last executing test programs: 34.553414528s ago: executing program 0 (id=1348): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x45, 0x83, 0x0, 0x2}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000580)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r2, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 28.178079047s ago: executing program 0 (id=1348): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x45, 0x83, 0x0, 0x2}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000580)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r2, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 22.228356572s ago: executing program 0 (id=1348): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x45, 0x83, 0x0, 0x2}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000580)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r2, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 15.111007959s ago: executing program 0 (id=1348): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x45, 0x83, 0x0, 0x2}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000580)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r2, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 7.915110841s ago: executing program 0 (id=1348): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x45, 0x83, 0x0, 0x2}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000580)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r2, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.767201509s ago: executing program 1 (id=1744): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (fail_nth: 2) 5.519933508s ago: executing program 4 (id=1749): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x73, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 5.232376451s ago: executing program 1 (id=1750): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 4.875266219s ago: executing program 3 (id=1751): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfffffe51) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r2}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)=0xc2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000080)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9f, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000003c0), 0x8, 0x34, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="000000000000000300080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0xe9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r0, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0], 0x0, 0xc2, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000b40), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000dc0)={0x6, 0xf, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x61ce}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000740)='syzkaller\x00', 0x7fffffff, 0x9b, &(0x7f0000000940)=""/155, 0x41000, 0x4, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000d00)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000d40)={0x5, 0x10, 0x5, 0x29e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r2], 0x0, 0x10, 0xe2}, 0x94) r8 = perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x5, 0x1, 0x2, 0x7, 0x0, 0xff, 0x6600, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x400}, 0x4100, 0x1, 0x1, 0x8, 0x3, 0xa, 0x9, 0x0, 0x6, 0x0, 0xfff}, 0x0, 0xb, r2, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000500)='GPL\x00') perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x3f) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0x9}]}}, 0x0, 0x26}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.724164821s ago: executing program 4 (id=1752): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@tail_call={{}, {}, {0x85, 0x0, 0x0, 0x1b}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x16, 0x8, &(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='neigh_create\x00', r4}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYBLOB], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f40)='neigh_create\x00', r6}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) 4.666525805s ago: executing program 4 (id=1753): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000b80)={0x2, 0x80, 0x6, 0x0, 0x2, 0x40, 0x0, 0xe, 0x8, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x800, 0x5485, 0x10000, 0x9, 0x1000, 0x5, 0xd40, 0x0, 0x4, 0x0, 0x887a}, 0xffffffffffffffff, 0x45, r4, 0x9) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) socketpair(0x21, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x56, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff886411004048633321fbac14142ce934a0a662079f4b4d2f87e56dca6aab845013f208001a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfb, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000001c40)="beb61ec2ca90080239f2a54e2368fa761313c3a024a98109ba1e2e7b780d03c54b7a83d56fce397842e724674507d531762055fca371ea775f418df7bee236c9b9968146efb3232ae3413b617445e98bb644a892b9337f1a9135d9f30457a8ffb21aef4a95a155fab70a40b086056b0f63331a66b3457c", 0x2}, 0x2c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) sendmsg$unix(r2, &(0x7f0000000380)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)="0d30c674880dbf22568ed3c7bbf9fa892b4a0d0ee1d66692ca535711021c8a8e5d7b30e4614a15c9847dc6ee1f43097bbcb42819d3a86a7abe8c0a08bc43346f6cb060d560ecaf29b07b105121cbb3e62085055b2da1983dfb53819c", 0x5c}, {&(0x7f0000000e40)="941f6651a700dd684dc24a831967643a724e8d2490af2fae6cb0b95c0adbe4ae1b9b5fa4b0eb854701c176c486b8cedfdc539334f52da2ca2a32b032cdd67c7928a514e55eb05579fbc64f81d2150170ec997ff6e625940f961fcad31b492883607fc64333c3e3da22a2fde6f9a1ac2b991c3c511727b98a36c7fa362efd318d39a54e09ea3f375e2a9e3c69f1165ee4fc678d70a38bba140721451fb1e4ca689c3b27753867180c501c7de3d5508f52d7d7df45b56b712484bb95b0dfd28bb1ae6f127b155ae08751b5579e31c2ea116aea148ffcb5edc56764a8d04094ef3c8db5d718fb5207839c42e5979a97093dd0f73743f6f2caa500307b", 0xfb}, {&(0x7f0000000f40)="6e745ccd4200fa073ba88f8fe3ed59210968cb4d32e9871eb7e9e05c6dcea9d9cfd1c924aa8d204edf8c402f742ef572f2848b7c8bcf124dd88563c73738ff49aad78db223d3a272b1095e699ac48dd3c871a41c6dae216883aa91b7acbba9fc83bd3ba7fab73e4c2a8ad63d96e9bf872cd9759971a5764190e9fa277fbd25e1185dfca8fb8a957f022d3cf3b0e38c9f2962354ebfb897db82636dc310c116523ece9e5137b744b8ac3c993d8c29cb18e105c28706e4cf136226f2082bb56be8025c49ccf3647354d3d9e1", 0xcb}, {&(0x7f0000001040)="881283a8d7f04d0c76cfbb54af5ded25c18278d9dea288f2a6ed57989bd13d07fa83641fc93553672ed0fb3a588a0c834d9c8c654b01beaccc03b1ecfb8e0443aaebc5f79fa7da50e2d06ecd72e3e6f4f076ac98c6477d174bd134806e5d235cedede34b8e7d4dc460c9b95a4acd397dea38a762f13bdd6130fefc0135ded88959cbfc91f812b77f01440aef04b2ea37173fcf5d910a6d14affed1d06cdb3ac5220d37f50cc8cb8a666efb963a9099a1c5a4354775d43e2290fb8991aa70ec0676f4c0f5b090dcf1b7374a2d5fec257eb90818510849341e68ed547d29bc45e2d717c2", 0xe3}], 0x4, &(0x7f0000000300)=[@rights={{0x38, 0x1, 0x1, [r5, r1, r3, r8, r2, r1, r9, r7, r4, r10]}}], 0x38, 0x8800}, 0xc021) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="05000000010000008a000000c9e7000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000008afbccc9a20a2f9002e9547312851c4fe536c919c9ebb4902433c17baa23da9876e644865e11a9da0f3f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r11, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}], 0x60}, 0x100) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) perf_event_open(&(0x7f0000000d40)={0x0, 0x80, 0xe6, 0x4, 0x41, 0x8, 0x0, 0x7, 0x6019, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0x9, 0x9}, 0x119200, 0x1000, 0x1, 0x1, 0x8, 0x8b57, 0x8, 0x0, 0x8d9, 0x0, 0xc}, 0x0, 0x9, r0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000000d0000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000be000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9d5788029901e5a79d8b9990ace8f74087f25ad50c46088000000008000"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r13, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.35928672s ago: executing program 1 (id=1754): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180)="160a8bdc13ff43357fa0dc5c5d0eaa2d1497b4e86290cda2d3a67ce26c07631283c44936349216749befb1bfaf7699c11d4e42707b791349c10f80e638", &(0x7f0000000040)=""/50}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_clone(0x500, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000680)="a38c6d67e880d536b0cd6480c6c04888660257104c0a84f867f52f1bf63d96dd2cc1ec0c76c974b283fdd8b0a835c94e942454f01607fde1df07a8a0ee6c2ab6e9443b979dca9bb606c738d18035eb51bfd276df128218484d02b2b14f4133a46db472c2bf10748d4a7368a1de") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x37a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x500}, 0x10105d, 0x3, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c0000000000402}, 0x0, 0x1, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ff0f00000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007f2c6ed3464a3d0d4da010000f8ffffffb702000008000000b7030000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000000110000", @ANYRES32=r5, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) write$cgroup_subtree(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7fffffff, 0xbffffffffffffffa}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e000400ffff7ffe1ae6baf45dc1258a283df92a", @ANYRES32, @ANYBLOB=':\x00'/20, @ANYBLOB="6bea2a3191f3d6cfd3bf644cf3fae5bce37ed787ac1351b672d1abf43371", @ANYRES32=r3, @ANYBLOB="0400000003000000010000000f00"/24, @ANYRES32, @ANYRESOCT=0x0], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff7ffffc}, 0x94) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 4.028369465s ago: executing program 1 (id=1756): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r5}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r6}, 0x38) 4.018744356s ago: executing program 2 (id=1757): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x1, 0x80c4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x2, 0x8}, 0x11c11, 0x1000, 0x20, 0x6, 0x6, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x8901, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="040000000400000004000000000001", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x009\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffff"], 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)='!', 0x1}], 0x1}, 0x0) ioctl$TUNGETVNETLE(r0, 0x4008744b, &(0x7f0000000180)) 3.793917253s ago: executing program 2 (id=1758): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000005000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001db7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 3.70663976s ago: executing program 1 (id=1759): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_macvtap\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r6, 0x0, 0x0}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.667983523s ago: executing program 2 (id=1760): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x5}, 0x8823, 0x0, 0x0, 0x0, 0x1, 0x9}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x40, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r6, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) 3.130373975s ago: executing program 1 (id=1761): syz_clone(0x1806000, &(0x7f0000000200)="dd3097badb90026dc453733cee080e6df6ddb96fee3e33dddc6c3907bdb3c818dc86df94484aa1f47d28fe13c965b7107c83142c881c6807fd01872bbc3c5e8ed11c7daababe2ab3555931c08b7c0006da066bf1165715ca83d32f2bacb2df12ebaab14ce91fb037e8eb13cf09", 0x6d, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="28e9e89e91e1f9703dec4e3b59969116d41fdbe81bba76221c4c38527cd7306fd4143dfde34107e05640b0386be0c8cbdbe497afbba0032502ca41d120778b9b6f8b6f9975af3a46f09aa21ca66c3d586c455093408722d37de6a5474fa768d69d635abdf4169d43a5baa4357394a14aff9986582bfcc7bf919cb3f9513614b9162109f109a2e02da0c6fb188ac5ec8b1c5442861206eb789470219b7365") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xb, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x9}, 0x8080, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r2}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x3, 0x5f5c, 0x4400, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0xd}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r0, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0], 0x0, 0x70, &(0x7f0000000900)=[{}], 0x8, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x67, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000001380)=ANY=[@ANYBLOB="9feb010018000000000000004800000048000000070000001000000002000085070000000000000005000000030000000500000005000000100000000d000000000000090000000005000000000000120400000001000000000000080000000000612e00302e006e7536c261378b1f18332a0523c9da91e7f70c5faa6f383593bcf99bcc22f6ca1ce20c217387007e75247606dcb1291293d2ba79f7a8bb5374fe4ab8492b7f09eeafa835d50913804786e8c1af6cd581a7c7599cb4eafe1fc8cdf395a13c740b1c93713828"], &(0x7f0000000c80)=""/193, 0x67, 0xc1, 0x0, 0x3ff}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x6, 0x19, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ldst={0x0, 0x2, 0x3, 0x9, 0x3, 0x50}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}]}, &(0x7f0000000540)='syzkaller\x00', 0xfffffffe, 0xf5, &(0x7f0000000780)=""/245, 0x41100, 0x2, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000dc0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000e00)=[{0x3, 0x1, 0x5, 0x8}, {0x1, 0x4, 0xd, 0xc}, {0x0, 0x2, 0x8, 0x9}, {0x1, 0x2, 0xf, 0x5}, {0x5, 0x5, 0x7, 0x6}], 0x10, 0x10001}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001280)={0xffffffffffffffff, 0xc, 0x8}, 0xc) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001340)={&(0x7f0000000f80)="dd6bfadb3d1e1e9f04cad85749f9e5671c17b810a622d5215deda3874f0337d52c7c2e949d2d91e1bde234d0fbe46dd2696ebb89264bbcde3ca77a4f388a520d9d2c047c6756e45c6b", &(0x7f0000001080)=""/250, &(0x7f0000001000)="2dd828ad5736136aff8b1e589132858376078e82e1291e4b268aee", &(0x7f0000001200)="05f610a1a3d94ce967e7fa9e2a482e6fc0d708478460e0b8d1f8bffac29c0244586cf312dce5868fa0bef93ab569e76d4ff57b4095615508f87c821e5fbe14c815271ce691f8dbb88cf3f0bf3392b61ee86b", 0xe, r8, 0x4}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x7ee, 0x0, &(0x7f0000000e80)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="9500add3ffdc1ed8edb3070000"], 0x0, 0x2, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x24, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001040)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000a40), 0x0, 0x10, 0x2}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@base={0x1, 0x5, 0x5, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) 2.782240962s ago: executing program 3 (id=1762): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 2.313598669s ago: executing program 2 (id=1763): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 1.610344614s ago: executing program 3 (id=1764): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x73, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 1.318925187s ago: executing program 2 (id=1765): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 1.167830839s ago: executing program 4 (id=1766): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) 631.86709ms ago: executing program 3 (id=1767): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r2}, 0x38) 292.784947ms ago: executing program 3 (id=1768): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000005000400000000000100002020702500000000002004000000f8ff00000000bfa100000000000007010000f8ffffffb602000008000000b7030000870000008500002006000000850000149e000000950000000000000037f92088843ac2257005bb0adaf366f11bbcb91313"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x5, 0x9, 0x10, 0x1, 0x0, 0x1, 0x8009, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff5, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x1000, 0x0, 0x7fffffff, 0x9, 0x2, 0x7, 0x1ff, 0x0, 0x8, 0x0, 0x7}, 0x0, 0x8, r2, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='bcache_journal_write\x00', r5, 0x0, 0xfffffffffffffcf7}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000019, &(0x7f0000000100)="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", 0x0, 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000600)="d792921e20846169c93a4961aab71a4ca64508000000000000009c6fa22027bf810c17f9007786e52553b344b310c9ba7b1d83"}, 0x2c) 291.969727ms ago: executing program 2 (id=1769): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r5}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r6}, 0x38) 237.693091ms ago: executing program 4 (id=1770): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000005000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001db7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 188.046725ms ago: executing program 3 (id=1771): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r0, 0x0, 0x0}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x94) recvmsg(0xffffffffffffffff, 0x0, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0}, 0x0, 0x401, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000400000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x4) 187.127936ms ago: executing program 4 (id=1772): syz_clone(0x88080, &(0x7f0000000000)="12c26847cef2f0d7e9f734b3e560ecb4b1dc3b2ccec34a2c265ccfd37cd5d2b5a3204ae4fde78d3f4dde6803a0ce4699d58a112362456f258110c3e1d5ad60048042677b0da21108ac4b12e9675d4f16bef28c90747dea6e0c0f52a846d18d8145aa85ae9a9991a67a4e44fc27637e310dad066652ae1b20b3028c4b0784cccc1cd899ef75ce11ffab8392fe258ad8e7117dd5d080e9eb2b6ef458a08126646a0ed15c1df7", 0xa5, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000004c0)="d4ccd11e536783ff3d2ccddd2409f02c654420890ddeb6af2a8a46455a1e2c90f1e3c815d4b1b056749e12d7654b8a4f252194d19f1e29de56859aff1561c33221c8cffdf850f119fbe1993af138efc48239d6ba6467e003348cb1f9e0efbe131f0821df94a9110408fe90965cba656016073826ffd4e7a68389f6f2ad8edc00e6d9b77f7c586eeef919c9a309f151f8069928c1935410562b12087cbce0a4e2ddf371c194c7d07f513b36fcbda3efb252ecbe520aaa93b1e50e8f4381cde06682b2448dac1a545d0d7900d337ee86b8b468f69c") (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000"], 0x48) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1b, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x5c}, [@ldst={0x5, 0x3, 0x0, 0xa}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000380)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) (rerun: 64) 0s ago: executing program 0 (id=1348): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x45, 0x83, 0x0, 0x2}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000580)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r2, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): __cfi_ksys_write+0x10/0x10 [ 194.740578][ T3522] ? debug_smp_processor_id+0x17/0x20 [ 194.745950][ T3522] __x64_sys_bpf+0x7c/0x90 [ 194.750368][ T3522] x64_sys_call+0x488/0x9a0 [ 194.754875][ T3522] do_syscall_64+0x4c/0xa0 [ 194.759289][ T3522] ? clear_bhb_loop+0x30/0x80 [ 194.763969][ T3522] ? clear_bhb_loop+0x30/0x80 [ 194.768650][ T3522] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 194.774546][ T3522] RIP: 0033:0x7f02e338f749 [ 194.776359][ T3523] syz.4.906[3523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.778957][ T3522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.778972][ T3522] RSP: 002b:00007f02e42b2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 194.778990][ T3522] RAX: ffffffffffffffda RBX: 00007f02e35e5fa0 RCX: 00007f02e338f749 [ 194.826109][ T3522] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 194.834088][ T3522] RBP: 00007f02e42b2090 R08: 0000000000000000 R09: 0000000000000000 [ 194.842060][ T3522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.850027][ T3522] R13: 00007f02e35e6038 R14: 00007f02e35e5fa0 R15: 00007ffcb1757268 [ 194.858009][ T3522] [ 195.606455][ T3560] device syzkaller0 entered promiscuous mode [ 195.672953][ T3564] syz.4.923[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.673037][ T3564] syz.4.923[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.696784][ T3564] syz.4.923[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.708322][ T3564] syz.4.923[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.293852][ T3575] FAULT_INJECTION: forcing a failure. [ 196.293852][ T3575] name failslab, interval 1, probability 0, space 0, times 0 [ 196.337090][ T3575] CPU: 0 PID: 3575 Comm: syz.2.926 Not tainted syzkaller #0 [ 196.344422][ T3575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 196.354480][ T3575] Call Trace: [ 196.357753][ T3575] [ 196.360675][ T3575] __dump_stack+0x21/0x24 [ 196.365003][ T3575] dump_stack_lvl+0xee/0x150 [ 196.369584][ T3575] ? __cfi_dump_stack_lvl+0x8/0x8 [ 196.374596][ T3575] ? __kasan_kmalloc+0x95/0xb0 [ 196.379346][ T3575] dump_stack+0x15/0x24 [ 196.383487][ T3575] should_fail_ex+0x3d4/0x520 [ 196.388153][ T3575] ? build_skb+0x2a/0x220 [ 196.392466][ T3575] __should_failslab+0xac/0xf0 [ 196.397217][ T3575] should_failslab+0x9/0x20 [ 196.401708][ T3575] kmem_cache_alloc+0x3b/0x330 [ 196.406458][ T3575] build_skb+0x2a/0x220 [ 196.410597][ T3575] bpf_prog_test_run_skb+0x39f/0x1290 [ 196.415959][ T3575] ? __fget_files+0x2d5/0x330 [ 196.420619][ T3575] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 196.426413][ T3575] bpf_prog_test_run+0x3e3/0x630 [ 196.431333][ T3575] ? slab_free_freelist_hook+0xc2/0x190 [ 196.436870][ T3575] ? bpf_prog_query+0x270/0x270 [ 196.441708][ T3575] ? selinux_bpf+0xce/0xf0 [ 196.446110][ T3575] ? security_bpf+0x93/0xb0 [ 196.450602][ T3575] __sys_bpf+0x56d/0x780 [ 196.454859][ T3575] ? bpf_link_show_fdinfo+0x320/0x320 [ 196.460218][ T3575] ? __cfi_ksys_write+0x10/0x10 [ 196.465060][ T3575] ? debug_smp_processor_id+0x17/0x20 [ 196.470418][ T3575] __x64_sys_bpf+0x7c/0x90 [ 196.474825][ T3575] x64_sys_call+0x488/0x9a0 [ 196.479313][ T3575] do_syscall_64+0x4c/0xa0 [ 196.483715][ T3575] ? clear_bhb_loop+0x30/0x80 [ 196.488379][ T3575] ? clear_bhb_loop+0x30/0x80 [ 196.493045][ T3575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 196.498925][ T3575] RIP: 0033:0x7f5658b8f749 [ 196.503326][ T3575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.522921][ T3575] RSP: 002b:00007f5659976038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 196.531325][ T3575] RAX: ffffffffffffffda RBX: 00007f5658de5fa0 RCX: 00007f5658b8f749 [ 196.539279][ T3575] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 196.547233][ T3575] RBP: 00007f5659976090 R08: 0000000000000000 R09: 0000000000000000 [ 196.555185][ T3575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.563143][ T3575] R13: 00007f5658de6038 R14: 00007f5658de5fa0 R15: 00007fff02879b78 [ 196.571104][ T3575] [ 198.082936][ T3604] syz.3.935[3604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.085941][ T3604] syz.3.935[3604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.665043][ T3649] device syzkaller0 entered promiscuous mode [ 200.548024][ T3659] bpf_get_probe_write_proto: 2 callbacks suppressed [ 200.548040][ T3659] syz.2.950[3659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.567314][ T3659] syz.2.950[3659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.663119][ T3660] syz.2.950[3660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.829508][ T3660] syz.2.950[3660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.077560][ T3685] bridge0: port 3(veth1_macvtap) entered blocking state [ 202.356559][ T3685] bridge0: port 3(veth1_macvtap) entered disabled state [ 202.569679][ T3694] device veth1_macvtap entered promiscuous mode [ 202.737186][ T3700] device syzkaller0 entered promiscuous mode [ 203.619342][ T3712] syz.4.965[3712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.619416][ T3712] syz.4.965[3712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.715447][ T3716] syz.4.965[3716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.792810][ T3716] syz.4.965[3716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.285922][ T3751] FAULT_INJECTION: forcing a failure. [ 205.285922][ T3751] name failslab, interval 1, probability 0, space 0, times 0 [ 205.309782][ T3751] CPU: 0 PID: 3751 Comm: syz.1.976 Not tainted syzkaller #0 [ 205.317079][ T3751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 205.327144][ T3751] Call Trace: [ 205.330436][ T3751] [ 205.333387][ T3751] __dump_stack+0x21/0x24 [ 205.337726][ T3751] dump_stack_lvl+0xee/0x150 [ 205.342322][ T3751] ? __cfi_dump_stack_lvl+0x8/0x8 [ 205.347337][ T3751] ? kasan_set_track+0x60/0x70 [ 205.352084][ T3751] ? kasan_save_alloc_info+0x25/0x30 [ 205.357442][ T3751] ? __kasan_slab_alloc+0x72/0x80 [ 205.362450][ T3751] ? slab_post_alloc_hook+0x4f/0x2d0 [ 205.367722][ T3751] ? kmem_cache_alloc+0x16e/0x330 [ 205.372736][ T3751] dump_stack+0x15/0x24 [ 205.376878][ T3751] should_fail_ex+0x3d4/0x520 [ 205.381541][ T3751] __should_failslab+0xac/0xf0 [ 205.386289][ T3751] ? ref_tracker_alloc+0x139/0x430 [ 205.391386][ T3751] should_failslab+0x9/0x20 [ 205.395874][ T3751] __kmem_cache_alloc_node+0x3d/0x2c0 [ 205.401232][ T3751] ? ref_tracker_alloc+0x139/0x430 [ 205.406329][ T3751] kmalloc_trace+0x29/0xb0 [ 205.410732][ T3751] ref_tracker_alloc+0x139/0x430 [ 205.415666][ T3751] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 205.421126][ T3751] ? slab_post_alloc_hook+0x6d/0x2d0 [ 205.426406][ T3751] ? dst_alloc+0x16a/0x1e0 [ 205.430819][ T3751] dst_init+0xc4/0x3d0 [ 205.434881][ T3751] dst_alloc+0x191/0x1e0 [ 205.439116][ T3751] ip_route_output_key_hash_rcu+0x1300/0x2030 [ 205.445177][ T3751] ip_route_output_flow+0x12e/0x2e0 [ 205.450365][ T3751] ? arch_stack_walk+0xfc/0x150 [ 205.455205][ T3751] ? __cfi_ip_route_output_flow+0x10/0x10 [ 205.460913][ T3751] ip_tunnel_xmit+0xa4b/0x2700 [ 205.465666][ T3751] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 205.470854][ T3751] ? __kasan_check_write+0x14/0x20 [ 205.475972][ T3751] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 205.481419][ T3751] ? gre_build_header+0x25d/0x9b0 [ 205.486429][ T3751] ipgre_xmit+0x80b/0xb90 [ 205.490752][ T3751] dev_hard_start_xmit+0x20b/0x750 [ 205.495856][ T3751] __dev_queue_xmit+0x18d9/0x3420 [ 205.500864][ T3751] ? __dev_queue_xmit+0x250/0x3420 [ 205.505966][ T3751] ? __cfi___dev_queue_xmit+0x10/0x10 [ 205.511334][ T3751] ? __kasan_check_write+0x14/0x20 [ 205.516430][ T3751] ? skb_release_data+0x1d2/0x890 [ 205.521436][ T3751] ? skb_ensure_writable+0x2f8/0x470 [ 205.526704][ T3751] ? __kasan_check_write+0x14/0x20 [ 205.531796][ T3751] ? pskb_expand_head+0xc4a/0x1210 [ 205.536906][ T3751] __bpf_redirect+0x8db/0x1130 [ 205.541656][ T3751] bpf_clone_redirect+0x26a/0x3c0 [ 205.546666][ T3751] bpf_prog_208b094576c80b22+0x56/0x5b [ 205.552112][ T3751] ? kasan_set_track+0x60/0x70 [ 205.556864][ T3751] ? kasan_set_track+0x4b/0x70 [ 205.561608][ T3751] ? kasan_save_alloc_info+0x25/0x30 [ 205.566879][ T3751] ? __kasan_slab_alloc+0x72/0x80 [ 205.571885][ T3751] ? slab_post_alloc_hook+0x4f/0x2d0 [ 205.577158][ T3751] ? kmem_cache_alloc+0x16e/0x330 [ 205.582168][ T3751] ? build_skb+0x2a/0x220 [ 205.586479][ T3751] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 205.592016][ T3751] ? bpf_prog_test_run+0x3e3/0x630 [ 205.597110][ T3751] ? __sys_bpf+0x56d/0x780 [ 205.601506][ T3751] ? __x64_sys_bpf+0x7c/0x90 [ 205.606094][ T3751] ? x64_sys_call+0x488/0x9a0 [ 205.610755][ T3751] ? do_syscall_64+0x4c/0xa0 [ 205.615338][ T3751] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 205.621398][ T3751] ? ktime_get+0x141/0x170 [ 205.625798][ T3751] bpf_test_run+0x349/0x8d0 [ 205.630294][ T3751] ? convert___skb_to_skb+0x5b0/0x5b0 [ 205.635663][ T3751] ? __cfi_eth_type_trans+0x10/0x10 [ 205.640843][ T3751] ? convert___skb_to_skb+0x40/0x5b0 [ 205.646119][ T3751] bpf_prog_test_run_skb+0xaec/0x1290 [ 205.651510][ T3751] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 205.657303][ T3751] bpf_prog_test_run+0x3e3/0x630 [ 205.662232][ T3751] ? slab_free_freelist_hook+0xc2/0x190 [ 205.667772][ T3751] ? bpf_prog_query+0x270/0x270 [ 205.672606][ T3751] ? selinux_bpf+0xce/0xf0 [ 205.677017][ T3751] ? security_bpf+0x93/0xb0 [ 205.681508][ T3751] __sys_bpf+0x56d/0x780 [ 205.685734][ T3751] ? bpf_link_show_fdinfo+0x320/0x320 [ 205.691092][ T3751] ? __cfi_ksys_write+0x10/0x10 [ 205.695929][ T3751] ? debug_smp_processor_id+0x17/0x20 [ 205.701284][ T3751] __x64_sys_bpf+0x7c/0x90 [ 205.705689][ T3751] x64_sys_call+0x488/0x9a0 [ 205.710178][ T3751] do_syscall_64+0x4c/0xa0 [ 205.714578][ T3751] ? clear_bhb_loop+0x30/0x80 [ 205.719246][ T3751] ? clear_bhb_loop+0x30/0x80 [ 205.723913][ T3751] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 205.729789][ T3751] RIP: 0033:0x7f3a1698f749 [ 205.734190][ T3751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.753876][ T3751] RSP: 002b:00007f3a17886038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 205.762276][ T3751] RAX: ffffffffffffffda RBX: 00007f3a16be5fa0 RCX: 00007f3a1698f749 [ 205.770233][ T3751] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 205.778193][ T3751] RBP: 00007f3a17886090 R08: 0000000000000000 R09: 0000000000000000 [ 205.786149][ T3751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.794108][ T3751] R13: 00007f3a16be6038 R14: 00007f3a16be5fa0 R15: 00007ffc68e23598 [ 205.802074][ T3751] [ 205.805149][ T3751] memory allocation failure, unreliable refcount tracker. [ 206.332517][ T3774] syz.1.981[3774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.332596][ T3774] syz.1.981[3774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.448660][ T3782] syz.1.981[3782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.518231][ T3781] device syzkaller0 entered promiscuous mode [ 206.752160][ T3782] syz.1.981[3782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.250176][ T3795] device sit0 left promiscuous mode [ 207.578989][ T3803] device sit0 entered promiscuous mode [ 207.954248][ T3816] FAULT_INJECTION: forcing a failure. [ 207.954248][ T3816] name failslab, interval 1, probability 0, space 0, times 0 [ 207.966932][ T3816] CPU: 1 PID: 3816 Comm: syz.4.992 Not tainted syzkaller #0 [ 207.974229][ T3816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 207.984284][ T3816] Call Trace: [ 207.987549][ T3816] [ 207.990461][ T3816] __dump_stack+0x21/0x24 [ 207.994775][ T3816] dump_stack_lvl+0xee/0x150 [ 207.999346][ T3816] ? __cfi_dump_stack_lvl+0x8/0x8 [ 208.004363][ T3816] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 208.010163][ T3816] ? __stack_depot_save+0x445/0x480 [ 208.015341][ T3816] dump_stack+0x15/0x24 [ 208.019479][ T3816] should_fail_ex+0x3d4/0x520 [ 208.024159][ T3816] __should_failslab+0xac/0xf0 [ 208.028902][ T3816] should_failslab+0x9/0x20 [ 208.033383][ T3816] kmem_cache_alloc_node+0x42/0x340 [ 208.038564][ T3816] ? __alloc_skb+0xea/0x4b0 [ 208.043048][ T3816] __alloc_skb+0xea/0x4b0 [ 208.047355][ T3816] ip_frag_next+0xd4/0xa00 [ 208.051751][ T3816] ? selinux_ip_postroute+0x245/0xf60 [ 208.057107][ T3816] ip_do_fragment+0x880/0x19f0 [ 208.061849][ T3816] ? __cfi_ip_finish_output2+0x10/0x10 [ 208.067292][ T3816] ip_fragment+0x152/0x260 [ 208.071698][ T3816] __ip_finish_output+0x24c/0x370 [ 208.076702][ T3816] ip_finish_output+0x31/0x2b0 [ 208.081447][ T3816] ? ip_output+0x31d/0x360 [ 208.085858][ T3816] ip_output+0x1e1/0x360 [ 208.090172][ T3816] ? __cfi_ip_output+0x10/0x10 [ 208.094914][ T3816] ? __cfi_ip_finish_output+0x10/0x10 [ 208.100274][ T3816] ip_local_out+0xa7/0xc0 [ 208.104582][ T3816] iptunnel_xmit+0x522/0x930 [ 208.109153][ T3816] ip_tunnel_xmit+0x1f3f/0x2700 [ 208.113988][ T3816] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 208.119173][ T3816] ? unwind_get_return_address+0x4d/0x90 [ 208.124831][ T3816] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 208.130971][ T3816] ? gre_build_header+0x25d/0x9b0 [ 208.135979][ T3816] ipgre_xmit+0x80b/0xb90 [ 208.140290][ T3816] dev_hard_start_xmit+0x20b/0x750 [ 208.145386][ T3816] __dev_queue_xmit+0x18d9/0x3420 [ 208.150394][ T3816] ? __dev_queue_xmit+0x250/0x3420 [ 208.155483][ T3816] ? __cfi___dev_queue_xmit+0x10/0x10 [ 208.160846][ T3816] ? __kasan_check_write+0x14/0x20 [ 208.165941][ T3816] ? skb_release_data+0x1d2/0x890 [ 208.170974][ T3816] ? skb_ensure_writable+0x2f8/0x470 [ 208.176260][ T3816] ? __kasan_check_write+0x14/0x20 [ 208.181370][ T3816] ? pskb_expand_head+0xc4a/0x1210 [ 208.186475][ T3816] __bpf_redirect+0x8db/0x1130 [ 208.191224][ T3816] bpf_clone_redirect+0x26a/0x3c0 [ 208.196233][ T3816] bpf_prog_208b094576c80b22+0x56/0x5b [ 208.201674][ T3816] ? kasan_set_track+0x60/0x70 [ 208.206421][ T3816] ? kasan_set_track+0x4b/0x70 [ 208.211165][ T3816] ? kasan_save_alloc_info+0x25/0x30 [ 208.216438][ T3816] ? __kasan_slab_alloc+0x72/0x80 [ 208.221448][ T3816] ? slab_post_alloc_hook+0x4f/0x2d0 [ 208.226716][ T3816] ? kmem_cache_alloc+0x16e/0x330 [ 208.231729][ T3816] ? build_skb+0x2a/0x220 [ 208.236038][ T3816] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 208.241571][ T3816] ? bpf_prog_test_run+0x3e3/0x630 [ 208.246666][ T3816] ? __sys_bpf+0x56d/0x780 [ 208.251064][ T3816] ? __x64_sys_bpf+0x7c/0x90 [ 208.255639][ T3816] ? x64_sys_call+0x488/0x9a0 [ 208.260298][ T3816] ? do_syscall_64+0x4c/0xa0 [ 208.264872][ T3816] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 208.270929][ T3816] ? ktime_get+0x141/0x170 [ 208.275329][ T3816] bpf_test_run+0x349/0x8d0 [ 208.279822][ T3816] ? convert___skb_to_skb+0x5b0/0x5b0 [ 208.285180][ T3816] ? __cfi_eth_type_trans+0x10/0x10 [ 208.290360][ T3816] ? convert___skb_to_skb+0x40/0x5b0 [ 208.295652][ T3816] bpf_prog_test_run_skb+0xaec/0x1290 [ 208.301015][ T3816] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 208.306813][ T3816] bpf_prog_test_run+0x3e3/0x630 [ 208.311734][ T3816] ? slab_free_freelist_hook+0xc2/0x190 [ 208.317270][ T3816] ? bpf_prog_query+0x270/0x270 [ 208.322112][ T3816] ? selinux_bpf+0xce/0xf0 [ 208.326518][ T3816] ? security_bpf+0x93/0xb0 [ 208.331009][ T3816] __sys_bpf+0x56d/0x780 [ 208.335236][ T3816] ? bpf_link_show_fdinfo+0x320/0x320 [ 208.340594][ T3816] ? __cfi_ksys_write+0x10/0x10 [ 208.345435][ T3816] ? debug_smp_processor_id+0x17/0x20 [ 208.350789][ T3816] __x64_sys_bpf+0x7c/0x90 [ 208.355199][ T3816] x64_sys_call+0x488/0x9a0 [ 208.359689][ T3816] do_syscall_64+0x4c/0xa0 [ 208.364089][ T3816] ? clear_bhb_loop+0x30/0x80 [ 208.368749][ T3816] ? clear_bhb_loop+0x30/0x80 [ 208.373411][ T3816] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 208.379288][ T3816] RIP: 0033:0x7f9ded58f749 [ 208.383685][ T3816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.403274][ T3816] RSP: 002b:00007f9dee437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.411673][ T3816] RAX: ffffffffffffffda RBX: 00007f9ded7e5fa0 RCX: 00007f9ded58f749 [ 208.419633][ T3816] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 208.427602][ T3816] RBP: 00007f9dee437090 R08: 0000000000000000 R09: 0000000000000000 [ 208.435564][ T3816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 208.443525][ T3816] R13: 00007f9ded7e6038 R14: 00007f9ded7e5fa0 R15: 00007ffc4e045558 [ 208.451499][ T3816] [ 208.631022][ T3820] syzkaller: port 1(erspan0) entered blocking state [ 208.637741][ T3820] syzkaller: port 1(erspan0) entered disabled state [ 208.645102][ T3820] device erspan0 entered promiscuous mode [ 209.305363][ T3837] syz.4.997[3837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.305438][ T3837] syz.4.997[3837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.361006][ T3838] syz.4.997[3838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.641582][ T3838] syz.4.997[3838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.155766][ T28] audit: type=1400 audit(1766096094.738:135): avc: denied { create } for pid=3848 comm="syz.1.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 211.295778][ T3860] device syzkaller0 entered promiscuous mode [ 212.322797][ T3904] syz.1.1011[3904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.322871][ T3904] syz.1.1011[3904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.542222][ T3899] syz.1.1011[3899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.754694][ T3911] device syzkaller0 entered promiscuous mode [ 213.538955][ T3924] device syzkaller0 entered promiscuous mode [ 214.902309][ T3955] syz.0.1026[3955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.902385][ T3955] syz.0.1026[3955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.963133][ T3953] syz.0.1026[3953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.060158][ T3953] syz.0.1026[3953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.517386][ T3979] device syzkaller0 entered promiscuous mode [ 216.474348][ T3985] device syzkaller0 entered promiscuous mode [ 216.746543][ T4001] device syzkaller0 entered promiscuous mode [ 218.408623][ T28] audit: type=1400 audit(1766096102.988:136): avc: denied { ioctl } for pid=4040 comm="syz.3.1051" path="socket:[28230]" dev="sockfs" ino=28230 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 221.044559][ T4057] device syzkaller0 entered promiscuous mode [ 222.009526][ T4092] syz.4.1065[4092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.009599][ T4092] syz.4.1065[4092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.024849][ T4091] device syzkaller0 entered promiscuous mode [ 222.046592][ T4092] syz.4.1065[4092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.046682][ T4092] syz.4.1065[4092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.806974][ T4132] device syzkaller0 entered promiscuous mode [ 224.869772][ T4136] syz.4.1080[4136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.871747][ T4136] syz.4.1080[4136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.902874][ T4137] syz.4.1080[4137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.998907][ T4137] syz.4.1080[4137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.882395][ T4155] FAULT_INJECTION: forcing a failure. [ 225.882395][ T4155] name failslab, interval 1, probability 0, space 0, times 0 [ 226.035306][ T4155] CPU: 1 PID: 4155 Comm: syz.3.1087 Not tainted syzkaller #0 [ 226.042747][ T4155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 226.052815][ T4155] Call Trace: [ 226.056092][ T4155] [ 226.059016][ T4155] __dump_stack+0x21/0x24 [ 226.063342][ T4155] dump_stack_lvl+0xee/0x150 [ 226.067931][ T4155] ? __cfi_dump_stack_lvl+0x8/0x8 [ 226.072948][ T4155] dump_stack+0x15/0x24 [ 226.077095][ T4155] should_fail_ex+0x3d4/0x520 [ 226.081762][ T4155] __should_failslab+0xac/0xf0 [ 226.086525][ T4155] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 226.092063][ T4155] should_failslab+0x9/0x20 [ 226.096549][ T4155] __kmem_cache_alloc_node+0x3d/0x2c0 [ 226.101911][ T4155] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 226.107450][ T4155] __kmalloc+0xa1/0x1e0 [ 226.111598][ T4155] bpf_prog_test_run_skb+0x24f/0x1290 [ 226.116958][ T4155] ? __fget_files+0x2d5/0x330 [ 226.121624][ T4155] ? __kasan_check_write+0x14/0x20 [ 226.126722][ T4155] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 226.132522][ T4155] bpf_prog_test_run+0x3e3/0x630 [ 226.137451][ T4155] ? slab_free_freelist_hook+0xc2/0x190 [ 226.142986][ T4155] ? bpf_prog_query+0x270/0x270 [ 226.147823][ T4155] ? selinux_bpf+0xce/0xf0 [ 226.152229][ T4155] ? security_bpf+0x93/0xb0 [ 226.156719][ T4155] __sys_bpf+0x56d/0x780 [ 226.160946][ T4155] ? bpf_link_show_fdinfo+0x320/0x320 [ 226.166303][ T4155] ? __cfi_ksys_write+0x10/0x10 [ 226.171139][ T4155] ? debug_smp_processor_id+0x17/0x20 [ 226.176500][ T4155] __x64_sys_bpf+0x7c/0x90 [ 226.180919][ T4155] x64_sys_call+0x488/0x9a0 [ 226.185414][ T4155] do_syscall_64+0x4c/0xa0 [ 226.189819][ T4155] ? clear_bhb_loop+0x30/0x80 [ 226.194482][ T4155] ? clear_bhb_loop+0x30/0x80 [ 226.199148][ T4155] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 226.205028][ T4155] RIP: 0033:0x7f02e338f749 [ 226.209433][ T4155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.229035][ T4155] RSP: 002b:00007f02e42b2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 226.237447][ T4155] RAX: ffffffffffffffda RBX: 00007f02e35e5fa0 RCX: 00007f02e338f749 [ 226.245408][ T4155] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 226.253366][ T4155] RBP: 00007f02e42b2090 R08: 0000000000000000 R09: 0000000000000000 [ 226.261322][ T4155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.269278][ T4155] R13: 00007f02e35e6038 R14: 00007f02e35e5fa0 R15: 00007ffcb1757268 [ 226.277246][ T4155] [ 227.384101][ T4180] device syzkaller0 entered promiscuous mode [ 227.779390][ T4178] device syzkaller0 entered promiscuous mode [ 228.353638][ T4216] device syzkaller0 entered promiscuous mode [ 228.563123][ T4221] device syzkaller0 entered promiscuous mode [ 229.283517][ T4230] device syzkaller0 entered promiscuous mode [ 230.766682][ T4277] device syzkaller0 entered promiscuous mode [ 231.021287][ T4288] device sit0 entered promiscuous mode [ 231.989791][ T4310] syz.0.1128[4310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.989870][ T4310] syz.0.1128[4310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.120736][ T4310] syz.0.1128[4310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.249524][ T4310] syz.0.1128[4310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.534139][ T28] audit: type=1400 audit(1766096117.118:137): avc: denied { write } for pid=4317 comm="syz.2.1130" name="cgroup.subtree_control" dev="cgroup2" ino=356 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 232.730738][ T4335] FAULT_INJECTION: forcing a failure. [ 232.730738][ T4335] name failslab, interval 1, probability 0, space 0, times 0 [ 232.798950][ T28] audit: type=1400 audit(1766096117.118:138): avc: denied { open } for pid=4317 comm="syz.2.1130" path="" dev="cgroup2" ino=356 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 232.897524][ T4335] CPU: 1 PID: 4335 Comm: syz.0.1135 Not tainted syzkaller #0 [ 232.904951][ T4335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 232.915013][ T4335] Call Trace: [ 232.918297][ T4335] [ 232.921224][ T4335] __dump_stack+0x21/0x24 [ 232.925557][ T4335] dump_stack_lvl+0xee/0x150 [ 232.930145][ T4335] ? __cfi_dump_stack_lvl+0x8/0x8 [ 232.935173][ T4335] dump_stack+0x15/0x24 [ 232.939326][ T4335] should_fail_ex+0x3d4/0x520 [ 232.944010][ T4335] __should_failslab+0xac/0xf0 [ 232.948789][ T4335] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 232.954517][ T4335] should_failslab+0x9/0x20 [ 232.959031][ T4335] __kmem_cache_alloc_node+0x3d/0x2c0 [ 232.964403][ T4335] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 232.970125][ T4335] kmalloc_trace+0x29/0xb0 [ 232.974547][ T4335] selinux_sk_alloc_security+0x7e/0x1a0 [ 232.980091][ T4335] security_sk_alloc+0x83/0xb0 [ 232.984854][ T4335] sk_prot_alloc+0x108/0x320 [ 232.989443][ T4335] sk_alloc+0x3b/0x460 [ 232.993513][ T4335] ? __kasan_check_write+0x14/0x20 [ 232.998621][ T4335] bpf_prog_test_run_skb+0x37e/0x1290 [ 233.003997][ T4335] ? __fget_files+0x2d5/0x330 [ 233.008683][ T4335] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 233.014494][ T4335] bpf_prog_test_run+0x3e3/0x630 [ 233.019433][ T4335] ? slab_free_freelist_hook+0xc2/0x190 [ 233.024983][ T4335] ? bpf_prog_query+0x270/0x270 [ 233.029833][ T4335] ? selinux_bpf+0xce/0xf0 [ 233.034250][ T4335] ? security_bpf+0x93/0xb0 [ 233.038757][ T4335] __sys_bpf+0x56d/0x780 [ 233.042999][ T4335] ? bpf_link_show_fdinfo+0x320/0x320 [ 233.048375][ T4335] ? __cfi_ksys_write+0x10/0x10 [ 233.053225][ T4335] ? debug_smp_processor_id+0x17/0x20 [ 233.058600][ T4335] __x64_sys_bpf+0x7c/0x90 [ 233.063029][ T4335] x64_sys_call+0x488/0x9a0 [ 233.067535][ T4335] do_syscall_64+0x4c/0xa0 [ 233.071958][ T4335] ? clear_bhb_loop+0x30/0x80 [ 233.076646][ T4335] ? clear_bhb_loop+0x30/0x80 [ 233.081327][ T4335] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 233.087219][ T4335] RIP: 0033:0x7ff9ea58f749 [ 233.091628][ T4335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.111232][ T4335] RSP: 002b:00007ff9eb3b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 233.119652][ T4335] RAX: ffffffffffffffda RBX: 00007ff9ea7e5fa0 RCX: 00007ff9ea58f749 [ 233.127627][ T4335] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 233.135599][ T4335] RBP: 00007ff9eb3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 233.143576][ T4335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.151550][ T4335] R13: 00007ff9ea7e6038 R14: 00007ff9ea7e5fa0 R15: 00007ffd198ac388 [ 233.159532][ T4335] [ 233.412894][ T4343] device syzkaller0 entered promiscuous mode [ 233.662702][ T4337] device macsec0 entered promiscuous mode [ 233.807556][ T4346] device sit0 left promiscuous mode [ 239.103922][ T4434] device syzkaller0 entered promiscuous mode [ 241.074494][ T28] audit: type=1400 audit(1766096125.648:139): avc: denied { create } for pid=4455 comm="syz.1.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 241.516941][ T4463] device syzkaller0 entered promiscuous mode [ 241.728507][ T28] audit: type=1400 audit(1766096126.308:140): avc: denied { append } for pid=4467 comm="syz.1.1171" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 243.990118][ T4489] syz.4.1175[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.990196][ T4489] syz.4.1175[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.801568][ T28] audit: type=1400 audit(1766096130.378:141): avc: denied { create } for pid=4511 comm="syz.0.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 246.797232][ T4526] device syzkaller0 entered promiscuous mode [ 247.274007][ T4539] device wg2 left promiscuous mode [ 247.446937][ T4539] device wg2 entered promiscuous mode [ 248.762635][ T4558] cgroup: fork rejected by pids controller in /syz1 [ 248.964114][ T4567] device syzkaller0 entered promiscuous mode [ 249.820195][ T4586] device sit0 entered promiscuous mode [ 250.271460][ T4588] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.409217][ T4588] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.495557][ T4588] device bridge_slave_0 entered promiscuous mode [ 250.529711][ T4632] syz.3.1213[4632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.529789][ T4632] syz.3.1213[4632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.599127][ T4588] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.795245][ T4629] syz.3.1213[4629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.795321][ T4629] syz.3.1213[4629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.899966][ T4588] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.048710][ T4588] device bridge_slave_1 entered promiscuous mode [ 251.199142][ T28] audit: type=1400 audit(1766096135.778:142): avc: denied { create } for pid=4637 comm="syz.3.1215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 251.285068][ T543] device veth1_macvtap left promiscuous mode [ 251.291683][ T543] device veth0_vlan left promiscuous mode [ 251.532752][ T28] audit: type=1400 audit(1766096136.118:143): avc: denied { create } for pid=4588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.594637][ T28] audit: type=1400 audit(1766096136.118:144): avc: denied { write } for pid=4588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.729162][ T28] audit: type=1400 audit(1766096136.118:145): avc: denied { read } for pid=4588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.958326][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.982299][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.039618][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.049433][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.068090][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.075198][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.083184][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.099720][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.108977][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.116080][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.181845][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.224153][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.256254][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.276672][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.286805][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.340342][ T4588] device veth0_vlan entered promiscuous mode [ 252.376981][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.398887][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.414311][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.448048][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.509934][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.559467][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.653037][ T4588] device veth1_macvtap entered promiscuous mode [ 252.669806][ T4680] syz.4.1225[4680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.669881][ T4680] syz.4.1225[4680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.772734][ T4679] device syzkaller0 entered promiscuous mode [ 252.802623][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.830671][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.891307][ T4678] syz.4.1225[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.891383][ T4678] syz.4.1225[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.907520][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.353917][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.391463][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.961960][ T4700] device pim6reg1 entered promiscuous mode [ 254.451284][ T28] audit: type=1400 audit(1766096139.028:146): avc: denied { read } for pid=4717 comm="syz.4.1235" dev="nsfs" ino=4026532486 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 254.503770][ T28] audit: type=1400 audit(1766096139.028:147): avc: denied { open } for pid=4717 comm="syz.4.1235" path="net:[4026532486]" dev="nsfs" ino=4026532486 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 254.595952][ T4720] IPv6: pim6reg1: Disabled Multicast RS [ 255.198690][ T4747] device sit0 entered promiscuous mode [ 256.840895][ T4818] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 256.880067][ T4818] device syzkaller0 entered promiscuous mode [ 257.653782][ T4827] device pim6reg1 entered promiscuous mode [ 258.972655][ T4853] device syzkaller0 entered promiscuous mode [ 260.348687][ T4900] device syzkaller0 entered promiscuous mode [ 260.841209][ T4914] device syzkaller0 entered promiscuous mode [ 261.499273][ T4955] device sit0 entered promiscuous mode [ 261.784092][ T28] audit: type=1400 audit(1766096146.368:148): avc: denied { create } for pid=4964 comm="syz.3.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 261.793932][ T4961] device syzkaller0 entered promiscuous mode [ 262.422769][ T4968] device sit0 left promiscuous mode [ 264.287624][ T5047] syz.1.1313[5047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.287695][ T5047] syz.1.1313[5047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.421262][ T5047] syz.1.1313[5047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.449833][ T5047] syz.1.1313[5047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.855023][ T28] audit: type=1400 audit(1766096149.438:149): avc: denied { create } for pid=5059 comm="syz.3.1318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 265.630101][ T5080] device sit0 entered promiscuous mode [ 266.852029][ T5104] device syzkaller0 entered promiscuous mode [ 267.612680][ T5112] syz.2.1331[5112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.612754][ T5112] syz.2.1331[5112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.625142][ T5112] syz.2.1331[5112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.639962][ T5112] syz.2.1331[5112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.905808][ T5120] device sit0 left promiscuous mode [ 267.937800][ T5118] device syzkaller0 entered promiscuous mode [ 267.959407][ T5120] device sit0 entered promiscuous mode [ 268.808049][ T5128] device pim6reg1 entered promiscuous mode [ 268.823942][ T28] audit: type=1400 audit(1766096153.408:150): avc: denied { create } for pid=5124 comm="syz.1.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 269.113572][ T5141] device syzkaller0 entered promiscuous mode [ 269.875783][ T5143] device syzkaller0 entered promiscuous mode [ 270.338103][ T5166] û: renamed from bond_slave_0 [ 270.691045][ T5170] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.739217][ T5170] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.776259][ T5170] device bridge_slave_0 entered promiscuous mode [ 270.813600][ T5170] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.889235][ T5170] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.909009][ T5170] device bridge_slave_1 entered promiscuous mode [ 271.150016][ T337] device erspan0 left promiscuous mode [ 271.155626][ T337] syzkaller: port 1(erspan0) entered disabled state [ 271.328859][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.337062][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.337855][ T5195] syz.4.1354[5195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.387077][ T5195] syz.4.1354[5195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.418164][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.470945][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.503857][ T543] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.510961][ T543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.519178][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.528029][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.536741][ T543] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.543806][ T543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.551585][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.597343][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.612328][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.624886][ T337] device bridge_slave_1 left promiscuous mode [ 271.649740][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.684077][ T337] device bridge_slave_0 left promiscuous mode [ 271.700438][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.709057][ T337] device veth0_vlan left promiscuous mode [ 272.199816][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.208652][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.225309][ T5170] device veth0_vlan entered promiscuous mode [ 272.236958][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.245545][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.264747][ T5170] device veth1_macvtap entered promiscuous mode [ 272.274327][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.283981][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.293931][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.302414][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.311104][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.321650][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.330390][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.382023][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.390892][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.892855][ T5209] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.900416][ T5209] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.909045][ T5209] device bridge_slave_0 entered promiscuous mode [ 272.955039][ T5209] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.962942][ T5209] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.970728][ T5209] device bridge_slave_1 entered promiscuous mode [ 273.605090][ T337] device bridge_slave_1 left promiscuous mode [ 273.616280][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.715002][ T337] device bridge_slave_0 left promiscuous mode [ 273.721285][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.735523][ T337] device veth1_macvtap left promiscuous mode [ 273.741639][ T337] device veth0_vlan left promiscuous mode [ 274.251185][ T5219] device syzkaller0 entered promiscuous mode [ 274.900754][ T5209] device veth0_vlan entered promiscuous mode [ 274.909838][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.939395][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.949165][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.958079][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.045365][ T543] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.052468][ T543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.777762][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.807755][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.816140][ T543] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.823192][ T543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.830794][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.838988][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.848123][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.961265][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.050438][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.142207][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.359715][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.539467][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.586252][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.679589][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.731901][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.773063][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.818258][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.877714][ T5209] device veth1_macvtap entered promiscuous mode [ 276.910175][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.918576][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.932005][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.963543][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.972430][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.132017][ T5270] device sit0 left promiscuous mode [ 277.675896][ T5273] device sit0 entered promiscuous mode [ 278.180947][ T5279] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.224505][ T5279] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.267950][ T5279] device bridge_slave_0 entered promiscuous mode [ 278.306365][ T5290] device sit0 left promiscuous mode [ 278.779251][ T5279] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.806833][ T5279] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.815196][ T5279] device bridge_slave_1 entered promiscuous mode [ 279.343021][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.365107][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.456858][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.478836][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.487620][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.494728][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.502336][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.510906][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.519391][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.526455][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.534170][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.713386][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.725083][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.733333][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.741823][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.811950][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.888237][ T5279] device veth0_vlan entered promiscuous mode [ 279.958017][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.983048][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.008425][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.875740][ T337] device bridge_slave_1 left promiscuous mode [ 280.883154][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.900247][ T337] device bridge_slave_0 left promiscuous mode [ 280.909806][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.930295][ T337] device veth1_macvtap left promiscuous mode [ 280.939401][ T337] device veth0_vlan left promiscuous mode [ 281.106660][ T5279] device veth1_macvtap entered promiscuous mode [ 281.120791][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.139819][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.148279][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.231176][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.245863][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.267080][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.282330][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.392514][ T5335] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.399768][ T5335] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.440433][ T5341] syz.4.1382[5341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.440509][ T5341] syz.4.1382[5341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.444752][ T5335] device bridge_slave_0 entered promiscuous mode [ 282.474473][ T5335] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.481577][ T5335] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.489350][ T5335] device bridge_slave_1 entered promiscuous mode [ 282.535396][ T5337] syz.4.1382[5337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.536796][ T5337] syz.4.1382[5337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.629662][ T337] device bridge_slave_1 left promiscuous mode [ 282.671872][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.719673][ T337] device bridge_slave_0 left promiscuous mode [ 282.725846][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.779272][ T337] device veth1_macvtap left promiscuous mode [ 282.785761][ T337] device veth0_vlan left promiscuous mode [ 283.077450][ T5354] device wg2 left promiscuous mode [ 283.137981][ T5361] syz.3.1388[5361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.138059][ T5361] syz.3.1388[5361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.175709][ T5360] device wg2 entered promiscuous mode [ 283.196512][ T5361] syz.3.1388[5361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.196589][ T5361] syz.3.1388[5361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.282037][ T5363] device veth0_vlan left promiscuous mode [ 283.349362][ T5363] device veth0_vlan entered promiscuous mode [ 283.400407][ T5362] device pim6reg1 entered promiscuous mode [ 283.678242][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.691971][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.750306][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.860055][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.930454][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.937521][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.034325][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.142176][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.229762][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.236849][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.261359][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.402915][ T5398] device sit0 entered promiscuous mode [ 284.683123][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.713577][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.792763][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.859826][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.957515][ T5335] device veth0_vlan entered promiscuous mode [ 285.070845][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.100813][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.164348][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.230754][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.301224][ T5335] device veth1_macvtap entered promiscuous mode [ 285.363972][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.413492][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.476742][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.583365][ T5419] device veth0_vlan left promiscuous mode [ 285.609648][ T5419] device veth0_vlan entered promiscuous mode [ 285.778409][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.787199][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.798225][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.806722][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.814907][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 285.825656][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.835188][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.990210][ T5462] veth0_vlan: mtu less than device minimum [ 287.451540][ T5460] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.459390][ T5460] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.466959][ T5460] device bridge_slave_0 entered promiscuous mode [ 287.500062][ T5475] device pim6reg1 left promiscuous mode [ 287.514739][ T337] device bridge_slave_1 left promiscuous mode [ 287.523363][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.547766][ T337] device bridge_slave_0 left promiscuous mode [ 287.575385][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.654268][ T337] device veth1_macvtap left promiscuous mode [ 287.714456][ T337] device veth0_vlan left promiscuous mode [ 287.970600][ T5478] device veth0_vlan left promiscuous mode [ 287.977393][ T5478] device veth0_vlan entered promiscuous mode [ 288.048160][ T5460] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.075494][ T5460] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.114240][ T5460] device bridge_slave_1 entered promiscuous mode [ 288.191629][ T5490] device syzkaller0 entered promiscuous mode [ 288.879435][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.887537][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.919192][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.024761][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.069570][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.076652][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.165000][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.225949][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.338129][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.345217][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.505844][ T5528] device syzkaller0 entered promiscuous mode [ 289.751698][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.802407][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.837482][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.168410][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.199006][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.273081][ T5545] device syzkaller0 entered promiscuous mode [ 290.667123][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.677689][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.688965][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.697428][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.714486][ T5460] device veth0_vlan entered promiscuous mode [ 290.807530][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.817026][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.827009][ T5460] device veth1_macvtap entered promiscuous mode [ 290.946487][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.961232][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 291.067050][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 291.075762][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.712122][ T5568] device sit0 left promiscuous mode [ 293.101631][ T5575] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.344799][ T5575] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.411614][ T5575] device bridge_slave_0 entered promiscuous mode [ 293.459521][ T5575] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.466634][ T5575] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.506627][ T5575] device bridge_slave_1 entered promiscuous mode [ 293.817214][ T28] audit: type=1400 audit(1766096178.398:151): avc: denied { create } for pid=5586 comm="syz.3.1441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 293.893658][ T337] device bridge_slave_1 left promiscuous mode [ 293.937175][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.056816][ T337] device bridge_slave_0 left promiscuous mode [ 294.063301][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.149977][ T337] device veth1_macvtap left promiscuous mode [ 294.156105][ T337] device veth0_vlan left promiscuous mode [ 295.118365][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.129999][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.279586][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.288039][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.301946][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.309013][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.317271][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.325714][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.334175][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.341220][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.599549][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.729440][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.882076][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.981413][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.131107][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 296.139512][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.148535][ T5575] device veth0_vlan entered promiscuous mode [ 296.160435][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.168273][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.311603][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.471363][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.632410][ T5575] device veth1_macvtap entered promiscuous mode [ 296.812352][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.860400][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.021971][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.050573][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.431169][ T5645] syz.2.1453[5645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.431244][ T5645] syz.2.1453[5645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.786262][ T5641] syz.2.1453[5641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.798367][ T5641] syz.2.1453[5641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.361320][ T8] device bridge_slave_1 left promiscuous mode [ 298.419790][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.481851][ T8] device bridge_slave_0 left promiscuous mode [ 298.488016][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.600505][ T8] device veth1_macvtap left promiscuous mode [ 298.609353][ T8] device veth0_vlan left promiscuous mode [ 299.892668][ T5668] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.910428][ T5668] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.919593][ T5668] device bridge_slave_0 entered promiscuous mode [ 299.979008][ T5701] FAULT_INJECTION: forcing a failure. [ 299.979008][ T5701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 300.009271][ T5668] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.060480][ T5668] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.088486][ T5701] CPU: 0 PID: 5701 Comm: syz.1.1466 Not tainted syzkaller #0 [ 300.095901][ T5701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 300.105980][ T5701] Call Trace: [ 300.109258][ T5701] [ 300.112182][ T5701] __dump_stack+0x21/0x24 [ 300.116534][ T5701] dump_stack_lvl+0xee/0x150 [ 300.121126][ T5701] ? __cfi_dump_stack_lvl+0x8/0x8 [ 300.126155][ T5701] dump_stack+0x15/0x24 [ 300.130311][ T5701] should_fail_ex+0x3d4/0x520 [ 300.134994][ T5701] should_fail+0xb/0x10 [ 300.139154][ T5701] should_fail_usercopy+0x1a/0x20 [ 300.144183][ T5701] _copy_from_user+0x1e/0xc0 [ 300.148780][ T5701] __sys_bpf+0x277/0x780 [ 300.153024][ T5701] ? bpf_link_show_fdinfo+0x320/0x320 [ 300.158406][ T5701] ? __cfi_ksys_write+0x10/0x10 [ 300.163251][ T5701] ? do_user_addr_fault+0x9ac/0x1050 [ 300.168542][ T5701] ? debug_smp_processor_id+0x17/0x20 [ 300.173915][ T5701] __x64_sys_bpf+0x7c/0x90 [ 300.178343][ T5701] x64_sys_call+0x488/0x9a0 [ 300.182847][ T5701] do_syscall_64+0x4c/0xa0 [ 300.187262][ T5701] ? clear_bhb_loop+0x30/0x80 [ 300.191953][ T5701] ? clear_bhb_loop+0x30/0x80 [ 300.196645][ T5701] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 300.202546][ T5701] RIP: 0033:0x7f550478f749 [ 300.206976][ T5701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.226587][ T5701] RSP: 002b:00007f550561c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.235005][ T5701] RAX: ffffffffffffffda RBX: 00007f55049e6180 RCX: 00007f550478f749 [ 300.242976][ T5701] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 300.250951][ T5701] RBP: 00007f550561c090 R08: 0000000000000000 R09: 0000000000000000 [ 300.258921][ T5701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.266891][ T5701] R13: 00007f55049e6218 R14: 00007f55049e6180 R15: 00007ffec60206d8 [ 300.274867][ T5701] [ 300.301133][ T5668] device bridge_slave_1 entered promiscuous mode [ 300.921242][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.928795][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.958379][ T5668] device veth0_vlan entered promiscuous mode [ 300.972338][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.980770][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.988755][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.996798][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.004492][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.013107][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.021442][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.028501][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.035954][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.044452][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.052735][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.059770][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.067090][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.075454][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.083741][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 301.196150][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.209745][ T5668] device veth1_macvtap entered promiscuous mode [ 301.237559][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.246176][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 301.742007][ T5731] device syzkaller0 entered promiscuous mode [ 302.665284][ T5741] device sit0 left promiscuous mode [ 302.806230][ T5741] device sit0 entered promiscuous mode [ 302.981781][ T8] device bridge_slave_1 left promiscuous mode [ 302.987970][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.054782][ T5758] syz.3.1478[5758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.054854][ T5758] syz.3.1478[5758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.066453][ T8] device bridge_slave_0 left promiscuous mode [ 303.156564][ T5763] syz.3.1478[5763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.156640][ T5763] syz.3.1478[5763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.223670][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.295643][ T8] device veth1_macvtap left promiscuous mode [ 303.320393][ T8] device veth0_vlan left promiscuous mode [ 304.114966][ T5747] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.236803][ T5747] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.302628][ T5747] device bridge_slave_0 entered promiscuous mode [ 304.579581][ T5747] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.586778][ T5747] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.608274][ T5747] device bridge_slave_1 entered promiscuous mode [ 305.816224][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.832842][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.015420][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.042128][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.178138][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.185250][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.365106][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.375371][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.383836][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.390892][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.398442][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.492345][ T5799] FAULT_INJECTION: forcing a failure. [ 306.492345][ T5799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.506272][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.519287][ T5799] CPU: 0 PID: 5799 Comm: syz.3.1486 Not tainted syzkaller #0 [ 306.526700][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 306.536752][ T5799] Call Trace: [ 306.540029][ T5799] [ 306.542956][ T5799] __dump_stack+0x21/0x24 [ 306.547290][ T5799] dump_stack_lvl+0xee/0x150 [ 306.551885][ T5799] ? __cfi_dump_stack_lvl+0x8/0x8 [ 306.556915][ T5799] ? memcpy+0x56/0x70 [ 306.560901][ T5799] dump_stack+0x15/0x24 [ 306.565059][ T5799] should_fail_ex+0x3d4/0x520 [ 306.569742][ T5799] should_fail+0xb/0x10 [ 306.573901][ T5799] should_fail_usercopy+0x1a/0x20 [ 306.578951][ T5799] strncpy_from_user+0x24/0x2d0 [ 306.583812][ T5799] bpf_prog_load+0x1bb/0x15a0 [ 306.588502][ T5799] ? map_freeze+0x390/0x390 [ 306.593016][ T5799] ? selinux_bpf+0xc7/0xf0 [ 306.597519][ T5799] ? security_bpf+0x93/0xb0 [ 306.602066][ T5799] __sys_bpf+0x504/0x780 [ 306.606307][ T5799] ? bpf_link_show_fdinfo+0x320/0x320 [ 306.611682][ T5799] ? __cfi_ksys_write+0x10/0x10 [ 306.616533][ T5799] ? debug_smp_processor_id+0x17/0x20 [ 306.621906][ T5799] __x64_sys_bpf+0x7c/0x90 [ 306.626332][ T5799] x64_sys_call+0x488/0x9a0 [ 306.630837][ T5799] do_syscall_64+0x4c/0xa0 [ 306.635255][ T5799] ? clear_bhb_loop+0x30/0x80 [ 306.639935][ T5799] ? clear_bhb_loop+0x30/0x80 [ 306.644619][ T5799] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 306.650521][ T5799] RIP: 0033:0x7f02e338f749 [ 306.654932][ T5799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.674543][ T5799] RSP: 002b:00007f02e4270038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.682961][ T5799] RAX: ffffffffffffffda RBX: 00007f02e35e6180 RCX: 00007f02e338f749 [ 306.690940][ T5799] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 306.698922][ T5799] RBP: 00007f02e4270090 R08: 0000000000000000 R09: 0000000000000000 [ 306.706898][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.714875][ T5799] R13: 00007f02e35e6218 R14: 00007f02e35e6180 R15: 00007ffcb1757268 [ 306.722861][ T5799] [ 306.728112][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.888016][ T5747] device veth0_vlan entered promiscuous mode [ 306.946276][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.954947][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.963649][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.971893][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.983587][ T5747] device veth1_macvtap entered promiscuous mode [ 307.054041][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.069585][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.081307][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.089792][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.098010][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.142984][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.152509][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.161338][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.170128][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.125198][ T5841] device syzkaller0 entered promiscuous mode [ 310.134572][ T8] device bridge_slave_1 left promiscuous mode [ 310.141000][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.148650][ T8] device bridge_slave_0 left promiscuous mode [ 310.155106][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.181921][ T8] device veth1_macvtap left promiscuous mode [ 310.188104][ T8] device veth0_vlan left promiscuous mode [ 310.800926][ T5846] device veth0_vlan left promiscuous mode [ 310.829764][ T5846] device veth0_vlan entered promiscuous mode [ 311.096753][ T5834] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.156931][ T5834] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.225174][ T5834] device bridge_slave_0 entered promiscuous mode [ 311.288489][ T5834] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.339238][ T5834] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.382904][ T5834] device bridge_slave_1 entered promiscuous mode [ 311.405860][ T5863] device syzkaller0 entered promiscuous mode [ 311.645782][ T5834] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.652902][ T5834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.660219][ T5834] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.667247][ T5834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.918874][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.926631][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.981991][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.057023][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.064844][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.073527][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.081793][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.088829][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.264086][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.313377][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.398581][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.405674][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.604324][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 312.626209][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 312.767147][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 312.831972][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 312.897170][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 312.952990][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 313.051240][ T5834] device veth0_vlan entered promiscuous mode [ 313.107132][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 313.153103][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.280015][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.298945][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.395110][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 313.433825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 313.547746][ T5834] device veth1_macvtap entered promiscuous mode [ 313.653478][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 313.661322][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 313.678627][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 313.695101][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 313.704537][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.839893][ T2926] device bridge_slave_1 left promiscuous mode [ 314.846006][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.853497][ T2926] device bridge_slave_0 left promiscuous mode [ 314.859681][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.867305][ T2926] device veth1_macvtap left promiscuous mode [ 314.873413][ T2926] device veth0_vlan left promiscuous mode [ 315.513144][ T5929] device syzkaller0 entered promiscuous mode [ 315.802957][ T5919] device sit0 left promiscuous mode [ 316.078668][ T5927] device syzkaller0 entered promiscuous mode [ 316.130564][ T5940] device veth1_macvtap left promiscuous mode [ 316.137908][ T28] audit: type=1400 audit(1766096200.718:152): avc: denied { create } for pid=5939 comm="syz.3.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 316.175099][ T5945] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 316.175849][ T2926] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 316.522600][ T5956] syz.1.1522[5956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.522675][ T5956] syz.1.1522[5956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.610943][ T5958] syz.1.1522[5958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.755689][ T5958] syz.1.1522[5958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.087403][ T5938] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.200093][ T5938] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.207638][ T5938] device bridge_slave_0 entered promiscuous mode [ 317.216845][ T5938] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.251622][ T5938] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.367361][ T5938] device bridge_slave_1 entered promiscuous mode [ 317.512632][ T5955] syz.4.1523[5955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.519162][ T5955] syz.4.1523[5955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.668809][ T5955] syz.4.1523[5955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.700683][ T5955] syz.4.1523[5955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.113455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.149470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.180172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.190396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.209343][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.216448][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.250398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.310352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.353343][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.360452][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.375806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.640657][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.651951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.746817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.841621][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.908286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.010000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.108289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.146800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.300472][ T5938] device veth0_vlan entered promiscuous mode [ 319.306782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.372365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.443645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 319.529869][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 319.601009][ T5938] device veth1_macvtap entered promiscuous mode [ 319.670899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 319.694428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.903797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.920312][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.538694][ T2926] device bridge_slave_1 left promiscuous mode [ 321.545804][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.574999][ T6018] syz.3.1535[6018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.575074][ T6018] syz.3.1535[6018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.586927][ T2926] device bridge_slave_0 left promiscuous mode [ 321.694865][ T6018] syz.3.1535[6018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.694938][ T6018] syz.3.1535[6018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.717367][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.881378][ T2926] device veth1_macvtap left promiscuous mode [ 321.887477][ T2926] device veth0_vlan left promiscuous mode [ 322.278033][ T6020] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.300071][ T6020] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.330178][ T6020] device bridge_slave_0 entered promiscuous mode [ 322.391055][ T6020] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.408525][ T6020] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.434484][ T6020] device bridge_slave_1 entered promiscuous mode [ 322.798910][ T6046] device syzkaller0 entered promiscuous mode [ 323.688046][ T6069] ±ÿ: renamed from team_slave_1 [ 323.912324][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.957164][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.022680][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.094929][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.121506][ T6086] syz.4.1549[6086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.121594][ T6086] syz.4.1549[6086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.149367][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.167727][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.225145][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.244275][ T6081] syz.4.1549[6081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.244350][ T6081] syz.4.1549[6081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.259696][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.302949][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.311588][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.318655][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.348955][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.366411][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.449167][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.457302][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.706413][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.715165][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.807235][ T6020] device veth0_vlan entered promiscuous mode [ 324.826049][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.837449][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.854692][ T6020] device veth1_macvtap entered promiscuous mode [ 324.864964][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.880387][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.899146][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.915974][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.933010][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 326.924789][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 326.958220][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 326.973215][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 326.982413][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.045551][ T28] audit: type=1400 audit(1766096211.628:153): avc: denied { getattr } for pid=6115 comm="syz.4.1560" path="net:[4026532486]" dev="nsfs" ino=4026532486 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 327.047835][ T6113] device syzkaller0 entered promiscuous mode [ 327.088611][ T6114] device sit0 left promiscuous mode [ 327.253035][ T6117] device syzkaller0 entered promiscuous mode [ 327.374310][ T6122] device sit0 entered promiscuous mode [ 328.779981][ T2926] device bridge_slave_1 left promiscuous mode [ 328.786102][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.793618][ T2926] device bridge_slave_0 left promiscuous mode [ 328.799840][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.807617][ T2926] device veth1_macvtap left promiscuous mode [ 328.813682][ T2926] device veth0_vlan left promiscuous mode [ 329.263762][ T6142] device syzkaller0 entered promiscuous mode [ 329.325873][ T6149] syz.2.1566[6149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.325945][ T6149] syz.2.1566[6149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.499069][ T6140] syz.2.1566[6140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.644027][ T6140] syz.2.1566[6140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.923292][ T6150] device syzkaller0 entered promiscuous mode [ 330.216692][ T6154] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.224026][ T6154] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.231951][ T6154] device bridge_slave_0 entered promiscuous mode [ 330.239615][ T6154] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.246702][ T6154] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.254342][ T6154] device bridge_slave_1 entered promiscuous mode [ 331.004084][ T6154] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.011186][ T6154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.018467][ T6154] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.025525][ T6154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.364806][ T6195] device veth0_vlan left promiscuous mode [ 331.436499][ T6195] device veth0_vlan entered promiscuous mode [ 331.547184][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.565765][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.574834][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.583269][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.591083][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.790546][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.798912][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.938523][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.075312][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.229400][ T543] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.236490][ T543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.493469][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.602152][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.610478][ T543] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.617508][ T543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.624894][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.720332][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.763688][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.791258][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.957302][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.140072][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.227888][ T6154] device veth0_vlan entered promiscuous mode [ 333.247079][ T6154] device veth1_macvtap entered promiscuous mode [ 333.354663][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.496892][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.599701][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.719915][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.795983][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.848704][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.859748][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.868237][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.876771][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 333.885319][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.901611][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.890196][ T337] device bridge_slave_1 left promiscuous mode [ 334.897168][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.905828][ T337] device bridge_slave_0 left promiscuous mode [ 334.912102][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.921907][ T337] device veth1_macvtap left promiscuous mode [ 334.928008][ T337] device veth0_vlan left promiscuous mode [ 336.280740][ T6262] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.295351][ T6262] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.453301][ T6262] device bridge_slave_0 entered promiscuous mode [ 336.723734][ T6282] device syzkaller0 entered promiscuous mode [ 337.139881][ T6262] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.147055][ T6262] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.170041][ T6262] device bridge_slave_1 entered promiscuous mode [ 337.640934][ T6305] device wg2 left promiscuous mode [ 338.101458][ T6314] device wg2 entered promiscuous mode [ 338.111950][ T6300] device veth0_vlan left promiscuous mode [ 338.262604][ T6300] device veth0_vlan entered promiscuous mode [ 338.409256][ T6326] device sit0 left promiscuous mode [ 338.619570][ T6327] device sit0 entered promiscuous mode [ 339.231018][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.269696][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.504921][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.574583][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.629775][ T543] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.636841][ T543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.644487][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.652937][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.661239][ T543] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.668292][ T543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.675934][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.756343][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.766949][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.923662][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.948201][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.100682][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 340.139584][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.201951][ T6262] device veth0_vlan entered promiscuous mode [ 340.208314][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 340.257013][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.356784][ T6262] device veth1_macvtap entered promiscuous mode [ 340.391707][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.410462][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.473715][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 340.486397][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.494877][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.546340][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.555206][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.564713][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.574011][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.570313][ T543] device bridge_slave_1 left promiscuous mode [ 341.576538][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.584251][ T543] device bridge_slave_0 left promiscuous mode [ 341.590766][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.599155][ T543] device veth1_macvtap left promiscuous mode [ 341.605255][ T543] device veth0_vlan left promiscuous mode [ 342.596734][ T6359] device syzkaller0 entered promiscuous mode [ 343.371932][ T6390] syz.3.1623[6390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.372009][ T6390] syz.3.1623[6390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.384351][ T6390] syz.3.1623[6390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.395998][ T6390] syz.3.1623[6390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.396246][ T6367] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.503561][ T6393] syz.4.1624[6393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.503634][ T6393] syz.4.1624[6393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.528087][ T6367] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.566394][ T6396] syz.4.1624[6396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.566471][ T6396] syz.4.1624[6396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.584796][ T6367] device bridge_slave_0 entered promiscuous mode [ 343.691677][ T6367] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.715222][ T6367] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.764326][ T6367] device bridge_slave_1 entered promiscuous mode [ 344.384318][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.400729][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.464427][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.509420][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.552302][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.559405][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.612796][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.621625][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.632752][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.639828][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.664814][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.673682][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.682361][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.691945][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.700867][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.709607][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 344.724113][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.747925][ T6367] device veth0_vlan entered promiscuous mode [ 344.762976][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.783985][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.793696][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.801669][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.839412][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.897412][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.927168][ T6367] device veth1_macvtap entered promiscuous mode [ 344.965234][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.995010][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 345.079938][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.132410][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 345.193340][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.920146][ T543] device bridge_slave_1 left promiscuous mode [ 345.926322][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.945250][ T543] device bridge_slave_0 left promiscuous mode [ 345.953438][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.984879][ T543] device veth1_macvtap left promiscuous mode [ 345.991714][ T543] device veth0_vlan left promiscuous mode [ 347.400632][ T6434] device syzkaller0 entered promiscuous mode [ 348.120543][ T6454] bond_slave_1: mtu less than device minimum [ 348.224198][ T6450] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.245981][ T6450] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.255112][ T6450] device bridge_slave_0 entered promiscuous mode [ 348.265595][ T6450] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.273313][ T6450] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.281335][ T6450] device bridge_slave_1 entered promiscuous mode [ 348.651739][ T6477] device syzkaller0 entered promiscuous mode [ 349.415270][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.451520][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.529298][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.576176][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.639501][ T2926] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.646600][ T2926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.658981][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.699754][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.769433][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.866628][ T2926] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.873761][ T2926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.981051][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.063008][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.134385][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.193439][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.325584][ T6506] device veth0_vlan left promiscuous mode [ 350.370545][ T6506] device veth0_vlan entered promiscuous mode [ 350.470481][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 350.495193][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.589915][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 350.597979][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.606388][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.613989][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.624908][ T6450] device veth0_vlan entered promiscuous mode [ 350.638416][ T6450] device veth1_macvtap entered promiscuous mode [ 350.676624][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 350.685186][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.693536][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.717815][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.728799][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.737611][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.752713][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.823584][ T6511] device sit0 left promiscuous mode [ 350.929602][ T6511] device sit0 entered promiscuous mode [ 351.959639][ T543] device bridge_slave_1 left promiscuous mode [ 351.965750][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.973193][ T543] device bridge_slave_0 left promiscuous mode [ 351.979371][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.986978][ T543] device veth1_macvtap left promiscuous mode [ 351.993036][ T543] device veth0_vlan left promiscuous mode [ 352.936667][ T6538] device syzkaller0 entered promiscuous mode [ 353.749020][ T6536] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.769112][ T6536] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.798197][ T6536] device bridge_slave_0 entered promiscuous mode [ 353.830389][ T6536] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.837451][ T6536] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.845498][ T6536] device bridge_slave_1 entered promiscuous mode [ 354.455169][ T6536] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.462281][ T6536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.469575][ T6536] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.476606][ T6536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.513428][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.526975][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.599702][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.635292][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.651761][ T2926] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.658844][ T2926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.666682][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.681295][ T2926] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.688382][ T2926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.808769][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.840564][ T6576] syz.1.1666[6576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.840638][ T6576] syz.1.1666[6576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.889605][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.912081][ T6576] syz.1.1666[6576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.914410][ T6576] syz.1.1666[6576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.032687][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.171885][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.305279][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 355.364738][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.499183][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 355.525803][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.688821][ T6587] device syzkaller0 entered promiscuous mode [ 355.862429][ T6536] device veth0_vlan entered promiscuous mode [ 355.869053][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.877587][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.601688][ T6536] device veth1_macvtap entered promiscuous mode [ 356.624392][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 356.653454][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 356.662222][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 356.690712][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 356.712967][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 356.769250][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 356.839507][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.241190][ T6598] syz.3.1672[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.243663][ T6598] syz.3.1672[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.291072][ T6536] syz-executor (6536) used greatest stack depth: 21248 bytes left [ 357.340687][ T6598] syz.3.1672[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.348191][ T6598] syz.3.1672[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.232070][ T543] device bridge_slave_1 left promiscuous mode [ 358.249568][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.257602][ T543] device bridge_slave_0 left promiscuous mode [ 358.263870][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.272359][ T543] device veth1_macvtap left promiscuous mode [ 358.278420][ T543] device veth0_vlan left promiscuous mode [ 359.461040][ T6614] device syzkaller0 entered promiscuous mode [ 360.427822][ T6627] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.519367][ T6627] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.526890][ T6627] device bridge_slave_0 entered promiscuous mode [ 360.549535][ T6637] syz.4.1681[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.549611][ T6637] syz.4.1681[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.748760][ T6637] syz.4.1681[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.761363][ T6637] syz.4.1681[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.812855][ T6627] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.866967][ T6627] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.880673][ T6627] device bridge_slave_1 entered promiscuous mode [ 360.896066][ T6646] bridge0: port 3(veth1_macvtap) entered blocking state [ 360.903442][ T6646] bridge0: port 3(veth1_macvtap) entered disabled state [ 361.251866][ T6627] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.258913][ T6627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.266216][ T6627] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.273267][ T6627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.351138][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.369229][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.528051][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.551164][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.700133][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.806593][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.845659][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.852773][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.860281][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.868734][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.877347][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.884414][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.968513][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.989619][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.080725][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.088992][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.147277][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.200542][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.240452][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 362.269151][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.340939][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.371409][ T6676] syz.4.1690[6676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.371483][ T6676] syz.4.1690[6676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.422532][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.470223][ T6675] syz.4.1690[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.479720][ T6675] syz.4.1690[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.570096][ T6627] device veth0_vlan entered promiscuous mode [ 362.625913][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 362.669615][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 362.818917][ T6627] device veth1_macvtap entered promiscuous mode [ 362.876635][ T6682] syz.4.1693[6682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.888906][ T6682] syz.4.1693[6682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.906575][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.020511][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.084954][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.100191][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 363.314668][ T6699] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.209704][ T736] device bridge_slave_1 left promiscuous mode [ 364.215819][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.223347][ T736] device bridge_slave_0 left promiscuous mode [ 364.229552][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.237268][ T736] device veth1_macvtap left promiscuous mode [ 364.243534][ T736] device veth0_vlan left promiscuous mode [ 365.498964][ T6722] device pim6reg1 entered promiscuous mode [ 365.950832][ T6744] device syzkaller0 entered promiscuous mode [ 365.979730][ T6749] bpf_get_probe_write_proto: 2 callbacks suppressed [ 365.979750][ T6749] syz.4.1707[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.986431][ T6749] syz.4.1707[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.176524][ T6745] syz.4.1707[6745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.239645][ T6745] syz.4.1707[6745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.960286][ T6738] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.079184][ T6738] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.086703][ T6738] device bridge_slave_0 entered promiscuous mode [ 367.159647][ T6738] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.168925][ T6738] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.184148][ T6738] device bridge_slave_1 entered promiscuous mode [ 368.021543][ T6783] syz.3.1714 uses obsolete (PF_INET,SOCK_PACKET) [ 368.845199][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.871078][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.964324][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.985591][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.029695][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.036782][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.088490][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 369.097474][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.105946][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.113011][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.239200][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 369.291221][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.328506][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.336801][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.345136][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.469345][ T6738] device veth0_vlan entered promiscuous mode [ 369.501795][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.519565][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.533063][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.541228][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.565404][ T6738] device veth1_macvtap entered promiscuous mode [ 369.733055][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.749449][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.757331][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.768469][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.777204][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 370.019423][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 370.027776][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.036749][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.047580][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 371.229535][ T337] device bridge_slave_1 left promiscuous mode [ 371.235673][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.243123][ T337] device bridge_slave_0 left promiscuous mode [ 371.249300][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.256898][ T337] device veth1_macvtap left promiscuous mode [ 371.262940][ T337] device veth0_vlan left promiscuous mode [ 372.593129][ T6822] syz.4.1723[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.593205][ T6822] syz.4.1723[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.683101][ T6823] device syzkaller0 entered promiscuous mode [ 372.779503][ T6822] syz.4.1723[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.779581][ T6822] syz.4.1723[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.523619][ T6842] FAULT_INJECTION: forcing a failure. [ 373.523619][ T6842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 373.737560][ T6842] CPU: 1 PID: 6842 Comm: syz.2.1731 Not tainted syzkaller #0 [ 373.744979][ T6842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 373.755042][ T6842] Call Trace: [ 373.758329][ T6842] [ 373.761263][ T6842] __dump_stack+0x21/0x24 [ 373.765598][ T6842] dump_stack_lvl+0xee/0x150 [ 373.770188][ T6842] ? __cfi_dump_stack_lvl+0x8/0x8 [ 373.775221][ T6842] dump_stack+0x15/0x24 [ 373.779381][ T6842] should_fail_ex+0x3d4/0x520 [ 373.784064][ T6842] should_fail+0xb/0x10 [ 373.788229][ T6842] should_fail_usercopy+0x1a/0x20 [ 373.793262][ T6842] _copy_from_user+0x1e/0xc0 [ 373.797862][ T6842] __sys_bpf+0x277/0x780 [ 373.802108][ T6842] ? bpf_link_show_fdinfo+0x320/0x320 [ 373.807484][ T6842] ? __cfi_ksys_write+0x10/0x10 [ 373.812336][ T6842] ? debug_smp_processor_id+0x17/0x20 [ 373.817707][ T6842] __x64_sys_bpf+0x7c/0x90 [ 373.822129][ T6842] x64_sys_call+0x488/0x9a0 [ 373.826632][ T6842] do_syscall_64+0x4c/0xa0 [ 373.831052][ T6842] ? clear_bhb_loop+0x30/0x80 [ 373.835733][ T6842] ? clear_bhb_loop+0x30/0x80 [ 373.840411][ T6842] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 373.846308][ T6842] RIP: 0033:0x7f5658b8f749 [ 373.850719][ T6842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.870327][ T6842] RSP: 002b:00007f5659976038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 373.878842][ T6842] RAX: ffffffffffffffda RBX: 00007f5658de5fa0 RCX: 00007f5658b8f749 [ 373.886821][ T6842] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 373.894799][ T6842] RBP: 00007f5659976090 R08: 0000000000000000 R09: 0000000000000000 [ 373.902773][ T6842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 373.910749][ T6842] R13: 00007f5658de6038 R14: 00007f5658de5fa0 R15: 00007fff02879b78 [ 373.918731][ T6842] [ 374.074483][ T6824] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.128805][ T6824] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.136385][ T6824] device bridge_slave_0 entered promiscuous mode [ 374.143803][ T6824] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.183788][ T6824] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.191604][ T6824] device bridge_slave_1 entered promiscuous mode [ 375.232936][ T6867] device sit0 left promiscuous mode [ 375.564999][ T6877] device syzkaller0 entered promiscuous mode [ 376.445867][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.460328][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.468003][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.477033][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.485708][ T2926] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.492776][ T2926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.501036][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 376.509582][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 376.518002][ T2926] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.525070][ T2926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.565013][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 376.587318][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.600255][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.619707][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.653076][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.766734][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 376.789765][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 376.833969][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.849353][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.915855][ T6824] device veth0_vlan entered promiscuous mode [ 376.940380][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.967039][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.081351][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 377.113137][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.134276][ T6824] device veth1_macvtap entered promiscuous mode [ 377.271199][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 377.283310][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.292970][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.359980][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.403266][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 378.210266][ T543] device bridge_slave_1 left promiscuous mode [ 378.216491][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.224200][ T543] device bridge_slave_0 left promiscuous mode [ 378.230840][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.240109][ T543] device veth1_macvtap left promiscuous mode [ 378.246167][ T543] device veth0_vlan left promiscuous mode [ 379.700100][ T6911] FAULT_INJECTION: forcing a failure. [ 379.700100][ T6911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.729681][ T6911] CPU: 0 PID: 6911 Comm: syz.1.1744 Not tainted syzkaller #0 [ 379.737097][ T6911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 379.747159][ T6911] Call Trace: [ 379.750444][ T6911] [ 379.753375][ T6911] __dump_stack+0x21/0x24 [ 379.757708][ T6911] dump_stack_lvl+0xee/0x150 [ 379.762305][ T6911] ? __cfi_dump_stack_lvl+0x8/0x8 [ 379.767340][ T6911] ? memcpy+0x56/0x70 [ 379.771330][ T6911] dump_stack+0x15/0x24 [ 379.775482][ T6911] should_fail_ex+0x3d4/0x520 [ 379.780166][ T6911] should_fail+0xb/0x10 [ 379.784321][ T6911] should_fail_usercopy+0x1a/0x20 [ 379.789374][ T6911] strncpy_from_user+0x24/0x2d0 [ 379.794228][ T6911] bpf_prog_load+0x1bb/0x15a0 [ 379.798908][ T6911] ? map_freeze+0x390/0x390 [ 379.803422][ T6911] ? selinux_bpf+0xc7/0xf0 [ 379.807836][ T6911] ? security_bpf+0x93/0xb0 [ 379.812344][ T6911] __sys_bpf+0x504/0x780 [ 379.816588][ T6911] ? bpf_link_show_fdinfo+0x320/0x320 [ 379.821973][ T6911] ? __cfi_ksys_write+0x10/0x10 [ 379.826820][ T6911] ? debug_smp_processor_id+0x17/0x20 [ 379.832190][ T6911] __x64_sys_bpf+0x7c/0x90 [ 379.836606][ T6911] x64_sys_call+0x488/0x9a0 [ 379.841111][ T6911] do_syscall_64+0x4c/0xa0 [ 379.845529][ T6911] ? clear_bhb_loop+0x30/0x80 [ 379.850213][ T6911] ? clear_bhb_loop+0x30/0x80 [ 379.854899][ T6911] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 379.860792][ T6911] RIP: 0033:0x7f550478f749 [ 379.865206][ T6911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.884815][ T6911] RSP: 002b:00007f550565e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.893237][ T6911] RAX: ffffffffffffffda RBX: 00007f55049e5fa0 RCX: 00007f550478f749 [ 379.901217][ T6911] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 379.909199][ T6911] RBP: 00007f550565e090 R08: 0000000000000000 R09: 0000000000000000 [ 379.917179][ T6911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.925154][ T6911] R13: 00007f55049e6038 R14: 00007f55049e5fa0 R15: 00007ffec60206d8 [ 379.933135][ T6911] [ 379.967355][ T6922] device syzkaller0 entered promiscuous mode [ 381.257121][ T6925] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.353949][ T6925] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.419598][ T6925] device bridge_slave_0 entered promiscuous mode [ 381.568483][ T6925] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.576412][ T6925] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.584146][ T6925] device bridge_slave_1 entered promiscuous mode [ 381.897393][ T6961] veth0_macvtap: mtu greater than device maximum [ 382.554273][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.579465][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.601221][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.621698][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.669395][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.676490][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.714357][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.749461][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.767905][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.775006][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.919671][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 382.947814][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.985678][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.108595][ T6983] device syzkaller0 entered promiscuous mode [ 383.892607][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 383.901601][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 383.918939][ T6925] device veth0_vlan entered promiscuous mode [ 384.036051][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 384.065099][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.154718][ T6925] device veth1_macvtap entered promiscuous mode [ 384.216135][ T6992] device syzkaller0 entered promiscuous mode [ 384.279170][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.307394][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.347989][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 384.398807][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 384.439864][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.800885][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 384.837824][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 384.925935][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 385.066351][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=1348 state=3 status=67 (errno 32: Broken pipe) [ 385.727847][ T28] audit: type=1400 audit(1766096270.308:154): avc: denied { write } for pid=276 comm="syz-executor" path="pipe:[13853]" dev="pipefs" ino=13853 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 386.620126][ T543] device bridge_slave_1 left promiscuous mode [ 386.626302][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.635409][ T543] device bridge_slave_0 left promiscuous mode [ 386.644005][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.660725][ T543] device veth1_macvtap left promiscuous mode [ 386.666847][ T543] device veth0_vlan left promiscuous mode [ 387.570603][ T543] device bridge_slave_1 left promiscuous mode [ 387.576745][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.584822][ T543] device bridge_slave_0 left promiscuous mode [ 387.599282][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.608269][ T543] device bridge_slave_1 left promiscuous mode [ 387.614547][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.622155][ T543] device bridge_slave_0 left promiscuous mode [ 387.628298][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.640731][ T543] device veth1_macvtap left promiscuous mode [ 389.129764][ T543] device bridge_slave_1 left promiscuous mode [ 389.135912][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.143331][ T543] device bridge_slave_0 left promiscuous mode [ 389.149472][ T543] bridge0: port 1(bridge_slave_0) entered disabled state