45.220495][ T1760] dump_stack_lvl+0x169/0x1d8 [ 45.225175][ T1760] ? thaw_kernel_threads+0x220/0x220 [ 45.230460][ T1760] ? show_regs_print_info+0x18/0x18 [ 45.235664][ T1760] dump_stack+0x15/0x1c [ 45.239829][ T1760] should_fail+0x3c1/0x510 [ 45.244334][ T1760] should_fail_usercopy+0x1a/0x20 [ 45.249366][ T1760] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 45.255438][ T1760] generic_perform_write+0x326/0x510 [ 45.260731][ T1760] ? atime_needs_update+0x5b0/0x5b0 [ 45.266027][ T1760] ? grab_cache_page_write_begin+0xb0/0xb0 [ 45.271842][ T1760] ? file_remove_privs+0x580/0x580 [ 45.276953][ T1760] ? __fsnotify_parent+0x5f5/0x6c0 [ 45.282063][ T1760] ? __kasan_check_write+0x14/0x20 [ 45.287197][ T1760] ? down_write+0xac/0x110 [ 45.291631][ T1760] __generic_file_write_iter+0x24b/0x480 [ 45.297364][ T1760] ? generic_write_checks+0x3d4/0x480 [ 45.302746][ T1760] generic_file_write_iter+0xa9/0x1d0 [ 45.308117][ T1760] vfs_write+0x725/0xd60 [ 45.312384][ T1760] ? __kasan_slab_free+0x11/0x20 [ 45.317323][ T1760] ? kernel_write+0x3c0/0x3c0 [ 45.322003][ T1760] ? mutex_trylock+0xa0/0xa0 [ 45.326596][ T1760] ? __fget_files+0x2c4/0x320 [ 45.331543][ T1760] ? __fdget_pos+0x2d2/0x380 [ 45.336134][ T1760] ? ksys_write+0x71/0x240 [ 45.340641][ T1760] ksys_write+0x140/0x240 [ 45.344987][ T1760] ? __ia32_sys_read+0x90/0x90 [ 45.349765][ T1760] ? debug_smp_processor_id+0x17/0x20 [ 45.355145][ T1760] __x64_sys_write+0x7b/0x90 [ 45.359744][ T1760] do_syscall_64+0x31/0x40 [ 45.364163][ T1760] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.370058][ T1760] RIP: 0033:0x7f009c05aec9 [ 45.374479][ T1760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.394099][ T1760] RSP: 002b:00007f009aac3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 45.402543][ T1760] RAX: ffffffffffffffda RBX: 00007f009c2b1fa0 RCX: 00007f009c05aec9 [ 45.410524][ T1760] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 45.418501][ T1760] RBP: 00007f009aac3090 R08: 0000000000000000 R09: 0000000000000000 [ 45.426484][ T1760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 45.434468][ T1760] R13: 00007f009c2b2038 R14: 00007f009c2b1fa0 R15: 00007ffe79184618 [ 45.543334][ T24] audit: type=1400 audit(1759899408.270:138): avc: denied { create } for pid=1764 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 45.718092][ T24] audit: type=1400 audit(1759899408.440:139): avc: denied { create } for pid=1767 comm="syz.2.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 45.913961][ T1793] FAULT_INJECTION: forcing a failure. [ 45.913961][ T1793] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.927080][ T1793] CPU: 0 PID: 1793 Comm: syz.1.410 Tainted: G W syzkaller #0 [ 45.935863][ T1793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.945918][ T1793] Call Trace: [ 45.949210][ T1793] __dump_stack+0x21/0x24 [ 45.953551][ T1793] dump_stack_lvl+0x169/0x1d8 [ 45.958217][ T1793] ? thaw_kernel_threads+0x220/0x220 [ 45.963488][ T1793] ? show_regs_print_info+0x18/0x18 [ 45.968674][ T1793] dump_stack+0x15/0x1c [ 45.972816][ T1793] should_fail+0x3c1/0x510 [ 45.977225][ T1793] should_fail_usercopy+0x1a/0x20 [ 45.982240][ T1793] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 45.988307][ T1793] generic_perform_write+0x326/0x510 [ 45.993586][ T1793] ? grab_cache_page_write_begin+0xb0/0xb0 [ 45.999480][ T1793] ? file_remove_privs+0x580/0x580 [ 46.004581][ T1793] ? __fsnotify_parent+0x5f5/0x6c0 [ 46.009681][ T1793] ? __kasan_check_write+0x14/0x20 [ 46.014785][ T1793] ? down_write+0xac/0x110 [ 46.019190][ T1793] __generic_file_write_iter+0x24b/0x480 [ 46.024813][ T1793] ? generic_write_checks+0x3d4/0x480 [ 46.030180][ T1793] generic_file_write_iter+0xa9/0x1d0 [ 46.035543][ T1793] vfs_write+0x725/0xd60 [ 46.039783][ T1793] ? __kasan_slab_free+0x11/0x20 [ 46.044711][ T1793] ? kernel_write+0x3c0/0x3c0 [ 46.049387][ T1793] ? mutex_trylock+0xa0/0xa0 [ 46.053964][ T1793] ? __fget_files+0x2c4/0x320 [ 46.058628][ T1793] ? __fdget_pos+0x2d2/0x380 [ 46.063205][ T1793] ? ksys_write+0x71/0x240 [ 46.067607][ T1793] ksys_write+0x140/0x240 [ 46.071921][ T1793] ? __ia32_sys_read+0x90/0x90 [ 46.076673][ T1793] ? debug_smp_processor_id+0x17/0x20 [ 46.082032][ T1793] __x64_sys_write+0x7b/0x90 [ 46.086627][ T1793] do_syscall_64+0x31/0x40 [ 46.091056][ T1793] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.096946][ T1793] RIP: 0033:0x7fbf7cdbeec9 [ 46.101356][ T1793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.120965][ T1793] RSP: 002b:00007fbf7b827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 46.129383][ T1793] RAX: ffffffffffffffda RBX: 00007fbf7d015fa0 RCX: 00007fbf7cdbeec9 [ 46.137355][ T1793] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 46.145419][ T1793] RBP: 00007fbf7b827090 R08: 0000000000000000 R09: 0000000000000000 [ 46.153382][ T1793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 46.161344][ T1793] R13: 00007fbf7d016038 R14: 00007fbf7d015fa0 R15: 00007ffd2f25ce58 [ 46.220422][ T24] audit: type=1400 audit(1759899408.940:140): avc: denied { create } for pid=1799 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 46.356674][ T1816] device wg2 entered promiscuous mode [ 47.073952][ T1907] device syzkaller0 entered promiscuous mode [ 47.533934][ T24] audit: type=1400 audit(1759899410.210:141): avc: denied { create } for pid=1929 comm="syz.3.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 48.749436][ T1977] device pim6reg1 entered promiscuous mode [ 50.214117][ T24] audit: type=1400 audit(1759899412.940:142): avc: denied { read } for pid=2031 comm="syz.2.480" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 50.656168][ T2071] device syzkaller0 entered promiscuous mode [ 50.772101][ T2078] syz.1.493[2078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.679911][ T2118] device sit0 entered promiscuous mode [ 52.500809][ T2161] device pim6reg1 entered promiscuous mode [ 53.604176][ T24] audit: type=1400 audit(1759899416.330:143): avc: denied { create } for pid=2221 comm="syz.4.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 54.095478][ T2278] device sit0 left promiscuous mode [ 54.111159][ T2278] device sit0 entered promiscuous mode [ 55.148880][ T2335] device pim6reg1 entered promiscuous mode [ 57.417972][ T2420] device syzkaller0 entered promiscuous mode [ 58.224564][ T24] audit: type=1400 audit(1759899420.950:144): avc: denied { create } for pid=2465 comm="syz.2.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 58.285973][ T24] audit: type=1400 audit(1759899420.980:145): avc: denied { create } for pid=2453 comm="syz.4.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 58.976908][ T2493] ÿ: renamed from bond_slave_0 [ 58.999703][ T2509] device veth0_vlan left promiscuous mode [ 59.013053][ T2509] device veth0_vlan entered promiscuous mode [ 59.038866][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.047510][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.055099][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.341322][ T2516] device syzkaller0 entered promiscuous mode [ 60.534018][ T2587] device veth0_vlan left promiscuous mode [ 60.558722][ T2587] device veth0_vlan entered promiscuous mode [ 60.641426][ T2588] device syzkaller0 entered promiscuous mode [ 60.653208][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.667218][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.675123][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.919360][ T2606] device syzkaller0 entered promiscuous mode [ 61.082375][ T24] audit: type=1400 audit(1759899423.810:146): avc: denied { create } for pid=2622 comm="syz.4.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 61.981428][ T2822] device pim6reg1 entered promiscuous mode [ 62.055317][ T2830] device sit0 left promiscuous mode [ 62.102128][ T2830] device sit0 entered promiscuous mode [ 62.458872][ T24] audit: type=1400 audit(1759899425.190:147): avc: denied { append } for pid=2857 comm="syz.3.671" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 62.565849][ T2868] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.573986][ T2868] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.677071][ T2873] device bridge_slave_1 left promiscuous mode [ 62.697415][ T2873] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.735061][ T2873] device bridge_slave_0 left promiscuous mode [ 62.757455][ T2873] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.888172][ T2879] device sit0 left promiscuous mode [ 63.313306][ T2904] device sit0 entered promiscuous mode [ 63.822495][ T24] audit: type=1400 audit(1759899426.550:148): avc: denied { create } for pid=2924 comm="syz.4.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 64.119964][ T24] audit: type=1400 audit(1759899426.810:149): avc: denied { create } for pid=2932 comm="syz.4.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 66.216877][ T2970] device wg2 entered promiscuous mode [ 68.592544][ T24] audit: type=1400 audit(1759899431.320:150): avc: denied { create } for pid=2988 comm="syz.4.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 70.816672][ T3039] ÿÿÿÿÿÿ: renamed from vlan1 [ 70.974482][ T24] audit: type=1400 audit(1759899433.700:151): avc: denied { create } for pid=3055 comm="syz.0.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 71.127721][ T3063] device pim6reg1 entered promiscuous mode [ 71.388918][ T3071] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.396217][ T3071] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.510322][ T3067] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.555552][ T3067] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.586033][ T3067] device bridge_slave_0 entered promiscuous mode [ 71.715777][ T3067] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.723043][ T3067] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.730896][ T3067] device bridge_slave_1 entered promiscuous mode [ 72.221737][ T3067] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.228824][ T3067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.236208][ T3067] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.243262][ T3067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.457187][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.475511][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.483533][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.506506][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.552861][ T3114] device sit0 left promiscuous mode [ 72.603865][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.627429][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.650110][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.657223][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.697348][ T3114] device sit0 entered promiscuous mode [ 72.720140][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.751248][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.767644][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.774707][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.837105][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.859992][ T3132] syz.2.745[3132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.860049][ T3132] syz.2.745[3132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.866579][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.891807][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.900152][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.920799][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.931681][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.979050][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.998013][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.006158][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.031348][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.061060][ T3067] device veth0_vlan entered promiscuous mode [ 73.101969][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.117419][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.146289][ T3067] device veth1_macvtap entered promiscuous mode [ 73.164392][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.187741][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.204441][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.247757][ T9] device veth1_macvtap left promiscuous mode [ 73.522858][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.537490][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.626921][ T3150] device sit0 left promiscuous mode [ 76.806184][ T3212] A6±ÿ: renamed from team_slave_1 [ 77.036394][ T3230] device pim6reg1 entered promiscuous mode [ 77.098638][ T24] audit: type=1400 audit(1759899439.830:152): avc: denied { create } for pid=3223 comm="syz.1.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 77.193992][ T3237] device syzkaller0 entered promiscuous mode [ 77.829064][ T3261] device syzkaller0 entered promiscuous mode [ 78.481662][ T3295] device syzkaller0 entered promiscuous mode [ 78.634277][ T3303] device pim6reg1 entered promiscuous mode [ 79.135512][ T3337] device pim6reg1 entered promiscuous mode [ 79.390777][ T3361] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 79.402010][ T3361] device syzkaller0 entered promiscuous mode [ 79.462677][ T3371] device pim6reg1 entered promiscuous mode [ 79.579109][ T3396] device veth1_macvtap left promiscuous mode [ 79.585356][ T3396] device macsec0 entered promiscuous mode [ 80.004840][ T3412] Ÿë: port 1(veth0_to_team) entered blocking state [ 80.037956][ T3412] Ÿë: port 1(veth0_to_team) entered disabled state [ 80.076178][ T3412] device veth0_to_team entered promiscuous mode [ 82.390606][ T3527] device veth1_macvtap left promiscuous mode [ 83.046649][ T3559] device sit0 left promiscuous mode [ 83.060022][ T24] audit: type=1400 audit(1759899445.790:153): avc: denied { create } for pid=3558 comm="syz.1.872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 84.337802][ T3625] device syzkaller0 entered promiscuous mode [ 84.676362][ T3635] device sit0 entered promiscuous mode [ 86.215141][ T3695] device syzkaller0 entered promiscuous mode [ 86.428186][ T3709] device syzkaller0 entered promiscuous mode [ 86.597592][ T24] audit: type=1400 audit(1759899449.320:154): avc: denied { create } for pid=3717 comm="syz.0.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 86.702890][ T3714] device syzkaller0 entered promiscuous mode [ 86.775607][ T3722] device pim6reg1 entered promiscuous mode [ 87.299791][ T3749] device syzkaller0 entered promiscuous mode [ 87.307363][ T3757] device pim6reg1 entered promiscuous mode [ 87.316400][ T2692] syzkaller0: tun_net_xmit 48 [ 87.326769][ T3749] syzkaller0: create flow: hash 1290104975 index 0 [ 87.463882][ T3749] syzkaller0 (unregistered): delete flow: hash 1290104975 index 0 [ 87.468018][ T3771] device pim6reg1 entered promiscuous mode [ 88.272093][ T3819] syz.2.951 uses obsolete (PF_INET,SOCK_PACKET) [ 90.095339][ T3892] device syzkaller0 entered promiscuous mode [ 90.294685][ T24] audit: type=1400 audit(1759899453.020:155): avc: denied { create } for pid=3902 comm="syz.4.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 90.356084][ T3903] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.364635][ T3903] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.978746][ T24] audit: type=1400 audit(1759899453.710:156): avc: denied { create } for pid=3933 comm="syz.3.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 91.673230][ T3975] device pim6reg1 entered promiscuous mode [ 91.954491][ T24] audit: type=1400 audit(1759899454.680:157): avc: denied { create } for pid=3993 comm="syz.4.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 92.401775][ T4012] device syzkaller0 entered promiscuous mode [ 92.472145][ T4018] : port 1(erspan0) entered blocking state [ 92.480116][ T4018] : port 1(erspan0) entered disabled state [ 92.492236][ T4018] device erspan0 entered promiscuous mode [ 92.518191][ T4018] : port 1(erspan0) entered blocking state [ 92.524297][ T4018] : port 1(erspan0) entered forwarding state [ 92.546148][ T4022] device wg2 left promiscuous mode [ 92.665937][ T4033] device pim6reg1 entered promiscuous mode [ 92.677786][ T4022] device wg2 entered promiscuous mode [ 92.726563][ T4041] syz.2.1019[4041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.726615][ T4041] syz.2.1019[4041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.968218][ T4058] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 93.026859][ T4058] device syzkaller0 entered promiscuous mode [ 93.142050][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 93.176062][ T4068] device syzkaller0 left promiscuous mode [ 94.325822][ T4121] device veth0_vlan left promiscuous mode [ 94.374190][ T4121] device veth0_vlan entered promiscuous mode [ 95.079002][ T4142] device sit0 entered promiscuous mode [ 95.227409][ T4165] syzkaller0: mtu greater than device maximum [ 95.693016][ T4204] device veth0_vlan left promiscuous mode [ 95.710959][ T4204] device veth0_vlan entered promiscuous mode [ 95.721651][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.730302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.741528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.873983][ T4215] device wg2 left promiscuous mode [ 95.939916][ T4213] device sit0 left promiscuous mode [ 96.711761][ T4245] syz.3.1075[4245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.720449][ T4249] device sit0 left promiscuous mode [ 96.789791][ T4249] device sit0 entered promiscuous mode [ 96.966574][ T4253] device pim6reg1 entered promiscuous mode [ 97.009163][ T4258] device sit0 left promiscuous mode [ 97.021197][ T4262] FAULT_INJECTION: forcing a failure. [ 97.021197][ T4262] name failslab, interval 1, probability 0, space 0, times 0 [ 97.033891][ T4262] CPU: 0 PID: 4262 Comm: syz.3.1080 Tainted: G W syzkaller #0 [ 97.042739][ T4262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 97.052794][ T4262] Call Trace: [ 97.056089][ T4262] __dump_stack+0x21/0x24 [ 97.060418][ T4262] dump_stack_lvl+0x169/0x1d8 [ 97.065093][ T4262] ? thaw_kernel_threads+0x220/0x220 [ 97.070378][ T4262] ? show_regs_print_info+0x18/0x18 [ 97.075570][ T4262] dump_stack+0x15/0x1c [ 97.079719][ T4262] should_fail+0x3c1/0x510 [ 97.084128][ T4262] ? inet6_rt_notify+0x287/0x470 [ 97.089063][ T4262] __should_failslab+0xa4/0xe0 [ 97.093819][ T4262] should_failslab+0x9/0x20 [ 97.098310][ T4262] __kmalloc_track_caller+0x5f/0x320 [ 97.103582][ T4262] ? kmem_cache_alloc+0x165/0x2e0 [ 97.108597][ T4262] ? __alloc_skb+0x9e/0x520 [ 97.113101][ T4262] ? inet6_rt_notify+0x287/0x470 [ 97.118032][ T4262] __alloc_skb+0xdc/0x520 [ 97.122348][ T4262] inet6_rt_notify+0x287/0x470 [ 97.127100][ T4262] ? rt6_nh_dump_exceptions+0x690/0x690 [ 97.132637][ T4262] ? call_fib_notifiers+0xa0/0xc0 [ 97.137648][ T4262] fib6_del+0xbf9/0xf60 [ 97.141797][ T4262] ? fib6_locate+0x460/0x460 [ 97.146372][ T4262] ? __kasan_check_write+0x14/0x20 [ 97.151470][ T4262] ? finish_task_switch+0x1b7/0x5a0 [ 97.156658][ T4262] ? fib6_ifdown+0x2eb/0x4e0 [ 97.161237][ T4262] fib6_clean_node+0x296/0x520 [ 97.166001][ T4262] ? node_free_rcu+0x30/0x30 [ 97.170590][ T4262] ? __kasan_check_read+0x11/0x20 [ 97.175602][ T4262] fib6_walk_continue+0x4fc/0x700 [ 97.181048][ T4262] fib6_walk+0x153/0x290 [ 97.185279][ T4262] fib6_clean_all+0x16a/0x230 [ 97.189946][ T4262] ? tracing_record_taskinfo+0x7c/0x220 [ 97.195483][ T4262] ? rt6_sync_down_dev+0x130/0x130 [ 97.200584][ T4262] ? fib6_del+0xf60/0xf60 [ 97.204936][ T4262] ? node_free_rcu+0x30/0x30 [ 97.209514][ T4262] ? rt6_sync_down_dev+0x130/0x130 [ 97.214612][ T4262] ? schedule_preempt_disabled+0x20/0x20 [ 97.220236][ T4262] rt6_disable_ip+0x119/0x6a0 [ 97.224898][ T4262] ? preempt_schedule_thunk+0x16/0x18 [ 97.230257][ T4262] ? __queue_work+0x951/0xca0 [ 97.234921][ T4262] ? fib6_ifdown+0x4e0/0x4e0 [ 97.239503][ T4262] ? __kasan_check_read+0x11/0x20 [ 97.244952][ T4262] addrconf_ifdown+0x144/0x1800 [ 97.249790][ T4262] ? addrconf_cleanup+0x1c0/0x1c0 [ 97.254800][ T4262] ? __kasan_check_write+0x14/0x20 [ 97.259896][ T4262] ? mutex_lock+0x8c/0xe0 [ 97.264212][ T4262] ? mutex_trylock+0xa0/0xa0 [ 97.268792][ T4262] ? nf_nat_masq_schedule+0x490/0x490 [ 97.274246][ T4262] ? __kasan_check_write+0x14/0x20 [ 97.279343][ T4262] addrconf_notify+0x3bd/0xe90 [ 97.284095][ T4262] raw_notifier_call_chain+0x90/0x100 [ 97.289456][ T4262] dev_close_many+0x330/0x4d0 [ 97.294210][ T4262] ? __dev_open+0x4c0/0x4c0 [ 97.298709][ T4262] ? __kasan_check_read+0x11/0x20 [ 97.303724][ T4262] unregister_netdevice_many+0x44c/0x1980 [ 97.309866][ T4262] ? kfree_skbmem+0x10c/0x180 [ 97.314531][ T4262] ? kmem_cache_free+0x100/0x2d0 [ 97.319476][ T4262] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 97.325019][ T4262] ? _raw_spin_lock+0xe0/0xe0 [ 97.329688][ T4262] ? alloc_netdev_mqs+0xc80/0xc80 [ 97.334711][ T4262] ? __kasan_check_read+0x11/0x20 [ 97.339737][ T4262] unregister_netdevice_queue+0x31c/0x360 [ 97.345447][ T4262] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 97.351071][ T4262] ? list_netdevice+0x4c0/0x4c0 [ 97.355917][ T4262] ? linkwatch_fire_event+0x2d3/0x330 [ 97.361277][ T4262] __tun_detach+0xca6/0x1450 [ 97.365861][ T4262] ? tun_chr_open+0x540/0x540 [ 97.370611][ T4262] tun_chr_close+0x92/0x140 [ 97.375143][ T4262] __fput+0x2fb/0x770 [ 97.379116][ T4262] ____fput+0x15/0x20 [ 97.383089][ T4262] task_work_run+0x127/0x190 [ 97.387666][ T4262] exit_to_user_mode_loop+0xcb/0xe0 [ 97.392874][ T4262] exit_to_user_mode_prepare+0x76/0xa0 [ 97.398320][ T4262] syscall_exit_to_user_mode+0x1d/0x40 [ 97.403761][ T4262] do_syscall_64+0x3d/0x40 [ 97.408176][ T4262] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 97.414052][ T4262] RIP: 0033:0x7fe7cca9eec9 [ 97.418466][ T4262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.438059][ T4262] RSP: 002b:00007fe7cb507038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 97.446460][ T4262] RAX: 0000000000000000 RBX: 00007fe7cccf5fa0 RCX: 00007fe7cca9eec9 [ 97.454423][ T4262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 97.462388][ T4262] RBP: 00007fe7cb507090 R08: 0000000000000000 R09: 0000000000000000 [ 97.470380][ T4262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.478344][ T4262] R13: 00007fe7cccf6038 R14: 00007fe7cccf5fa0 R15: 00007fff3e53e1c8 [ 97.927042][ T4303] device pim6reg1 entered promiscuous mode [ 98.230468][ T4327] cgroup: fork rejected by pids controller in /syz4 [ 98.471175][ T4337] device sit0 entered promiscuous mode [ 98.651596][ T4347] device syzkaller0 entered promiscuous mode [ 98.785072][ T4350] device sit0 entered promiscuous mode [ 99.093197][ T4371] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.104423][ T4371] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.112373][ T4371] device bridge_slave_0 entered promiscuous mode [ 99.164605][ T4371] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.172261][ T4371] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.194820][ T4371] device bridge_slave_1 entered promiscuous mode [ 99.815376][ T4411] device wg2 left promiscuous mode [ 99.853624][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.867599][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.933521][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.953842][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.968377][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.975437][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.982816][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.997215][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.020830][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.027915][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.077183][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.114269][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.131691][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.145851][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.159431][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.192484][ T4405] device wg2 entered promiscuous mode [ 100.237336][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.248929][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.274456][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.306506][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.326817][ T4371] device veth0_vlan entered promiscuous mode [ 100.343608][ T4371] device veth1_macvtap entered promiscuous mode [ 100.418553][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.428817][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.439666][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.448843][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.457355][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.465087][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.473562][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.482864][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.756532][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.875576][ T4478] device pim6reg1 entered promiscuous mode [ 102.019020][ T7] device bridge_slave_1 left promiscuous mode [ 102.026390][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.041928][ T7] device bridge_slave_0 left promiscuous mode [ 102.059930][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.073293][ T7] device veth0_vlan left promiscuous mode [ 102.179153][ T4486] device pim6reg1 entered promiscuous mode [ 102.205011][ T24] audit: type=1400 audit(1759899464.930:158): avc: denied { create } for pid=4490 comm="syz.4.1149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 102.514775][ T4512] device pim6reg1 entered promiscuous mode [ 102.528302][ T24] audit: type=1400 audit(1759899465.260:159): avc: denied { setattr } for pid=4511 comm="syz.4.1155" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 102.782590][ T24] audit: type=1400 audit(1759899465.510:160): avc: denied { read } for pid=4518 comm="syz.1.1157" dev="nsfs" ino=4026532369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 102.809854][ T24] audit: type=1400 audit(1759899465.510:161): avc: denied { open } for pid=4518 comm="syz.1.1157" path="uts:[4026532369]" dev="nsfs" ino=4026532369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 104.039786][ T4704] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.048585][ T4704] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.170808][ T4709] device sit0 entered promiscuous mode [ 104.620300][ T4714] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.652254][ T4714] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.682116][ T4714] device bridge_slave_0 entered promiscuous mode [ 104.708611][ T4714] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.719042][ T4714] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.726628][ T4714] device bridge_slave_1 entered promiscuous mode [ 104.918469][ T4714] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.925566][ T4714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.932863][ T4714] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.939903][ T4714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.202264][ T4776] device sit0 left promiscuous mode [ 105.406457][ T4779] device sit0 entered promiscuous mode [ 105.555873][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.566731][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.579492][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.587258][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.762749][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.771990][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.780344][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.787847][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.795723][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.804354][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.813012][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.820098][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.828690][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.836803][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.844936][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.853015][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.915671][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.925500][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.967663][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.985417][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.007777][ T4714] device veth0_vlan entered promiscuous mode [ 106.020657][ T4714] device veth1_macvtap entered promiscuous mode [ 106.028098][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.035925][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.044539][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 106.052983][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 106.061965][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 106.125173][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 106.133609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.142408][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 106.151735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.240441][ T9] device bridge_slave_1 left promiscuous mode [ 107.294993][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.331589][ T9] device bridge_slave_0 left promiscuous mode [ 107.350452][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.374576][ T9] device veth1_macvtap left promiscuous mode [ 107.384032][ T9] device veth0_vlan left promiscuous mode [ 108.434112][ T4891] cgroup: fork rejected by pids controller in /syz2 [ 108.512280][ T4891] device pim6reg1 entered promiscuous mode [ 109.811475][ T4925] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.818852][ T4925] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.826374][ T4925] device bridge_slave_0 entered promiscuous mode [ 109.834712][ T4933] device sit0 left promiscuous mode [ 109.946218][ T4925] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.953537][ T4925] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.961615][ T4925] device bridge_slave_1 entered promiscuous mode [ 109.971590][ T4935] device sit0 entered promiscuous mode [ 110.242142][ T4925] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.249223][ T4925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.256527][ T4925] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.263580][ T4925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.301179][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.309249][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.316652][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.334881][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.354821][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.361920][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.375445][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.395079][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.402268][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.415039][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.433656][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.532972][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.549067][ T4925] device veth0_vlan entered promiscuous mode [ 110.564118][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.587449][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.624463][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.671671][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.695614][ T4925] device veth1_macvtap entered promiscuous mode [ 110.710794][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.730823][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.764357][ T9] : port 1(erspan0) entered disabled state [ 110.779544][ T9] device erspan0 left promiscuous mode [ 110.805625][ T9] : port 1(erspan0) entered disabled state [ 111.000144][ T9] device bridge_slave_1 left promiscuous mode [ 111.010586][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.061765][ T9] device bridge_slave_0 left promiscuous mode [ 111.096385][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.777437][ T5012] device sit0 left promiscuous mode [ 113.256310][ T24] audit: type=1400 audit(1759899475.980:162): avc: denied { ioctl } for pid=5090 comm="syz.2.1295" path="uts:[4026532293]" dev="nsfs" ino=4026532293 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 113.596712][ T5131] device sit0 entered promiscuous mode [ 113.855752][ T24] audit: type=1400 audit(1759899476.580:163): avc: denied { create } for pid=5155 comm="syz.1.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 113.914541][ T5156] device wg2 left promiscuous mode [ 114.533987][ T5199] device syzkaller0 entered promiscuous mode [ 114.709415][ T5201] device syzkaller0 entered promiscuous mode [ 116.643344][ T5257] device syzkaller0 entered promiscuous mode [ 117.056604][ T24] audit: type=1400 audit(1759899479.780:164): avc: denied { create } for pid=5283 comm="syz.1.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 117.171035][ T5293] tap0: tun_chr_ioctl cmd 2147767521 [ 117.689713][ T5294] device syzkaller0 entered promiscuous mode [ 117.880307][ T5313] device pim6reg1 entered promiscuous mode [ 119.182615][ T5363] syz.1.1365[5363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.182677][ T5363] syz.1.1365[5363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.127206][ T5393] device syzkaller0 left promiscuous mode [ 120.948865][ T5440] device syzkaller0 entered promiscuous mode [ 121.033523][ T5450] device syzkaller0 entered promiscuous mode [ 121.084597][ T5448] device pim6reg1 entered promiscuous mode [ 121.296753][ T5471] device syzkaller0 entered promiscuous mode [ 122.119762][ T5520] batadv0: tun_chr_ioctl cmd 2147767521 [ 122.125619][ T5520] batadv0: tun_chr_ioctl cmd 1074025692 [ 122.131813][ T5521] batadv0: tun_chr_ioctl cmd 1074025692 [ 122.672181][ T5549] device pim6reg1 entered promiscuous mode [ 122.901086][ T5568] device pim6reg1 entered promiscuous mode [ 122.921265][ T5573] device syzkaller0 entered promiscuous mode [ 122.990953][ T5579] device veth0_vlan left promiscuous mode [ 123.007445][ T5579] device veth0_vlan entered promiscuous mode [ 123.512971][ T5626] device pim6reg1 entered promiscuous mode [ 123.763963][ T5635] device sit0 entered promiscuous mode [ 125.032320][ T5741] device veth0_vlan left promiscuous mode [ 125.067904][ T5741] device veth0_vlan entered promiscuous mode [ 125.083981][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.107608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.148304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 125.220864][ T5748] device pim6reg1 entered promiscuous mode [ 126.750890][ T5797] device veth1_macvtap left promiscuous mode [ 126.807141][ T5799] device veth1_macvtap entered promiscuous mode [ 126.815715][ T5799] device macsec0 entered promiscuous mode [ 127.025646][ T5811] device pim6reg1 entered promiscuous mode [ 127.683019][ T5837] device syzkaller0 entered promiscuous mode [ 128.241597][ T5895] device syzkaller0 entered promiscuous mode [ 128.342820][ T5901] device wg2 entered promiscuous mode [ 129.201195][ T5966] device veth0_vlan left promiscuous mode [ 129.228948][ T5966] device veth0_vlan entered promiscuous mode [ 129.288014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.298890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.313415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.377847][ T6009] device sit0 left promiscuous mode [ 130.550042][ T6019] device sit0 entered promiscuous mode [ 133.169299][ T6198] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.199692][ T6198] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.223075][ T6198] device bridge_slave_0 entered promiscuous mode [ 133.266401][ T6198] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.288281][ T6198] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.334822][ T6198] device bridge_slave_1 entered promiscuous mode [ 133.455735][ T6198] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.462857][ T6198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.470171][ T6198] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.477230][ T6198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.530175][ T6235] device wg2 entered promiscuous mode [ 133.585478][ T7] device bridge_slave_1 left promiscuous mode [ 133.595280][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.602896][ T7] device bridge_slave_0 left promiscuous mode [ 133.643183][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.658115][ T7] device veth1_macvtap left promiscuous mode [ 133.664287][ T7] device veth0_vlan left promiscuous mode [ 133.749100][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.756356][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.775013][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.785543][ T6252] syzkaller0: refused to change device tx_queue_len [ 133.806581][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.815131][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.822198][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.830119][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.838511][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.845574][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.869123][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.886212][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.910465][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.940260][ T6198] device veth0_vlan entered promiscuous mode [ 133.947797][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.065738][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.073946][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.190256][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.210406][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.243892][ T6198] device veth1_macvtap entered promiscuous mode [ 134.355692][ T6290] device pim6reg1 entered promiscuous mode [ 134.376343][ T6287] ±ÿ: renamed from team_slave_1 [ 134.419295][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.437363][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.445712][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.497105][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.534773][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.994899][ T6318] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.182584][ T6332] syz.2.1656[6332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.191903][ T6332] syz.2.1656[6332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.451671][ T6335] device veth0_vlan left promiscuous mode [ 135.764036][ T6335] device veth0_vlan entered promiscuous mode [ 136.115787][ T6356] device sit0 entered promiscuous mode [ 137.298641][ T6418] device pim6reg1 entered promiscuous mode [ 138.486677][ T6511] device wg2 entered promiscuous mode [ 138.603438][ T6529] syz.2.1711[6529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.603513][ T6529] syz.2.1711[6529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.953923][ T6539] device veth0_vlan left promiscuous mode [ 138.976470][ T6539] device veth0_vlan entered promiscuous mode [ 139.593166][ T6567] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.600499][ T6567] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.662638][ T6567] device bridge0 left promiscuous mode [ 139.728587][ T6570] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.735691][ T6570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.743086][ T6570] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.750238][ T6570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.758201][ T6570] device bridge0 entered promiscuous mode [ 140.175919][ T6603] device syzkaller0 left promiscuous mode [ 140.400076][ T6620] syz.1.1739[6620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.400134][ T6620] syz.1.1739[6620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.623264][ T6620] device veth0_vlan left promiscuous mode [ 140.676274][ T6620] device veth0_vlan entered promiscuous mode [ 140.724449][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.749785][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.794168][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.888444][ T6635] device pim6reg1 entered promiscuous mode [ 140.998250][ T6643] sock: sock_set_timeout: `syz.0.1745' (pid 6643) tries to set negative timeout [ 142.875177][ T6737] device veth1_macvtap left promiscuous mode [ 142.916148][ T6756] device sit0 left promiscuous mode [ 143.074929][ T6765] device syzkaller0 entered promiscuous mode [ 143.264613][ T6774] device veth1_macvtap entered promiscuous mode [ 143.281477][ T6774] device macsec0 entered promiscuous mode [ 144.469092][ T6826] device veth1_macvtap left promiscuous mode [ 145.304002][ T6852] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 146.043291][ T6883] device wg2 left promiscuous mode [ 146.198562][ T6904] device syzkaller0 entered promiscuous mode [ 146.945710][ T6932] device sit0 entered promiscuous mode [ 147.717557][ T6969] device syzkaller0 entered promiscuous mode [ 148.127628][ T7004] device pim6reg1 entered promiscuous mode [ 148.427986][ T7016] device wg2 entered promiscuous mode [ 148.602789][ T7020] device syzkaller0 entered promiscuous mode [ 148.788062][ T7033] device pim6reg1 entered promiscuous mode [ 148.971613][ T7038] device syzkaller0 left promiscuous mode [ 149.027951][ T7049] device vlan0 entered promiscuous mode [ 149.399873][ T7077] device sit0 left promiscuous mode [ 149.700426][ T7083] device pim6reg1 entered promiscuous mode [ 150.100733][ T7095] device pim6reg1 entered promiscuous mode [ 150.163606][ T7104] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.170793][ T7104] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.700579][ T7143] device syzkaller0 entered promiscuous mode [ 151.177440][ T7169] syz.2.1891[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.177526][ T7169] syz.2.1891[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.581865][ T7185] device syzkaller0 entered promiscuous mode [ 152.859774][ T7354] device pim6reg1 entered promiscuous mode [ 153.177623][ T7374] device veth0_vlan left promiscuous mode [ 153.183387][ T7374] device veth0_vlan entered promiscuous mode [ 153.198462][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.206739][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.225274][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.505819][ T7378] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.523477][ T7378] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.545131][ T7378] device bridge_slave_0 entered promiscuous mode [ 153.572273][ T7378] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.586210][ T7378] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.600376][ T7378] device bridge_slave_1 entered promiscuous mode [ 153.652572][ T7408] device pim6reg1 entered promiscuous mode [ 153.711962][ T7408] device pim6reg1 left promiscuous mode [ 153.864858][ T7378] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.871971][ T7378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.879618][ T7378] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.886661][ T7378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.909656][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.917959][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.925253][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.949291][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.965962][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.973312][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.995409][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.004285][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.011346][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.070836][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.107499][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.165935][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 154.210004][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.224551][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 154.236726][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.244934][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.252610][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.302009][ T7378] device veth0_vlan entered promiscuous mode [ 154.314434][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.322949][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.333333][ T7378] device veth1_macvtap entered promiscuous mode [ 154.346775][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.354837][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 154.363834][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 154.393570][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 154.403310][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.458754][ T7444] syz.1.1944[7444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.458804][ T7444] syz.1.1944[7444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.445393][ T7] device bridge_slave_1 left promiscuous mode [ 155.463293][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.476759][ T7] device bridge_slave_0 left promiscuous mode [ 155.516176][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.537330][ T7] device veth1_macvtap left promiscuous mode [ 155.543695][ T7] device veth0_vlan left promiscuous mode [ 155.990889][ T7515] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.999192][ T7515] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.145754][ T7518] device wg2 entered promiscuous mode [ 156.164270][ T7521] device syzkaller0 entered promiscuous mode [ 158.391153][ T7670] syzkaller1: tun_chr_ioctl cmd 21731 [ 158.411942][ T7670] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 159.866285][ T7758] device syzkaller0 entered promiscuous mode [ 160.017876][ T7777] device veth1_macvtap left promiscuous mode [ 160.037448][ T7777] device macsec0 left promiscuous mode [ 161.745970][ T7857] device veth0_vlan left promiscuous mode [ 161.768918][ T7857] device veth0_vlan entered promiscuous mode [ 161.870515][ T7863] device pim6reg1 entered promiscuous mode [ 161.898577][ T7859] device pim6reg1 left promiscuous mode [ 162.298745][ T7901] device syzkaller0 left promiscuous mode [ 162.337061][ T7901] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 162.345773][ T7901] syzkaller0: Linktype set failed because interface is up [ 162.524229][ T7918] device veth0_vlan left promiscuous mode [ 162.554606][ T7918] device veth0_vlan entered promiscuous mode [ 162.686448][ T7929] device sit0 entered promiscuous mode [ 162.900450][ T7945] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.907525][ T7945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.914814][ T7945] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.921906][ T7945] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.930119][ T7945] device bridge0 entered promiscuous mode [ 163.388497][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.909258][ T8061] device syzkaller0 entered promiscuous mode [ 166.837449][ T8126] device wg2 entered promiscuous mode [ 168.432549][ T8239] device pim6reg1 entered promiscuous mode [ 169.343734][ T8302] syz.0.2193[8302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.343786][ T8302] syz.0.2193[8302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.841297][ T8337] device sit0 entered promiscuous mode [ 170.448837][ T8363] device wg2 left promiscuous mode [ 170.512256][ T8370] device wg2 entered promiscuous mode [ 170.739517][ T8379] device sit0 left promiscuous mode [ 170.803413][ T8383] device sit0 entered promiscuous mode [ 170.886671][ T8395] device veth0_vlan left promiscuous mode [ 170.908903][ T8395] device veth0_vlan entered promiscuous mode [ 170.937340][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.960092][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.007889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.086045][ T8411] device syzkaller0 entered promiscuous mode [ 171.172001][ T8416] device syzkaller0 entered promiscuous mode [ 172.090462][ T8482] device pim6reg1 entered promiscuous mode [ 172.190625][ T24] audit: type=1400 audit(1759899534.920:165): avc: denied { create } for pid=8483 comm="syz.2.2249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 173.324330][ T8529] device pim6reg1 entered promiscuous mode [ 173.401512][ T8533] syz.4.2263[8533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.401613][ T8533] syz.4.2263[8533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.622868][ T8540] device sit0 entered promiscuous mode [ 174.172959][ T8590] Q±6ã×\b‹¡Y­4: renamed from lo [ 174.347495][ C0] syzkaller0: tun_net_xmit 76 [ 174.795037][ T8630] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 174.815954][ T8630] device syzkaller0 entered promiscuous mode [ 175.004936][ T8635] device sit0 left promiscuous mode [ 175.073060][ T8637] device sit0 entered promiscuous mode [ 175.568636][ T8644] device sit0 left promiscuous mode [ 175.584887][ T8648] device sit0 entered promiscuous mode [ 176.065782][ T8642] ±ÿ: renamed from team_slave_1 [ 176.211997][ T8658] device wg2 left promiscuous mode [ 177.318806][ T8717] syz.3.2307[8717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.327044][ T8717] syz.3.2307[8717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.621308][ T8732] device veth0_vlan left promiscuous mode [ 177.748965][ T8732] device veth0_vlan entered promiscuous mode [ 178.778235][ T8782] device syzkaller0 entered promiscuous mode [ 179.328281][ T8809] ±ÿ: renamed from team_slave_1 [ 179.364305][ T8816] device pim6reg1 entered promiscuous mode [ 179.595891][ T8827] device sit0 left promiscuous mode [ 179.737460][ T8827] device sit0 entered promiscuous mode [ 179.917368][ T8832] device wg2 left promiscuous mode [ 180.106501][ T8849] syz.0.2350[8849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.106557][ T8849] syz.0.2350[8849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.240065][ T8856] device syzkaller0 entered promiscuous mode [ 180.287097][ T8860] device sit0 left promiscuous mode [ 180.377262][ T8862] device sit0 entered promiscuous mode [ 180.794003][ T8878] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.801822][ T8878] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.877578][ T8878] device bridge0 left promiscuous mode [ 181.044480][ T8879] device bridge_slave_1 left promiscuous mode [ 181.064066][ T8879] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.109526][ T8879] device bridge_slave_0 left promiscuous mode [ 181.161291][ T8879] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.759938][ T8927] device syzkaller0 entered promiscuous mode [ 183.205240][ T8991] syz.2.2394[8991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.205292][ T8991] syz.2.2394[8991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.542117][ T9006] tap0: tun_chr_ioctl cmd 1074025680 [ 184.219773][ T9057] device sit0 left promiscuous mode [ 184.309996][ T9057] device sit0 entered promiscuous mode [ 185.101587][ T9093] device pim6reg1 entered promiscuous mode [ 185.402716][ T9117] syz.1.2429[9117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.402774][ T9117] syz.1.2429[9117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.417221][ T9113] syzkaller0: create flow: hash 4137510813 index 1 [ 185.494317][ T2806] syzkaller0: tun_net_xmit 76 [ 185.507610][ T2806] syzkaller0: tun_net_xmit 48 [ 185.517330][ C1] syzkaller0: tun_net_xmit 76 [ 185.573874][ T24] audit: type=1400 audit(1759899548.300:166): avc: denied { create } for pid=9121 comm="syz.0.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 185.587185][ C1] syzkaller0: tun_net_xmit 76 [ 185.616971][ C1] syzkaller0: tun_net_xmit 76 [ 185.698789][ T9124] device veth0_vlan left promiscuous mode [ 185.736541][ T9124] device veth0_vlan entered promiscuous mode [ 185.807016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.898256][ T9140] syz.1.2434[9140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.898337][ T9140] syz.1.2434[9140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.924435][ T9136] device pim6reg1 entered promiscuous mode [ 186.047970][ T9133] device syzkaller0 entered promiscuous mode [ 186.206975][ C1] syzkaller0: tun_net_xmit 76 [ 186.266239][ T9108] syzkaller0: delete flow: hash 4137510813 index 1 [ 186.707334][ T9168] syz.0.2442[9168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.707442][ T9168] syz.0.2442[9168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.327485][ C0] syzkaller0: tun_net_xmit 76 [ 188.986912][ T9218] device veth0_vlan left promiscuous mode [ 188.996224][ T9218] device veth0_vlan entered promiscuous mode [ 189.090373][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.098639][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.106038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.840080][ T9251] device pim6reg1 entered promiscuous mode [ 191.137618][ T24] audit: type=1400 audit(1759899553.870:167): avc: denied { create } for pid=9285 comm="syz.1.2478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 191.178420][ T9286] device pim6reg1 entered promiscuous mode [ 191.408658][ T9294] device veth0_vlan left promiscuous mode [ 191.455706][ T9294] device veth0_vlan entered promiscuous mode [ 191.522152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.533794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.554467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.340464][ T9305] device macsec0 entered promiscuous mode [ 192.357494][ T9305] device veth1_macvtap entered promiscuous mode [ 193.199721][ T9376] syz.4.2504[9376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.199780][ T9376] syz.4.2504[9376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.403927][ T9376] device veth0_vlan left promiscuous mode [ 193.454967][ T9382] syz.4.2504[9382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.455048][ T9382] syz.4.2504[9382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.505893][ T9376] device veth0_vlan entered promiscuous mode [ 194.361894][ T9430] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.369047][ T9430] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.387090][ T9430] device bridge0 left promiscuous mode [ 194.874828][ T9445] device pim6reg1 entered promiscuous mode [ 195.477844][ T9460] device syzkaller0 left promiscuous mode [ 198.629808][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.659981][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.694378][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 198.744626][ T9575] device pim6reg1 entered promiscuous mode [ 200.031420][ T9614] device syzkaller0 entered promiscuous mode [ 201.022341][ T9671] device syzkaller0 entered promiscuous mode [ 201.082898][ T9686] device wg2 left promiscuous mode [ 201.211665][ T9704] device syzkaller0 entered promiscuous mode [ 202.300162][ T9747] p: renamed from pim6reg1 [ 202.645177][ T9767] device veth0_vlan left promiscuous mode [ 202.651647][ T9767] device veth0_vlan entered promiscuous mode [ 202.725810][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.733946][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.741635][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.174784][ T9790] device wg2 left promiscuous mode [ 204.213257][ T9825] device syzkaller0 entered promiscuous mode [ 204.295324][ T9828] device syzkaller0 entered promiscuous mode [ 204.368413][ T9836] device sit0 left promiscuous mode [ 204.474601][ T9836] device sit0 entered promiscuous mode [ 205.016983][ C1] syzkaller0: tun_net_xmit 76 [ 205.167961][ T9868] device pim6reg1 entered promiscuous mode [ 205.256394][ T9876] device syzkaller0 left promiscuous mode [ 205.356970][ C1] syzkaller0: tun_net_xmit 76 [ 205.574933][ T9893] device wg2 entered promiscuous mode [ 207.704472][T10002] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.711807][T10002] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.719895][T10002] device bridge_slave_0 entered promiscuous mode [ 207.731522][T10002] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.747047][T10002] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.761078][T10002] device bridge_slave_1 entered promiscuous mode [ 207.933330][T10013] device wg2 entered promiscuous mode [ 207.939880][T10018] FAULT_INJECTION: forcing a failure. [ 207.939880][T10018] name failslab, interval 1, probability 0, space 0, times 0 [ 207.952673][T10018] CPU: 1 PID: 10018 Comm: syz.3.2694 Tainted: G W syzkaller #0 [ 207.961528][T10018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 207.971576][T10018] Call Trace: [ 207.974863][T10018] __dump_stack+0x21/0x24 [ 207.979181][T10018] dump_stack_lvl+0x169/0x1d8 [ 207.983850][T10018] ? show_regs_print_info+0x18/0x18 [ 207.989039][T10018] ? stack_trace_save+0x98/0xe0 [ 207.993876][T10018] ? stack_trace_snprint+0xf0/0xf0 [ 207.998975][T10018] dump_stack+0x15/0x1c [ 208.003125][T10018] should_fail+0x3c1/0x510 [ 208.007537][T10018] ? __d_alloc+0x2d/0x6a0 [ 208.011858][T10018] __should_failslab+0xa4/0xe0 [ 208.016608][T10018] should_failslab+0x9/0x20 [ 208.021101][T10018] kmem_cache_alloc+0x3d/0x2e0 [ 208.025852][T10018] ? node_tag_clear+0x1ea/0x2a0 [ 208.030689][T10018] __d_alloc+0x2d/0x6a0 [ 208.034846][T10018] d_alloc_pseudo+0x1d/0x70 [ 208.039340][T10018] alloc_file_pseudo+0xc8/0x1f0 [ 208.044179][T10018] ? alloc_empty_file_noaccount+0x80/0x80 [ 208.049885][T10018] ? __kasan_check_write+0x14/0x20 [ 208.054982][T10018] ? _raw_spin_lock_bh+0x8e/0xe0 [ 208.059911][T10018] anon_inode_getfile+0xa6/0x180 [ 208.064833][T10018] bpf_link_prime+0xf0/0x250 [ 208.069408][T10018] bpf_tracing_prog_attach+0x740/0xbc0 [ 208.074857][T10018] ? bpf_insn_prepare_dump+0x830/0x830 [ 208.080306][T10018] ? __fget_files+0x2c4/0x320 [ 208.084974][T10018] bpf_raw_tracepoint_open+0x654/0x790 [ 208.090418][T10018] ? bpf_obj_get_info_by_fd+0x2c30/0x2c30 [ 208.096126][T10018] ? selinux_bpf+0xce/0xf0 [ 208.100537][T10018] ? security_bpf+0x82/0xa0 [ 208.105034][T10018] __se_sys_bpf+0x418/0x680 [ 208.109526][T10018] ? __x64_sys_bpf+0x90/0x90 [ 208.114113][T10018] ? debug_smp_processor_id+0x17/0x20 [ 208.119476][T10018] __x64_sys_bpf+0x7b/0x90 [ 208.123877][T10018] do_syscall_64+0x31/0x40 [ 208.128285][T10018] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 208.134339][T10018] RIP: 0033:0x7fe7cca9eec9 [ 208.138838][T10018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.158614][T10018] RSP: 002b:00007fe7cb507038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.167034][T10018] RAX: ffffffffffffffda RBX: 00007fe7cccf5fa0 RCX: 00007fe7cca9eec9 [ 208.174992][T10018] RDX: 0000000000000010 RSI: 0000200000000440 RDI: 0000000000000011 [ 208.182950][T10018] RBP: 00007fe7cb507090 R08: 0000000000000000 R09: 0000000000000000 [ 208.190906][T10018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.198882][T10018] R13: 00007fe7cccf6038 R14: 00007fe7cccf5fa0 R15: 00007fff3e53e1c8 [ 208.250348][T10002] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.257438][T10002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.264712][T10002] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.271767][T10002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.333423][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.354980][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.419516][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.452795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.504253][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.547330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.572542][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.579634][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.633868][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.682164][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.722623][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.729718][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.760276][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.770963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.803968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.814485][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.835695][T10002] device veth0_vlan entered promiscuous mode [ 208.852570][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.865620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.882877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.903825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.951656][T10002] device veth1_macvtap entered promiscuous mode [ 208.968548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.980263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.013349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.063399][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.084888][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.134739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.161728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.178699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.187305][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.345575][T10068] device syzkaller0 entered promiscuous mode [ 210.544897][T10135] device pim6reg1 entered promiscuous mode [ 211.190860][T10170] device syzkaller0 entered promiscuous mode [ 211.206039][T10173] FAULT_INJECTION: forcing a failure. [ 211.206039][T10173] name failslab, interval 1, probability 0, space 0, times 0 [ 211.347874][T10173] CPU: 1 PID: 10173 Comm: syz.2.2739 Tainted: G W syzkaller #0 [ 211.356755][T10173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 211.366812][T10173] Call Trace: [ 211.370103][T10173] __dump_stack+0x21/0x24 [ 211.374435][T10173] dump_stack_lvl+0x169/0x1d8 [ 211.379112][T10173] ? thaw_kernel_threads+0x220/0x220 [ 211.384403][T10173] ? show_regs_print_info+0x18/0x18 [ 211.389601][T10173] dump_stack+0x15/0x1c [ 211.393752][T10173] should_fail+0x3c1/0x510 [ 211.398170][T10173] ? bpf_trampoline_update+0x4c9/0xe20 [ 211.403624][T10173] __should_failslab+0xa4/0xe0 [ 211.408388][T10173] should_failslab+0x9/0x20 [ 211.412889][T10173] kmem_cache_alloc_trace+0x3a/0x2e0 [ 211.418172][T10173] ? alloc_file_pseudo+0x1a4/0x1f0 [ 211.423281][T10173] ? bpf_trampoline_update+0x57/0xe20 [ 211.428650][T10173] bpf_trampoline_update+0x4c9/0xe20 [ 211.433936][T10173] ? mutex_trylock+0xa0/0xa0 [ 211.438532][T10173] bpf_trampoline_link_prog+0x437/0x690 [ 211.444077][T10173] bpf_tracing_prog_attach+0x765/0xbc0 [ 211.449534][T10173] ? bpf_insn_prepare_dump+0x830/0x830 [ 211.454988][T10173] ? __fget_files+0x2c4/0x320 [ 211.459664][T10173] bpf_raw_tracepoint_open+0x654/0x790 [ 211.465118][T10173] ? bpf_obj_get_info_by_fd+0x2c30/0x2c30 [ 211.470835][T10173] ? bpf_send_signal_common+0x339/0x420 [ 211.476392][T10173] ? selinux_bpf+0xce/0xf0 [ 211.480816][T10173] ? security_bpf+0x82/0xa0 [ 211.485326][T10173] __se_sys_bpf+0x418/0x680 [ 211.489832][T10173] ? __x64_sys_bpf+0x90/0x90 [ 211.494431][T10173] ? __bpf_trace_sys_enter+0x62/0x70 [ 211.499717][T10173] __x64_sys_bpf+0x7b/0x90 [ 211.504274][T10173] do_syscall_64+0x31/0x40 [ 211.508692][T10173] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.514584][T10173] RIP: 0033:0x7f61249cdec9 [ 211.518998][T10173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.538778][T10173] RSP: 002b:00007f6123436038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 211.547201][T10173] RAX: ffffffffffffffda RBX: 00007f6124c24fa0 RCX: 00007f61249cdec9 [ 211.555187][T10173] RDX: 0000000000000010 RSI: 0000200000000440 RDI: 0000000000000011 [ 211.563171][T10173] RBP: 00007f6123436090 R08: 0000000000000000 R09: 0000000000000000 [ 211.571154][T10173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.579131][T10173] R13: 00007f6124c25038 R14: 00007f6124c24fa0 R15: 00007ffc06dcb708 [ 211.819714][T10182] syz.1.2742[10182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.040462][T10269] ±ÿ: renamed from team_slave_1 [ 226.623941][T10328] syz.3.2781[10328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.624005][T10328] syz.3.2781[10328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.852825][T10327] device wg2 entered promiscuous mode [ 228.742710][T10422] device syzkaller0 entered promiscuous mode [ 229.032595][T10464] device pim6reg1 entered promiscuous mode [ 230.272531][T10526] Q±6ã×\b‹¡Y­4: renamed from lo [ 230.916596][T10552] device sit0 left promiscuous mode [ 231.075641][T10553] device sit0 entered promiscuous mode [ 232.220686][T10593] device syzkaller0 entered promiscuous mode [ 233.233561][T10631] device wg2 left promiscuous mode [ 234.956541][T10719] device syzkaller0 entered promiscuous mode [ 235.250231][T10740] device pim6reg1 entered promiscuous mode [ 236.210621][T10774] device syzkaller0 entered promiscuous mode [ 236.370381][T10781] device sit0 left promiscuous mode [ 239.709703][T10940] device syzkaller0 entered promiscuous mode [ 240.480980][T10973] device pim6reg1 entered promiscuous mode [ 240.920805][T10997] device veth0_vlan left promiscuous mode [ 240.926834][T10997] device veth0_vlan entered promiscuous mode [ 240.937992][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.957367][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.967352][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.497312][T11030] syz.2.2987[11030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.497396][T11030] syz.2.2987[11030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.152620][T11142] device veth0_vlan left promiscuous mode [ 243.201710][T11142] device veth0_vlan entered promiscuous mode [ 243.267796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.331493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.344712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.261968][T11240] device pim6reg1 entered promiscuous mode [ 244.476518][T11246] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 244.520494][T11246] device syzkaller0 entered promiscuous mode [ 244.801805][T11258] device syzkaller0 entered promiscuous mode [ 245.204184][T11272] tap0: tun_chr_ioctl cmd 1074025681 [ 245.209611][T11271] tap0: tun_chr_ioctl cmd 1074025698 [ 246.013796][T11320] device veth1_macvtap entered promiscuous mode [ 246.027102][T11320] device macsec0 entered promiscuous mode [ 246.066498][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.425246][T11372] device syzkaller0 entered promiscuous mode [ 247.623616][T11375] device wg2 left promiscuous mode [ 248.161254][T11405] device sit0 left promiscuous mode [ 248.188452][T11407] device sit0 entered promiscuous mode [ 250.913101][T11518] device pim6reg1 entered promiscuous mode [ 251.721969][T11565] device veth0_vlan left promiscuous mode [ 251.729025][T11565] device veth0_vlan entered promiscuous mode [ 252.853935][T11630] device macsec0 entered promiscuous mode [ 253.440436][T11656] device syzkaller0 entered promiscuous mode [ 253.525879][T11661] device sit0 entered promiscuous mode [ 254.689218][T11700] device sit0 left promiscuous mode [ 254.746274][T11700] device sit0 entered promiscuous mode [ 255.349863][T11717] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.357253][T11717] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.364944][T11717] device bridge_slave_0 entered promiscuous mode [ 255.381005][T11717] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.394836][T11717] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.411675][T11717] device bridge_slave_1 entered promiscuous mode [ 255.641860][T11732] device syzkaller0 entered promiscuous mode [ 255.657403][T11732] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 255.834950][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.842789][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.858349][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.866784][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.877341][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.884393][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.892838][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.906260][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.914772][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.921855][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.961410][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.972142][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.987249][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.003486][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.014141][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.024782][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.033570][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.052772][T11717] device veth0_vlan entered promiscuous mode [ 256.087328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.128958][T11717] device veth1_macvtap entered promiscuous mode [ 256.218563][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.259994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.483685][T11766] device ip6_vti0 entered promiscuous mode [ 257.188312][ T7] device veth0_to_team left promiscuous mode [ 257.198768][ T7] Ÿë: port 1(veth0_to_team) entered disabled state [ 257.242160][ T7] device bridge_slave_1 left promiscuous mode [ 257.276485][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.291834][ T7] device bridge_slave_0 left promiscuous mode [ 257.305748][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.322194][ T7] device veth1_macvtap left promiscuous mode [ 258.657598][T11882] device pim6reg1 entered promiscuous mode [ 258.829274][T11899] device syzkaller0 entered promiscuous mode [ 258.854109][T11897] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.863239][T11897] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.928677][T11897] device bridge_slave_1 left promiscuous mode [ 258.949036][T11897] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.972681][T11897] device bridge_slave_0 left promiscuous mode [ 258.980448][T11897] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.572997][T11949] device sit0 left promiscuous mode [ 259.841921][T11961] device veth0_vlan left promiscuous mode [ 259.865989][T11961] device veth0_vlan entered promiscuous mode [ 260.351903][T12003] device veth0_vlan left promiscuous mode [ 260.400880][T12003] device veth0_vlan entered promiscuous mode [ 260.411296][ T24] audit: type=1400 audit(1759899623.140:168): avc: denied { ioctl } for pid=12016 comm="syz.0.3282" path="" dev="cgroup2" ino=380 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 261.611983][T12091] device syzkaller0 entered promiscuous mode [ 263.070293][T12164] device wg2 entered promiscuous mode [ 264.824778][T12263] syz.2.3350[12263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.824838][T12263] syz.2.3350[12263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.824868][T12264] syz.2.3350[12264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.519924][T12416] device veth0_vlan left promiscuous mode [ 267.643988][T12416] device veth0_vlan entered promiscuous mode [ 267.714950][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.729100][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.757465][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.399607][T12443] device syzkaller0 entered promiscuous mode [ 268.723343][T12458] device syzkaller0 entered promiscuous mode [ 268.903621][T12463] device syzkaller0 entered promiscuous mode [ 268.997835][T12476] device veth0_vlan left promiscuous mode [ 269.014629][T12476] device veth0_vlan entered promiscuous mode [ 269.146097][T12484] ÿÿÿÿÿÿ: renamed from vlan1 [ 269.997235][T12530] device pim6reg1 entered promiscuous mode [ 272.267505][T12633] device syzkaller0 entered promiscuous mode [ 272.506910][ T24] audit: type=1400 audit(1759899635.230:169): avc: denied { create } for pid=12637 comm="syz.1.3467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 272.835012][T12646] FAULT_INJECTION: forcing a failure. [ 272.835012][T12646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.926618][T12646] CPU: 1 PID: 12646 Comm: syz.2.3469 Tainted: G W syzkaller #0 [ 272.935508][T12646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 272.945669][T12646] Call Trace: [ 272.948971][T12646] __dump_stack+0x21/0x24 [ 272.953299][T12646] dump_stack_lvl+0x169/0x1d8 [ 272.957979][T12646] ? show_regs_print_info+0x18/0x18 [ 272.963182][T12646] ? stack_trace_save+0x98/0xe0 [ 272.968032][T12646] dump_stack+0x15/0x1c [ 272.972185][T12646] should_fail+0x3c1/0x510 [ 272.976602][T12646] should_fail_usercopy+0x1a/0x20 [ 272.981625][T12646] _copy_from_user+0x20/0xd0 [ 272.986220][T12646] __copy_msghdr_from_user+0xaf/0x5e0 [ 272.991590][T12646] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 272.996875][T12646] ? __fsnotify_parent+0x5f5/0x6c0 [ 273.001990][T12646] ___sys_sendmsg+0x156/0x260 [ 273.006658][T12646] ? __sys_sendmsg+0x250/0x250 [ 273.011541][T12646] ? rw_verify_area+0x1c0/0x360 [ 273.016377][T12646] ? __fdget+0x1a1/0x230 [ 273.020775][T12646] __x64_sys_sendmsg+0x1e2/0x2a0 [ 273.025692][T12646] ? fput+0x1a/0x20 [ 273.029547][T12646] ? ___sys_sendmsg+0x260/0x260 [ 273.034463][T12646] ? debug_smp_processor_id+0x17/0x20 [ 273.039818][T12646] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 273.045871][T12646] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 273.051484][T12646] do_syscall_64+0x31/0x40 [ 273.055880][T12646] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 273.061753][T12646] RIP: 0033:0x7f61249cdec9 [ 273.066157][T12646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 273.085768][T12646] RSP: 002b:00007f6123436038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 273.094199][T12646] RAX: ffffffffffffffda RBX: 00007f6124c24fa0 RCX: 00007f61249cdec9 [ 273.102175][T12646] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 273.110236][T12646] RBP: 00007f6123436090 R08: 0000000000000000 R09: 0000000000000000 [ 273.118376][T12646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.126345][T12646] R13: 00007f6124c25038 R14: 00007f6124c24fa0 R15: 00007ffc06dcb708 [ 273.488321][T12663] device wg2 entered promiscuous mode [ 273.853943][T12685] FAULT_INJECTION: forcing a failure. [ 273.853943][T12685] name failslab, interval 1, probability 0, space 0, times 0 [ 273.960640][T12685] CPU: 1 PID: 12685 Comm: syz.1.3480 Tainted: G W syzkaller #0 [ 273.969529][T12685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 273.979595][T12685] Call Trace: [ 273.982902][T12685] __dump_stack+0x21/0x24 [ 273.987499][T12685] dump_stack_lvl+0x169/0x1d8 [ 273.992183][T12685] ? thaw_kernel_threads+0x220/0x220 [ 273.997479][T12685] ? show_regs_print_info+0x18/0x18 [ 274.002684][T12685] ? slab_post_alloc_hook+0x5d/0x2f0 [ 274.007982][T12685] ? security_inode_alloc+0x33/0x110 [ 274.013271][T12685] ? inode_init_always+0x70a/0x9b0 [ 274.018389][T12685] ? new_inode_pseudo+0x91/0x210 [ 274.023334][T12685] ? proc_pid_make_inode+0x27/0x1d0 [ 274.028539][T12685] ? proc_pident_instantiate+0x69/0x2b0 [ 274.034090][T12685] ? proc_pident_lookup+0x1c0/0x270 [ 274.039298][T12685] dump_stack+0x15/0x1c [ 274.043458][T12685] should_fail+0x3c1/0x510 [ 274.047881][T12685] ? __alloc_skb+0x9e/0x520 [ 274.052390][T12685] __should_failslab+0xa4/0xe0 [ 274.057160][T12685] should_failslab+0x9/0x20 [ 274.061670][T12685] kmem_cache_alloc+0x3d/0x2e0 [ 274.066428][T12685] __alloc_skb+0x9e/0x520 [ 274.070754][T12685] alloc_skb_with_frags+0xa2/0x560 [ 274.075943][T12685] sock_alloc_send_pskb+0x853/0x980 [ 274.081393][T12685] ? sock_kzfree_s+0x60/0x60 [ 274.085971][T12685] ? __kasan_check_write+0x14/0x20 [ 274.091073][T12685] ? _raw_spin_lock+0x8e/0xe0 [ 274.095740][T12685] ? _raw_spin_trylock_bh+0x130/0x130 [ 274.101104][T12685] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 274.107332][T12685] unix_dgram_sendmsg+0x5f4/0x17d0 [ 274.112436][T12685] ? selinux_socket_accept+0x500/0x500 [ 274.117884][T12685] ? stack_trace_snprint+0xf0/0xf0 [ 274.122988][T12685] ? unix_dgram_poll+0x620/0x620 [ 274.127912][T12685] ? kasan_set_track+0x5b/0x70 [ 274.132661][T12685] ? kasan_set_track+0x4a/0x70 [ 274.137413][T12685] ? security_socket_sendmsg+0x82/0xa0 [ 274.142860][T12685] ? unix_dgram_poll+0x620/0x620 [ 274.147782][T12685] ____sys_sendmsg+0x5a2/0x8c0 [ 274.152533][T12685] ? __sys_sendmsg_sock+0x40/0x40 [ 274.157546][T12685] ? import_iovec+0x7c/0xb0 [ 274.162040][T12685] ___sys_sendmsg+0x1f0/0x260 [ 274.166707][T12685] ? __sys_sendmsg+0x250/0x250 [ 274.171466][T12685] ? rw_verify_area+0x1c0/0x360 [ 274.176324][T12685] ? __fdget+0x1a1/0x230 [ 274.180555][T12685] __x64_sys_sendmsg+0x1e2/0x2a0 [ 274.185477][T12685] ? fput+0x1a/0x20 [ 274.189284][T12685] ? ___sys_sendmsg+0x260/0x260 [ 274.194125][T12685] ? debug_smp_processor_id+0x17/0x20 [ 274.199484][T12685] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 274.205538][T12685] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 274.211159][T12685] do_syscall_64+0x31/0x40 [ 274.215562][T12685] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 274.221437][T12685] RIP: 0033:0x7f407c02fec9 [ 274.225843][T12685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.245873][T12685] RSP: 002b:00007f407aa98038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 274.254274][T12685] RAX: ffffffffffffffda RBX: 00007f407c286fa0 RCX: 00007f407c02fec9 [ 274.262235][T12685] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 274.270194][T12685] RBP: 00007f407aa98090 R08: 0000000000000000 R09: 0000000000000000 [ 274.278349][T12685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.286318][T12685] R13: 00007f407c287038 R14: 00007f407c286fa0 R15: 00007ffe4fd53d88 [ 274.953850][T12713] device syzkaller0 entered promiscuous mode [ 275.424147][T12740] FAULT_INJECTION: forcing a failure. [ 275.424147][T12740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.470366][T12740] CPU: 0 PID: 12740 Comm: syz.2.3494 Tainted: G W syzkaller #0 [ 275.479341][T12740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 275.489409][T12740] Call Trace: [ 275.492705][T12740] __dump_stack+0x21/0x24 [ 275.497124][T12740] dump_stack_lvl+0x169/0x1d8 [ 275.501793][T12740] ? show_regs_print_info+0x18/0x18 [ 275.506984][T12740] dump_stack+0x15/0x1c [ 275.511125][T12740] should_fail+0x3c1/0x510 [ 275.515528][T12740] should_fail_usercopy+0x1a/0x20 [ 275.520543][T12740] _copy_from_iter+0x1d1/0x9f0 [ 275.525305][T12740] ? __kasan_check_read+0x11/0x20 [ 275.530319][T12740] ? __check_object_size+0x2f4/0x3c0 [ 275.535599][T12740] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 275.541326][T12740] tun_get_user+0x140a/0x3090 [ 275.546002][T12740] ? tun_do_read+0x1c00/0x1c00 [ 275.550772][T12740] ? kstrtouint_from_user+0x1a0/0x200 [ 275.556159][T12740] ? __fsnotify_parent+0x5f5/0x6c0 [ 275.561266][T12740] ? avc_policy_seqno+0x1b/0x70 [ 275.566110][T12740] ? selinux_file_permission+0x2a5/0x510 [ 275.571741][T12740] ? fsnotify_perm+0x66/0x4b0 [ 275.576413][T12740] tun_chr_write_iter+0x1bf/0x270 [ 275.581432][T12740] vfs_write+0x725/0xd60 [ 275.585664][T12740] ? kernel_write+0x3c0/0x3c0 [ 275.590340][T12740] ? __fget_files+0x2c4/0x320 [ 275.595006][T12740] ? __fdget_pos+0x1f7/0x380 [ 275.599587][T12740] ? ksys_write+0x71/0x240 [ 275.603989][T12740] ksys_write+0x140/0x240 [ 275.608306][T12740] ? __ia32_sys_read+0x90/0x90 [ 275.613061][T12740] ? debug_smp_processor_id+0x17/0x20 [ 275.618510][T12740] __x64_sys_write+0x7b/0x90 [ 275.623090][T12740] do_syscall_64+0x31/0x40 [ 275.627497][T12740] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 275.633375][T12740] RIP: 0033:0x7f61249cdec9 [ 275.637786][T12740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.657380][T12740] RSP: 002b:00007f6123415038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 275.665784][T12740] RAX: ffffffffffffffda RBX: 00007f6124c25090 RCX: 00007f61249cdec9 [ 275.673755][T12740] RDX: 000000000000fdef RSI: 0000200000000440 RDI: 0000000000000006 [ 275.681740][T12740] RBP: 00007f6123415090 R08: 0000000000000000 R09: 0000000000000000 [ 275.689892][T12740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.697857][T12740] R13: 00007f6124c25128 R14: 00007f6124c25090 R15: 00007ffc06dcb708 [ 275.986784][T12777] device sit0 entered promiscuous mode [ 276.117377][T12792] FAULT_INJECTION: forcing a failure. [ 276.117377][T12792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.135034][T12792] CPU: 1 PID: 12792 Comm: syz.2.3510 Tainted: G W syzkaller #0 [ 276.143896][T12792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 276.153961][T12792] Call Trace: [ 276.157257][T12792] __dump_stack+0x21/0x24 [ 276.161591][T12792] dump_stack_lvl+0x169/0x1d8 [ 276.166259][T12792] ? thaw_kernel_threads+0x220/0x220 [ 276.171557][T12792] ? vsnprintf+0x1871/0x1960 [ 276.176130][T12792] ? show_regs_print_info+0x18/0x18 [ 276.181320][T12792] dump_stack+0x15/0x1c [ 276.185453][T12792] should_fail+0x3c1/0x510 [ 276.189860][T12792] should_fail_usercopy+0x1a/0x20 [ 276.194879][T12792] _copy_to_user+0x20/0x90 [ 276.199281][T12792] simple_read_from_buffer+0xe9/0x160 [ 276.204646][T12792] proc_fail_nth_read+0x19a/0x210 [ 276.209655][T12792] ? proc_fault_inject_write+0x2f0/0x2f0 [ 276.215270][T12792] ? rw_verify_area+0x1c0/0x360 [ 276.220101][T12792] ? proc_fault_inject_write+0x2f0/0x2f0 [ 276.225718][T12792] vfs_read+0x1fe/0xa10 [ 276.229855][T12792] ? kernel_read+0x70/0x70 [ 276.234340][T12792] ? __kasan_check_write+0x14/0x20 [ 276.239448][T12792] ? mutex_lock+0x8c/0xe0 [ 276.243772][T12792] ? mutex_trylock+0xa0/0xa0 [ 276.248367][T12792] ? __fget_files+0x2c4/0x320 [ 276.253042][T12792] ? __fdget_pos+0x2d2/0x380 [ 276.257618][T12792] ? ksys_read+0x71/0x240 [ 276.261938][T12792] ksys_read+0x140/0x240 [ 276.266178][T12792] ? vfs_write+0xd60/0xd60 [ 276.270576][T12792] ? ____fput+0x15/0x20 [ 276.274723][T12792] ? debug_smp_processor_id+0x17/0x20 [ 276.280094][T12792] __x64_sys_read+0x7b/0x90 [ 276.284578][T12792] do_syscall_64+0x31/0x40 [ 276.288977][T12792] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 276.294858][T12792] RIP: 0033:0x7f61249cc8dc [ 276.299261][T12792] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 276.318849][T12792] RSP: 002b:00007f6123436030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 276.327270][T12792] RAX: ffffffffffffffda RBX: 00007f6124c24fa0 RCX: 00007f61249cc8dc [ 276.335224][T12792] RDX: 000000000000000f RSI: 00007f61234360a0 RDI: 0000000000000009 [ 276.343177][T12792] RBP: 00007f6123436090 R08: 0000000000000000 R09: 0000000000000000 [ 276.351129][T12792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.359099][T12792] R13: 00007f6124c25038 R14: 00007f6124c24fa0 R15: 00007ffc06dcb708 [ 276.373040][T12777] pimreg: tun_chr_ioctl cmd 1074025677 [ 276.378985][T12777] pimreg: linktype set to 6 [ 276.669411][T12843] device syzkaller0 entered promiscuous mode [ 278.280963][T12956] syz.3.3555[12956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.281049][T12956] syz.3.3555[12956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.285171][T12960] syz.0.3556[12960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.326342][T12960] syz.0.3556[12960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.531446][T12960] device veth0_vlan left promiscuous mode [ 278.586482][T12960] device veth0_vlan entered promiscuous mode [ 280.197404][T13034] device syzkaller0 entered promiscuous mode [ 280.782764][T13049] device veth0_vlan left promiscuous mode [ 280.794927][T13049] device veth0_vlan entered promiscuous mode [ 280.816281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.836620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.852068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.503829][T13166] device syzkaller0 entered promiscuous mode [ 282.968440][T13201] syz.1.3625[13201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.968493][T13201] syz.1.3625[13201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.419696][T13220] device veth0_vlan left promiscuous mode [ 283.534186][T13220] device veth0_vlan entered promiscuous mode [ 283.669374][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.688090][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.753469][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 284.006082][T13238] device sit0 entered promiscuous mode [ 284.017942][T13235] device veth0_vlan left promiscuous mode [ 284.030004][T13235] device veth0_vlan entered promiscuous mode [ 284.167166][T13243] device sit0 left promiscuous mode [ 284.279670][T13248] device sit0 entered promiscuous mode [ 287.569110][T13320] device syzkaller0 entered promiscuous mode [ 287.759365][T13337] device syzkaller0 entered promiscuous mode [ 288.837808][T13425] device sit0 left promiscuous mode [ 290.417268][T13493] device syzkaller0 entered promiscuous mode [ 290.995957][T13514] device veth1_to_team entered promiscuous mode [ 292.285586][T13586] device bridge_slave_1 left promiscuous mode [ 292.297010][T13586] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.336377][T13586] device bridge_slave_0 left promiscuous mode [ 292.375517][T13586] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.867455][T13613] device veth0_vlan left promiscuous mode [ 292.890056][T13613] device veth0_vlan entered promiscuous mode [ 293.301861][T13649] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.315375][T13649] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.323228][T13649] device bridge_slave_0 entered promiscuous mode [ 293.330638][T13649] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.365830][T13649] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.375175][T13655] syz.4.3757[13655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.375384][T13655] syz.4.3757[13655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.437422][T13649] device bridge_slave_1 entered promiscuous mode [ 293.625914][T13649] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.633022][T13649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.640309][T13649] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.647360][T13649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.818165][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.825839][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.833220][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.841656][T13667] device veth1_macvtap left promiscuous mode [ 293.932597][T13671] device veth1_macvtap entered promiscuous mode [ 293.949306][T13671] device macsec0 entered promiscuous mode [ 293.949326][T13680] syz.0.3764[13680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.043738][T13680] device veth0_vlan left promiscuous mode [ 294.064883][T13680] device veth0_vlan entered promiscuous mode [ 294.089936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.098487][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.105544][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.117093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.128343][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.135399][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.146701][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.155059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.163483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.171827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.185131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.354129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.362921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.539395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.556262][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.596061][T13649] device veth0_vlan entered promiscuous mode [ 294.602394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.628058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.671018][T13649] device veth1_macvtap entered promiscuous mode [ 294.677970][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.686438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.695261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.761704][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.771879][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.780291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.788913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.799613][T13711] device sit0 entered promiscuous mode [ 294.811485][T13710] device sit0 left promiscuous mode [ 294.948068][T13726] device wg2 left promiscuous mode [ 294.987783][T13724] device veth0_vlan left promiscuous mode [ 295.009162][T13724] device veth0_vlan entered promiscuous mode [ 295.073756][T13730] tun1: tun_chr_ioctl cmd 1074025676 [ 295.079592][T13730] tun1: owner set to 0 [ 295.224801][T13735] device syzkaller0 entered promiscuous mode [ 295.298576][ T791] device bridge_slave_1 left promiscuous mode [ 295.307069][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.316018][ T791] device bridge_slave_0 left promiscuous mode [ 295.322513][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.332131][ T791] device veth1_macvtap left promiscuous mode [ 295.472204][T13761] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.479416][T13761] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.629698][T13824] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.636988][T13824] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.605996][T13866] device syzkaller0 entered promiscuous mode [ 299.345744][T13928] device syzkaller0 entered promiscuous mode [ 299.539876][T13933] device veth0_to_team entered promiscuous mode [ 300.349038][T13970] syz.3.3846[13970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.350643][T13970] syz.3.3846[13970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.474082][T14026] device syzkaller0 entered promiscuous mode [ 302.212180][T14090] syz.2.3882[14090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.212232][T14090] syz.2.3882[14090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.248938][T14091] syz.2.3882[14091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.430433][T14125] device sit0 left promiscuous mode [ 302.593503][T14127] device sit0 entered promiscuous mode [ 303.240797][T14161] device veth0_vlan left promiscuous mode [ 303.252024][T14161] device veth0_vlan entered promiscuous mode [ 303.300521][T14170] -1: renamed from syzkaller0 [ 303.367472][T14188] device pim6reg1 entered promiscuous mode [ 304.472132][T14238] tap0: tun_chr_ioctl cmd 1074025675 [ 304.496907][T14238] tap0: persist enabled [ 304.501464][T14238] tap0: tun_chr_ioctl cmd 1074025675 [ 304.507087][T14238] tap0: persist enabled [ 304.696694][T14271] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 304.715960][T14271] device syzkaller0 entered promiscuous mode [ 304.818093][T14288] device syzkaller0 entered promiscuous mode [ 305.358309][T14329] ÿÿÿÿÿÿ: renamed from vlan1 [ 305.391394][T14329] device pim6reg1 entered promiscuous mode [ 305.593594][T14354] device sit0 entered promiscuous mode [ 305.729546][T14362] syz.1.3956[14362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.729609][T14362] syz.1.3956[14362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.777243][T14361] syz.1.3956[14361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.108334][T14367] device syzkaller0 entered promiscuous mode [ 306.721688][T14391] device pim6reg1 entered promiscuous mode [ 310.186401][T14462] device sit0 left promiscuous mode [ 310.396619][T14456] device veth0_vlan left promiscuous mode [ 310.412275][T14456] device veth0_vlan entered promiscuous mode [ 310.475292][T14463] device sit0 entered promiscuous mode [ 310.718595][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.726782][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.742336][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 311.138183][T14481] device bond_slave_0 entered promiscuous mode [ 311.174048][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 311.190851][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 311.820838][T14515] device syzkaller0 entered promiscuous mode [ 311.953443][T14526] syzkaller0: tun_chr_ioctl cmd 35108 [ 311.969567][T14526] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 314.770891][T14623] device veth0_vlan left promiscuous mode [ 314.790125][T14623] device veth0_vlan entered promiscuous mode [ 314.823546][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.834864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.848862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.495464][T14648] tap1: tun_chr_ioctl cmd 1074025675 [ 315.527282][T14648] tap1: persist enabled [ 315.545810][T14648] tap1: tun_chr_ioctl cmd 1074025675 [ 315.564560][T14648] tap1: persist enabled [ 316.385325][T14681] ref_ctr_offset mismatch. inode: 0x3f8 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 316.711240][T14699] device pim6reg1 entered promiscuous mode [ 317.791945][T14746] device syzkaller0 entered promiscuous mode [ 317.825502][T14754] device pim6reg1 entered promiscuous mode [ 318.114362][T14777] device syzkaller0 entered promiscuous mode [ 319.708045][T14923] device sit0 left promiscuous mode [ 320.053368][ T24] audit: type=1400 audit(1759899682.780:170): avc: denied { associate } for pid=14934 comm="syz.4.4122" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 320.966051][T14992] device pim6reg1 entered promiscuous mode [ 321.155567][T15007] device wg2 entered promiscuous mode [ 321.217066][T15012] device sit0 left promiscuous mode [ 321.263725][T15020] ±: renamed from pim6reg1 [ 321.885311][T15034] device syzkaller0 entered promiscuous mode [ 322.876401][T15103] device veth0_vlan left promiscuous mode [ 322.901982][T15103] device veth0_vlan entered promiscuous mode [ 322.966987][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.982610][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.012125][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 323.695264][T15152] device syzkaller0 entered promiscuous mode [ 324.095865][T15174] Ÿë: port 1(veth0_vlan) entered blocking state [ 324.118550][T15174] Ÿë: port 1(veth0_vlan) entered disabled state [ 324.175598][T15173] device syzkaller0 entered promiscuous mode [ 324.461508][ T24] audit: type=1400 audit(1759899687.190:171): avc: denied { create } for pid=15203 comm="syz.2.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 325.356914][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.366499][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 325.395570][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 325.781712][T15253] device wg2 entered promiscuous mode [ 325.827823][T15255] syz.3.4219[15255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.827881][T15255] syz.3.4219[15255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.921090][T15255] syz.3.4219[15255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.996978][T15255] syz.3.4219[15255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.141241][T15259] syz.3.4219[15259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.248220][T15259] syz.3.4219[15259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.552756][T15376] device sit0 entered promiscuous mode [ 329.264841][T15409] device sit0 entered promiscuous mode [ 329.819093][T15424] device wg2 entered promiscuous mode [ 329.979861][T15431] device wg2 entered promiscuous mode [ 330.521581][T15460] device syzkaller0 entered promiscuous mode [ 333.943566][T15653] device sit0 entered promiscuous mode [ 334.971279][T15711] device sit0 entered promiscuous mode [ 335.848078][T15765] device veth0_vlan left promiscuous mode [ 335.859039][T15765] device veth0_vlan entered promiscuous mode [ 335.898108][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.907944][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.922609][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.938432][T15775] device wg2 left promiscuous mode [ 335.982287][T15777] device wg2 entered promiscuous mode [ 336.261714][T15787] device wg2 entered promiscuous mode [ 336.694400][T15799] batadv0: tun_chr_ioctl cmd 2147767521 [ 336.729637][T15799] batadv0: tun_chr_ioctl cmd 1074025692 [ 337.147823][T15832] device pim6reg1 entered promiscuous mode [ 337.437007][T15850] device syzkaller0 entered promiscuous mode [ 339.538215][T15926] device veth0_vlan left promiscuous mode [ 339.553501][T15926] device veth0_vlan entered promiscuous mode [ 339.616169][T15925] device veth1_macvtap left promiscuous mode [ 339.736554][T15939] device syzkaller0 entered promiscuous mode [ 340.504457][T15973] device veth0_vlan left promiscuous mode [ 340.542496][T15973] device veth0_vlan entered promiscuous mode [ 340.641179][T15978] tap0: tun_chr_ioctl cmd 1074025675 [ 340.646522][T15978] tap0: persist enabled [ 340.857916][T15997] device syzkaller0 entered promiscuous mode [ 341.049410][T16012] device pim6reg1 entered promiscuous mode [ 341.551464][T16047] device syzkaller0 entered promiscuous mode [ 341.710512][T16055] tap2: tun_chr_ioctl cmd 2147767521 [ 342.211094][T16070] device sit0 left promiscuous mode [ 344.297151][T16160] ref_ctr_offset mismatch. inode: 0xb40 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 345.030076][T16186] device pim6reg1 entered promiscuous mode [ 346.321811][T16218] ref_ctr_offset mismatch. inode: 0xa2c offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 347.738512][T16299] device veth0_vlan left promiscuous mode [ 347.744468][T16299] device veth0_vlan entered promiscuous mode [ 347.822301][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.847117][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.905084][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.976679][T16409] device sit0 left promiscuous mode [ 352.228596][T16423] device sit0 entered promiscuous mode [ 353.310366][T16463] syz.0.4577[16463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.310461][T16463] syz.0.4577[16463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.550449][T16525] device wg2 left promiscuous mode [ 354.585729][T16525] device wg2 entered promiscuous mode [ 355.249454][T16601] device sit0 left promiscuous mode [ 355.889588][T16614] device wg2 left promiscuous mode [ 355.902461][T16614] device wg2 entered promiscuous mode [ 357.227081][T16702] device pim6reg1 entered promiscuous mode [ 361.376947][T16932] device pim6reg1 entered promiscuous mode [ 361.582889][T16945] device wg2 left promiscuous mode [ 361.666108][T16956] device wg2 entered promiscuous mode [ 362.307068][ T24] audit: type=1400 audit(1759899724.970:172): avc: denied { mounton } for pid=16995 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 362.873484][T17030] device wg2 left promiscuous mode [ 363.010591][T16995] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.017689][T16995] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.025149][T16995] device bridge_slave_0 entered promiscuous mode [ 363.032663][T16995] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.052432][T16995] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.064244][T16995] device bridge_slave_1 entered promiscuous mode [ 363.180494][T17037] device wg2 entered promiscuous mode [ 363.459470][T16995] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.466534][T16995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.473835][T16995] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.480892][T16995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.767775][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.781276][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.790176][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.871785][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.880490][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.887561][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.898435][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.906693][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.913796][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.923153][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.931566][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.058922][T17092] device syzkaller0 entered promiscuous mode [ 364.731357][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.747231][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.764933][T16995] device veth0_vlan entered promiscuous mode [ 364.834529][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 364.847183][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.861912][T16995] device veth1_macvtap entered promiscuous mode [ 364.894393][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.902953][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.910605][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.919150][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.927497][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.975128][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.983516][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.066116][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.074416][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 365.138043][ T24] audit: type=1400 audit(1759899727.870:173): avc: denied { unmount } for pid=16995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 365.257817][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.268892][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 365.276376][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 365.472279][T17159] device sit0 entered promiscuous mode [ 365.595068][T17163] device wg2 left promiscuous mode [ 365.662506][T17176] device wg2 entered promiscuous mode [ 366.378094][ T302] device bridge_slave_1 left promiscuous mode [ 366.386508][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.421358][ T302] device bridge_slave_0 left promiscuous mode [ 366.445151][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.639742][T17218] syz.2.4794[17218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.639803][T17218] syz.2.4794[17218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.045398][T17241] device wg2 entered promiscuous mode [ 367.266042][T17245] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.273126][T17245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.280430][T17245] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.287465][T17245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.393873][T17245] device bridge0 entered promiscuous mode [ 367.433488][T17248] device sit0 left promiscuous mode [ 367.556269][T17249] device sit0 entered promiscuous mode [ 367.930230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.674400][T17289] device pim6reg1 entered promiscuous mode [ 369.065405][T17320] device veth1_macvtap left promiscuous mode [ 369.073403][T17320] device macsec0 entered promiscuous mode [ 369.411132][T17383] @0Ù: renamed from bond_slave_1 [ 369.424832][T17383] device sit0 entered promiscuous mode [ 369.995980][T17523] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.003234][T17523] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.027324][T17523] device bridge_slave_0 entered promiscuous mode [ 370.056956][T17523] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.064981][T17523] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.097625][T17523] device bridge_slave_1 entered promiscuous mode [ 370.263649][T17523] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.270759][T17523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.278078][T17523] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.285111][T17523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.322155][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.336266][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.354591][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.410271][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.427183][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.434257][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.442867][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.467077][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.474120][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.481938][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.490330][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 370.518964][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 370.538896][T17523] device veth0_vlan entered promiscuous mode [ 370.547890][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.564398][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 370.572746][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.595877][T17523] device veth1_macvtap entered promiscuous mode [ 370.603236][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 370.630280][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.644495][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 371.561510][ T302] Ÿë: port 1(veth0_vlan) entered disabled state [ 371.586997][ T302] device veth0_vlan left promiscuous mode [ 371.919191][T17649] device pim6reg1 entered promiscuous mode [ 373.902843][T17723] device syzkaller0 entered promiscuous mode [ 374.060356][T17729] €Â0: renamed from pim6reg1 [ 379.171385][T17962] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.178517][T17962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.186035][T17962] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.193157][T17962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.221658][T17962] device bridge0 entered promiscuous mode [ 379.346889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 379.477592][T17998] device sit0 entered promiscuous mode [ 379.644432][T18019] syz.3.5010[18019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.644481][T18019] syz.3.5010[18019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.577965][T18069] device pim6reg1 entered promiscuous mode [ 380.668329][T18073] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.677536][T18073] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.764435][T18075] device bridge_slave_1 left promiscuous mode [ 380.825839][T18075] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.875270][T18075] device bridge_slave_0 left promiscuous mode [ 380.912152][T18075] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.244917][T18099] syz.3.5031[18099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.244977][T18099] syz.3.5031[18099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.627855][T18112] : renamed from bond_slave_0 [ 381.808062][T18119] device sit0 left promiscuous mode [ 381.968787][T18130] device sit0 entered promiscuous mode [ 382.275531][T18141] device sit0 left promiscuous mode [ 382.306044][T18141] device sit0 entered promiscuous mode [ 382.719452][T18150] device syzkaller0 entered promiscuous mode [ 382.774282][T18159] device sit0 left promiscuous mode [ 382.995884][T18162] device sit0 entered promiscuous mode [ 383.566454][T18193] FAULT_INJECTION: forcing a failure. [ 383.566454][T18193] name failslab, interval 1, probability 0, space 0, times 0 [ 383.610305][T18193] CPU: 1 PID: 18193 Comm: syz.4.5058 Tainted: G W syzkaller #0 [ 383.619181][T18193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 383.629229][T18193] Call Trace: [ 383.632526][T18193] __dump_stack+0x21/0x24 [ 383.636845][T18193] dump_stack_lvl+0x169/0x1d8 [ 383.641515][T18193] ? show_regs_print_info+0x18/0x18 [ 383.646705][T18193] dump_stack+0x15/0x1c [ 383.650868][T18193] should_fail+0x3c1/0x510 [ 383.655277][T18193] ? btf_new_fd+0x113/0xa00 [ 383.659768][T18193] __should_failslab+0xa4/0xe0 [ 383.664519][T18193] should_failslab+0x9/0x20 [ 383.669008][T18193] kmem_cache_alloc_trace+0x3a/0x2e0 [ 383.674278][T18193] btf_new_fd+0x113/0xa00 [ 383.678598][T18193] bpf_btf_load+0x5e/0x70 [ 383.682913][T18193] __se_sys_bpf+0x48a/0x680 [ 383.687404][T18193] ? __x64_sys_bpf+0x90/0x90 [ 383.691987][T18193] ? debug_smp_processor_id+0x17/0x20 [ 383.697364][T18193] __x64_sys_bpf+0x7b/0x90 [ 383.701799][T18193] do_syscall_64+0x31/0x40 [ 383.706225][T18193] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 383.712229][T18193] RIP: 0033:0x7f4ef7f88ec9 [ 383.716648][T18193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.736258][T18193] RSP: 002b:00007f4ef69f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.744668][T18193] RAX: ffffffffffffffda RBX: 00007f4ef81dffa0 RCX: 00007f4ef7f88ec9 [ 383.752628][T18193] RDX: 0000000000000028 RSI: 00002000000002c0 RDI: 0000000000000012 [ 383.760588][T18193] RBP: 00007f4ef69f1090 R08: 0000000000000000 R09: 0000000000000000 [ 383.768561][T18193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.776528][T18193] R13: 00007f4ef81e0038 R14: 00007f4ef81dffa0 R15: 00007ffcf18cb0a8 [ 383.957698][T18201] device syzkaller0 entered promiscuous mode [ 384.500746][T18245] device sit0 left promiscuous mode [ 384.752461][T18263] syz.1.5076[18263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.752522][T18263] syz.1.5076[18263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.307832][T18302] ±: renamed from pim6reg1 [ 385.996478][T18361] syz.3.5102[18361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.035312][T18336] device syzkaller0 entered promiscuous mode [ 386.213393][T18357] device sit0 entered promiscuous mode [ 387.201770][T18388] device syzkaller0 entered promiscuous mode [ 389.368342][T18455] lo: mtu less than device minimum [ 389.856039][T18483] device pim6reg1 entered promiscuous mode [ 391.221496][T18511] device syzkaller0 entered promiscuous mode [ 391.321576][T18526] FAULT_INJECTION: forcing a failure. [ 391.321576][T18526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 391.336726][T18526] CPU: 0 PID: 18526 Comm: syz.1.5154 Tainted: G W syzkaller #0 [ 391.345587][T18526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 391.355634][T18526] Call Trace: [ 391.358917][T18526] __dump_stack+0x21/0x24 [ 391.363236][T18526] dump_stack_lvl+0x169/0x1d8 [ 391.367903][T18526] ? show_regs_print_info+0x18/0x18 [ 391.373101][T18526] ? vfs_write+0xac8/0xd60 [ 391.377511][T18526] dump_stack+0x15/0x1c [ 391.381656][T18526] should_fail+0x3c1/0x510 [ 391.386070][T18526] should_fail_usercopy+0x1a/0x20 [ 391.391084][T18526] _copy_from_user+0x20/0xd0 [ 391.395717][T18526] __se_sys_bpf+0x181/0x680 [ 391.400204][T18526] ? __x64_sys_bpf+0x90/0x90 [ 391.404809][T18526] ? debug_smp_processor_id+0x17/0x20 [ 391.410166][T18526] __x64_sys_bpf+0x7b/0x90 [ 391.414569][T18526] do_syscall_64+0x31/0x40 [ 391.418975][T18526] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 391.424859][T18526] RIP: 0033:0x7f407c02fec9 [ 391.429273][T18526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.448882][T18526] RSP: 002b:00007f407aa98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.457294][T18526] RAX: ffffffffffffffda RBX: 00007f407c286fa0 RCX: 00007f407c02fec9 [ 391.465266][T18526] RDX: 0000000000000028 RSI: 00002000000002c0 RDI: 0000000000000012 [ 391.473232][T18526] RBP: 00007f407aa98090 R08: 0000000000000000 R09: 0000000000000000 [ 391.481208][T18526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 391.489170][T18526] R13: 00007f407c287038 R14: 00007f407c286fa0 R15: 00007ffe4fd53d88 [ 391.603094][T18524] device syzkaller0 entered promiscuous mode [ 391.617991][T18511] syzkaller0: tun_net_xmit 1280 [ 392.401099][T18593] device sit0 entered promiscuous mode [ 392.685143][T18620] syz.0.5179[18620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.685203][T18620] syz.0.5179[18620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.956735][T18637] FAULT_INJECTION: forcing a failure. [ 392.956735][T18637] name failslab, interval 1, probability 0, space 0, times 0 [ 393.001263][T18635] device sit0 left promiscuous mode [ 393.053002][T18637] CPU: 0 PID: 18637 Comm: syz.1.5185 Tainted: G W syzkaller #0 [ 393.061878][T18637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 393.071935][T18637] Call Trace: [ 393.075237][T18637] __dump_stack+0x21/0x24 [ 393.079574][T18637] dump_stack_lvl+0x169/0x1d8 [ 393.084260][T18637] ? thaw_kernel_threads+0x220/0x220 [ 393.089545][T18637] ? show_regs_print_info+0x18/0x18 [ 393.094760][T18637] ? selinux_capable+0x29c/0x380 [ 393.099703][T18637] ? selinux_capset+0xf0/0xf0 [ 393.104815][T18637] dump_stack+0x15/0x1c [ 393.108975][T18637] should_fail+0x3c1/0x510 [ 393.113393][T18637] ? bpf_map_area_alloc+0x49/0xe0 [ 393.118417][T18637] __should_failslab+0xa4/0xe0 [ 393.123186][T18637] should_failslab+0x9/0x20 [ 393.124013][T18643] device sit0 entered promiscuous mode [ 393.127689][T18637] __kmalloc+0x60/0x330 [ 393.127701][T18637] ? __kasan_check_write+0x14/0x20 [ 393.127715][T18637] bpf_map_area_alloc+0x49/0xe0 [ 393.127725][T18637] array_map_alloc+0x330/0x7c0 [ 393.127744][T18637] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 393.157652][T18637] ? kernel_write+0x3c0/0x3c0 [ 393.162319][T18637] ? array_map_alloc_check+0x2c2/0x390 [ 393.167973][T18637] map_create+0x44e/0x2090 [ 393.172383][T18637] __se_sys_bpf+0x203/0x680 [ 393.176877][T18637] ? __x64_sys_bpf+0x90/0x90 [ 393.181460][T18637] ? debug_smp_processor_id+0x17/0x20 [ 393.186822][T18637] __x64_sys_bpf+0x7b/0x90 [ 393.191232][T18637] do_syscall_64+0x31/0x40 [ 393.195643][T18637] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 393.201525][T18637] RIP: 0033:0x7f407c02fec9 [ 393.205933][T18637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.225525][T18637] RSP: 002b:00007f407aa98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 393.234021][T18637] RAX: ffffffffffffffda RBX: 00007f407c286fa0 RCX: 00007f407c02fec9 [ 393.241989][T18637] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 393.249950][T18637] RBP: 00007f407aa98090 R08: 0000000000000000 R09: 0000000000000000 [ 393.257917][T18637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.265875][T18637] R13: 00007f407c287038 R14: 00007f407c286fa0 R15: 00007ffe4fd53d88 [ 393.506140][T18661] FAULT_INJECTION: forcing a failure. [ 393.506140][T18661] name failslab, interval 1, probability 0, space 0, times 0 [ 393.586947][T18661] CPU: 1 PID: 18661 Comm: syz.1.5192 Tainted: G W syzkaller #0 [ 393.595823][T18661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 393.605882][T18661] Call Trace: [ 393.609204][T18661] __dump_stack+0x21/0x24 [ 393.613535][T18661] dump_stack_lvl+0x169/0x1d8 [ 393.618214][T18661] ? show_regs_print_info+0x18/0x18 [ 393.623420][T18661] dump_stack+0x15/0x1c [ 393.627573][T18661] should_fail+0x3c1/0x510 [ 393.631991][T18661] ? __d_alloc+0x2d/0x6a0 [ 393.636315][T18661] __should_failslab+0xa4/0xe0 [ 393.641069][T18661] should_failslab+0x9/0x20 [ 393.645566][T18661] kmem_cache_alloc+0x3d/0x2e0 [ 393.650324][T18661] ? kmem_cache_alloc+0x165/0x2e0 [ 393.655337][T18661] __d_alloc+0x2d/0x6a0 [ 393.659482][T18661] ? _raw_spin_trylock_bh+0x130/0x130 [ 393.664842][T18661] d_alloc_pseudo+0x1d/0x70 [ 393.669497][T18661] alloc_file_pseudo+0xc8/0x1f0 [ 393.674360][T18661] ? alloc_empty_file_noaccount+0x80/0x80 [ 393.680082][T18661] __anon_inode_getfd+0x248/0x3b0 [ 393.685099][T18661] ? anon_inode_getfd+0x40/0x40 [ 393.689940][T18661] ? __kasan_check_write+0x14/0x20 [ 393.695042][T18661] ? _raw_spin_lock_bh+0x8e/0xe0 [ 393.699982][T18661] anon_inode_getfd+0x31/0x40 [ 393.704646][T18661] btf_new_fd+0x819/0xa00 [ 393.708970][T18661] bpf_btf_load+0x5e/0x70 [ 393.713285][T18661] __se_sys_bpf+0x48a/0x680 [ 393.717779][T18661] ? __x64_sys_bpf+0x90/0x90 [ 393.722364][T18661] ? debug_smp_processor_id+0x17/0x20 [ 393.727730][T18661] __x64_sys_bpf+0x7b/0x90 [ 393.732138][T18661] do_syscall_64+0x31/0x40 [ 393.736545][T18661] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 393.742523][T18661] RIP: 0033:0x7f407c02fec9 [ 393.746936][T18661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.766662][T18661] RSP: 002b:00007f407aa98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 393.775077][T18661] RAX: ffffffffffffffda RBX: 00007f407c286fa0 RCX: 00007f407c02fec9 [ 393.783044][T18661] RDX: 0000000000000028 RSI: 00002000000002c0 RDI: 0000000000000012 [ 393.791096][T18661] RBP: 00007f407aa98090 R08: 0000000000000000 R09: 0000000000000000 [ 393.799061][T18661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 393.807027][T18661] R13: 00007f407c287038 R14: 00007f407c286fa0 R15: 00007ffe4fd53d88 [ 393.936101][T18676] FAULT_INJECTION: forcing a failure. [ 393.936101][T18676] name failslab, interval 1, probability 0, space 0, times 0 [ 394.027056][T18676] CPU: 1 PID: 18676 Comm: syz.3.5198 Tainted: G W syzkaller #0 [ 394.035937][T18676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 394.046005][T18676] Call Trace: [ 394.049314][T18676] __dump_stack+0x21/0x24 [ 394.053648][T18676] dump_stack_lvl+0x169/0x1d8 [ 394.058419][T18676] ? thaw_kernel_threads+0x220/0x220 [ 394.063717][T18676] ? show_regs_print_info+0x18/0x18 [ 394.068966][T18676] dump_stack+0x15/0x1c [ 394.073258][T18676] should_fail+0x3c1/0x510 [ 394.077683][T18676] ? selinux_bpf_map_alloc+0x51/0x140 [ 394.083049][T18676] __should_failslab+0xa4/0xe0 [ 394.087917][T18676] should_failslab+0x9/0x20 [ 394.092417][T18676] kmem_cache_alloc_trace+0x3a/0x2e0 [ 394.097704][T18676] selinux_bpf_map_alloc+0x51/0x140 [ 394.102897][T18676] security_bpf_map_alloc+0x62/0x90 [ 394.108092][T18676] map_create+0xb5f/0x2090 [ 394.112599][T18676] __se_sys_bpf+0x203/0x680 [ 394.117097][T18676] ? __x64_sys_bpf+0x90/0x90 [ 394.121681][T18676] ? __bpf_trace_sys_enter+0x62/0x70 [ 394.126956][T18676] __x64_sys_bpf+0x7b/0x90 [ 394.131404][T18676] do_syscall_64+0x31/0x40 [ 394.135818][T18676] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 394.141698][T18676] RIP: 0033:0x7fb899316ec9 [ 394.146102][T18676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.165695][T18676] RSP: 002b:00007fb897d7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.174100][T18676] RAX: ffffffffffffffda RBX: 00007fb89956dfa0 RCX: 00007fb899316ec9 [ 394.182066][T18676] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 394.190038][T18676] RBP: 00007fb897d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 394.198009][T18676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 394.205971][T18676] R13: 00007fb89956e038 R14: 00007fb89956dfa0 R15: 00007ffe099c2218 [ 394.865686][T18708] FAULT_INJECTION: forcing a failure. [ 394.865686][T18708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.954231][T18708] CPU: 1 PID: 18708 Comm: syz.2.5207 Tainted: G W syzkaller #0 [ 394.963108][T18708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 394.973168][T18708] Call Trace: [ 394.976471][T18708] __dump_stack+0x21/0x24 [ 394.980926][T18708] dump_stack_lvl+0x169/0x1d8 [ 394.985978][T18708] ? thaw_kernel_threads+0x220/0x220 [ 394.991287][T18708] ? vsnprintf+0x1871/0x1960 [ 394.995890][T18708] ? show_regs_print_info+0x18/0x18 [ 395.001095][T18708] dump_stack+0x15/0x1c [ 395.005341][T18708] should_fail+0x3c1/0x510 [ 395.009772][T18708] should_fail_usercopy+0x1a/0x20 [ 395.014892][T18708] _copy_to_user+0x20/0x90 [ 395.019314][T18708] simple_read_from_buffer+0xe9/0x160 [ 395.024700][T18708] proc_fail_nth_read+0x19a/0x210 [ 395.029729][T18708] ? proc_fault_inject_write+0x2f0/0x2f0 [ 395.035363][T18708] ? rw_verify_area+0x1c0/0x360 [ 395.040221][T18708] ? proc_fault_inject_write+0x2f0/0x2f0 [ 395.045858][T18708] vfs_read+0x1fe/0xa10 [ 395.050026][T18708] ? kernel_read+0x70/0x70 [ 395.054446][T18708] ? __kasan_check_write+0x14/0x20 [ 395.059554][T18708] ? mutex_lock+0x8c/0xe0 [ 395.063885][T18708] ? mutex_trylock+0xa0/0xa0 [ 395.068472][T18708] ? __fget_files+0x2c4/0x320 [ 395.073152][T18708] ? __fdget_pos+0x2d2/0x380 [ 395.077848][T18708] ? ksys_read+0x71/0x240 [ 395.082185][T18708] ksys_read+0x140/0x240 [ 395.086440][T18708] ? vfs_write+0xd60/0xd60 [ 395.090881][T18708] ? debug_smp_processor_id+0x17/0x20 [ 395.096350][T18708] __x64_sys_read+0x7b/0x90 [ 395.100863][T18708] do_syscall_64+0x31/0x40 [ 395.105283][T18708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 395.111174][T18708] RIP: 0033:0x7f20641c58dc [ 395.115604][T18708] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 395.135212][T18708] RSP: 002b:00007f2062c2f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 395.143634][T18708] RAX: ffffffffffffffda RBX: 00007f206441dfa0 RCX: 00007f20641c58dc [ 395.151611][T18708] RDX: 000000000000000f RSI: 00007f2062c2f0a0 RDI: 0000000000000003 [ 395.159582][T18708] RBP: 00007f2062c2f090 R08: 0000000000000000 R09: 0000000000000000 [ 395.167552][T18708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 395.175522][T18708] R13: 00007f206441e038 R14: 00007f206441dfa0 R15: 00007ffff4185b48 [ 396.758533][T18799] device wg2 left promiscuous mode [ 396.820544][T18814] device wg2 entered promiscuous mode [ 397.089178][T18846] FAULT_INJECTION: forcing a failure. [ 397.089178][T18846] name failslab, interval 1, probability 0, space 0, times 0 [ 397.104348][T18846] CPU: 1 PID: 18846 Comm: syz.1.5247 Tainted: G W syzkaller #0 [ 397.113214][T18846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 397.123379][T18846] Call Trace: [ 397.126675][T18846] __dump_stack+0x21/0x24 [ 397.131020][T18846] dump_stack_lvl+0x169/0x1d8 [ 397.135792][T18846] ? thaw_kernel_threads+0x220/0x220 [ 397.141162][T18846] ? show_regs_print_info+0x18/0x18 [ 397.146370][T18846] dump_stack+0x15/0x1c [ 397.150520][T18846] should_fail+0x3c1/0x510 [ 397.154961][T18846] ? security_file_alloc+0x33/0x120 [ 397.160171][T18846] __should_failslab+0xa4/0xe0 [ 397.164941][T18846] should_failslab+0x9/0x20 [ 397.169536][T18846] kmem_cache_alloc+0x3d/0x2e0 [ 397.174322][T18846] ? __alloc_file+0x28/0x320 [ 397.178917][T18846] security_file_alloc+0x33/0x120 [ 397.183942][T18846] __alloc_file+0xb5/0x320 [ 397.188359][T18846] alloc_empty_file+0x97/0x180 [ 397.193122][T18846] alloc_file+0x59/0x540 [ 397.197370][T18846] alloc_file_pseudo+0x17a/0x1f0 [ 397.202401][T18846] ? alloc_empty_file_noaccount+0x80/0x80 [ 397.208124][T18846] __anon_inode_getfd+0x248/0x3b0 [ 397.213148][T18846] ? anon_inode_getfd+0x40/0x40 [ 397.218170][T18846] ? __kasan_check_write+0x14/0x20 [ 397.223279][T18846] ? selinux_bpf_map+0xd2/0x110 [ 397.228125][T18846] anon_inode_getfd+0x31/0x40 [ 397.232802][T18846] bpf_map_new_fd+0x5f/0x70 [ 397.237299][T18846] map_create+0xc21/0x2090 [ 397.241714][T18846] __se_sys_bpf+0x203/0x680 [ 397.246212][T18846] ? __x64_sys_bpf+0x90/0x90 [ 397.250809][T18846] ? debug_smp_processor_id+0x17/0x20 [ 397.256180][T18846] __x64_sys_bpf+0x7b/0x90 [ 397.260590][T18846] do_syscall_64+0x31/0x40 [ 397.265008][T18846] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 397.270895][T18846] RIP: 0033:0x7f407c02fec9 [ 397.275309][T18846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 397.294913][T18846] RSP: 002b:00007f407aa98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 397.303324][T18846] RAX: ffffffffffffffda RBX: 00007f407c286fa0 RCX: 00007f407c02fec9 [ 397.311290][T18846] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 397.319259][T18846] RBP: 00007f407aa98090 R08: 0000000000000000 R09: 0000000000000000 [ 397.327230][T18846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.335201][T18846] R13: 00007f407c287038 R14: 00007f407c286fa0 R15: 00007ffe4fd53d88 [ 397.345191][T18852] device sit0 left promiscuous mode [ 398.330173][T18899] FAULT_INJECTION: forcing a failure. [ 398.330173][T18899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.346869][T18899] CPU: 0 PID: 18899 Comm: syz.4.5262 Tainted: G W syzkaller #0 [ 398.355758][T18899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 398.365904][T18899] Call Trace: [ 398.369489][T18899] __dump_stack+0x21/0x24 [ 398.373834][T18899] dump_stack_lvl+0x169/0x1d8 [ 398.378518][T18899] ? thaw_kernel_threads+0x220/0x220 [ 398.383811][T18899] ? vsnprintf+0x1871/0x1960 [ 398.388403][T18899] ? show_regs_print_info+0x18/0x18 [ 398.393607][T18899] dump_stack+0x15/0x1c [ 398.397766][T18899] should_fail+0x3c1/0x510 [ 398.402183][T18899] should_fail_usercopy+0x1a/0x20 [ 398.407215][T18899] _copy_to_user+0x20/0x90 [ 398.411623][T18899] simple_read_from_buffer+0xe9/0x160 [ 398.416979][T18899] proc_fail_nth_read+0x19a/0x210 [ 398.421995][T18899] ? proc_fault_inject_write+0x2f0/0x2f0 [ 398.427623][T18899] ? rw_verify_area+0x1c0/0x360 [ 398.432475][T18899] ? proc_fault_inject_write+0x2f0/0x2f0 [ 398.438104][T18899] vfs_read+0x1fe/0xa10 [ 398.442259][T18899] ? kernel_read+0x70/0x70 [ 398.446672][T18899] ? anon_inode_getfd+0x31/0x40 [ 398.451611][T18899] ? __kasan_check_write+0x14/0x20 [ 398.456719][T18899] ? mutex_lock+0x8c/0xe0 [ 398.461045][T18899] ? mutex_trylock+0xa0/0xa0 [ 398.465632][T18899] ? __fget_files+0x2c4/0x320 [ 398.470310][T18899] ? __fdget_pos+0x2d2/0x380 [ 398.474895][T18899] ? ksys_read+0x71/0x240 [ 398.479223][T18899] ksys_read+0x140/0x240 [ 398.483828][T18899] ? vfs_write+0xd60/0xd60 [ 398.488264][T18899] ? debug_smp_processor_id+0x17/0x20 [ 398.493641][T18899] __x64_sys_read+0x7b/0x90 [ 398.498147][T18899] do_syscall_64+0x31/0x40 [ 398.502567][T18899] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 398.508462][T18899] RIP: 0033:0x7f4ef7f878dc [ 398.512889][T18899] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 398.532498][T18899] RSP: 002b:00007f4ef69f1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 398.540911][T18899] RAX: ffffffffffffffda RBX: 00007f4ef81dffa0 RCX: 00007f4ef7f878dc [ 398.548901][T18899] RDX: 000000000000000f RSI: 00007f4ef69f10a0 RDI: 0000000000000006 [ 398.556880][T18899] RBP: 00007f4ef69f1090 R08: 0000000000000000 R09: 0000000000000000 [ 398.564863][T18899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.572839][T18899] R13: 00007f4ef81e0038 R14: 00007f4ef81dffa0 R15: 00007ffcf18cb0a8 [ 398.703384][T18909] device pim6reg1 entered promiscuous mode [ 398.806661][T18921] syz.1.5265[18921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.806719][T18921] syz.1.5265[18921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.721977][T18961] device pim6reg1 entered promiscuous mode [ 403.810644][T18980] syz.1.5283[18980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.810716][T18980] syz.1.5283[18980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.234682][T19001] device veth0_vlan left promiscuous mode [ 404.306854][T19001] device veth0_vlan entered promiscuous mode [ 404.314310][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.322786][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.330544][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.839592][T19054] device veth1_macvtap left promiscuous mode [ 405.664876][T19092] device wg2 left promiscuous mode [ 405.693481][T19092] syz.3.5317[19092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.695600][T19092] syz.3.5317[19092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.110954][T19175] device pim6reg1 entered promiscuous mode [ 414.625155][T19268] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.632562][T19268] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.641608][T19268] device bridge0 left promiscuous mode [ 414.682098][T19266] device veth1_macvtap entered promiscuous mode [ 414.783356][T19272] device bridge_slave_1 left promiscuous mode [ 414.807204][T19272] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.849158][T19272] device bridge_slave_0 left promiscuous mode [ 414.872266][T19272] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.957826][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 415.156928][T19284] device veth1_macvtap left promiscuous mode [ 415.204818][T19284] device veth1_macvtap entered promiscuous mode [ 415.237214][T19284] device macsec0 entered promiscuous mode [ 415.355071][T19296] device veth1_macvtap left promiscuous mode [ 415.372630][T19296] device macsec0 left promiscuous mode [ 415.407638][T19296] device veth1_macvtap entered promiscuous mode [ 415.434204][T19296] device macsec0 entered promiscuous mode [ 419.535772][T19366] device syzkaller0 entered promiscuous mode [ 420.563554][T19382] device syzkaller0 entered promiscuous mode [ 420.849279][T19385] device syzkaller0 entered promiscuous mode [ 421.018489][T19403] device veth0_vlan left promiscuous mode [ 421.033908][T19403] device veth0_vlan entered promiscuous mode [ 421.237933][T19426] device pim6reg1 entered promiscuous mode [ 421.256343][T19426] device veth1 entered promiscuous mode [ 421.359150][T19428] device wg2 entered promiscuous mode [ 421.869736][T19447] device pim6reg1 entered promiscuous mode [ 423.233080][T19507] device sit0 left promiscuous mode [ 423.302264][T19516] device sit0 entered promiscuous mode [ 423.721677][T19542] device veth1_macvtap left promiscuous mode [ 423.758357][T19543] device sit0 left promiscuous mode [ 423.963192][T19563] syz.0.5455[19563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.963252][T19563] syz.0.5455[19563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.189460][T19572] GPL: port 1(erspan0) entered blocking state [ 424.244762][T19572] GPL: port 1(erspan0) entered disabled state [ 424.279356][T19572] device erspan0 entered promiscuous mode [ 424.297344][T19577] GPL: port 1(erspan0) entered blocking state [ 424.303479][T19577] GPL: port 1(erspan0) entered forwarding state [ 424.615488][T19590] device syzkaller0 entered promiscuous mode [ 425.711067][T19695] syz.2.5481[19695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.711129][T19695] syz.2.5481[19695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.729315][T19696] syz.2.5481[19696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.909718][T19707] syz.3.5485[19707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.966662][T19707] syz.3.5485[19707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.163305][T19707] device veth0_vlan left promiscuous mode [ 426.246074][T19707] device veth0_vlan entered promiscuous mode [ 426.283724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.298085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.337509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 427.231753][T19761] FAULT_INJECTION: forcing a failure. [ 427.231753][T19761] name failslab, interval 1, probability 0, space 0, times 0 [ 427.327170][T19761] CPU: 1 PID: 19761 Comm: syz.0.5504 Tainted: G W syzkaller #0 [ 427.336147][T19761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 427.346205][T19761] Call Trace: [ 427.349510][T19761] __dump_stack+0x21/0x24 [ 427.353845][T19761] dump_stack_lvl+0x169/0x1d8 [ 427.358520][T19761] ? thaw_kernel_threads+0x220/0x220 [ 427.363978][T19761] ? show_regs_print_info+0x18/0x18 [ 427.369174][T19761] dump_stack+0x15/0x1c [ 427.373327][T19761] should_fail+0x3c1/0x510 [ 427.377741][T19761] ? selinux_bpf_map_alloc+0x51/0x140 [ 427.383120][T19761] __should_failslab+0xa4/0xe0 [ 427.387882][T19761] should_failslab+0x9/0x20 [ 427.392401][T19761] kmem_cache_alloc_trace+0x3a/0x2e0 [ 427.397684][T19761] selinux_bpf_map_alloc+0x51/0x140 [ 427.402875][T19761] security_bpf_map_alloc+0x62/0x90 [ 427.408061][T19761] map_create+0xb5f/0x2090 [ 427.412501][T19761] __se_sys_bpf+0x203/0x680 [ 427.417083][T19761] ? __x64_sys_bpf+0x90/0x90 [ 427.422022][T19761] ? debug_smp_processor_id+0x17/0x20 [ 427.427471][T19761] __x64_sys_bpf+0x7b/0x90 [ 427.431885][T19761] do_syscall_64+0x31/0x40 [ 427.436292][T19761] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 427.442172][T19761] RIP: 0033:0x7f90d56f8ec9 [ 427.446581][T19761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.466180][T19761] RSP: 002b:00007f90d4161038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 427.474585][T19761] RAX: ffffffffffffffda RBX: 00007f90d594ffa0 RCX: 00007f90d56f8ec9 [ 427.482544][T19761] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 427.490523][T19761] RBP: 00007f90d4161090 R08: 0000000000000000 R09: 0000000000000000 [ 427.498508][T19761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.506481][T19761] R13: 00007f90d5950038 R14: 00007f90d594ffa0 R15: 00007fffcfbd8258 [ 428.632752][T19820] FAULT_INJECTION: forcing a failure. [ 428.632752][T19820] name failslab, interval 1, probability 0, space 0, times 0 [ 428.648240][T19820] CPU: 0 PID: 19820 Comm: syz.1.5523 Tainted: G W syzkaller #0 [ 428.657108][T19820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 428.667172][T19820] Call Trace: [ 428.670608][T19820] __dump_stack+0x21/0x24 [ 428.674954][T19820] dump_stack_lvl+0x169/0x1d8 [ 428.679639][T19820] ? show_regs_print_info+0x18/0x18 [ 428.684846][T19820] dump_stack+0x15/0x1c [ 428.689095][T19820] should_fail+0x3c1/0x510 [ 428.693528][T19820] ? __d_alloc+0x2d/0x6a0 [ 428.697860][T19820] __should_failslab+0xa4/0xe0 [ 428.702653][T19820] should_failslab+0x9/0x20 [ 428.707161][T19820] kmem_cache_alloc+0x3d/0x2e0 [ 428.711930][T19820] ? __kasan_kmalloc+0xda/0x110 [ 428.716796][T19820] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 428.722344][T19820] __d_alloc+0x2d/0x6a0 [ 428.726511][T19820] ? _raw_spin_trylock_bh+0x130/0x130 [ 428.731935][T19820] d_alloc_pseudo+0x1d/0x70 [ 428.736447][T19820] alloc_file_pseudo+0xc8/0x1f0 [ 428.741316][T19820] ? alloc_empty_file_noaccount+0x80/0x80 [ 428.747041][T19820] __anon_inode_getfd+0x248/0x3b0 [ 428.752254][T19820] ? anon_inode_getfd+0x40/0x40 [ 428.757129][T19820] ? __kasan_check_write+0x14/0x20 [ 428.762348][T19820] ? selinux_bpf_map+0xd2/0x110 [ 428.767399][T19820] anon_inode_getfd+0x31/0x40 [ 428.772087][T19820] bpf_map_new_fd+0x5f/0x70 [ 428.776599][T19820] map_create+0xc21/0x2090 [ 428.781021][T19820] __se_sys_bpf+0x203/0x680 [ 428.785528][T19820] ? __x64_sys_bpf+0x90/0x90 [ 428.790139][T19820] ? debug_smp_processor_id+0x17/0x20 [ 428.795513][T19820] __x64_sys_bpf+0x7b/0x90 [ 428.799937][T19820] do_syscall_64+0x31/0x40 [ 428.804615][T19820] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 428.810515][T19820] RIP: 0033:0x7f407c02fec9 [ 428.814945][T19820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 428.834565][T19820] RSP: 002b:00007f407aa98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 428.842991][T19820] RAX: ffffffffffffffda RBX: 00007f407c286fa0 RCX: 00007f407c02fec9 [ 428.850976][T19820] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 428.858950][T19820] RBP: 00007f407aa98090 R08: 0000000000000000 R09: 0000000000000000 [ 428.866929][T19820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.874910][T19820] R13: 00007f407c287038 R14: 00007f407c286fa0 R15: 00007ffe4fd53d88 [ 430.512013][T19925] FAULT_INJECTION: forcing a failure. [ 430.512013][T19925] name failslab, interval 1, probability 0, space 0, times 0 [ 430.584141][T19925] CPU: 1 PID: 19925 Comm: syz.2.5548 Tainted: G W syzkaller #0 [ 430.593026][T19925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 430.603085][T19925] Call Trace: [ 430.606380][T19925] __dump_stack+0x21/0x24 [ 430.610717][T19925] dump_stack_lvl+0x169/0x1d8 [ 430.615387][T19925] ? thaw_kernel_threads+0x220/0x220 [ 430.620667][T19925] ? show_regs_print_info+0x18/0x18 [ 430.625860][T19925] dump_stack+0x15/0x1c [ 430.630006][T19925] should_fail+0x3c1/0x510 [ 430.634414][T19925] ? security_file_alloc+0x33/0x120 [ 430.639608][T19925] __should_failslab+0xa4/0xe0 [ 430.644408][T19925] should_failslab+0x9/0x20 [ 430.648900][T19925] kmem_cache_alloc+0x3d/0x2e0 [ 430.653752][T19925] ? __alloc_file+0x28/0x320 [ 430.658475][T19925] security_file_alloc+0x33/0x120 [ 430.663495][T19925] __alloc_file+0xb5/0x320 [ 430.667945][T19925] alloc_empty_file+0x97/0x180 [ 430.672732][T19925] alloc_file+0x59/0x540 [ 430.677003][T19925] alloc_file_pseudo+0x17a/0x1f0 [ 430.681942][T19925] ? alloc_empty_file_noaccount+0x80/0x80 [ 430.687931][T19925] __anon_inode_getfd+0x248/0x3b0 [ 430.693033][T19925] ? anon_inode_getfd+0x40/0x40 [ 430.697880][T19925] ? __kasan_check_write+0x14/0x20 [ 430.703065][T19925] ? selinux_bpf_map+0xd2/0x110 [ 430.708079][T19925] anon_inode_getfd+0x31/0x40 [ 430.712760][T19925] bpf_map_new_fd+0x5f/0x70 [ 430.717340][T19925] map_create+0xc21/0x2090 [ 430.721746][T19925] __se_sys_bpf+0x203/0x680 [ 430.726234][T19925] ? __x64_sys_bpf+0x90/0x90 [ 430.730900][T19925] ? bpf_trace_run2+0xb8/0x200 [ 430.735749][T19925] ? debug_smp_processor_id+0x17/0x20 [ 430.741220][T19925] __x64_sys_bpf+0x7b/0x90 [ 430.745634][T19925] do_syscall_64+0x31/0x40 [ 430.750083][T19925] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 430.756556][T19925] RIP: 0033:0x7f20641c6ec9 [ 430.761106][T19925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 430.780891][T19925] RSP: 002b:00007f2062c2f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.789312][T19925] RAX: ffffffffffffffda RBX: 00007f206441dfa0 RCX: 00007f20641c6ec9 [ 430.797298][T19925] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 430.805264][T19925] RBP: 00007f2062c2f090 R08: 0000000000000000 R09: 0000000000000000 [ 430.813402][T19925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.821478][T19925] R13: 00007f206441e038 R14: 00007f206441dfa0 R15: 00007ffff4185b48 [ 430.849070][T19939] device veth1_macvtap left promiscuous mode [ 431.772611][T20002] FAULT_INJECTION: forcing a failure. [ 431.772611][T20002] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.796037][T20002] CPU: 1 PID: 20002 Comm: syz.3.5569 Tainted: G W syzkaller #0 [ 431.805051][T20002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 431.815130][T20002] Call Trace: [ 431.818440][T20002] __dump_stack+0x21/0x24 [ 431.822939][T20002] dump_stack_lvl+0x169/0x1d8 [ 431.827740][T20002] ? thaw_kernel_threads+0x220/0x220 [ 431.833028][T20002] ? vsnprintf+0x1871/0x1960 [ 431.837630][T20002] ? show_regs_print_info+0x18/0x18 [ 431.842833][T20002] dump_stack+0x15/0x1c [ 431.847012][T20002] should_fail+0x3c1/0x510 [ 431.851439][T20002] should_fail_usercopy+0x1a/0x20 [ 431.856456][T20002] _copy_to_user+0x20/0x90 [ 431.860957][T20002] simple_read_from_buffer+0xe9/0x160 [ 431.866415][T20002] proc_fail_nth_read+0x19a/0x210 [ 431.871628][T20002] ? proc_fault_inject_write+0x2f0/0x2f0 [ 431.877263][T20002] ? rw_verify_area+0x1c0/0x360 [ 431.882112][T20002] ? proc_fault_inject_write+0x2f0/0x2f0 [ 431.887736][T20002] vfs_read+0x1fe/0xa10 [ 431.891927][T20002] ? kernel_read+0x70/0x70 [ 431.896350][T20002] ? anon_inode_getfd+0x31/0x40 [ 431.901199][T20002] ? __kasan_check_write+0x14/0x20 [ 431.906298][T20002] ? mutex_lock+0x8c/0xe0 [ 431.910621][T20002] ? mutex_trylock+0xa0/0xa0 [ 431.915205][T20002] ? __fget_files+0x2c4/0x320 [ 431.919873][T20002] ? __fdget_pos+0x2d2/0x380 [ 431.924448][T20002] ? ksys_read+0x71/0x240 [ 431.929462][T20002] ksys_read+0x140/0x240 [ 431.933693][T20002] ? vfs_write+0xd60/0xd60 [ 431.938102][T20002] ? debug_smp_processor_id+0x17/0x20 [ 431.943465][T20002] __x64_sys_read+0x7b/0x90 [ 431.947958][T20002] do_syscall_64+0x31/0x40 [ 431.952390][T20002] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 431.958277][T20002] RIP: 0033:0x7fb8993158dc [ 431.962697][T20002] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 431.982782][T20002] RSP: 002b:00007fb897d7f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 431.991291][T20002] RAX: ffffffffffffffda RBX: 00007fb89956dfa0 RCX: 00007fb8993158dc [ 431.999270][T20002] RDX: 000000000000000f RSI: 00007fb897d7f0a0 RDI: 0000000000000006 [ 432.007330][T20002] RBP: 00007fb897d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 432.015297][T20002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.023263][T20002] R13: 00007fb89956e038 R14: 00007fb89956dfa0 R15: 00007ffe099c2218 [ 432.332136][T20026] device sit0 left promiscuous mode [ 432.397731][T20029] device sit0 entered promiscuous mode [ 433.053052][T20050] syz.4.5582[20050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.053138][T20050] syz.4.5582[20050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.454905][T20144] device syzkaller0 entered promiscuous mode [ 434.595676][T20148] device syzkaller0 entered promiscuous mode [ 435.152043][T20209] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.184233][T20209] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.239261][T20209] device bridge_slave_0 entered promiscuous mode [ 435.270257][T20209] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.366860][T20209] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.374812][T20209] device bridge_slave_1 entered promiscuous mode [ 435.629232][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 435.657093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.704351][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.738098][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.750220][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.757315][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.770928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 435.779540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.788106][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.795191][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.842559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 435.857236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 435.870967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 435.949859][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 435.969735][T20248] device wg2 left promiscuous mode [ 435.984339][T20209] device veth0_vlan entered promiscuous mode [ 436.004142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.032729][T20248] device wg2 entered promiscuous mode [ 436.044514][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.060569][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.107555][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.154606][T20209] device veth1_macvtap entered promiscuous mode [ 436.216070][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.266662][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 436.401373][T20279] syz.4.5650[20279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.401430][T20279] syz.4.5650[20279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.622432][T20279] device wg2 left promiscuous mode [ 436.752108][T20287] device wg2 entered promiscuous mode [ 437.096930][T20313] device pim6reg1 entered promiscuous mode [ 437.116465][T20321] device veth1_macvtap left promiscuous mode [ 437.124540][T20321] device macsec0 entered promiscuous mode [ 437.152456][T20322] device pim6reg1 entered promiscuous mode [ 437.601091][T20345] device sit0 left promiscuous mode [ 437.801859][T20349] device sit0 entered promiscuous mode [ 437.963377][T20354] device pim6reg1 entered promiscuous mode [ 438.283694][ T9] device veth1_macvtap left promiscuous mode [ 439.447274][T20405] device sit0 left promiscuous mode [ 440.882891][T20486] device pim6reg1 entered promiscuous mode [ 441.007928][T20497] device pim6reg1 entered promiscuous mode [ 443.369172][T20568] syz.2.5735[20568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.369260][T20568] syz.2.5735[20568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.375763][T20549] device syzkaller0 entered promiscuous mode [ 443.447069][T20570] device wg2 entered promiscuous mode [ 444.110944][T20593] device pim6reg1 entered promiscuous mode [ 444.638523][T20640] device veth0_vlan left promiscuous mode [ 444.653618][T20640] device veth0_vlan entered promiscuous mode [ 447.877209][T20728] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.885275][T20728] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.963952][T20728] device bridge0 left promiscuous mode [ 448.713665][T20740] device pim6reg1 entered promiscuous mode [ 449.617526][T20753] device sit0 entered promiscuous mode [ 452.937919][T20881] device sit0 left promiscuous mode [ 453.809097][T20932] device veth1_macvtap entered promiscuous mode [ 453.815439][T20932] device macsec0 entered promiscuous mode [ 453.843040][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 453.924652][T20939] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.936226][T20939] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.525654][T20990] device syzkaller0 entered promiscuous mode [ 455.754584][T20998] device syzkaller0 entered promiscuous mode [ 456.396644][T21027] device sit0 entered promiscuous mode [ 456.770737][T21026] device veth0_vlan left promiscuous mode [ 456.791024][T21026] device veth0_vlan entered promiscuous mode [ 456.868002][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.884461][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.908776][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.748178][T21119] device syzkaller0 entered promiscuous mode [ 460.139687][T21137] device syzkaller0 entered promiscuous mode [ 460.907758][T21168] device syzkaller0 entered promiscuous mode [ 461.102066][ T24] audit: type=1400 audit(1759899823.830:174): avc: denied { create } for pid=21210 comm="syz.3.5922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 461.635239][T21243] device pim6reg1 entered promiscuous mode [ 462.730423][T21319] device pim6reg1 entered promiscuous mode [ 464.557255][T21395] device pim6reg1 entered promiscuous mode [ 464.686877][T21431] device syzkaller0 entered promiscuous mode [ 466.310986][T21501] device pim6reg1 entered promiscuous mode [ 467.869491][T21559] device syzkaller0 entered promiscuous mode [ 468.092377][T21583] device wg2 left promiscuous mode [ 468.131314][T21581] device pim6reg1 entered promiscuous mode [ 468.157437][T21583] device wg2 entered promiscuous mode [ 469.569082][T21646] device wg2 left promiscuous mode [ 469.642671][T21646] device wg2 entered promiscuous mode [ 469.799014][T21656] device veth0_to_team entered promiscuous mode [ 470.078798][T21676] device pim6reg1 entered promiscuous mode [ 470.629789][T21725] device pim6reg1 entered promiscuous mode [ 470.839389][T21735] device pim6reg1 entered promiscuous mode [ 471.499153][T21756] device pim6reg1 entered promiscuous mode [ 471.823315][T21789] device wg2 left promiscuous mode [ 471.879501][T21789] device wg2 entered promiscuous mode [ 472.113409][T21798] device sit0 left promiscuous mode [ 472.147514][T21798] device sit0 entered promiscuous mode [ 472.422712][T21812] device pim6reg1 entered promiscuous mode [ 473.875886][T21863] device syzkaller0 entered promiscuous mode [ 474.255982][T21873] device syzkaller0 entered promiscuous mode [ 474.272280][T21875] device sit0 left promiscuous mode [ 474.502348][T21875] device sit0 entered promiscuous mode [ 474.959511][T21907] device pim6reg1 entered promiscuous mode [ 475.370730][T21933] syz.1.6132[21933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.372201][T21933] syz.1.6132[21933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.644829][T21949] device veth0_vlan left promiscuous mode [ 475.746954][T21949] device veth0_vlan entered promiscuous mode [ 475.831619][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.854584][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.888139][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 475.933730][T21955] device pim6reg1 entered promiscuous mode [ 475.945214][T21960] ÿ: renamed from team_slave_1 [ 476.800795][T22015] device pim6reg1 entered promiscuous mode [ 477.178155][T22032] device veth0_vlan left promiscuous mode [ 477.210824][T22032] device veth0_vlan entered promiscuous mode [ 478.131014][T22051] device sit0 left promiscuous mode [ 478.253872][T22058] device pim6reg1 entered promiscuous mode [ 478.303213][T22072] device sit0 left promiscuous mode [ 478.661927][T22086] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.670404][T22086] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.678109][T22086] device bridge_slave_0 entered promiscuous mode [ 478.684771][T22101] device vlan0 entered promiscuous mode [ 478.690801][T22086] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.698039][T22086] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.706181][T22086] device bridge_slave_1 entered promiscuous mode [ 478.768609][T22086] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.775700][T22086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.782992][T22086] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.790156][T22086] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.823891][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 478.831797][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.839672][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.862551][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 478.871242][ T791] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.878313][ T791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.903585][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 478.912490][ T791] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.919565][ T791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.929293][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 478.937413][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 478.953631][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 478.968517][T22086] device veth0_vlan entered promiscuous mode [ 478.974952][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.984155][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.992506][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 479.009958][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 479.022034][T22086] device veth1_macvtap entered promiscuous mode [ 479.033501][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 479.049980][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 479.158279][T22113] syz.2.6182[22113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.158336][T22113] syz.2.6182[22113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.898689][T22151] device veth1 left promiscuous mode [ 480.018150][T22155] device pim6reg1 entered promiscuous mode [ 480.504480][T22190] device veth1_macvtap left promiscuous mode [ 480.535186][T22190] device macsec0 entered promiscuous mode [ 481.124683][T22205] device pim6reg1 entered promiscuous mode [ 481.156620][T22205] device veth1_macvtap left promiscuous mode [ 481.734121][T22241] ±ÿ: renamed from team_slave_1 [ 482.476527][T22286] device syzkaller0 entered promiscuous mode [ 482.587056][T22292] device macsec0 left promiscuous mode [ 482.616318][T22292] device veth1_macvtap entered promiscuous mode [ 482.640228][T22292] device macsec0 entered promiscuous mode [ 482.661725][ T791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.023421][T22343] syz.4.6250[22343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.023514][T22343] syz.4.6250[22343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.083924][T22348] syz.1.6252[22348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.145086][T22348] syz.1.6252[22348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.267013][T22348] device veth0_vlan left promiscuous mode [ 484.292829][T22348] device veth0_vlan entered promiscuous mode [ 484.412936][T22377] device syzkaller0 entered promiscuous mode [ 484.752206][T22390] device veth1_macvtap left promiscuous mode [ 484.768593][T22390] device macsec0 left promiscuous mode [ 484.984945][T22421] device veth0_vlan left promiscuous mode [ 484.991222][T22421] device veth0_vlan entered promiscuous mode [ 485.013014][T22422] device syzkaller0 entered promiscuous mode [ 485.019676][T22411] device syzkaller0 entered promiscuous mode [ 485.025848][T22411] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 485.049957][T22411] device bridge0 entered promiscuous mode [ 485.273729][T22430] device syzkaller0 entered promiscuous mode [ 485.393263][T22455] device pim6reg1 entered promiscuous mode [ 485.763538][T22472] device pim6reg1 entered promiscuous mode [ 485.802503][T22481] device veth0_to_bridge entered promiscuous mode [ 487.791361][T22563] device syzkaller0 entered promiscuous mode [ 488.312130][T22583] device wg2 left promiscuous mode [ 489.012220][T22607] device syzkaller0 entered promiscuous mode [ 489.892674][T22662] syz.0.6350[22662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.892724][T22662] syz.0.6350[22662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.988919][T22662] device syzkaller0 entered promiscuous mode [ 492.171657][T22810] device veth1_macvtap entered promiscuous mode [ 492.181128][T22810] device macsec0 entered promiscuous mode [ 492.214282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 493.172422][T22871] device wg2 left promiscuous mode [ 493.352669][T22873] device pim6reg1 entered promiscuous mode [ 495.032195][T22952] device pim6reg1 entered promiscuous mode [ 495.327517][T22980] device sit0 entered promiscuous mode Connection to 10.128.0.241 closed by remote host. [ 498.278403][ T791] GPL: port 1(erspan0) entered disabled state [ 498.286282][ T791] device erspan0 left promiscuous mode [ 498.291959][ T791] GPL: port 1(erspan0) entered disabled state [ 498.598113][ T791] device bridge_slave_1 left promiscuous mode [ 498.604238][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.611679][ T791] device bridge_slave_0 left promiscuous mode [ 498.617800][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.625452][ T791] device bridge_slave_1 left promiscuous mode [ 498.631622][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.638979][ T791] device bridge_slave_0 left promiscuous mode [ 498.645062][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.652886][ T791] device bridge_slave_1 left promiscuous mode [ 498.659143][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.666488][ T791] device bridge_slave_0 left promiscuous mode [ 498.672705][ T791] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.680711][ T791] device veth1_macvtap left promiscuous mode [ 498.686862][ T791] device veth0_vlan left promiscuous mode [ 498.692916][ T791] device veth1_macvtap left promiscuous mode [ 501.597434][ T791] device bridge_slave_1 left promiscuous mode [ 501.603694][ T791] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.611228][ T791] device bridge_slave_0 left promiscuous mode [ 501.617413][ T791] bridge0: port 1(bridge_slave_0) entered disabled state