last executing test programs: 8.020629159s ago: executing program 3 (id=4388): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0x1eb, 0x10001}, 0x2010, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) 6.756345418s ago: executing program 3 (id=4392): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500f8ff00002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') r5 = gettid() syz_open_procfs$namespace(r5, &(0x7f0000000500)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x1, 0x0, 0x4, 0x2, 0x1, 0x20}]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb269, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x10, 0x0, 0x0) recvmsg(r7, &(0x7f0000000080)={0xfffffffffffffffe, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)=""/224}], 0x2}, 0xf7481d501685431e) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r6}, 0x57) socketpair(0x1, 0x1, 0x8000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 6.467001793s ago: executing program 3 (id=4395): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map=r2, r1, 0x4, 0x2013, r0, @value=r3}, 0x20) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x5, 0x103ba, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r5, 0x0, 0x0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x4, 0x6, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0xd}, 0x0, 0xe, 0x0, 0x0, 0x3, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000080)) 6.227200506s ago: executing program 3 (id=4398): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0004000000ff00"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="000000000500000002000000040000008bed0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="000000000500000002000000040000008bed0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="0900000001000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000020000000000dfffffffffffffff00cd4bc12e12ba15c98e573abdd85eb781c6b8ffca43b61ff62371a834f4fbeff685e0c87c4ef1f16f62ac856eabbe87d4e6dff6d5e252db4c50bfb175fa6e40adfedf28759d"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000006862c62d000004000000000018510b007d92750d78e484d73282b9019e9730508c313175fa6792f4973a1289fc833407b2435218e5a79a067d21f30c52baefdc28936b8ad10b7e68b173821b7949858d0e0b41d19a0000d19acbe1f615cb274f3c5504775fb801b2c5346b37f0797b03528d02437747b6841fab73811fedee70561fad43f5ab03394b510a722520a579bdd2709a9b5db114b10372500bcc3101b385ca7990ce61ffd69297d3b7c0225d4d8d32699ec0b22ddccd4ffbe95f80d04cdbba1e28c42a18d22e4a8e", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB="000000000000f1000000000000001a0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB="000000000000f1000000000000001a0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000f4ffffff0000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001040)={0x0, 0x7, 0x18}, 0xc) 5.98253873s ago: executing program 3 (id=4400): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000085", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0100000004000000060000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000001900000000000000000000000009f76a86bfbbdd6b21840000000000000e000000000000001b785e8cf739df23587429667d98053db2c1a35a49138e4d73c3829679900858df0f2ee6f97dec4f26b700dffc6f03d55d3460b013468e9152678b438326acd2c2b67cb9effa661c1b1f3516e62d65a474ae512dec01e2cf8515e1dc1c674b9178a7a6de650badb222f9b38c7df2ae97052dc2550ac27306ec74109747eba4e204a684687292d750ae3bd029cea339ee59a76faba86d5340c38f16216e9121146a7ffde85073f12b75923a3ee8273381ca00"/232], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000", @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r6, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r7, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2035, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000005c0), &(0x7f0000001c80), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x7, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x14, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="388d36b24d2e8509030090d402000000580000000000000008000000185b00000f00000000000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x8, 0xe5, &(0x7f0000000380)=""/229, 0x40f00, 0x66, '\x00', 0x0, @fallback=0x2e, r1, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x10, 0xfffffffa, 0x9}, 0x10, r9, 0xffffffffffffffff, 0x4, &(0x7f0000000500)=[r5, r5, r0, r5, r4], &(0x7f0000000540)=[{0x2, 0x1, 0xf, 0xa}, {0x1, 0x3, 0xa, 0x8}, {0x3, 0x2, 0xa, 0x6}, {0x0, 0x3, 0x2}], 0x10, 0x3, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x80000000) r10 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x1, @perf_config_ext, 0x100019, 0x9, 0xbad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fd}, r10, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) 3.053557464s ago: executing program 1 (id=4421): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200006600000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057000000"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x28, 0x80000, 0x0, &(0x7f0000000280)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000fe3d59000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 2.69207463s ago: executing program 1 (id=4423): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000003000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300005cf30000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 2.65068896s ago: executing program 3 (id=4425): ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0xc0189436, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r2], &(0x7f0000000bc0), 0x10, 0x3, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0xe00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x10035) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={r4, 0xe0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001400)=[0x0], 0x0, 0x94, &(0x7f0000001440)=[{}], 0x8, 0x10, &(0x7f0000001480), &(0x7f00000014c0), 0x8, 0x3f, 0x8, 0x8, &(0x7f0000001500)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x5, &(0x7f0000000680)=ANY=[@ANYRESDEC=r1, @ANYBLOB="96d6c32242b4aac1d71c11ef16dbef8cea35ec51e6f4117bc22df7fda3456e02f789f518b37c9af1cd2bd1c743cb64c1068f07bd6b79fe614467818279e348d28d604c4f5c915f800e99c0b1de93fafaf5c79733052b31e73b1c5e4dc35b11b10928c5461cb10103534f3f6c6cc99ada152926be7ec1b632de077e3999dac910b873f16fe3cc67844158a93b53e57594547c74dab31beb71bfeb3d1ca4c09e235d5f20c117d148c1", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', r5, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r6, 0x0, 0xffffffffffffffff}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r8}, 0x8) close(r9) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r9, 0x0, 0x0}, 0x10) 2.583299332s ago: executing program 1 (id=4427): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000400)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6e5a, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001140)={r2, &(0x7f0000001000)="b81abe65ac77696ab48d1fadb88660151795e2a56fe580765c65b97f3fa229f8fbb1b1ac3abc08f6bf4a98669b541f4719093982f4b057cf5063d2c5b3c18220c5bd8f3635567b9eeb303951f46f33afa1d9286aab1ce0aeb4072668a2e0cf5862cb1811938d1127eb24342c4730dd2a2f1216b99e9d72448b6eb63d8cab7b6c77d30c4258a6369e908e754581730450a793738c64360e2d6475bc20a679c7507f6c88c780df51e69d9c3658f5682b73dba3b9307fb1dea577781d5f05d55734d99e0bd62033", &(0x7f0000001100)=""/11, 0x4}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="61123000000000006113100000000000bf2000000000000016000200071b48013d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07276702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0x0, 0x0, 0x0, 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.809717993s ago: executing program 0 (id=4429): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x14, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f0000000300)=0x900, &(0x7f0000000340)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x0, 0x2d, 0xf6, &(0x7f0000000000)="e07ea0ac3c364b03ae605c1e0f1677c526a5303a547b119495758a6e8d43b54e3d797385d52e29974c5fe505da", &(0x7f0000000680)=""/246, 0x3, 0x0, 0x7e, 0x7, &(0x7f0000000280)="ae37ef2b5d06db76819e2f886fd3bf7cedf764018d7b0a4f1bf5c5a9ed848acb727580e53ed8b1efa5bf1f130ba93bc25078633b2d05e6539a35da11def37290bd6f5f623752a54b578a104a9e3380edd41a72d1c0bdac8ceb044155f489c3c6e234a39e1385311896449a0f6dd49c531a0b89075319f32a2860c7bfb24a", &(0x7f00000003c0)="013db9e8857457", 0x3, 0x0, 0x1}, 0x50) 1.716290165s ago: executing program 0 (id=4430): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="b4000000000400000f1000000000000063000000000000009500050000000000622167cc525a970268e17740a38f02925549625b01a53d0a078072b0e1"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x10, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x45, 0x0, 0x20, 0x0, 0x40000}, 0x0, 0x40000000000001, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff92) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000005c0)={&(0x7f00000004c0), &(0x7f0000000540)=""/34, &(0x7f0000000580)="94127f0f6d216b6564453e58a90912cb1043103f620ad09ae3a83d", &(0x7f0000000680)="f60473692e7efc2772bab948d6dc2e37ca6247b287b0cab586e190a36263230c62e2ed9f924b86b13b49b04f95e99ce9b26a97bd8a8e44ddd714b33a47908e4510fafdbd38417ba5eb9ff09df7745d35e4de4fbc", 0x2, r4, 0x4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 1.703873165s ago: executing program 1 (id=4431): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d0020850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x11, 0xd, &(0x7f00000017c0)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x71, 0x1000, &(0x7f0000000600)=""/4096, 0x40f00, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001640)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000001680)={0x1, 0x2, 0x2, 0x6ae8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xce3, @void, @value}, 0x94) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001b000000000000000008000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000008c0)='gpio_value\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xd, 0x4, 0x0, 0x9, 0x0, 0x3, 0x40000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x104400, 0xbf, 0x2, 0x6, 0x5, 0x80000001, 0x400, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f00000002c0), 0x0}, 0x20) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) (async) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async) write$cgroup_int(r4, 0x0, 0x0) 1.35860631s ago: executing program 1 (id=4433): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0x1eb, 0x10001}, 0x2010, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000200000000000000000", @ANYRES32, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) 1.35779479s ago: executing program 4 (id=4434): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000010000000500080001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)="3586c0", &(0x7f0000000540), 0x80000000, r0}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x400000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r3}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r8}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x40, 0x1, 0xd, 0x4, 0x0, 0x6, 0x0, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000080), 0x3}, 0x800, 0x200, 0xfb, 0x6, 0x10, 0x3, 0x1, 0x0, 0x100f, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r11, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1.35726096s ago: executing program 2 (id=4435): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="b9ff03076804268c989e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000700)='erofs_lookup\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) (async) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x5, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x9b, &(0x7f0000000740)}, 0x54) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000140)='afs_receive_data\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0xc8, 0x7, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r8) (async, rerun: 64) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', r7, 0x4000, r8}, 0x18) (async, rerun: 64) write$cgroup_subtree(r7, &(0x7f0000000200)=ANY=[], 0x12) 1.35654658s ago: executing program 2 (id=4436): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0x1eb, 0x10001}, 0x2010, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000200000000000000000", @ANYRES32, @ANYRES16=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) 1.34382588s ago: executing program 4 (id=4437): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x5, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffefffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0x4000000000000c8, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) syz_clone(0xd0100500, &(0x7f0000000680)="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", 0x1000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)="5b9f7bcd1f1b9d8c50ff4493c0c1ac9ec5d0d97b15f0155583cbe64ba5e9c94c09b1a592873a77124d12a2419713a915f39c8c15903c6e93098d9991ef73ad6fd31135b53f3602d1b2bd26c446fb63419d6db53c3b44f5046dfd1947631b553fdf5050f33ba5ac7e445bbbae0a061c231b905b277e3616e9d482792c52a64635f0fbf6a68e621c0f8d59b7d1fd92c1bff3ff13dd145c0020091d7d93adbb721840add5af21dfaadad319b8fbf734d3c76d11627e39ce17149cec10") recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0x13) 1.323934541s ago: executing program 4 (id=4438): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x10, &(0x7f0000001000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x36) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000df98c6a8000000000000850000004f00000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x96) 1.194365102s ago: executing program 0 (id=4439): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESOCT=r0, @ANYRES8=r4, @ANYRESOCT=0x0, @ANYRES32=r1, @ANYRESHEX=r4], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d000000000000000002000000000000000000000a020000"], &(0x7f0000003740)=""/138, 0x3a, 0x8a, 0x1, 0x0, 0x0, @void, @value}, 0x28) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r8 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x58202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xc}, 0xa100, 0xc4, 0x3, 0x6}, 0x0, 0xffffffffffffdffb, r8, 0x0) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) 1.064980774s ago: executing program 0 (id=4440): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) socketpair(0x1e, 0x1, 0x500, &(0x7f0000000040)={0x0, 0x0}) 1.014306115s ago: executing program 2 (id=4441): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x7}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc42a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r2) 1.012801525s ago: executing program 4 (id=4442): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e85"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESOCT=r0, @ANYRES8, @ANYRESOCT=0x0, @ANYRES32=r1, @ANYRES16, @ANYRESHEX], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d000000000000000002000000000000000000000a020000"], &(0x7f0000003740)=""/138, 0x3a, 0x8a, 0x1, 0x0, 0x0, @void, @value}, 0x28) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x58202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xc}, 0xa100, 0xc4, 0x3, 0x6}, 0x0, 0xffffffffffffdffb, r7, 0x0) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) 1.011211395s ago: executing program 0 (id=4443): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000001140)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000780)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) close(r5) write$cgroup_type(r6, &(0x7f0000000280), 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 577.356902ms ago: executing program 2 (id=4444): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (fail_nth: 5) 242.218657ms ago: executing program 2 (id=4445): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) (async) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00', @ANYRES32], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00', @ANYRES32], 0x50) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000001419"], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r5) (async) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 230.258667ms ago: executing program 0 (id=4446): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000800), &(0x7f0000000200)=r5}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x6, 0x0, 0xa, 0x9, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x0, 0x2, 0x0, r7}, {}, {0x46, 0x8, 0xfff4, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 195.188317ms ago: executing program 1 (id=4447): bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x84}, {0x6}]}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r5}, 0x50) close(0xffffffffffffffff) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r6) 76.813489ms ago: executing program 2 (id=4448): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f086dd47fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x300, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) 612.38µs ago: executing program 4 (id=4449): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0x4, 0x1, 0x0, 0x1, 0x2000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x60000000}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0x4, 0x1, 0x0, 0x1, 0x2000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x60000000}, 0xc) (async) 0s ago: executing program 4 (id=4450): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESOCT=r0, @ANYRES8=r4, @ANYRESOCT=0x0, @ANYRES32=r1, @ANYRESHEX=r4], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d000000000000000002000000000000000000000a020000"], &(0x7f0000003740)=""/138, 0x3a, 0x8a, 0x1, 0x0, 0x0, @void, @value}, 0x28) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r8 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x58202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xc}, 0xa100, 0xc4, 0x3, 0x6}, 0x0, 0xffffffffffffdffb, r8, 0x0) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.28' (ED25519) to the list of known hosts. [ 22.159709][ T24] audit: type=1400 audit(1750142680.230:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.160988][ T267] cgroup: Unknown subsys name 'net' [ 22.182490][ T24] audit: type=1400 audit(1750142680.230:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.209852][ T24] audit: type=1400 audit(1750142680.260:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.210128][ T267] cgroup: Unknown subsys name 'devices' [ 22.378107][ T267] cgroup: Unknown subsys name 'hugetlb' [ 22.383748][ T267] cgroup: Unknown subsys name 'rlimit' [ 22.553999][ T24] audit: type=1400 audit(1750142680.620:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.577331][ T24] audit: type=1400 audit(1750142680.620:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.602240][ T24] audit: type=1400 audit(1750142680.620:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.609511][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.634270][ T24] audit: type=1400 audit(1750142680.700:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.659787][ T24] audit: type=1400 audit(1750142680.700:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.705634][ T24] audit: type=1400 audit(1750142680.770:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.731180][ T24] audit: type=1400 audit(1750142680.770:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.757373][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.605957][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.613066][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.620500][ T275] device bridge_slave_0 entered promiscuous mode [ 23.628887][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.635924][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.643380][ T275] device bridge_slave_1 entered promiscuous mode [ 23.695493][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.702825][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.710360][ T276] device bridge_slave_0 entered promiscuous mode [ 23.718355][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.725393][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.732804][ T276] device bridge_slave_1 entered promiscuous mode [ 23.746828][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.753869][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.761291][ T278] device bridge_slave_0 entered promiscuous mode [ 23.768132][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.775165][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.782583][ T278] device bridge_slave_1 entered promiscuous mode [ 23.823556][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.830630][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.838054][ T279] device bridge_slave_0 entered promiscuous mode [ 23.866067][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.873157][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.880543][ T279] device bridge_slave_1 entered promiscuous mode [ 23.933074][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.940216][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.947647][ T277] device bridge_slave_0 entered promiscuous mode [ 23.969456][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.977197][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.984454][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.991581][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.002099][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.009198][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.016659][ T277] device bridge_slave_1 entered promiscuous mode [ 24.042680][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.049774][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.057049][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.064069][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.094745][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.101820][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.109097][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.116132][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.139789][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.146861][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.154103][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.161144][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.195300][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.202630][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.209855][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.217570][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.224746][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.232089][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.239581][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.247005][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.254148][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.263523][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.271801][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.278851][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.298805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.306556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.313933][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.321387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.329872][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.336935][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.344887][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.353106][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.360173][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.386941][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.395196][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.402232][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.409975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.418352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.426856][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.434742][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.442732][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.457004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.465332][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.472404][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.479925][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.488214][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.495355][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.502731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.515985][ T276] device veth0_vlan entered promiscuous mode [ 24.538498][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.547984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.555936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.563638][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.571378][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.579544][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.586572][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.593885][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.602105][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.609131][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.616481][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.624599][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.632716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.640941][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.647993][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.655340][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.663889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.672148][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.679196][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.687095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.701158][ T275] device veth0_vlan entered promiscuous mode [ 24.715113][ T279] device veth0_vlan entered promiscuous mode [ 24.725624][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.733568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.741831][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.751499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.759962][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.768045][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.775911][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.783791][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.791834][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.800051][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.808181][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.816610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.824532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.832614][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.840654][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.848223][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.855590][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.863102][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.873390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.881688][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.899063][ T276] device veth1_macvtap entered promiscuous mode [ 24.907384][ T275] device veth1_macvtap entered promiscuous mode [ 24.917320][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.924938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.933296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.942044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.949829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.958195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.966543][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.974710][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.986939][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.994823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.006367][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.013915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.021383][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.029921][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.041636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.050054][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.063887][ T279] device veth1_macvtap entered promiscuous mode [ 25.070572][ T278] device veth0_vlan entered promiscuous mode [ 25.082619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.091032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.099427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.107725][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.115786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.123917][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.131872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.139888][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.148195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.156850][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.164268][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.171834][ T277] device veth0_vlan entered promiscuous mode [ 25.186017][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 25.199527][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.202570][ T277] device veth1_macvtap entered promiscuous mode [ 25.221686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.231730][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.240493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.250282][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.258815][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.267283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.275471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.283472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.291716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.306742][ T278] device veth1_macvtap entered promiscuous mode [ 25.322376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.336960][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.345259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.363578][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.373379][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.382579][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.402588][ C0] hrtimer: interrupt took 19174 ns [ 25.435007][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.466520][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.476597][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.022714][ T315] device veth0_vlan left promiscuous mode [ 26.029481][ T315] device veth0_vlan entered promiscuous mode [ 26.090063][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.103070][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.111174][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.736297][ T343] ÿÿÿÿÿÿ: renamed from vlan1 [ 29.817575][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 29.817588][ T24] audit: type=1400 audit(1750142687.890:112): avc: denied { read } for pid=362 comm="syz.1.19" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.956615][ T24] audit: type=1400 audit(1750142687.920:113): avc: denied { open } for pid=362 comm="syz.1.19" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.957295][ T371] device veth0_vlan left promiscuous mode [ 29.980042][ T24] audit: type=1400 audit(1750142687.920:114): avc: denied { ioctl } for pid=362 comm="syz.1.19" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.010322][ T371] device veth0_vlan entered promiscuous mode [ 30.092636][ T24] audit: type=1400 audit(1750142688.090:115): avc: denied { write } for pid=362 comm="syz.1.19" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.331834][ T377] device pim6reg1 entered promiscuous mode [ 31.577017][ T411] device veth0_vlan left promiscuous mode [ 31.620578][ T411] device veth0_vlan entered promiscuous mode [ 32.614040][ T420] device syzkaller0 entered promiscuous mode [ 32.630009][ T425] cgroup: syz.1.37 (425) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 32.711562][ T425] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 32.768834][ T24] audit: type=1400 audit(1750142690.840:116): avc: denied { create } for pid=424 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 32.889759][ T431] device pim6reg1 entered promiscuous mode [ 33.046575][ T434] device veth0_vlan left promiscuous mode [ 33.058739][ T434] device veth0_vlan entered promiscuous mode [ 33.298977][ T24] audit: type=1400 audit(1750142691.370:117): avc: denied { create } for pid=440 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.650391][ T446] device syzkaller0 entered promiscuous mode [ 34.165310][ T464] device veth0_vlan left promiscuous mode [ 34.172250][ T464] device veth0_vlan entered promiscuous mode [ 34.276187][ T468] device veth0_to_team entered promiscuous mode [ 34.304149][ T24] audit: type=1400 audit(1750142692.370:118): avc: denied { create } for pid=471 comm="syz.2.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.689952][ T482] device veth0_vlan left promiscuous mode [ 34.722268][ T482] device veth0_vlan entered promiscuous mode [ 34.762087][ T24] audit: type=1400 audit(1750142692.830:119): avc: denied { create } for pid=485 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.809149][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.818041][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.840169][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 36.736292][ T540] device veth0_vlan left promiscuous mode [ 36.744955][ T540] device veth0_vlan entered promiscuous mode [ 38.144175][ T574] device veth0_vlan left promiscuous mode [ 38.202403][ T574] device veth0_vlan entered promiscuous mode [ 38.229074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.302368][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.351285][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 38.672991][ T582] ref_ctr_offset mismatch. inode: 0x70 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 39.356268][ T593] device veth0_vlan left promiscuous mode [ 39.366658][ T593] device veth0_vlan entered promiscuous mode [ 39.406328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.436930][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.485196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.904886][ T603] device veth0_vlan left promiscuous mode [ 39.917148][ T603] device veth0_vlan entered promiscuous mode [ 41.266635][ T625] device pim6reg1 entered promiscuous mode [ 41.944964][ T635] device veth0_vlan left promiscuous mode [ 41.968230][ T635] device veth0_vlan entered promiscuous mode [ 44.578891][ T701] device veth0_vlan left promiscuous mode [ 44.585525][ T701] device veth0_vlan entered promiscuous mode [ 44.662371][ T703] device sit0 entered promiscuous mode [ 44.877680][ T707] device syzkaller0 entered promiscuous mode [ 45.541909][ T730] device veth0_vlan left promiscuous mode [ 45.588626][ T730] device veth0_vlan entered promiscuous mode [ 46.101318][ T744] device veth0_vlan left promiscuous mode [ 46.108144][ T744] device veth0_vlan entered promiscuous mode [ 46.174866][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.183799][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.191426][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.342309][ T24] audit: type=1400 audit(1750142704.410:120): avc: denied { associate } for pid=763 comm="syz.0.142" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 46.532584][ T773] device veth0_vlan left promiscuous mode [ 46.539319][ T773] device veth0_vlan entered promiscuous mode [ 47.997785][ T814] device veth0_vlan left promiscuous mode [ 48.032458][ T814] device veth0_vlan entered promiscuous mode [ 48.248832][ T24] audit: type=1400 audit(1750142706.310:121): avc: denied { create } for pid=818 comm="syz.3.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 48.416264][ T24] audit: type=1400 audit(1750142706.480:122): avc: denied { ioctl } for pid=818 comm="syz.3.157" path="socket:[16743]" dev="sockfs" ino=16743 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.456960][ T825] device veth0_vlan left promiscuous mode [ 48.463245][ T825] device veth0_vlan entered promiscuous mode [ 48.851705][ T24] audit: type=1400 audit(1750142706.920:123): avc: denied { relabelfrom } for pid=838 comm="syz.3.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 48.904876][ T843] FAULT_INJECTION: forcing a failure. [ 48.904876][ T843] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 48.936214][ T24] audit: type=1400 audit(1750142706.930:124): avc: denied { relabelto } for pid=838 comm="syz.3.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 48.986497][ T843] CPU: 0 PID: 843 Comm: syz.2.164 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 48.996267][ T843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 49.006337][ T843] Call Trace: [ 49.009641][ T843] __dump_stack+0x21/0x24 [ 49.013968][ T843] dump_stack_lvl+0x169/0x1d8 [ 49.018639][ T843] ? show_regs_print_info+0x18/0x18 [ 49.023836][ T843] dump_stack+0x15/0x1c [ 49.028002][ T843] should_fail+0x3c1/0x510 [ 49.032418][ T843] should_fail_alloc_page+0x4f/0x60 [ 49.037612][ T843] __alloc_pages_nodemask+0x109/0x5f0 [ 49.042978][ T843] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 49.048522][ T843] ? _raw_spin_trylock_bh+0x130/0x130 [ 49.053922][ T843] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 49.060262][ T843] __get_free_pages+0xe/0x30 [ 49.064865][ T843] kasan_populate_vmalloc_pte+0x29/0x120 [ 49.070506][ T843] __apply_to_page_range+0x74e/0x9e0 [ 49.075845][ T843] ? kasan_populate_vmalloc+0x70/0x70 [ 49.081211][ T843] ? kasan_populate_vmalloc+0x70/0x70 [ 49.086577][ T843] apply_to_page_range+0x3b/0x50 [ 49.091506][ T843] kasan_populate_vmalloc+0x60/0x70 [ 49.096724][ T843] alloc_vmap_area+0x1734/0x1870 [ 49.101661][ T843] ? vm_map_ram+0x9c0/0x9c0 [ 49.106160][ T843] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 49.111703][ T843] ? selinux_capable+0x29c/0x380 [ 49.116631][ T843] ? __get_vm_area_node+0x113/0x450 [ 49.121840][ T843] __get_vm_area_node+0x147/0x450 [ 49.126862][ T843] __vmalloc_node_range+0xe0/0x780 [ 49.131966][ T843] ? array_map_alloc+0x330/0x7c0 [ 49.136909][ T843] bpf_map_area_alloc+0xd5/0xe0 [ 49.141757][ T843] ? array_map_alloc+0x330/0x7c0 [ 49.146686][ T843] array_map_alloc+0x330/0x7c0 [ 49.151443][ T843] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 49.157071][ T843] ? irq_exit_rcu+0x9/0x10 [ 49.161487][ T843] ? fd_array_map_alloc_check+0x23a/0x310 [ 49.167202][ T843] map_create+0x441/0x2190 [ 49.171625][ T843] __se_sys_bpf+0x203/0x680 [ 49.176123][ T843] ? __x64_sys_bpf+0x90/0x90 [ 49.180719][ T843] ? debug_smp_processor_id+0x17/0x20 [ 49.186085][ T843] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 49.192148][ T843] __x64_sys_bpf+0x7b/0x90 [ 49.196561][ T843] do_syscall_64+0x31/0x40 [ 49.200972][ T843] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.206857][ T843] RIP: 0033:0x7f0733acb929 [ 49.211287][ T843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.230886][ T843] RSP: 002b:00007f0732134038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.239293][ T843] RAX: ffffffffffffffda RBX: 00007f0733cf2fa0 RCX: 00007f0733acb929 [ 49.247257][ T843] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 49.255903][ T843] RBP: 00007f0732134090 R08: 0000000000000000 R09: 0000000000000000 [ 49.263955][ T843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.271927][ T843] R13: 0000000000000000 R14: 00007f0733cf2fa0 R15: 00007ffdee42e458 [ 49.733251][ T24] audit: type=1400 audit(1750142707.800:125): avc: denied { create } for pid=860 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 51.295828][ T888] device veth0_vlan left promiscuous mode [ 51.303986][ T888] device veth0_vlan entered promiscuous mode [ 51.489607][ T897] device veth0_vlan left promiscuous mode [ 51.526449][ T897] device veth0_vlan entered promiscuous mode [ 51.557651][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.581915][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.616849][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.778081][ T909] device veth0_vlan left promiscuous mode [ 51.821948][ T909] device veth0_vlan entered promiscuous mode [ 52.144788][ T907] device syzkaller0 entered promiscuous mode [ 52.443852][ T941] FAULT_INJECTION: forcing a failure. [ 52.443852][ T941] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 52.596648][ T941] CPU: 0 PID: 941 Comm: syz.0.199 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 52.606421][ T941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 52.616512][ T941] Call Trace: [ 52.619813][ T941] __dump_stack+0x21/0x24 [ 52.624154][ T941] dump_stack_lvl+0x169/0x1d8 [ 52.628829][ T941] ? show_regs_print_info+0x18/0x18 [ 52.634024][ T941] ? irq_exit_rcu+0x9/0x10 [ 52.638437][ T941] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 52.644249][ T941] dump_stack+0x15/0x1c [ 52.648405][ T941] should_fail+0x3c1/0x510 [ 52.652824][ T941] should_fail_alloc_page+0x4f/0x60 [ 52.658016][ T941] __alloc_pages_nodemask+0x109/0x5f0 [ 52.663383][ T941] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 52.668933][ T941] ? _raw_spin_trylock_bh+0x130/0x130 [ 52.674299][ T941] ? debug_smp_processor_id+0x17/0x20 [ 52.679666][ T941] __get_free_pages+0xe/0x30 [ 52.684246][ T941] kasan_populate_vmalloc_pte+0x29/0x120 [ 52.689870][ T941] __apply_to_page_range+0x74e/0x9e0 [ 52.695151][ T941] ? kasan_populate_vmalloc+0x70/0x70 [ 52.700523][ T941] ? kasan_populate_vmalloc+0x70/0x70 [ 52.705889][ T941] apply_to_page_range+0x3b/0x50 [ 52.710827][ T941] kasan_populate_vmalloc+0x60/0x70 [ 52.716022][ T941] alloc_vmap_area+0x1734/0x1870 [ 52.720960][ T941] ? vm_map_ram+0x9c0/0x9c0 [ 52.725503][ T941] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 52.731042][ T941] ? __get_vm_area_node+0x113/0x450 [ 52.736235][ T941] __get_vm_area_node+0x147/0x450 [ 52.741255][ T941] __vmalloc_node_range+0xe0/0x780 [ 52.746360][ T941] ? array_map_alloc+0x330/0x7c0 [ 52.751299][ T941] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 52.757468][ T941] bpf_map_area_alloc+0xd5/0xe0 [ 52.762317][ T941] ? array_map_alloc+0x330/0x7c0 [ 52.767249][ T941] array_map_alloc+0x330/0x7c0 [ 52.772031][ T941] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 52.777661][ T941] ? fd_array_map_alloc_check+0x23a/0x310 [ 52.783385][ T941] map_create+0x441/0x2190 [ 52.787799][ T941] __se_sys_bpf+0x203/0x680 [ 52.792303][ T941] ? __x64_sys_bpf+0x90/0x90 [ 52.796894][ T941] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 52.803040][ T941] __x64_sys_bpf+0x7b/0x90 [ 52.807456][ T941] do_syscall_64+0x31/0x40 [ 52.811872][ T941] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.817757][ T941] RIP: 0033:0x7fe4bfc1f929 [ 52.822166][ T941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.841769][ T941] RSP: 002b:00007fe4be288038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.850188][ T941] RAX: ffffffffffffffda RBX: 00007fe4bfe46fa0 RCX: 00007fe4bfc1f929 [ 52.858345][ T941] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 52.870825][ T941] RBP: 00007fe4be288090 R08: 0000000000000000 R09: 0000000000000000 [ 52.878789][ T941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 52.886839][ T941] R13: 0000000000000000 R14: 00007fe4bfe46fa0 R15: 00007ffdde6468c8 [ 53.460079][ T981] device sit0 entered promiscuous mode [ 53.562260][ T24] audit: type=1400 audit(1750142711.630:126): avc: denied { create } for pid=980 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 54.303038][ T1011] FAULT_INJECTION: forcing a failure. [ 54.303038][ T1011] name failslab, interval 1, probability 0, space 0, times 1 [ 54.356465][ T1011] CPU: 1 PID: 1011 Comm: syz.0.218 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 54.366302][ T1011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 54.376360][ T1011] Call Trace: [ 54.379700][ T1011] __dump_stack+0x21/0x24 [ 54.384031][ T1011] dump_stack_lvl+0x169/0x1d8 [ 54.388712][ T1011] ? thaw_kernel_threads+0x220/0x220 [ 54.393998][ T1011] ? show_regs_print_info+0x18/0x18 [ 54.399213][ T1011] ? should_fail+0x35c/0x510 [ 54.403795][ T1011] dump_stack+0x15/0x1c [ 54.407982][ T1011] should_fail+0x3c1/0x510 [ 54.412402][ T1011] ? __vmalloc_node_range+0x29f/0x780 [ 54.417772][ T1011] __should_failslab+0xa4/0xe0 [ 54.422618][ T1011] should_failslab+0x9/0x20 [ 54.427118][ T1011] __kmalloc+0x60/0x330 [ 54.431386][ T1011] __vmalloc_node_range+0x29f/0x780 [ 54.436585][ T1011] bpf_map_area_alloc+0xd5/0xe0 [ 54.441424][ T1011] ? array_map_alloc+0x330/0x7c0 [ 54.446352][ T1011] array_map_alloc+0x330/0x7c0 [ 54.451110][ T1011] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 54.456735][ T1011] ? fd_array_map_alloc_check+0x23a/0x310 [ 54.462453][ T1011] map_create+0x441/0x2190 [ 54.466871][ T1011] __se_sys_bpf+0x203/0x680 [ 54.471364][ T1011] ? __x64_sys_bpf+0x90/0x90 [ 54.475955][ T1011] ? debug_smp_processor_id+0x17/0x20 [ 54.481331][ T1011] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 54.487394][ T1011] __x64_sys_bpf+0x7b/0x90 [ 54.491889][ T1011] do_syscall_64+0x31/0x40 [ 54.496323][ T1011] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.502432][ T1011] RIP: 0033:0x7fe4bfc1f929 [ 54.506853][ T1011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.526465][ T1011] RSP: 002b:00007fe4be288038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.534873][ T1011] RAX: ffffffffffffffda RBX: 00007fe4bfe46fa0 RCX: 00007fe4bfc1f929 [ 54.542924][ T1011] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 54.550889][ T1011] RBP: 00007fe4be288090 R08: 0000000000000000 R09: 0000000000000000 [ 54.558854][ T1011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 54.566836][ T1011] R13: 0000000000000000 R14: 00007fe4bfe46fa0 R15: 00007ffdde6468c8 [ 54.930399][ T994] device veth0_vlan left promiscuous mode [ 54.971130][ T994] device veth0_vlan entered promiscuous mode [ 55.630315][ T1027] device veth0_vlan left promiscuous mode [ 55.668201][ T1027] device veth0_vlan entered promiscuous mode [ 55.674339][ T24] audit: type=1400 audit(1750142713.740:127): avc: denied { create } for pid=1030 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 55.769132][ T1028] device syzkaller0 entered promiscuous mode [ 56.743324][ T1060] FAULT_INJECTION: forcing a failure. [ 56.743324][ T1060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 56.826274][ T1060] CPU: 0 PID: 1060 Comm: syz.4.233 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 56.836128][ T1060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 56.846385][ T1060] Call Trace: [ 56.849689][ T1060] __dump_stack+0x21/0x24 [ 56.854020][ T1060] dump_stack_lvl+0x169/0x1d8 [ 56.858698][ T1060] ? show_regs_print_info+0x18/0x18 [ 56.863895][ T1060] dump_stack+0x15/0x1c [ 56.868261][ T1060] should_fail+0x3c1/0x510 [ 56.873298][ T1060] should_fail_alloc_page+0x4f/0x60 [ 56.878498][ T1060] __alloc_pages_nodemask+0x109/0x5f0 [ 56.883868][ T1060] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 56.889561][ T1060] ? __kmalloc+0x1a7/0x330 [ 56.893975][ T1060] ? __vmalloc_node_range+0x29f/0x780 [ 56.899357][ T1060] __vmalloc_node_range+0x353/0x780 [ 56.904561][ T1060] bpf_map_area_alloc+0xd5/0xe0 [ 56.909406][ T1060] ? array_map_alloc+0x330/0x7c0 [ 56.914333][ T1060] array_map_alloc+0x330/0x7c0 [ 56.919107][ T1060] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 56.924731][ T1060] ? map_create+0x2cc/0x2190 [ 56.929312][ T1060] ? fd_array_map_alloc_check+0x23a/0x310 [ 56.935022][ T1060] map_create+0x441/0x2190 [ 56.939517][ T1060] __se_sys_bpf+0x203/0x680 [ 56.944016][ T1060] ? __x64_sys_bpf+0x90/0x90 [ 56.948603][ T1060] __x64_sys_bpf+0x7b/0x90 [ 56.953013][ T1060] do_syscall_64+0x31/0x40 [ 56.957433][ T1060] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 56.963316][ T1060] RIP: 0033:0x7f3f76d81929 [ 56.967727][ T1060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.987413][ T1060] RSP: 002b:00007f3f753ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 56.995817][ T1060] RAX: ffffffffffffffda RBX: 00007f3f76fa8fa0 RCX: 00007f3f76d81929 [ 57.003782][ T1060] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 57.011748][ T1060] RBP: 00007f3f753ea090 R08: 0000000000000000 R09: 0000000000000000 [ 57.019712][ T1060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 57.027686][ T1060] R13: 0000000000000000 R14: 00007f3f76fa8fa0 R15: 00007fff81f76468 [ 57.231773][ T24] audit: type=1400 audit(1750142715.300:128): avc: denied { write } for pid=1076 comm="syz.4.239" name="cgroup.subtree_control" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 57.344652][ T1077] device veth0_vlan left promiscuous mode [ 57.364708][ T24] audit: type=1400 audit(1750142715.340:129): avc: denied { open } for pid=1076 comm="syz.4.239" path="" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 57.404696][ T1077] device veth0_vlan entered promiscuous mode [ 57.510303][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.542207][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.566569][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 57.913523][ T1115] FAULT_INJECTION: forcing a failure. [ 57.913523][ T1115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 57.963145][ T1115] CPU: 1 PID: 1115 Comm: syz.2.248 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 57.972997][ T1115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 57.983060][ T1115] Call Trace: [ 57.986369][ T1115] __dump_stack+0x21/0x24 [ 57.990702][ T1115] dump_stack_lvl+0x169/0x1d8 [ 57.995495][ T1115] ? show_regs_print_info+0x18/0x18 [ 58.000699][ T1115] dump_stack+0x15/0x1c [ 58.004890][ T1115] should_fail+0x3c1/0x510 [ 58.009313][ T1115] should_fail_alloc_page+0x4f/0x60 [ 58.014519][ T1115] __alloc_pages_nodemask+0x109/0x5f0 [ 58.019900][ T1115] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 58.025453][ T1115] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 58.031266][ T1115] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 58.037421][ T1115] ? __vmalloc_node_range+0x323/0x780 [ 58.042798][ T1115] __vmalloc_node_range+0x353/0x780 [ 58.048009][ T1115] bpf_map_area_alloc+0xd5/0xe0 [ 58.052870][ T1115] ? array_map_alloc+0x330/0x7c0 [ 58.057805][ T1115] array_map_alloc+0x330/0x7c0 [ 58.062575][ T1115] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 58.068225][ T1115] ? fd_array_map_alloc_check+0x92/0x310 [ 58.073871][ T1115] map_create+0x441/0x2190 [ 58.078294][ T1115] __se_sys_bpf+0x203/0x680 [ 58.082807][ T1115] ? __x64_sys_bpf+0x90/0x90 [ 58.087411][ T1115] __x64_sys_bpf+0x7b/0x90 [ 58.091836][ T1115] do_syscall_64+0x31/0x40 [ 58.096258][ T1115] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 58.102151][ T1115] RIP: 0033:0x7f0733acb929 [ 58.106580][ T1115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.126201][ T1115] RSP: 002b:00007f0732134038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 58.134644][ T1115] RAX: ffffffffffffffda RBX: 00007f0733cf2fa0 RCX: 00007f0733acb929 [ 58.142620][ T1115] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 58.150594][ T1115] RBP: 00007f0732134090 R08: 0000000000000000 R09: 0000000000000000 [ 58.158567][ T1115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 58.166542][ T1115] R13: 0000000000000000 R14: 00007f0733cf2fa0 R15: 00007ffdee42e458 [ 58.771871][ T1136] device veth0_vlan left promiscuous mode [ 58.794998][ T1136] device veth0_vlan entered promiscuous mode [ 59.835705][ T24] audit: type=1400 audit(1750142717.900:130): avc: denied { create } for pid=1174 comm="syz.4.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 59.956260][ T24] audit: type=1400 audit(1750142717.910:131): avc: denied { create } for pid=1174 comm="syz.4.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 60.673778][ T1195] device veth0_vlan left promiscuous mode [ 60.716659][ T1195] device veth0_vlan entered promiscuous mode [ 62.305111][ T24] audit: type=1400 audit(1750142720.370:132): avc: denied { create } for pid=1250 comm="syz.1.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 62.677958][ T1270] device pim6reg1 entered promiscuous mode [ 62.707071][ T24] audit: type=1400 audit(1750142720.780:133): avc: denied { create } for pid=1267 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.197785][ T24] audit: type=1400 audit(1750142721.260:134): avc: denied { tracepoint } for pid=1284 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 63.564753][ T24] audit: type=1400 audit(1750142721.630:135): avc: denied { create } for pid=1296 comm="syz.3.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 64.267206][ T1328] device veth0_vlan left promiscuous mode [ 64.274785][ T1328] device veth0_vlan entered promiscuous mode [ 64.287741][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.300377][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.322360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.307693][ T1359] device wg2 entered promiscuous mode [ 65.771101][ T24] audit: type=1400 audit(1750142723.840:136): avc: denied { create } for pid=1365 comm="syz.4.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 66.330747][ T24] audit: type=1400 audit(1750142724.400:137): avc: denied { create } for pid=1375 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 67.550257][ T1428] device syzkaller0 entered promiscuous mode [ 68.678758][ T1472] syz.0.360[1472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.678913][ T1472] syz.0.360[1472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.399517][ T1490] device veth0_vlan left promiscuous mode [ 69.509303][ T24] audit: type=1400 audit(1750142727.580:138): avc: denied { ioctl } for pid=1478 comm="syz.2.363" path="mnt:[4026532453]" dev="nsfs" ino=4026532453 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.557028][ T1490] device veth0_vlan entered promiscuous mode [ 70.414427][ T24] audit: type=1400 audit(1750142728.480:139): avc: denied { create } for pid=1524 comm="syz.0.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 70.579627][ T1539] device wg2 entered promiscuous mode [ 70.667854][ T1541] device sit0 left promiscuous mode [ 70.673158][ T24] audit: type=1400 audit(1750142728.740:140): avc: denied { create } for pid=1537 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 70.810603][ T1549] syz.3.386[1549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.810690][ T1549] syz.3.386[1549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.868872][ T1555] device pim6reg1 entered promiscuous mode [ 70.938515][ T1549] syz.3.386[1549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.938603][ T1549] syz.3.386[1549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.023927][ T1564] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.044776][ T1564] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.109495][ T1555] ÿÿÿÿÿÿ: renamed from vlan1 [ 71.139872][ T1564] device bridge_slave_1 left promiscuous mode [ 71.153128][ T1564] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.253952][ T1564] device bridge_slave_0 left promiscuous mode [ 71.287063][ T1564] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.759763][ T1572] device veth0_vlan left promiscuous mode [ 71.829485][ T1572] device veth0_vlan entered promiscuous mode [ 71.976151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.988762][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.036590][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 72.108199][ T1577] device sit0 left promiscuous mode [ 72.457674][ T1584] device sit0 entered promiscuous mode [ 73.640335][ T1620] device veth0_vlan left promiscuous mode [ 73.678725][ T1620] device veth0_vlan entered promiscuous mode [ 73.686002][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.706986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.776845][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.974566][ T1639] device pim6reg1 entered promiscuous mode [ 75.094591][ T1663] device veth0_vlan left promiscuous mode [ 75.179741][ T1663] device veth0_vlan entered promiscuous mode [ 75.237881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.262672][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.323008][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 75.619375][ T1693] device syzkaller0 entered promiscuous mode [ 76.010859][ T24] audit: type=1400 audit(1750142734.080:141): avc: denied { create } for pid=1698 comm="syz.3.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 76.519031][ T1717] device pim6reg1 entered promiscuous mode [ 76.670150][ T1718] device veth0_vlan left promiscuous mode [ 76.706764][ T1718] device veth0_vlan entered promiscuous mode [ 77.840630][ T1757] device veth0_vlan left promiscuous mode [ 77.896337][ T1757] device veth0_vlan entered promiscuous mode [ 81.464936][ T1855] device syzkaller0 entered promiscuous mode [ 82.138529][ T1867] device pim6reg1 entered promiscuous mode [ 82.635666][ T1878] device veth0_vlan left promiscuous mode [ 82.688825][ T1878] device veth0_vlan entered promiscuous mode [ 83.608597][ T24] audit: type=1400 audit(1750142741.680:142): avc: denied { create } for pid=1896 comm="syz.4.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 84.470256][ T24] audit: type=1400 audit(1750142742.540:143): avc: denied { create } for pid=1908 comm="syz.0.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 86.750397][ T1976] device veth0_vlan left promiscuous mode [ 86.756625][ T1976] device veth0_vlan entered promiscuous mode [ 86.793425][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.824019][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.846541][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.181520][ T2004] device veth0_vlan left promiscuous mode [ 88.189576][ T2004] device veth0_vlan entered promiscuous mode [ 88.417756][ T2014] device veth0_vlan left promiscuous mode [ 88.442320][ T2014] device veth0_vlan entered promiscuous mode [ 90.054047][ T2069] device veth0_vlan left promiscuous mode [ 90.089076][ T2069] device veth0_vlan entered promiscuous mode [ 92.648102][ T2155] device veth0_vlan left promiscuous mode [ 92.674471][ T2155] device veth0_vlan entered promiscuous mode [ 92.841423][ T2191] syz.1.580[2191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.841504][ T2191] syz.1.580[2191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.855834][ T2191] device pim6reg1 entered promiscuous mode [ 92.885299][ T2191] syz.1.580[2191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.885380][ T2191] syz.1.580[2191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.962954][ T2195] ÿÿÿÿÿÿ: renamed from vlan1 [ 93.495736][ T2208] device pim6reg1 entered promiscuous mode [ 93.673459][ T2225] FAULT_INJECTION: forcing a failure. [ 93.673459][ T2225] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 93.757372][ T2225] CPU: 1 PID: 2225 Comm: syz.4.588 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 93.767215][ T2225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 93.777270][ T2225] Call Trace: [ 93.780562][ T2225] __dump_stack+0x21/0x24 [ 93.784884][ T2225] dump_stack_lvl+0x169/0x1d8 [ 93.789555][ T2225] ? thaw_kernel_threads+0x220/0x220 [ 93.794836][ T2225] ? vsnprintf+0x1871/0x1960 [ 93.799421][ T2225] ? show_regs_print_info+0x18/0x18 [ 93.804615][ T2225] dump_stack+0x15/0x1c [ 93.808767][ T2225] should_fail+0x3c1/0x510 [ 93.813202][ T2225] should_fail_usercopy+0x1a/0x20 [ 93.818217][ T2225] _copy_to_user+0x20/0x90 [ 93.822625][ T2225] simple_read_from_buffer+0xe9/0x160 [ 93.828009][ T2225] proc_fail_nth_read+0x19a/0x210 [ 93.833022][ T2225] ? proc_fault_inject_write+0x2f0/0x2f0 [ 93.838646][ T2225] ? rw_verify_area+0x1c0/0x360 [ 93.843488][ T2225] ? proc_fault_inject_write+0x2f0/0x2f0 [ 93.849109][ T2225] vfs_read+0x1fe/0xa10 [ 93.853259][ T2225] ? kernel_read+0x70/0x70 [ 93.857690][ T2225] ? __kasan_check_write+0x14/0x20 [ 93.862797][ T2225] ? mutex_lock+0x8c/0xe0 [ 93.867141][ T2225] ? mutex_trylock+0xa0/0xa0 [ 93.871748][ T2225] ? __fget_files+0x2c4/0x320 [ 93.876418][ T2225] ? __fdget_pos+0x2d2/0x380 [ 93.880999][ T2225] ? ksys_read+0x71/0x240 [ 93.885322][ T2225] ksys_read+0x140/0x240 [ 93.889559][ T2225] ? vfs_write+0xd60/0xd60 [ 93.893970][ T2225] ? __bpf_trace_sys_enter+0x62/0x70 [ 93.899244][ T2225] __x64_sys_read+0x7b/0x90 [ 93.903736][ T2225] do_syscall_64+0x31/0x40 [ 93.908145][ T2225] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.914026][ T2225] RIP: 0033:0x7f3f76d8033c [ 93.918502][ T2225] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 93.938112][ T2225] RSP: 002b:00007f3f753ea030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.946518][ T2225] RAX: ffffffffffffffda RBX: 00007f3f76fa8fa0 RCX: 00007f3f76d8033c [ 93.954482][ T2225] RDX: 000000000000000f RSI: 00007f3f753ea0a0 RDI: 0000000000000006 [ 93.962448][ T2225] RBP: 00007f3f753ea090 R08: 0000000000000000 R09: 0000000000000000 [ 93.970409][ T2225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.978369][ T2225] R13: 0000000000000000 R14: 00007f3f76fa8fa0 R15: 00007fff81f76468 [ 95.642375][ T24] audit: type=1400 audit(1750142753.710:144): avc: denied { create } for pid=2291 comm="syz.0.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 97.124523][ T2360] device ip_vti0 entered promiscuous mode [ 97.549620][ T2384] syz.2.641[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.549704][ T2384] syz.2.641[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.702242][ T2384] device pim6reg1 entered promiscuous mode [ 97.719895][ T2389] syz.2.641[2389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.719982][ T2389] syz.2.641[2389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.746616][ T2389] ÿÿÿÿÿÿ: renamed from vlan1 [ 97.777622][ T2392] syz.3.644[2392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.777680][ T2392] syz.3.644[2392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.904721][ T2395] syz.0.645[2395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.941063][ T2395] syz.0.645[2395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.220434][ T2392] device veth0_vlan left promiscuous mode [ 98.249181][ T2392] device veth0_vlan entered promiscuous mode [ 98.287517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.305686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.313395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 98.632504][ T2441] syz.1.657[2441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.632599][ T2441] syz.1.657[2441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.689998][ T2444] device pim6reg1 entered promiscuous mode [ 98.803288][ T2441] syz.1.657[2441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.803375][ T2441] syz.1.657[2441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.219737][ T2461] tap0: tun_chr_ioctl cmd 1074025675 [ 99.256641][ T2461] tap0: persist enabled [ 99.262635][ T2461] tap0: tun_chr_ioctl cmd 1074025675 [ 99.299086][ T2461] tap0: persist disabled [ 99.642512][ T2471] device veth0_vlan left promiscuous mode [ 99.664219][ T2471] device veth0_vlan entered promiscuous mode [ 99.776053][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.807222][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.814809][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 100.141397][ T2487] device wg2 left promiscuous mode [ 100.233892][ T2492] device wg2 entered promiscuous mode [ 100.241181][ T2496] syz.3.675[2496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.241235][ T2496] syz.3.675[2496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.249424][ T2498] syz.1.674[2498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.287979][ T2498] syz.1.674[2498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.360123][ T2498] device pim6reg1 entered promiscuous mode [ 100.468643][ T2496] device veth0_vlan left promiscuous mode [ 100.512363][ T2496] device veth0_vlan entered promiscuous mode [ 100.686715][ T2507] device syzkaller0 entered promiscuous mode [ 100.909527][ T2516] device veth0_vlan left promiscuous mode [ 100.928604][ T2516] device veth0_vlan entered promiscuous mode [ 100.935967][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.945481][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.992395][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 101.060905][ T2521] device sit0 entered promiscuous mode [ 101.664563][ T2545] device pim6reg1 entered promiscuous mode [ 101.928022][ T2557] device veth0_vlan left promiscuous mode [ 101.970686][ T2557] device veth0_vlan entered promiscuous mode [ 102.167806][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.206876][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.234807][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 103.485465][ T2615] device syzkaller0 entered promiscuous mode [ 103.918955][ T2626] device veth0_vlan left promiscuous mode [ 103.964300][ T2626] device veth0_vlan entered promiscuous mode [ 104.096014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.118584][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.171317][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 104.289213][ T2633] device veth0_vlan left promiscuous mode [ 104.297386][ T2633] device veth0_vlan entered promiscuous mode [ 104.550749][ T2646] device sit0 entered promiscuous mode [ 104.907270][ T24] audit: type=1400 audit(1750142762.980:145): avc: denied { create } for pid=2665 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 105.646478][ T2682] device veth0_vlan left promiscuous mode [ 105.675256][ T2682] device veth0_vlan entered promiscuous mode [ 105.694394][ T2681] device veth0_vlan left promiscuous mode [ 105.711678][ T2681] device veth0_vlan entered promiscuous mode [ 106.130754][ T2686] device syzkaller0 entered promiscuous mode [ 107.261168][ T2728] bpf_get_probe_write_proto: 8 callbacks suppressed [ 107.261179][ T2728] syz.2.745[2728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.336882][ T2728] syz.2.745[2728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.386673][ T2734] device pim6reg1 entered promiscuous mode [ 107.588033][ T2728] syz.2.745[2728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.597275][ T2728] syz.2.745[2728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.833164][ T2741] device syzkaller0 entered promiscuous mode [ 108.165235][ T2756] device veth0_vlan left promiscuous mode [ 108.175671][ T2756] device veth0_vlan entered promiscuous mode [ 108.200497][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.209902][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.222596][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 109.044438][ T2789] ------------[ cut here ]------------ [ 109.105870][ T2789] trace type BPF program uses run-time allocation [ 109.179797][ T2789] WARNING: CPU: 0 PID: 2789 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x5d6/0x740 [ 109.246261][ T2789] Modules linked in: [ 109.250299][ T2789] CPU: 1 PID: 2789 Comm: syz.4.763 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 109.311163][ T2789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 109.330015][ T2789] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 109.412327][ T2789] Code: 85 e9 14 fe ff ff e8 89 f7 ef ff 31 c0 e9 15 fe ff ff e8 7d f7 ef ff c6 05 43 9b 2c 05 01 48 c7 c7 80 6b 05 85 e8 2a 5f f8 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 109.446473][ T2789] RSP: 0018:ffffc900013a7468 EFLAGS: 00010246 [ 109.463969][ T2789] RAX: 1e8196990a637700 RBX: 0000000000000001 RCX: ffff888114654f00 [ 109.638390][ T2789] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 109.729369][ T2789] RBP: ffffc900013a74b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 109.771239][ T2789] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88810e948000 [ 109.846188][ T2789] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811188a800 [ 109.854318][ T2789] FS: 00007f3f753c96c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 109.863446][ T2789] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 109.870084][ T2789] CR2: 0000000100000001 CR3: 0000000118f15000 CR4: 00000000003506a0 [ 109.920182][ T2789] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 109.962010][ T2789] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 110.006383][ T2789] Call Trace: [ 110.030065][ T2789] ? __fdget+0x1a1/0x230 [ 110.048826][ T2815] syz.2.770[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.050010][ T2815] syz.2.770[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.061810][ T2789] resolve_pseudo_ldimm64+0x526/0x1020 [ 110.104591][ T2815] syz.2.770[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.106224][ T2815] syz.2.770[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.127204][ T2789] ? bpf_check+0xd720/0xd720 [ 110.154524][ T2789] ? kvmalloc_node+0x88/0x130 [ 110.164053][ T2789] bpf_check+0x8db4/0xd720 [ 110.170751][ T2789] ? bpf_get_btf_vmlinux+0x60/0x60 [ 110.176013][ T2789] ? 0xffffffffa0018000 [ 110.180451][ T2789] ? is_bpf_text_address+0x177/0x190 [ 110.181740][ T2815] device wg2 left promiscuous mode [ 110.195353][ T2789] ? selinux_bpf_prog_alloc+0x51/0x140 [ 110.208555][ T2789] ? __kernel_text_address+0xa0/0x100 [ 110.229537][ T2789] ? unwind_get_return_address+0x4d/0x90 [ 110.238454][ T2789] ? stack_trace_save+0xe0/0xe0 [ 110.243581][ T2789] ? arch_stack_walk+0xee/0x140 [ 110.248815][ T2789] ? stack_trace_save+0x98/0xe0 [ 110.253758][ T2789] ? stack_trace_snprint+0xf0/0xf0 [ 110.259165][ T2789] ? __kasan_slab_alloc+0x69/0xf0 [ 110.297985][ T2789] ? selinux_bpf_prog_alloc+0x51/0x140 [ 110.309954][ T2789] ? __kasan_kmalloc+0xec/0x110 [ 110.326075][ T2789] ? __kasan_kmalloc+0xda/0x110 [ 110.331555][ T2789] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 110.375247][ T2789] ? selinux_bpf_prog_alloc+0x51/0x140 [ 110.384493][ T2789] ? security_bpf_prog_alloc+0x62/0x90 [ 110.391103][ T2789] ? bpf_prog_load+0x949/0x1420 [ 110.396318][ T2789] ? __se_sys_bpf+0x442/0x680 [ 110.401021][ T2789] ? __x64_sys_bpf+0x7b/0x90 [ 110.487348][ T2789] ? do_syscall_64+0x31/0x40 [ 110.492013][ T2789] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 110.526166][ T2789] ? memset+0x35/0x40 [ 110.530249][ T2789] ? bpf_obj_name_cpy+0x193/0x1e0 [ 110.535304][ T2789] bpf_prog_load+0xf5a/0x1420 [ 110.542407][ T2789] ? map_freeze+0x320/0x320 [ 110.549848][ T2789] ? selinux_bpf+0xc7/0xf0 [ 110.554398][ T2789] ? security_bpf+0x82/0xa0 [ 110.562166][ T2789] __se_sys_bpf+0x442/0x680 [ 110.587411][ T2789] ? __x64_sys_bpf+0x90/0x90 [ 110.596708][ T2789] ? fpu__clear_all+0x20/0x20 [ 110.615544][ T2789] __x64_sys_bpf+0x7b/0x90 [ 110.664204][ T2789] do_syscall_64+0x31/0x40 [ 110.700771][ T2789] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 110.754956][ T2789] RIP: 0033:0x7f3f76d81929 [ 110.818055][ T2789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.926666][ T2849] device pim6reg1 entered promiscuous mode [ 110.990332][ T2789] RSP: 002b:00007f3f753c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.036957][ T2789] RAX: ffffffffffffffda RBX: 00007f3f76fa9080 RCX: 00007f3f76d81929 [ 111.087411][ T2789] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 111.126184][ T2789] RBP: 00007f3f76e03b39 R08: 0000000000000000 R09: 0000000000000000 [ 111.134215][ T2789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 111.269097][ T2789] R13: 0000000000000000 R14: 00007f3f76fa9080 R15: 00007fff81f76468 [ 111.289633][ T2789] ---[ end trace 8a2a0ba7d6d65a1a ]--- [ 111.409964][ T2858] device sit0 left promiscuous mode [ 113.356647][ T2906] syz.1.796[2906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.356732][ T2906] syz.1.796[2906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.409365][ T2902] device veth0_vlan left promiscuous mode [ 113.427187][ T2902] device veth0_vlan entered promiscuous mode [ 113.438430][ T2906] device pim6reg1 entered promiscuous mode [ 113.488911][ T2904] syz.1.796[2904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.489003][ T2904] syz.1.796[2904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.500812][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.531834][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.539900][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 113.939158][ T2923] syz.0.802[2923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.948838][ T2923] syz.0.802[2923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.141559][ T2947] device veth0_vlan left promiscuous mode [ 115.196638][ T2947] device veth0_vlan entered promiscuous mode [ 115.205301][ T2949] device sit0 left promiscuous mode [ 115.215848][ T2958] syz.1.811[2958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.215934][ T2958] syz.1.811[2958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.251357][ T2953] device sit0 entered promiscuous mode [ 115.277524][ T2958] device pim6reg1 entered promiscuous mode [ 115.349272][ T2955] syz.1.811[2955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.349361][ T2955] syz.1.811[2955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.376392][ T2961] kfree: port 1(veth1) entered blocking state [ 115.467904][ T2961] kfree: port 1(veth1) entered disabled state [ 115.474589][ T2961] device veth1 entered promiscuous mode [ 116.388933][ T2983] device syzkaller0 entered promiscuous mode [ 116.484458][ T2987] device syzkaller0 entered promiscuous mode [ 116.788866][ T2992] device veth0_vlan left promiscuous mode [ 116.816423][ T2992] device veth0_vlan entered promiscuous mode [ 117.026619][ T3000] device pim6reg1 entered promiscuous mode [ 118.162212][ T3030] device veth0_vlan left promiscuous mode [ 118.168777][ T3030] device veth0_vlan entered promiscuous mode [ 118.587564][ T3041] bpf_get_probe_write_proto: 4 callbacks suppressed [ 118.587574][ T3041] syz.4.839[3041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.665259][ T3041] syz.4.839[3041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.695523][ T3043] device pim6reg1 entered promiscuous mode [ 118.740760][ T3041] syz.4.839[3041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.740852][ T3041] syz.4.839[3041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.466068][ T3058] device sit0 entered promiscuous mode [ 119.720203][ T3065] device pim6reg1 entered promiscuous mode [ 119.975449][ T3073] device veth0_vlan left promiscuous mode [ 120.022469][ T3073] device veth0_vlan entered promiscuous mode [ 120.159248][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.178880][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.247128][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 120.504355][ T3099] syz.2.855[3099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.504429][ T3099] syz.2.855[3099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.628125][ T3099] device pim6reg1 entered promiscuous mode [ 120.786435][ T3108] syz.2.855[3108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.786520][ T3108] syz.2.855[3108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.930505][ T3109] device syzkaller0 entered promiscuous mode [ 121.249078][ T3119] device veth0_vlan left promiscuous mode [ 121.256434][ T3119] device veth0_vlan entered promiscuous mode [ 121.312445][ T3118] device macsec0 entered promiscuous mode [ 122.208019][ T3138] device pim6reg1 entered promiscuous mode [ 122.354534][ T3145] device sit0 left promiscuous mode [ 122.397255][ T3146] device sit0 entered promiscuous mode [ 123.116737][ T3165] device veth0_vlan left promiscuous mode [ 123.148930][ T3165] device veth0_vlan entered promiscuous mode [ 123.286677][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.306804][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.337079][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 123.998073][ T24] audit: type=1400 audit(1750142782.070:146): avc: denied { create } for pid=3190 comm="syz.0.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 124.889229][ T3218] device veth0_vlan left promiscuous mode [ 124.899774][ T3218] device veth0_vlan entered promiscuous mode [ 126.489285][ T3279] device veth0_vlan left promiscuous mode [ 126.516843][ T3279] device veth0_vlan entered promiscuous mode [ 126.976339][ T3298] device veth0_vlan left promiscuous mode [ 127.068243][ T3298] device veth0_vlan entered promiscuous mode [ 127.725045][ T3325] device veth0_vlan left promiscuous mode [ 127.776857][ T3325] device veth0_vlan entered promiscuous mode [ 128.732790][ T3370] device veth0_vlan left promiscuous mode [ 128.757055][ T3370] device veth0_vlan entered promiscuous mode [ 128.765352][ T3365] device veth0_vlan left promiscuous mode [ 128.792098][ T3365] device veth0_vlan entered promiscuous mode [ 128.957093][ T3374] device veth0_vlan left promiscuous mode [ 128.964187][ T3374] device veth0_vlan entered promiscuous mode [ 129.250016][ T3404] device sit0 left promiscuous mode [ 129.323515][ T3404] device sit0 entered promiscuous mode [ 129.989458][ T3423] device veth0_vlan left promiscuous mode [ 130.027008][ T3423] device veth0_vlan entered promiscuous mode [ 130.248758][ T3449] syz.3.952[3449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.248850][ T3449] syz.3.952[3449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.383149][ T3434] device syzkaller0 entered promiscuous mode [ 130.436151][ T3449] device pim6reg1 entered promiscuous mode [ 132.587215][ T3517] device veth0_vlan left promiscuous mode [ 132.606067][ T3517] device veth0_vlan entered promiscuous mode [ 132.633727][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.655748][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.702749][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.255413][ T3560] device veth0_vlan left promiscuous mode [ 134.297413][ T3560] device veth0_vlan entered promiscuous mode [ 135.998155][ T3607] device veth0_vlan left promiscuous mode [ 136.015743][ T3607] device veth0_vlan entered promiscuous mode [ 136.053024][ T3608] device veth0_vlan left promiscuous mode [ 136.079381][ T3608] device veth0_vlan entered promiscuous mode [ 136.152611][ T3611] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.160239][ T3611] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.324417][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.354100][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.366525][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.390552][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.433971][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.467387][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 137.281205][ T3648] device sit0 left promiscuous mode [ 137.327732][ T3647] device wg2 left promiscuous mode [ 137.361456][ T3648] device sit0 entered promiscuous mode [ 137.585923][ T3647] device wg2 entered promiscuous mode [ 137.699450][ T3656] device sit0 entered promiscuous mode [ 137.850891][ T3660] device veth0_vlan left promiscuous mode [ 137.867656][ T3660] device veth0_vlan entered promiscuous mode [ 138.687356][ T3679] GPL: port 1(dummy0) entered blocking state [ 138.708546][ T3679] GPL: port 1(dummy0) entered disabled state [ 138.850189][ T3679] device dummy0 entered promiscuous mode [ 139.038066][ T3687] device dummy0 left promiscuous mode [ 139.043579][ T3687] GPL: port 1(dummy0) entered disabled state [ 139.298414][ T3701] device pim6reg1 entered promiscuous mode [ 139.315174][ T3702] device veth0_vlan left promiscuous mode [ 139.321359][ T3702] device veth0_vlan entered promiscuous mode [ 139.338606][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.349288][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.357048][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 139.482250][ T3701] device veth0_vlan left promiscuous mode [ 139.507154][ T3701] device veth0_vlan entered promiscuous mode [ 139.867801][ T3725] tap0: tun_chr_ioctl cmd 2147767511 [ 140.314636][ T3736] ref_ctr_offset mismatch. inode: 0x3fe offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 140.488754][ T3738] GPL: port 1(erspan0) entered blocking state [ 140.494868][ T3738] GPL: port 1(erspan0) entered disabled state [ 140.513717][ T3738] device erspan0 entered promiscuous mode [ 140.527668][ T3736] GPL: port 1(erspan0) entered blocking state [ 140.533983][ T3736] GPL: port 1(erspan0) entered forwarding state [ 141.065349][ T3741] device veth0_vlan left promiscuous mode [ 141.137362][ T3741] device veth0_vlan entered promiscuous mode [ 142.357744][ T3769] device veth0_vlan left promiscuous mode [ 142.380767][ T3769] device veth0_vlan entered promiscuous mode [ 142.388505][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.398401][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.418610][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 142.450557][ T3788] device veth0_vlan left promiscuous mode [ 142.487132][ T3788] device veth0_vlan entered promiscuous mode [ 142.517891][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.527918][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.536555][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 142.698878][ T3793] device sit0 left promiscuous mode [ 143.024256][ T3806] syz.2.1063[3806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.024348][ T3806] syz.2.1063[3806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.117582][ T3802] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.138351][ T3802] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.236545][ T3806] device pim6reg1 entered promiscuous mode [ 143.244429][ T3821] device bridge_slave_1 left promiscuous mode [ 143.263222][ T3806] syz.2.1063[3806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.263316][ T3806] syz.2.1063[3806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.285641][ T3821] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.486883][ T3821] device bridge_slave_0 left promiscuous mode [ 143.493149][ T3821] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.911853][ T3836] device veth0_vlan left promiscuous mode [ 143.930958][ T3836] device veth0_vlan entered promiscuous mode [ 144.836192][ T3867] device wg2 entered promiscuous mode [ 145.233697][ T3873] device syzkaller0 entered promiscuous mode [ 145.304450][ T3881] device veth0_vlan left promiscuous mode [ 145.314304][ T3881] device veth0_vlan entered promiscuous mode [ 145.317036][ T3880] syz.3.1084[3880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.323130][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.345103][ T3880] syz.3.1084[3880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.348985][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.368767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 145.384938][ T3880] device pim6reg1 entered promiscuous mode [ 145.396303][ T3873] device pim6reg1 entered promiscuous mode [ 145.463113][ T3880] syz.3.1084[3880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.463200][ T3880] syz.3.1084[3880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.455723][ T3911] device veth0_vlan left promiscuous mode [ 146.507123][ T3911] device veth0_vlan entered promiscuous mode [ 146.769299][ T3924] device veth0_vlan left promiscuous mode [ 146.825092][ T3924] device veth0_vlan entered promiscuous mode [ 146.928971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.965078][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.024294][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 147.679687][ T3941] device veth0_vlan left promiscuous mode [ 147.687654][ T3941] device veth0_vlan entered promiscuous mode [ 147.766184][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.775276][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.802739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 147.811276][ T3944] device sit0 left promiscuous mode [ 147.988255][ T3945] device veth0_vlan left promiscuous mode [ 147.995480][ T3945] device veth0_vlan entered promiscuous mode [ 148.029326][ T3946] device sit0 entered promiscuous mode [ 148.172060][ T3952] device sit0 left promiscuous mode [ 148.203247][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.212298][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.221491][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 148.397426][ T3962] device veth0_vlan left promiscuous mode [ 148.404902][ T3962] device veth0_vlan entered promiscuous mode [ 148.471201][ T3970] device veth0_vlan left promiscuous mode [ 148.503455][ T3970] device veth0_vlan entered promiscuous mode [ 148.724804][ T3985] device veth0_vlan left promiscuous mode [ 148.731278][ T3985] device veth0_vlan entered promiscuous mode [ 148.762304][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.798143][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.838449][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 149.265461][ T3997] device veth0_vlan left promiscuous mode [ 149.347699][ T3997] device veth0_vlan entered promiscuous mode [ 149.643945][ T4008] device veth0_vlan left promiscuous mode [ 149.650238][ T4008] device veth0_vlan entered promiscuous mode [ 151.567451][ T4058] device veth0_vlan left promiscuous mode [ 151.573598][ T4058] device veth0_vlan entered promiscuous mode [ 151.601738][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.611567][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.620247][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 151.697999][ T24] audit: type=1400 audit(1750142809.770:147): avc: denied { create } for pid=4074 comm="syz.0.1142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 152.962965][ T4108] device veth0_vlan left promiscuous mode [ 152.973388][ T4108] device veth0_vlan entered promiscuous mode [ 152.986980][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.000043][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.025263][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 153.109073][ T4114] device veth0_vlan left promiscuous mode [ 153.162860][ T4114] device veth0_vlan entered promiscuous mode [ 153.321010][ T4127] device veth1_macvtap left promiscuous mode [ 153.327952][ T4127] device macsec0 entered promiscuous mode [ 153.713679][ T4139] device veth0_vlan left promiscuous mode [ 153.744851][ T4139] device veth0_vlan entered promiscuous mode [ 153.990989][ T4153] syz.3.1166[4153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.991052][ T4153] syz.3.1166[4153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.731443][ T4169] device veth0_vlan left promiscuous mode [ 154.749374][ T4169] device veth0_vlan entered promiscuous mode [ 154.833208][ T4175] ªªªªª: renamed from bond_slave_1 [ 155.038227][ T4180] device veth0_vlan left promiscuous mode [ 155.044541][ T4180] device veth0_vlan entered promiscuous mode [ 155.190906][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.241553][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.249499][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 155.558561][ T4189] device veth1_macvtap left promiscuous mode [ 155.599038][ T4190] device veth1_macvtap entered promiscuous mode [ 155.605493][ T4190] device macsec0 entered promiscuous mode [ 157.550042][ T4259] device veth0_vlan left promiscuous mode [ 157.556739][ T4259] device veth0_vlan entered promiscuous mode [ 158.178159][ T4282] device veth0_vlan left promiscuous mode [ 158.245993][ T4282] device veth0_vlan entered promiscuous mode [ 158.639122][ T4300] device sit0 entered promiscuous mode [ 159.275999][ T4322] device veth0_vlan left promiscuous mode [ 159.438609][ T4322] device veth0_vlan entered promiscuous mode [ 159.678996][ T4337] syz.0.1218[4337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.679094][ T4337] syz.0.1218[4337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.755460][ T4337] device pim6reg1 entered promiscuous mode [ 159.780980][ T4337] syz.0.1218[4337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.781066][ T4337] syz.0.1218[4337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.013957][ T4343] device veth0_vlan left promiscuous mode [ 160.262442][ T4343] device veth0_vlan entered promiscuous mode [ 161.509492][ T4389] device pim6reg1 entered promiscuous mode [ 162.070599][ T4404] syz.2.1240[4404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.070666][ T4404] syz.2.1240[4404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.302337][ T4434] device veth0_vlan left promiscuous mode [ 163.333362][ T4434] device veth0_vlan entered promiscuous mode [ 163.546373][ T4436] device veth0_vlan left promiscuous mode [ 163.638806][ T4436] device veth0_vlan entered promiscuous mode [ 164.105199][ T4471] device veth0_vlan left promiscuous mode [ 164.111725][ T4471] device veth0_vlan entered promiscuous mode [ 164.436725][ T4482] device veth1_macvtap left promiscuous mode [ 164.661881][ T4485] device veth1_macvtap entered promiscuous mode [ 165.128857][ T4501] device veth0_vlan left promiscuous mode [ 165.144094][ T4501] device veth0_vlan entered promiscuous mode [ 165.152625][ T4503] device veth0_vlan left promiscuous mode [ 165.160378][ T4503] device veth0_vlan entered promiscuous mode [ 165.226265][ T4510] device pim6reg1 entered promiscuous mode [ 165.387076][ T4516] device veth0_vlan left promiscuous mode [ 165.438086][ T4516] device veth0_vlan entered promiscuous mode [ 166.736162][ T4551] device veth0_vlan left promiscuous mode [ 166.751464][ T4551] device veth0_vlan entered promiscuous mode [ 167.139300][ T4567] syz.1.1290[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.139383][ T4567] syz.1.1290[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.216570][ T4567] syz.1.1290[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.492194][ T4567] syz.1.1290[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.597928][ T4577] device syzkaller0 entered promiscuous mode [ 168.523996][ T4592] device veth0_vlan left promiscuous mode [ 168.658535][ T4592] device veth0_vlan entered promiscuous mode [ 168.843417][ T4602] device syzkaller0 entered promiscuous mode [ 170.338474][ T4624] syz.4.1308[4624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.338558][ T4624] syz.4.1308[4624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.483336][ T4624] syz.4.1308[4624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.505042][ T4624] syz.4.1308[4624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.373525][ T4632] device veth0_vlan left promiscuous mode [ 171.391066][ T4632] device veth0_vlan entered promiscuous mode [ 171.476534][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.499467][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.534565][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 172.081816][ T94] udevd[94]: worker [299] terminated by signal 33 (Unknown signal 33) [ 172.110495][ T94] udevd[94]: worker [299] failed while handling '/devices/virtual/block/loop2' [ 172.287393][ T94] udevd[94]: worker [4657] terminated by signal 33 (Unknown signal 33) [ 172.304403][ T94] udevd[94]: worker [4657] failed while handling '/devices/virtual/block/loop4' [ 172.608916][ T4667] GPL: port 1(erspan0) entered blocking state [ 172.656126][ T4667] GPL: port 1(erspan0) entered disabled state [ 172.669384][ T4667] device erspan0 entered promiscuous mode [ 172.677934][ T4670] GPL: port 1(erspan0) entered blocking state [ 172.684045][ T4670] GPL: port 1(erspan0) entered forwarding state [ 172.830229][ T4674] device veth0_vlan left promiscuous mode [ 172.846616][ T4674] device veth0_vlan entered promiscuous mode [ 172.889528][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.909418][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.921707][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 173.368134][ T4689] syz.1.1327[4689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.368182][ T4689] syz.1.1327[4689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.146540][ T4830] device veth0_vlan left promiscuous mode [ 178.164263][ T4830] device veth0_vlan entered promiscuous mode [ 178.203776][ T4831] device macsec0 left promiscuous mode [ 178.213488][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.226972][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.235553][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 179.383927][ T4872] GPL: port 2(dummy0) entered blocking state [ 179.426169][ T4872] GPL: port 2(dummy0) entered disabled state [ 179.447143][ T4872] device dummy0 entered promiscuous mode [ 179.521001][ T4872] GPL: port 2(dummy0) entered blocking state [ 179.527071][ T4872] GPL: port 2(dummy0) entered forwarding state [ 179.777391][ T4882] device pim6reg1 entered promiscuous mode [ 180.050578][ T4892] device wg2 left promiscuous mode [ 180.625370][ T4923] device wg2 entered promiscuous mode [ 181.144670][ T4938] device veth0_vlan left promiscuous mode [ 181.189492][ T4938] device veth0_vlan entered promiscuous mode [ 181.411519][ T4957] device pim6reg1 entered promiscuous mode [ 181.475505][ T4957] syz.2.1409[4957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.475589][ T4957] syz.2.1409[4957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.329862][ T4973] device veth0_vlan left promiscuous mode [ 182.416488][ T4973] device veth0_vlan entered promiscuous mode [ 182.611509][ T4995] device veth0_vlan left promiscuous mode [ 182.666906][ T4995] device veth0_vlan entered promiscuous mode [ 184.497119][ T5045] device veth0_vlan left promiscuous mode [ 184.522859][ T5045] device veth0_vlan entered promiscuous mode [ 186.639370][ T24] audit: type=1400 audit(1750142844.710:148): avc: denied { create } for pid=5112 comm="syz.3.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 187.855268][ T5139] FAULT_INJECTION: forcing a failure. [ 187.855268][ T5139] name failslab, interval 1, probability 0, space 0, times 0 [ 187.985798][ T5139] CPU: 1 PID: 5139 Comm: syz.2.1465 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 187.997111][ T5139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 188.007160][ T5139] Call Trace: [ 188.010438][ T5139] __dump_stack+0x21/0x24 [ 188.014751][ T5139] dump_stack_lvl+0x169/0x1d8 [ 188.019437][ T5139] ? show_regs_print_info+0x18/0x18 [ 188.024884][ T5139] dump_stack+0x15/0x1c [ 188.029023][ T5139] should_fail+0x3c1/0x510 [ 188.033420][ T5139] ? prepare_creds+0x2c/0x5d0 [ 188.038121][ T5139] __should_failslab+0xa4/0xe0 [ 188.042894][ T5139] should_failslab+0x9/0x20 [ 188.047407][ T5139] kmem_cache_alloc+0x3d/0x2e0 [ 188.052271][ T5139] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 188.057739][ T5139] prepare_creds+0x2c/0x5d0 [ 188.062254][ T5139] ? copy_creds+0x7b/0x480 [ 188.066680][ T5139] copy_creds+0xe5/0x480 [ 188.070928][ T5139] copy_process+0x957/0x32c0 [ 188.075523][ T5139] ? memset+0x35/0x40 [ 188.079518][ T5139] ? proc_fail_nth_read+0x210/0x210 [ 188.084723][ T5139] ? __pidfd_prepare+0x150/0x150 [ 188.089667][ T5139] ? rw_verify_area+0x1c0/0x360 [ 188.094521][ T5139] ? vfs_write+0xac8/0xd60 [ 188.098951][ T5139] ? __kasan_slab_free+0x11/0x20 [ 188.103899][ T5139] kernel_clone+0x23f/0x940 [ 188.108413][ T5139] ? kernel_write+0x3c0/0x3c0 [ 188.113095][ T5139] ? create_io_thread+0x130/0x130 [ 188.118129][ T5139] ? mutex_lock+0x8c/0xe0 [ 188.122475][ T5139] __x64_sys_clone+0x176/0x1d0 [ 188.127244][ T5139] ? __ia32_sys_vfork+0xf0/0xf0 [ 188.132101][ T5139] ? ksys_write+0x1eb/0x240 [ 188.136620][ T5139] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 188.142695][ T5139] do_syscall_64+0x31/0x40 [ 188.147121][ T5139] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 188.153016][ T5139] RIP: 0033:0x7f0733acb929 [ 188.157441][ T5139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.177134][ T5139] RSP: 002b:00007f0732112fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 188.185556][ T5139] RAX: ffffffffffffffda RBX: 00007f0733cf3080 RCX: 00007f0733acb929 [ 188.193540][ T5139] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000108000 [ 188.201520][ T5139] RBP: 00007f0732113090 R08: 0000000000000000 R09: 0000000000000000 [ 188.209503][ T5139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 188.217479][ T5139] R13: 0000000000000000 R14: 00007f0733cf3080 R15: 00007ffdee42e458 [ 188.237391][ T5156] FAULT_INJECTION: forcing a failure. [ 188.237391][ T5156] name failslab, interval 1, probability 0, space 0, times 0 [ 188.347520][ T5156] CPU: 0 PID: 5156 Comm: syz.0.1470 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 188.358953][ T5156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 188.369456][ T5156] Call Trace: [ 188.372756][ T5156] __dump_stack+0x21/0x24 [ 188.377095][ T5156] dump_stack_lvl+0x169/0x1d8 [ 188.381789][ T5156] ? thaw_kernel_threads+0x220/0x220 [ 188.387080][ T5156] ? show_regs_print_info+0x18/0x18 [ 188.392280][ T5156] ? proc_fail_nth_read+0x210/0x210 [ 188.397476][ T5156] dump_stack+0x15/0x1c [ 188.401630][ T5156] should_fail+0x3c1/0x510 [ 188.406048][ T5156] ? map_get_next_key+0x213/0x4c0 [ 188.411596][ T5156] __should_failslab+0xa4/0xe0 [ 188.416365][ T5156] should_failslab+0x9/0x20 [ 188.420885][ T5156] __kmalloc_track_caller+0x5f/0x320 [ 188.426171][ T5156] memdup_user+0x25/0xb0 [ 188.430418][ T5156] map_get_next_key+0x213/0x4c0 [ 188.435285][ T5156] ? security_bpf+0x82/0xa0 [ 188.439801][ T5156] __se_sys_bpf+0x31d/0x680 [ 188.444861][ T5156] ? __x64_sys_bpf+0x90/0x90 [ 188.449461][ T5156] ? fpu__clear_all+0x20/0x20 [ 188.454135][ T5156] __x64_sys_bpf+0x7b/0x90 [ 188.458562][ T5156] do_syscall_64+0x31/0x40 [ 188.462983][ T5156] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 188.468873][ T5156] RIP: 0033:0x7fe4bfc1f929 [ 188.473296][ T5156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.492907][ T5156] RSP: 002b:00007fe4be288038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.501327][ T5156] RAX: ffffffffffffffda RBX: 00007fe4bfe46fa0 RCX: 00007fe4bfc1f929 [ 188.509298][ T5156] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 188.517265][ T5156] RBP: 00007fe4be288090 R08: 0000000000000000 R09: 0000000000000000 [ 188.525240][ T5156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.533219][ T5156] R13: 0000000000000000 R14: 00007fe4bfe46fa0 R15: 00007ffdde6468c8 [ 190.626858][ T5211] device pim6reg1 entered promiscuous mode [ 190.929412][ T5215] ÿÿÿÿÿÿ: renamed from vlan1 [ 191.520235][ T5227] device veth0_vlan left promiscuous mode [ 191.564838][ T5227] device veth0_vlan entered promiscuous mode [ 191.697997][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.734851][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.768388][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 191.807471][ T5235] device pim6reg1 entered promiscuous mode [ 192.522515][ T5263] device sit0 entered promiscuous mode [ 193.682940][ T5292] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 193.746976][ T5292] syzkaller0: linktype set to 776 [ 194.394648][ T5311] device veth0_vlan left promiscuous mode [ 194.409872][ T5311] device veth0_vlan entered promiscuous mode [ 194.534770][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.556816][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.574825][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 195.770339][ T5349] device veth0_vlan left promiscuous mode [ 195.805264][ T5349] device veth0_vlan entered promiscuous mode [ 195.874986][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.889124][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.951409][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 196.316863][ T5365] syz.3.1529[5365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.316934][ T5365] syz.3.1529[5365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.194498][ T5436] device veth0_vlan left promiscuous mode [ 199.293759][ T5436] device veth0_vlan entered promiscuous mode [ 199.308283][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.357459][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.396635][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 199.540820][ T5439] device pim6reg1 entered promiscuous mode [ 200.377322][ T5466] device veth0_vlan left promiscuous mode [ 200.412766][ T5466] device veth0_vlan entered promiscuous mode [ 201.337967][ T5505] device syzkaller0 entered promiscuous mode [ 201.407667][ T5] syzkaller0: tun_net_xmit 48 [ 201.446568][ T5505] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 201.452442][ T5505] syzkaller0: Linktype set failed because interface is up [ 201.500413][ T5513] device veth0_vlan left promiscuous mode [ 201.508282][ T5513] FAULT_INJECTION: forcing a failure. [ 201.508282][ T5513] name failslab, interval 1, probability 0, space 0, times 0 [ 201.521718][ T5513] CPU: 1 PID: 5513 Comm: syz.3.1574 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 201.533016][ T5513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 201.543083][ T5513] Call Trace: [ 201.546389][ T5513] __dump_stack+0x21/0x24 [ 201.550724][ T5513] dump_stack_lvl+0x169/0x1d8 [ 201.555408][ T5513] ? thaw_kernel_threads+0x220/0x220 [ 201.560697][ T5513] ? show_regs_print_info+0x18/0x18 [ 201.565903][ T5513] ? kvm_sched_clock_read+0x18/0x40 [ 201.571110][ T5513] dump_stack+0x15/0x1c [ 201.575270][ T5513] should_fail+0x3c1/0x510 [ 201.579691][ T5513] ? ____ip_mc_inc_group+0x190/0x820 [ 201.584976][ T5513] __should_failslab+0xa4/0xe0 [ 201.589742][ T5513] should_failslab+0x9/0x20 [ 201.594255][ T5513] kmem_cache_alloc_trace+0x3a/0x2e0 [ 201.599550][ T5513] ____ip_mc_inc_group+0x190/0x820 [ 201.604667][ T5513] ip_mc_up+0x112/0x1f0 [ 201.608835][ T5513] inetdev_event+0xc13/0x1030 [ 201.613516][ T5513] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 201.619320][ T5513] ? devinet_exit_net+0x220/0x220 [ 201.624353][ T5513] ? __kasan_check_write+0x14/0x20 [ 201.629473][ T5513] raw_notifier_call_chain+0x90/0x100 [ 201.634853][ T5513] __dev_notify_flags+0x28f/0x500 [ 201.639878][ T5513] ? __kasan_check_read+0x11/0x20 [ 201.644930][ T5513] ? __dev_change_flags+0x6a0/0x6a0 [ 201.650127][ T5513] ? __dev_change_flags+0x4be/0x6a0 [ 201.655323][ T5513] ? dev_get_flags+0x1e0/0x1e0 [ 201.660093][ T5513] ? irq_exit_rcu+0x9/0x10 [ 201.664511][ T5513] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 201.670314][ T5513] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 201.676466][ T5513] dev_change_flags+0xe8/0x1a0 [ 201.681226][ T5513] dev_ifsioc+0x113/0xa50 [ 201.685544][ T5513] ? dev_ioctl+0xb80/0xb80 [ 201.689947][ T5513] dev_ioctl+0x550/0xb80 [ 201.694181][ T5513] sock_do_ioctl+0x235/0x330 [ 201.698761][ T5513] ? sock_show_fdinfo+0xa0/0xa0 [ 201.703601][ T5513] ? __irq_exit_rcu+0x40/0x150 [ 201.708357][ T5513] ? selinux_file_ioctl+0x377/0x480 [ 201.713551][ T5513] sock_ioctl+0x504/0x710 [ 201.717871][ T5513] ? sock_poll+0x360/0x360 [ 201.722275][ T5513] ? __fget_files+0x2c4/0x320 [ 201.726942][ T5513] ? security_file_ioctl+0x84/0xa0 [ 201.732058][ T5513] ? sock_poll+0x360/0x360 [ 201.736645][ T5513] __se_sys_ioctl+0x121/0x1a0 [ 201.741317][ T5513] __x64_sys_ioctl+0x7b/0x90 [ 201.745899][ T5513] do_syscall_64+0x31/0x40 [ 201.750305][ T5513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.756187][ T5513] RIP: 0033:0x7f563c3fc929 [ 201.760600][ T5513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.780191][ T5513] RSP: 002b:00007f563aa65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.788593][ T5513] RAX: ffffffffffffffda RBX: 00007f563c623fa0 RCX: 00007f563c3fc929 [ 201.796556][ T5513] RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000012 [ 201.804513][ T5513] RBP: 00007f563aa65090 R08: 0000000000000000 R09: 0000000000000000 [ 201.812470][ T5513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.820431][ T5513] R13: 0000000000000000 R14: 00007f563c623fa0 R15: 00007ffd7e53d428 [ 201.838281][ T5513] device veth0_vlan entered promiscuous mode [ 201.865127][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.876592][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.885170][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 202.382744][ T5530] device pim6reg1 entered promiscuous mode [ 202.663406][ T5544] device veth0_vlan left promiscuous mode [ 202.685991][ T5544] device veth0_vlan entered promiscuous mode [ 202.781213][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.799195][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.851939][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 202.938377][ T24] audit: type=1400 audit(1750142861.010:149): avc: denied { create } for pid=5554 comm="syz.4.1587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 203.062999][ T5561] device veth0_vlan left promiscuous mode [ 203.069974][ T5561] FAULT_INJECTION: forcing a failure. [ 203.069974][ T5561] name failslab, interval 1, probability 0, space 0, times 0 [ 203.088525][ T5561] CPU: 0 PID: 5561 Comm: syz.3.1586 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 203.099956][ T5561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 203.110022][ T5561] Call Trace: [ 203.113311][ T5561] __dump_stack+0x21/0x24 [ 203.117638][ T5561] dump_stack_lvl+0x169/0x1d8 [ 203.122310][ T5561] ? show_regs_print_info+0x18/0x18 [ 203.127502][ T5561] dump_stack+0x15/0x1c [ 203.131655][ T5561] should_fail+0x3c1/0x510 [ 203.136073][ T5561] ? fib_create_info+0x8f0/0x1fc0 [ 203.141099][ T5561] __should_failslab+0xa4/0xe0 [ 203.145852][ T5561] should_failslab+0x9/0x20 [ 203.150345][ T5561] __kmalloc+0x60/0x330 [ 203.154490][ T5561] ? stack_trace_save+0xe0/0xe0 [ 203.159327][ T5561] ? arch_stack_walk+0xee/0x140 [ 203.164173][ T5561] fib_create_info+0x8f0/0x1fc0 [ 203.169038][ T5561] fib_table_insert+0xc5/0x1bb0 [ 203.173876][ T5561] ? __kasan_kmalloc+0xec/0x110 [ 203.178720][ T5561] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 203.184251][ T5561] ? __hw_addr_add_ex+0x182/0x5b0 [ 203.189258][ T5561] ? dev_mc_add+0x72/0xd0 [ 203.193579][ T5561] ? igmp_group_added+0x1ca/0x850 [ 203.198592][ T5561] ? ____ip_mc_inc_group+0x623/0x820 [ 203.203870][ T5561] ? inetdev_event+0xc13/0x1030 [ 203.208708][ T5561] ? raw_notifier_call_chain+0x90/0x100 [ 203.214241][ T5561] ? __dev_notify_flags+0x28f/0x500 [ 203.219425][ T5561] ? dev_change_flags+0xe8/0x1a0 [ 203.224356][ T5561] ? dev_ioctl+0x550/0xb80 [ 203.228761][ T5561] ? sock_do_ioctl+0x235/0x330 [ 203.233514][ T5561] ? sock_ioctl+0x504/0x710 [ 203.238008][ T5561] ? __se_sys_ioctl+0x120/0x1a0 [ 203.242847][ T5561] ? __x64_sys_ioctl+0x7b/0x90 [ 203.247686][ T5561] ? do_syscall_64+0x31/0x40 [ 203.252271][ T5561] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.258427][ T5561] ? fib_new_table+0x10d/0x2b0 [ 203.263181][ T5561] fib_add_ifaddr+0x31b/0xed0 [ 203.267857][ T5561] ? ip_valid_fib_dump_req+0xc10/0xc10 [ 203.273312][ T5561] ? memcpy+0x56/0x70 [ 203.277291][ T5561] ? __local_bh_enable_ip+0x53/0x80 [ 203.282474][ T5561] ? _raw_spin_unlock_bh+0x51/0x60 [ 203.287572][ T5561] ? dev_mc_add+0xa3/0xd0 [ 203.291886][ T5561] ? igmp_group_added+0x215/0x850 [ 203.296899][ T5561] ? _raw_spin_lock_irq+0xe0/0xe0 [ 203.301917][ T5561] ? __kasan_check_write+0x14/0x20 [ 203.307020][ T5561] ? igmp_group_added+0x215/0x850 [ 203.312032][ T5561] ? _raw_spin_lock_irq+0xe0/0xe0 [ 203.317048][ T5561] ? igmpv3_del_delrec+0x700/0x700 [ 203.322148][ T5561] ? __local_bh_enable_ip+0x53/0x80 [ 203.327435][ T5561] ? _raw_spin_unlock_bh+0x51/0x60 [ 203.332533][ T5561] ? inetdev_event+0xdac/0x1030 [ 203.337376][ T5561] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 203.343173][ T5561] ? devinet_exit_net+0x220/0x220 [ 203.348189][ T5561] fib_netdev_event+0x231/0x5d0 [ 203.353030][ T5561] raw_notifier_call_chain+0x90/0x100 [ 203.358389][ T5561] __dev_notify_flags+0x28f/0x500 [ 203.363407][ T5561] ? __kasan_check_read+0x11/0x20 [ 203.368420][ T5561] ? __dev_change_flags+0x6a0/0x6a0 [ 203.373604][ T5561] ? __dev_change_flags+0x4be/0x6a0 [ 203.378796][ T5561] ? dev_get_flags+0x1e0/0x1e0 [ 203.383552][ T5561] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 203.390396][ T5561] dev_change_flags+0xe8/0x1a0 [ 203.395153][ T5561] dev_ifsioc+0x113/0xa50 [ 203.399473][ T5561] ? dev_ioctl+0xb80/0xb80 [ 203.403878][ T5561] dev_ioctl+0x550/0xb80 [ 203.408110][ T5561] sock_do_ioctl+0x235/0x330 [ 203.412687][ T5561] ? __bpf_trace_kmem_free+0x6f/0x90 [ 203.417969][ T5561] ? sock_show_fdinfo+0xa0/0xa0 [ 203.422910][ T5561] ? selinux_file_ioctl+0x377/0x480 [ 203.428108][ T5561] ? mutex_trylock+0xa0/0xa0 [ 203.432694][ T5561] ? __fget_files+0x2c4/0x320 [ 203.437361][ T5561] sock_ioctl+0x504/0x710 [ 203.441680][ T5561] ? sock_poll+0x360/0x360 [ 203.446169][ T5561] ? __fget_files+0x2c4/0x320 [ 203.450833][ T5561] ? security_file_ioctl+0x84/0xa0 [ 203.455963][ T5561] ? sock_poll+0x360/0x360 [ 203.460364][ T5561] __se_sys_ioctl+0x121/0x1a0 [ 203.465031][ T5561] __x64_sys_ioctl+0x7b/0x90 [ 203.469614][ T5561] do_syscall_64+0x31/0x40 [ 203.474027][ T5561] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.479908][ T5561] RIP: 0033:0x7f563c3fc929 [ 203.484337][ T5561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.503958][ T5561] RSP: 002b:00007f563aa44038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.512380][ T5561] RAX: ffffffffffffffda RBX: 00007f563c624080 RCX: 00007f563c3fc929 [ 203.520344][ T5561] RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000012 [ 203.528306][ T5561] RBP: 00007f563aa44090 R08: 0000000000000000 R09: 0000000000000000 [ 203.536269][ T5561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.544234][ T5561] R13: 0000000000000000 R14: 00007f563c624080 R15: 00007ffd7e53d428 [ 203.561528][ T5561] device veth0_vlan entered promiscuous mode [ 204.089694][ T5578] device veth0_vlan left promiscuous mode [ 204.096348][ T5578] device veth0_vlan entered promiscuous mode [ 205.271319][ T5610] device veth0_vlan left promiscuous mode [ 205.279910][ T5610] FAULT_INJECTION: forcing a failure. [ 205.279910][ T5610] name failslab, interval 1, probability 0, space 0, times 0 [ 205.294553][ T5610] CPU: 1 PID: 5610 Comm: syz.4.1601 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 205.305854][ T5610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 205.315935][ T5610] Call Trace: [ 205.319232][ T5610] __dump_stack+0x21/0x24 [ 205.323563][ T5610] dump_stack_lvl+0x169/0x1d8 [ 205.328249][ T5610] ? show_regs_print_info+0x18/0x18 [ 205.333454][ T5610] dump_stack+0x15/0x1c [ 205.337626][ T5610] should_fail+0x3c1/0x510 [ 205.342058][ T5610] ? fib_create_info+0x8f0/0x1fc0 [ 205.347096][ T5610] __should_failslab+0xa4/0xe0 [ 205.351878][ T5610] should_failslab+0x9/0x20 [ 205.356389][ T5610] __kmalloc+0x60/0x330 [ 205.360551][ T5610] fib_create_info+0x8f0/0x1fc0 [ 205.365407][ T5610] ? _raw_spin_lock_irq+0xe0/0xe0 [ 205.370442][ T5610] fib_table_insert+0xc5/0x1bb0 [ 205.375297][ T5610] ? dev_ioctl+0x480/0xb80 [ 205.379727][ T5610] ? __se_sys_ioctl+0x120/0x1a0 [ 205.384589][ T5610] ? fib_new_table+0x10d/0x2b0 [ 205.389357][ T5610] fib_add_ifaddr+0x808/0xed0 [ 205.394039][ T5610] ? ip_valid_fib_dump_req+0xc10/0xc10 [ 205.399505][ T5610] ? memcpy+0x56/0x70 [ 205.403620][ T5610] ? __local_bh_enable_ip+0x53/0x80 [ 205.408833][ T5610] ? _raw_spin_unlock_bh+0x51/0x60 [ 205.413954][ T5610] ? dev_mc_add+0xa3/0xd0 [ 205.418305][ T5610] ? __kasan_check_write+0x14/0x20 [ 205.423435][ T5610] ? igmp_group_added+0x215/0x850 [ 205.428479][ T5610] ? _raw_spin_lock_irq+0xe0/0xe0 [ 205.433516][ T5610] ? igmpv3_del_delrec+0x700/0x700 [ 205.438652][ T5610] ? __local_bh_enable_ip+0x53/0x80 [ 205.443949][ T5610] ? _raw_spin_unlock_bh+0x51/0x60 [ 205.449254][ T5610] ? inetdev_event+0xdac/0x1030 [ 205.454112][ T5610] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 205.459923][ T5610] ? devinet_exit_net+0x220/0x220 [ 205.465038][ T5610] fib_netdev_event+0x231/0x5d0 [ 205.469991][ T5610] raw_notifier_call_chain+0x90/0x100 [ 205.475368][ T5610] __dev_notify_flags+0x28f/0x500 [ 205.480393][ T5610] ? __kasan_check_read+0x11/0x20 [ 205.485422][ T5610] ? __dev_change_flags+0x6a0/0x6a0 [ 205.490638][ T5610] ? __dev_change_flags+0x4be/0x6a0 [ 205.495833][ T5610] ? dev_get_flags+0x1e0/0x1e0 [ 205.500613][ T5610] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 205.507398][ T5610] dev_change_flags+0xe8/0x1a0 [ 205.512165][ T5610] dev_ifsioc+0x113/0xa50 [ 205.516499][ T5610] ? dev_ioctl+0xb80/0xb80 [ 205.520927][ T5610] dev_ioctl+0x550/0xb80 [ 205.525280][ T5610] sock_do_ioctl+0x235/0x330 [ 205.529873][ T5610] ? sock_show_fdinfo+0xa0/0xa0 [ 205.534731][ T5610] ? selinux_file_ioctl+0x377/0x480 [ 205.540122][ T5610] ? mutex_trylock+0xa0/0xa0 [ 205.544707][ T5610] ? __fget_files+0x2c4/0x320 [ 205.549401][ T5610] sock_ioctl+0x504/0x710 [ 205.553737][ T5610] ? sock_poll+0x360/0x360 [ 205.558152][ T5610] ? __fget_files+0x2c4/0x320 [ 205.562838][ T5610] ? security_file_ioctl+0x84/0xa0 [ 205.567951][ T5610] ? sock_poll+0x360/0x360 [ 205.572370][ T5610] __se_sys_ioctl+0x121/0x1a0 [ 205.577055][ T5610] __x64_sys_ioctl+0x7b/0x90 [ 205.581654][ T5610] do_syscall_64+0x31/0x40 [ 205.586096][ T5610] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 205.591990][ T5610] RIP: 0033:0x7f3f76d81929 [ 205.596415][ T5610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.616110][ T5610] RSP: 002b:00007f3f753c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 205.624538][ T5610] RAX: ffffffffffffffda RBX: 00007f3f76fa9080 RCX: 00007f3f76d81929 [ 205.632692][ T5610] RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000012 [ 205.640671][ T5610] RBP: 00007f3f753c9090 R08: 0000000000000000 R09: 0000000000000000 [ 205.648652][ T5610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.656629][ T5610] R13: 0000000000000000 R14: 00007f3f76fa9080 R15: 00007fff81f76468 [ 205.692032][ T5610] device veth0_vlan entered promiscuous mode [ 205.837623][ T5622] €Â0: renamed from pim6reg1 [ 207.369326][ T5657] device veth0_vlan left promiscuous mode [ 207.426626][ T5657] FAULT_INJECTION: forcing a failure. [ 207.426626][ T5657] name failslab, interval 1, probability 0, space 0, times 0 [ 207.486233][ T5657] CPU: 1 PID: 5657 Comm: syz.0.1618 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 207.497551][ T5657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 207.507613][ T5657] Call Trace: [ 207.510912][ T5657] __dump_stack+0x21/0x24 [ 207.515255][ T5657] dump_stack_lvl+0x169/0x1d8 [ 207.519942][ T5657] ? thaw_kernel_threads+0x220/0x220 [ 207.525244][ T5657] ? _raw_spin_lock_bh+0x8e/0xe0 [ 207.530190][ T5657] ? show_regs_print_info+0x18/0x18 [ 207.535404][ T5657] dump_stack+0x15/0x1c [ 207.539590][ T5657] should_fail+0x3c1/0x510 [ 207.544032][ T5657] ? fib_table_insert+0x554/0x1bb0 [ 207.549158][ T5657] __should_failslab+0xa4/0xe0 [ 207.553939][ T5657] should_failslab+0x9/0x20 [ 207.558538][ T5657] kmem_cache_alloc+0x3d/0x2e0 [ 207.563323][ T5657] fib_table_insert+0x554/0x1bb0 [ 207.568274][ T5657] ? dev_ioctl+0x488/0xb80 [ 207.572715][ T5657] ? __se_sys_ioctl+0x120/0x1a0 [ 207.577734][ T5657] fib_add_ifaddr+0x808/0xed0 [ 207.582429][ T5657] ? ip_valid_fib_dump_req+0xc10/0xc10 [ 207.587910][ T5657] ? memcpy+0x56/0x70 [ 207.591915][ T5657] ? __local_bh_enable_ip+0x53/0x80 [ 207.597210][ T5657] ? _raw_spin_unlock_bh+0x51/0x60 [ 207.602327][ T5657] ? dev_mc_add+0xa3/0xd0 [ 207.606670][ T5657] ? __kasan_check_write+0x14/0x20 [ 207.611791][ T5657] ? igmp_group_added+0x215/0x850 [ 207.616823][ T5657] ? _raw_spin_lock_irq+0xe0/0xe0 [ 207.621861][ T5657] ? igmpv3_del_delrec+0x700/0x700 [ 207.627071][ T5657] ? __local_bh_enable_ip+0x53/0x80 [ 207.632281][ T5657] ? _raw_spin_unlock_bh+0x51/0x60 [ 207.637416][ T5657] ? inetdev_event+0xdac/0x1030 [ 207.642279][ T5657] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 207.648098][ T5657] ? devinet_exit_net+0x220/0x220 [ 207.653114][ T5657] fib_netdev_event+0x231/0x5d0 [ 207.657962][ T5657] raw_notifier_call_chain+0x90/0x100 [ 207.663328][ T5657] __dev_notify_flags+0x28f/0x500 [ 207.668351][ T5657] ? __kasan_check_read+0x11/0x20 [ 207.673367][ T5657] ? __dev_change_flags+0x6a0/0x6a0 [ 207.678597][ T5657] ? __dev_change_flags+0x4be/0x6a0 [ 207.683786][ T5657] ? dev_get_flags+0x1e0/0x1e0 [ 207.688543][ T5657] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 207.695303][ T5657] dev_change_flags+0xe8/0x1a0 [ 207.700073][ T5657] dev_ifsioc+0x113/0xa50 [ 207.704479][ T5657] ? dev_ioctl+0xb80/0xb80 [ 207.708886][ T5657] dev_ioctl+0x550/0xb80 [ 207.713134][ T5657] sock_do_ioctl+0x235/0x330 [ 207.717808][ T5657] ? sock_show_fdinfo+0xa0/0xa0 [ 207.722652][ T5657] ? irq_work_queue+0xc1/0x150 [ 207.727424][ T5657] ? selinux_file_ioctl+0x377/0x480 [ 207.732800][ T5657] ? mutex_trylock+0xa0/0xa0 [ 207.737383][ T5657] ? __fget_files+0x2c4/0x320 [ 207.742049][ T5657] sock_ioctl+0x504/0x710 [ 207.746362][ T5657] ? sock_poll+0x360/0x360 [ 207.750766][ T5657] ? __fget_files+0x2c4/0x320 [ 207.755433][ T5657] ? security_file_ioctl+0x84/0xa0 [ 207.760556][ T5657] ? sock_poll+0x360/0x360 [ 207.764974][ T5657] __se_sys_ioctl+0x121/0x1a0 [ 207.769735][ T5657] __x64_sys_ioctl+0x7b/0x90 [ 207.774321][ T5657] do_syscall_64+0x31/0x40 [ 207.778744][ T5657] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 207.784627][ T5657] RIP: 0033:0x7fe4bfc1f929 [ 207.789039][ T5657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 207.808640][ T5657] RSP: 002b:00007fe4be267038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 207.817167][ T5657] RAX: ffffffffffffffda RBX: 00007fe4bfe47080 RCX: 00007fe4bfc1f929 [ 207.825138][ T5657] RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000012 [ 207.833100][ T5657] RBP: 00007fe4be267090 R08: 0000000000000000 R09: 0000000000000000 [ 207.841059][ T5657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 207.849013][ T5657] R13: 0000000000000000 R14: 00007fe4bfe47080 R15: 00007ffdde6468c8 [ 207.866764][ T5657] device veth0_vlan entered promiscuous mode [ 209.196363][ T5676] GPL: port 1(erspan0) entered blocking state [ 209.204993][ T5676] GPL: port 1(erspan0) entered disabled state [ 209.263047][ T5676] device erspan0 entered promiscuous mode [ 209.309101][ T5677] GPL: port 1(erspan0) entered blocking state [ 209.315230][ T5677] GPL: port 1(erspan0) entered forwarding state [ 210.199262][ T5681] device syzkaller0 entered promiscuous mode [ 210.581881][ T5704] device veth0_vlan left promiscuous mode [ 210.602643][ T5704] device veth0_vlan entered promiscuous mode [ 210.702908][ T5714] device veth1_macvtap left promiscuous mode [ 210.736130][ T5714] device macsec0 left promiscuous mode [ 210.748122][ T5707] device sit0 left promiscuous mode [ 210.944300][ T5714] device veth1_macvtap entered promiscuous mode [ 210.950709][ T5714] device macsec0 entered promiscuous mode [ 210.957398][ T5720] device sit0 entered promiscuous mode [ 211.985954][ T5741] device veth0_vlan left promiscuous mode [ 211.992405][ T5741] device veth0_vlan entered promiscuous mode [ 212.191740][ T24] audit: type=1400 audit(1750142870.260:150): avc: denied { create } for pid=5756 comm="syz.4.1648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 212.446381][ T5761] device veth0_vlan left promiscuous mode [ 212.487846][ T5761] device veth0_vlan entered promiscuous mode [ 212.892035][ T5766] device veth0_vlan left promiscuous mode [ 212.947155][ T5766] device veth0_vlan entered promiscuous mode [ 213.144209][ T5773] device veth0_vlan left promiscuous mode [ 213.155826][ T5773] device veth0_vlan entered promiscuous mode [ 213.200204][ T5777] device sit0 left promiscuous mode [ 213.298656][ T5780] device sit0 entered promiscuous mode [ 213.367967][ T5784] device veth0_vlan left promiscuous mode [ 213.410438][ T5784] device veth0_vlan entered promiscuous mode [ 213.515803][ T5787] device veth0_vlan left promiscuous mode [ 213.522331][ T5787] device veth0_vlan entered promiscuous mode [ 214.651262][ T5816] device veth0_vlan left promiscuous mode [ 214.684925][ T5816] device veth0_vlan entered promiscuous mode [ 214.710682][ T5812] device pim6reg1 entered promiscuous mode [ 214.740750][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.777397][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.785182][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 214.850962][ T5822] device pim6reg1 entered promiscuous mode [ 214.895158][ T5843] syz.2.1675[5843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.895228][ T5843] syz.2.1675[5843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.931477][ T5843] device pim6reg1 entered promiscuous mode [ 215.036763][ T5854] syz.2.1675[5854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.036848][ T5854] syz.2.1675[5854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.373556][ T5871] device veth0_vlan left promiscuous mode [ 215.424754][ T5871] device veth0_vlan entered promiscuous mode [ 215.542750][ T5878] device veth0_vlan left promiscuous mode [ 215.549396][ T5878] device veth0_vlan entered promiscuous mode [ 215.651820][ T5882] device veth0_vlan left promiscuous mode [ 215.658326][ T5882] device veth0_vlan entered promiscuous mode [ 215.674444][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.687194][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.718165][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 215.809599][ T5893] device sit0 left promiscuous mode [ 215.920766][ T5891] device veth0_vlan left promiscuous mode [ 215.938835][ T5891] device veth0_vlan entered promiscuous mode [ 216.305177][ T5915] device veth0_vlan left promiscuous mode [ 216.391852][ T5915] device veth0_vlan entered promiscuous mode [ 217.246919][ T5957] device veth0_vlan left promiscuous mode [ 217.266981][ T5957] device veth0_vlan entered promiscuous mode [ 217.377689][ T5956] device veth0_vlan left promiscuous mode [ 217.496443][ T5956] device veth0_vlan entered promiscuous mode [ 218.057184][ T5980] Â: renamed from pim6reg1 [ 218.329946][ T5995] device veth0_vlan left promiscuous mode [ 218.341106][ T5995] device veth0_vlan entered promiscuous mode [ 218.717545][ T6011] GPL: port 2(dummy0) entered blocking state [ 218.725968][ T6011] GPL: port 2(dummy0) entered disabled state [ 218.755545][ T6011] device dummy0 entered promiscuous mode [ 218.774899][ T6011] GPL: port 2(dummy0) entered blocking state [ 218.781120][ T6011] GPL: port 2(dummy0) entered forwarding state [ 218.925475][ T6028] device syzkaller0 entered promiscuous mode [ 219.358682][ T6032] device sit0 left promiscuous mode [ 220.143458][ T6071] device syzkaller0 entered promiscuous mode [ 220.422873][ T6076] syz.1.1742[6076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.422969][ T6076] syz.1.1742[6076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.442453][ T6076] syz.1.1742[6076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.462665][ T6076] syz.1.1742[6076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.845870][ T6136] device sit0 entered promiscuous mode [ 222.069664][ T6137] device veth0_vlan left promiscuous mode [ 222.078043][ T6137] device veth0_vlan entered promiscuous mode [ 222.124216][ T6133] device sit0 left promiscuous mode [ 222.240174][ T24] audit: type=1400 audit(1750142880.310:151): avc: denied { create } for pid=6142 comm="syz.0.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 222.365629][ T6148] syz.3.1761[6148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.365715][ T6148] syz.3.1761[6148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.382328][ T6148] syz.3.1761[6148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.393856][ T6148] syz.3.1761[6148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.862117][ T6190] device veth1_macvtap left promiscuous mode [ 223.992312][ T6190] device macsec0 entered promiscuous mode [ 224.313608][ T6203] device veth0_vlan left promiscuous mode [ 224.386936][ T6203] device veth0_vlan entered promiscuous mode [ 224.408620][ T6201] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.418380][ T6201] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.594083][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.617126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.686474][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 224.846392][ T6208] device pim6reg1 entered promiscuous mode [ 226.140132][ T6258] device veth0_vlan left promiscuous mode [ 226.146493][ T6258] device veth0_vlan entered promiscuous mode [ 226.153600][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.187100][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.194779][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 227.268851][ T6277] device pim6reg1 entered promiscuous mode [ 228.175737][ T6293] device veth0_vlan left promiscuous mode [ 228.208750][ T6293] device veth0_vlan entered promiscuous mode [ 229.048730][ T6327] device pim6reg1 entered promiscuous mode [ 229.290622][ T6333] device veth0_vlan left promiscuous mode [ 229.318178][ T6333] device veth0_vlan entered promiscuous mode [ 229.355334][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.385228][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.426239][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 229.453766][ T6335] device veth0_vlan left promiscuous mode [ 229.471363][ T6335] device veth0_vlan entered promiscuous mode [ 229.537809][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.556873][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.571461][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 229.803612][ T6344] device pim6reg1 entered promiscuous mode [ 230.984913][ T6385] device pim6reg1 entered promiscuous mode [ 231.784374][ T6406] ref_ctr_offset mismatch. inode: 0x745 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 232.419443][ T6432] device pim6reg1 entered promiscuous mode [ 232.444510][ T6430] device sit0 left promiscuous mode [ 232.710456][ T24] audit: type=1400 audit(1750142890.780:152): avc: denied { append } for pid=6458 comm="syz.1.1850" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 233.272032][ T6476] device syzkaller0 entered promiscuous mode [ 233.562186][ T6501] device veth0_vlan left promiscuous mode [ 233.580196][ T6501] device veth0_vlan entered promiscuous mode [ 233.633566][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.657142][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.678694][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 233.694141][ T6514] device pim6reg1 entered promiscuous mode [ 233.976658][ T6527] device veth0_vlan left promiscuous mode [ 233.996610][ T6527] device veth0_vlan entered promiscuous mode [ 234.116511][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.138125][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.160054][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 234.265696][ T24] audit: type=1400 audit(1750142892.330:153): avc: denied { create } for pid=6533 comm="syz.1.1873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 234.357092][ T24] audit: type=1400 audit(1750142892.370:154): avc: denied { read } for pid=6531 comm="syz.0.1872" dev="nsfs" ino=4026532455 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 234.483725][ T24] audit: type=1400 audit(1750142892.370:155): avc: denied { open } for pid=6531 comm="syz.0.1872" path="net:[4026532455]" dev="nsfs" ino=4026532455 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 235.221413][ T6577] device pim6reg1 entered promiscuous mode [ 235.339551][ T6580] device sit0 entered promiscuous mode [ 236.484777][ T6621] device veth0_vlan left promiscuous mode [ 236.508961][ T6621] device veth0_vlan entered promiscuous mode [ 236.675938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.684810][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.749674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 237.275785][ T6652] device pim6reg1 entered promiscuous mode [ 237.891628][ T6688] GPL: port 2(dummy0) entered blocking state [ 237.897832][ T6688] GPL: port 2(dummy0) entered disabled state [ 237.951350][ T6688] device dummy0 entered promiscuous mode [ 237.969774][ T6688] GPL: port 2(dummy0) entered blocking state [ 237.976004][ T6688] GPL: port 2(dummy0) entered forwarding state [ 238.102542][ T6707] device veth0_vlan left promiscuous mode [ 238.124883][ T6707] device veth0_vlan entered promiscuous mode [ 238.169063][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.197061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.204695][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 238.517158][ T6739] device pim6reg1 entered promiscuous mode [ 241.897187][ T6824] device syzkaller0 entered promiscuous mode [ 242.314337][ T6843] device syzkaller0 entered promiscuous mode [ 243.644527][ T6893] device veth0_vlan left promiscuous mode [ 243.661437][ T6893] device veth0_vlan entered promiscuous mode [ 243.713437][ T6895] FAULT_INJECTION: forcing a failure. [ 243.713437][ T6895] name failslab, interval 1, probability 0, space 0, times 0 [ 243.752026][ T6895] CPU: 1 PID: 6895 Comm: syz.3.1980 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 243.763333][ T6895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 243.773382][ T6895] Call Trace: [ 243.776672][ T6895] __dump_stack+0x21/0x24 [ 243.780992][ T6895] dump_stack_lvl+0x169/0x1d8 [ 243.785661][ T6895] ? thaw_kernel_threads+0x220/0x220 [ 243.790949][ T6895] ? show_regs_print_info+0x18/0x18 [ 243.796143][ T6895] ? irq_exit_rcu+0x9/0x10 [ 243.800554][ T6895] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 243.806547][ T6895] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 243.812697][ T6895] dump_stack+0x15/0x1c [ 243.816846][ T6895] should_fail+0x3c1/0x510 [ 243.821379][ T6895] ? dup_task_struct+0x57/0xbd0 [ 243.826226][ T6895] __should_failslab+0xa4/0xe0 [ 243.830987][ T6895] should_failslab+0x9/0x20 [ 243.835486][ T6895] kmem_cache_alloc+0x3d/0x2e0 [ 243.840507][ T6895] dup_task_struct+0x57/0xbd0 [ 243.845176][ T6895] ? __kasan_check_write+0x14/0x20 [ 243.850278][ T6895] ? recalc_sigpending+0x1ac/0x230 [ 243.855382][ T6895] copy_process+0x5b2/0x32c0 [ 243.859966][ T6895] ? debug_smp_processor_id+0x17/0x20 [ 243.865335][ T6895] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 243.872191][ T6895] ? timerqueue_add+0x20a/0x230 [ 243.877050][ T6895] ? __pidfd_prepare+0x150/0x150 [ 243.881985][ T6895] kernel_clone+0x23f/0x940 [ 243.886499][ T6895] ? clockevents_program_event+0x362/0x8b0 [ 243.892304][ T6895] ? create_io_thread+0x130/0x130 [ 243.897323][ T6895] __x64_sys_clone+0x176/0x1d0 [ 243.902172][ T6895] ? __ia32_sys_vfork+0xf0/0xf0 [ 243.907018][ T6895] ? sched_clock+0x3a/0x40 [ 243.911442][ T6895] ? debug_smp_processor_id+0x17/0x20 [ 243.916815][ T6895] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 243.922869][ T6895] ? irqentry_exit_to_user_mode+0x41/0x80 [ 243.928574][ T6895] do_syscall_64+0x31/0x40 [ 243.932983][ T6895] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.938861][ T6895] RIP: 0033:0x7f563c3fc929 [ 243.943276][ T6895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.962869][ T6895] RSP: 002b:00007f563aa64fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 243.971277][ T6895] RAX: ffffffffffffffda RBX: 00007f563c623fa0 RCX: 00007f563c3fc929 [ 243.979236][ T6895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000108000 [ 243.987202][ T6895] RBP: 00007f563aa65090 R08: 0000000000000000 R09: 0000000000000000 [ 243.995164][ T6895] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 244.003123][ T6895] R13: 0000000000000000 R14: 00007f563c623fa0 R15: 00007ffd7e53d428 [ 244.117384][ T6911] device pim6reg1 entered promiscuous mode [ 244.220617][ T6922] device veth0_vlan left promiscuous mode [ 244.233920][ T6922] device veth0_vlan entered promiscuous mode [ 244.270812][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.285536][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.304553][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 245.778313][ T6948] FAULT_INJECTION: forcing a failure. [ 245.778313][ T6948] name failslab, interval 1, probability 0, space 0, times 0 [ 245.795141][ T6948] CPU: 0 PID: 6948 Comm: syz.0.1997 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 245.806449][ T6948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 245.816517][ T6948] Call Trace: [ 245.819821][ T6948] __dump_stack+0x21/0x24 [ 245.824157][ T6948] dump_stack_lvl+0x169/0x1d8 [ 245.828849][ T6948] ? show_regs_print_info+0x18/0x18 [ 245.834056][ T6948] ? do_syscall_64+0x31/0x40 [ 245.838660][ T6948] dump_stack+0x15/0x1c [ 245.842827][ T6948] should_fail+0x3c1/0x510 [ 245.847271][ T6948] ? __get_vm_area_node+0x113/0x450 [ 245.852474][ T6948] __should_failslab+0xa4/0xe0 [ 245.857243][ T6948] should_failslab+0x9/0x20 [ 245.861749][ T6948] kmem_cache_alloc_trace+0x3a/0x2e0 [ 245.867040][ T6948] __get_vm_area_node+0x113/0x450 [ 245.872074][ T6948] __vmalloc_node_range+0xe0/0x780 [ 245.877202][ T6948] ? copy_process+0x5b2/0x32c0 [ 245.881975][ T6948] ? kmem_cache_alloc+0x165/0x2e0 [ 245.887013][ T6948] dup_task_struct+0x40f/0xbd0 [ 245.891784][ T6948] ? copy_process+0x5b2/0x32c0 [ 245.896560][ T6948] ? __kasan_check_write+0x14/0x20 [ 245.901680][ T6948] ? recalc_sigpending+0x1ac/0x230 [ 245.906782][ T6948] copy_process+0x5b2/0x32c0 [ 245.911363][ T6948] ? memset+0x35/0x40 [ 245.915344][ T6948] ? proc_fail_nth_read+0x210/0x210 [ 245.920538][ T6948] ? __pidfd_prepare+0x150/0x150 [ 245.925471][ T6948] ? rw_verify_area+0x1c0/0x360 [ 245.930311][ T6948] ? vfs_write+0xac8/0xd60 [ 245.934730][ T6948] kernel_clone+0x23f/0x940 [ 245.939219][ T6948] ? kernel_write+0x3c0/0x3c0 [ 245.943883][ T6948] ? create_io_thread+0x130/0x130 [ 245.948892][ T6948] ? mutex_lock+0x8c/0xe0 [ 245.953207][ T6948] __x64_sys_clone+0x176/0x1d0 [ 245.957960][ T6948] ? __ia32_sys_vfork+0xf0/0xf0 [ 245.962814][ T6948] ? ksys_write+0x1eb/0x240 [ 245.967308][ T6948] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 245.973359][ T6948] do_syscall_64+0x31/0x40 [ 245.977773][ T6948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.983673][ T6948] RIP: 0033:0x7fe4bfc1f929 [ 245.988080][ T6948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.007672][ T6948] RSP: 002b:00007fe4be266fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 246.016085][ T6948] RAX: ffffffffffffffda RBX: 00007fe4bfe47080 RCX: 00007fe4bfc1f929 [ 246.024059][ T6948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000108000 [ 246.032027][ T6948] RBP: 00007fe4be267090 R08: 0000000000000000 R09: 0000000000000000 [ 246.040000][ T6948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 246.047966][ T6948] R13: 0000000000000000 R14: 00007fe4bfe47080 R15: 00007ffdde6468c8 [ 246.056281][ T6948] syz.0.1997: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 246.070454][ T6948] CPU: 0 PID: 6948 Comm: syz.0.1997 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 246.081761][ T6948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 246.091820][ T6948] Call Trace: [ 246.095116][ T6948] __dump_stack+0x21/0x24 [ 246.099441][ T6948] dump_stack_lvl+0x169/0x1d8 [ 246.104112][ T6948] ? show_regs_print_info+0x18/0x18 [ 246.109392][ T6948] ? pr_cont_kernfs_name+0xe3/0xf0 [ 246.114496][ T6948] dump_stack+0x15/0x1c [ 246.118643][ T6948] warn_alloc+0x1b0/0x1d0 [ 246.122964][ T6948] ? __get_vm_area_node+0x113/0x450 [ 246.128168][ T6948] ? zone_watermark_ok_safe+0x250/0x250 [ 246.133705][ T6948] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 246.139241][ T6948] ? __get_vm_area_node+0x345/0x450 [ 246.144436][ T6948] __vmalloc_node_range+0x27d/0x780 [ 246.149630][ T6948] ? kmem_cache_alloc+0x165/0x2e0 [ 246.154646][ T6948] dup_task_struct+0x40f/0xbd0 [ 246.159421][ T6948] ? copy_process+0x5b2/0x32c0 [ 246.164209][ T6948] ? __kasan_check_write+0x14/0x20 [ 246.169531][ T6948] ? recalc_sigpending+0x1ac/0x230 [ 246.174635][ T6948] copy_process+0x5b2/0x32c0 [ 246.179214][ T6948] ? memset+0x35/0x40 [ 246.183306][ T6948] ? proc_fail_nth_read+0x210/0x210 [ 246.188496][ T6948] ? __pidfd_prepare+0x150/0x150 [ 246.193423][ T6948] ? rw_verify_area+0x1c0/0x360 [ 246.198278][ T6948] ? vfs_write+0xac8/0xd60 [ 246.202686][ T6948] kernel_clone+0x23f/0x940 [ 246.207179][ T6948] ? kernel_write+0x3c0/0x3c0 [ 246.211850][ T6948] ? create_io_thread+0x130/0x130 [ 246.217049][ T6948] ? mutex_lock+0x8c/0xe0 [ 246.221405][ T6948] __x64_sys_clone+0x176/0x1d0 [ 246.226163][ T6948] ? __ia32_sys_vfork+0xf0/0xf0 [ 246.231006][ T6948] ? ksys_write+0x1eb/0x240 [ 246.235531][ T6948] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 246.241598][ T6948] do_syscall_64+0x31/0x40 [ 246.246139][ T6948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.252032][ T6948] RIP: 0033:0x7fe4bfc1f929 [ 246.256475][ T6948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.276078][ T6948] RSP: 002b:00007fe4be266fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 246.284482][ T6948] RAX: ffffffffffffffda RBX: 00007fe4bfe47080 RCX: 00007fe4bfc1f929 [ 246.292449][ T6948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000108000 [ 246.300410][ T6948] RBP: 00007fe4be267090 R08: 0000000000000000 R09: 0000000000000000 [ 246.308375][ T6948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 246.316342][ T6948] R13: 0000000000000000 R14: 00007fe4bfe47080 R15: 00007ffdde6468c8 [ 246.385093][ T6948] Mem-Info: [ 246.426644][ T6948] active_anon:35 inactive_anon:8464 isolated_anon:0 [ 246.426644][ T6948] active_file:24674 inactive_file:3630 isolated_file:0 [ 246.426644][ T6948] unevictable:0 dirty:253 writeback:0 [ 246.426644][ T6948] slab_reclaimable:7619 slab_unreclaimable:76067 [ 246.426644][ T6948] mapped:29326 shmem:161 pagetables:689 bounce:0 [ 246.426644][ T6948] free:1559013 free_pcp:800 free_cma:0 [ 246.746251][ T6948] Node 0 active_anon:140kB inactive_anon:34056kB active_file:98696kB inactive_file:14520kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117304kB dirty:1012kB writeback:0kB shmem:844kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4896kB all_unreclaimable? no [ 246.916245][ T6948] DMA32 free:2987448kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988828kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1380kB local_pcp:1380kB free_cma:0kB [ 246.996237][ T6948] lowmem_reserve[]: 0 3941 3941 [ 247.004696][ T6948] Normal free:3250396kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:140kB inactive_anon:34064kB active_file:98696kB inactive_file:14620kB unevictable:0kB writepending:1004kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2600kB bounce:0kB free_pcp:2032kB local_pcp:1296kB free_cma:0kB [ 247.096086][ T6948] lowmem_reserve[]: 0 0 0 [ 247.100606][ T6948] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 6*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2987448kB [ 247.119739][ T6948] Normal: 506*4kB (UME) 844*8kB (UME) 1087*16kB (UME) 964*32kB (UME) 455*64kB (UME) 116*128kB (UME) 60*256kB (UME) 18*512kB (UME) 9*1024kB (UM) 7*2048kB (M) 757*4096kB (UM) = 3249784kB [ 247.145076][ T6948] 28660 total pagecache pages [ 247.150290][ T6948] 0 pages in swap cache [ 247.154852][ T6948] Swap cache stats: add 0, delete 0, find 0/0 [ 247.161388][ T6948] Free swap = 124996kB [ 247.168445][ T6969] syz.2.2002[6969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.168534][ T6969] syz.2.2002[6969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.186216][ T6948] Total swap = 124996kB [ 247.206159][ T6948] 2097051 pages RAM [ 247.210005][ T6948] 0 pages HighMem/MovableOnly [ 247.214680][ T6948] 340752 pages reserved [ 247.219381][ T6948] 0 pages cma reserved [ 247.283361][ T6976] device veth1_macvtap left promiscuous mode [ 247.513525][ T6982] device veth0_vlan left promiscuous mode [ 247.588269][ T6982] device veth0_vlan entered promiscuous mode [ 247.775921][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.795425][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.822741][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 247.862521][ T6995] device veth1_to_bond entered promiscuous mode [ 248.892810][ T7013] device veth0_vlan left promiscuous mode [ 248.929399][ T7013] device veth0_vlan entered promiscuous mode [ 248.979580][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.988084][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.995665][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 249.044673][ T7018] device veth0_vlan left promiscuous mode [ 249.084402][ T7018] device veth0_vlan entered promiscuous mode [ 249.274695][ T7028] device veth0_vlan left promiscuous mode [ 249.331300][ T7028] device veth0_vlan entered promiscuous mode [ 249.721540][ T7043] device syzkaller0 entered promiscuous mode [ 250.018719][ T7058] device veth0_vlan left promiscuous mode [ 250.027186][ T7058] device veth0_vlan entered promiscuous mode [ 250.633187][ T7090] device wg2 entered promiscuous mode [ 251.698447][ T7115] device veth0_vlan left promiscuous mode [ 251.749239][ T7115] device veth0_vlan entered promiscuous mode [ 251.806537][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.826690][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.838788][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 251.853319][ T7125] device sit0 left promiscuous mode [ 253.374223][ T7165] device pim6reg1 entered promiscuous mode [ 254.163963][ T7194] device veth0_vlan left promiscuous mode [ 254.172839][ T7194] device veth0_vlan entered promiscuous mode [ 255.442983][ T7230] device veth0_vlan left promiscuous mode [ 255.487909][ T7230] device veth0_vlan entered promiscuous mode [ 256.293345][ T7262] device syzkaller0 entered promiscuous mode [ 257.714070][ T7291] device veth0_vlan left promiscuous mode [ 257.762081][ T7291] device veth0_vlan entered promiscuous mode [ 258.997311][ T7342] FAULT_INJECTION: forcing a failure. [ 258.997311][ T7342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.016150][ T7342] CPU: 1 PID: 7342 Comm: syz.2.2118 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 259.027464][ T7342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 259.037528][ T7342] Call Trace: [ 259.040830][ T7342] __dump_stack+0x21/0x24 [ 259.045176][ T7342] dump_stack_lvl+0x169/0x1d8 [ 259.049882][ T7342] ? show_regs_print_info+0x18/0x18 [ 259.055093][ T7342] dump_stack+0x15/0x1c [ 259.059259][ T7342] should_fail+0x3c1/0x510 [ 259.063680][ T7342] should_fail_usercopy+0x1a/0x20 [ 259.068706][ T7342] _copy_from_user+0x20/0xd0 [ 259.073302][ T7342] ip6_tnl_ioctl+0x3fa/0xed0 [ 259.078054][ T7342] ? preempt_count_add+0x90/0x1b0 [ 259.083103][ T7342] ? ip6_tnl_start_xmit+0x1320/0x1320 [ 259.088588][ T7342] ? __mutex_lock+0x853/0xc50 [ 259.093283][ T7342] ? full_name_hash+0xa0/0xf0 [ 259.097967][ T7342] dev_ifsioc+0x69b/0xa50 [ 259.102299][ T7342] ? dev_ioctl+0xb80/0xb80 [ 259.106723][ T7342] dev_ioctl+0x5ea/0xb80 [ 259.110972][ T7342] sock_ioctl+0x6a0/0x710 [ 259.115305][ T7342] ? sock_poll+0x360/0x360 [ 259.119732][ T7342] ? __fget_files+0x2c4/0x320 [ 259.124435][ T7342] ? security_file_ioctl+0x84/0xa0 [ 259.129554][ T7342] ? sock_poll+0x360/0x360 [ 259.133977][ T7342] __se_sys_ioctl+0x121/0x1a0 [ 259.138692][ T7342] __x64_sys_ioctl+0x7b/0x90 [ 259.143303][ T7342] do_syscall_64+0x31/0x40 [ 259.147731][ T7342] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 259.153624][ T7342] RIP: 0033:0x7f0733acb929 [ 259.158047][ T7342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.177659][ T7342] RSP: 002b:00007f0732134038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.186081][ T7342] RAX: ffffffffffffffda RBX: 00007f0733cf2fa0 RCX: 00007f0733acb929 [ 259.194063][ T7342] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 259.202034][ T7342] RBP: 00007f0732134090 R08: 0000000000000000 R09: 0000000000000000 [ 259.210024][ T7342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.218005][ T7342] R13: 0000000000000000 R14: 00007f0733cf2fa0 R15: 00007ffdee42e458 [ 259.486141][ T24] audit: type=1400 audit(1750142917.540:156): avc: denied { ioctl } for pid=7346 comm="syz.2.2120" path="uts:[4026532468]" dev="nsfs" ino=4026532468 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 259.595676][ T7369] device pim6reg1 entered promiscuous mode [ 261.396482][ T7411] device pim6reg1 entered promiscuous mode [ 261.409238][ T7412] device wg2 left promiscuous mode [ 261.439409][ T7406] device veth0_vlan left promiscuous mode [ 261.473140][ T7406] device veth0_vlan entered promiscuous mode [ 262.374843][ T7449] device veth0_vlan left promiscuous mode [ 262.432271][ T7449] device veth0_vlan entered promiscuous mode [ 262.669152][ T7462] device pim6reg1 entered promiscuous mode [ 263.492271][ T7492] device veth0_vlan left promiscuous mode [ 263.498873][ T7492] device veth0_vlan entered promiscuous mode [ 264.015534][ T7515] device pim6reg1 entered promiscuous mode [ 264.337642][ T7519] device pim6reg1 entered promiscuous mode [ 264.594480][ T7524] device veth0_vlan left promiscuous mode [ 264.640486][ T7524] device veth0_vlan entered promiscuous mode [ 264.697464][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.712605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.722222][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 264.753500][ T7531] device syzkaller0 entered promiscuous mode [ 264.761683][ T7532] device veth0_vlan left promiscuous mode [ 264.774085][ T7532] device veth0_vlan entered promiscuous mode [ 264.788504][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.798916][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.806842][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 264.859465][ T7531] device pim6reg1 entered promiscuous mode [ 264.868801][ T7531] syzkaller0: tun_net_xmit 1280 [ 264.873748][ T7531] syzkaller0: create flow: hash 3807412963 index 1 [ 264.998706][ C0] Illegal XDP return value 16128, expect packet loss! [ 265.272015][ T7559] device pim6reg1 entered promiscuous mode [ 265.616478][ T7530] syzkaller0: delete flow: hash 3807412963 index 1 [ 266.885609][ T7619] device pim6reg1 entered promiscuous mode [ 266.980063][ T7626] device sit0 entered promiscuous mode [ 267.723962][ T7655] syz.1.2218 uses obsolete (PF_INET,SOCK_PACKET) [ 267.818292][ T7657] device syzkaller0 entered promiscuous mode [ 267.830888][ T7661] device veth0_vlan left promiscuous mode [ 267.856657][ T7661] device veth0_vlan entered promiscuous mode [ 268.102046][ T7682] device pim6reg1 entered promiscuous mode [ 268.339561][ T7690] syz.0.2229[7690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.398022][ T7739] €Â0: renamed from pim6reg1 [ 270.547056][ T7742] device pim6reg1 entered promiscuous mode [ 271.408020][ T7763] device pim6reg1 entered promiscuous mode [ 273.414914][ T7802] device veth0_vlan left promiscuous mode [ 273.421853][ T7802] device veth0_vlan entered promiscuous mode [ 273.446675][ T7805] device veth0_vlan left promiscuous mode [ 273.453470][ T7805] device veth0_vlan entered promiscuous mode [ 273.469865][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.480221][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.488189][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 273.722909][ T7822] device pim6reg1 entered promiscuous mode [ 273.860746][ T7825] device veth0_vlan left promiscuous mode [ 273.961319][ T7825] device veth0_vlan entered promiscuous mode [ 274.116539][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.176873][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.213213][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 274.646638][ T7843] device veth0_vlan left promiscuous mode [ 274.662603][ T7843] device veth0_vlan entered promiscuous mode [ 274.741306][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.750195][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.759341][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 285.430710][ T7861] device veth0_vlan left promiscuous mode [ 285.470843][ T7861] device veth0_vlan entered promiscuous mode [ 285.558883][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.574235][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.596908][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 286.240865][ T7892] device veth0_vlan left promiscuous mode [ 286.271981][ T7892] device veth0_vlan entered promiscuous mode [ 286.410401][ T7898] device veth0_vlan left promiscuous mode [ 286.438182][ T7898] device veth0_vlan entered promiscuous mode [ 286.544471][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.576753][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.596864][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 286.690550][ T7908] device veth0_vlan left promiscuous mode [ 286.711588][ T7908] device veth0_vlan entered promiscuous mode [ 287.192793][ T7930] device pim6reg1 entered promiscuous mode [ 288.073800][ T7938] device macsec0 entered promiscuous mode [ 288.411241][ T7946] geneve1: tun_chr_ioctl cmd 1074025672 [ 288.416943][ T7946] geneve1: ignored: set checksum enabled [ 288.799089][ T7966] device sit0 entered promiscuous mode [ 288.968390][ T7972] device pim6reg1 entered promiscuous mode [ 289.017549][ T7975] device veth0_vlan left promiscuous mode [ 289.053815][ T7975] device veth0_vlan entered promiscuous mode [ 289.244616][ T7981] device veth0_to_team entered promiscuous mode [ 289.764129][ T8001] ref_ctr_offset mismatch. inode: 0x945 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 289.776827][ T8003] device erspan0 left promiscuous mode [ 289.815263][ T8003] GPL: port 1(erspan0) entered disabled state [ 290.774151][ T8026] device veth0_vlan left promiscuous mode [ 290.782506][ T8026] device veth0_vlan entered promiscuous mode [ 290.805429][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.875344][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.906518][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 290.915527][ T8022] syz.1.2327 (8022) used obsolete PPPIOCDETACH ioctl [ 291.514188][ T8042] device syzkaller0 entered promiscuous mode [ 292.205763][ T8066] device veth0_vlan left promiscuous mode [ 292.245245][ T8066] device veth0_vlan entered promiscuous mode [ 292.299565][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.308144][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.325309][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 292.412898][ T8070] device bridge_slave_1 left promiscuous mode [ 292.448023][ T8070] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.557033][ T8070] device bridge_slave_0 left promiscuous mode [ 292.586554][ T8070] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.527849][ T8093] device veth0_vlan left promiscuous mode [ 293.534820][ T8093] device veth0_vlan entered promiscuous mode [ 293.649655][ T8096] device pim6reg1 entered promiscuous mode [ 294.545944][ T8124] device veth0_vlan left promiscuous mode [ 294.582267][ T8124] device veth0_vlan entered promiscuous mode [ 296.671980][ T8173] device veth0_vlan left promiscuous mode [ 296.752487][ T8173] device veth0_vlan entered promiscuous mode [ 296.838258][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.850414][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.859103][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 296.999438][ T8181] device veth0_vlan left promiscuous mode [ 297.012752][ T8181] device veth0_vlan entered promiscuous mode [ 297.224163][ T8187] device veth0_vlan left promiscuous mode [ 297.287317][ T8187] device veth0_vlan entered promiscuous mode [ 297.635418][ T8197] device veth0_vlan left promiscuous mode [ 297.661557][ T8197] device veth0_vlan entered promiscuous mode [ 297.811630][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.855161][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.876583][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 297.903207][ T8209] device veth0_vlan left promiscuous mode [ 297.982522][ T8209] device veth0_vlan entered promiscuous mode [ 298.167075][ T8213] device sit0 left promiscuous mode [ 298.212084][ T8216] device sit0 entered promiscuous mode [ 298.556197][ T8229] device veth0_vlan left promiscuous mode [ 298.596614][ T8229] device veth0_vlan entered promiscuous mode [ 299.097268][ T8237] device veth0_vlan left promiscuous mode [ 299.130004][ T8237] device veth0_vlan entered promiscuous mode [ 299.601601][ T8257] device sit0 left promiscuous mode [ 299.886183][ T8267] device sit0 left promiscuous mode [ 299.914507][ T8265] device veth0_vlan left promiscuous mode [ 299.963515][ T8265] device veth0_vlan entered promiscuous mode [ 300.021805][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.030550][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.056505][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 300.066454][ T8267] device sit0 entered promiscuous mode [ 300.816733][ T8310] syz.2.2409[8310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.816869][ T8310] syz.2.2409[8310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.921685][ T8314] device pim6reg1 entered promiscuous mode [ 301.069081][ T8314] device syzkaller0 entered promiscuous mode [ 301.285855][ T8318] device veth0_vlan left promiscuous mode [ 301.306339][ T8318] device veth0_vlan entered promiscuous mode [ 301.501253][ T8328] device veth0_vlan left promiscuous mode [ 301.569214][ T8328] device veth0_vlan entered promiscuous mode [ 302.642208][ T8360] device veth0_vlan left promiscuous mode [ 302.696978][ T8360] device veth0_vlan entered promiscuous mode [ 302.760545][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.770193][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.785788][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 303.536115][ T8385] syz.1.2432[8385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.538880][ T8385] syz.1.2432[8385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.760080][ T8386] syz.1.2432[8386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.807458][ T8386] syz.1.2432[8386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.071587][ T8401] device veth0_vlan left promiscuous mode [ 304.089420][ T8401] device veth0_vlan entered promiscuous mode [ 304.973031][ T8426] device veth1_to_bond entered promiscuous mode [ 305.415102][ T8440] device pim6reg1 entered promiscuous mode [ 305.964779][ T8445] device veth0_vlan left promiscuous mode [ 305.981120][ T8445] device veth0_vlan entered promiscuous mode [ 306.020438][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.028923][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.036576][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 306.781636][ T8463] device wg2 left promiscuous mode [ 306.969066][ T8464] device wg2 entered promiscuous mode [ 307.107009][ T8471] device pim6reg1 entered promiscuous mode [ 308.385267][ T8497] device veth0_vlan left promiscuous mode [ 308.404847][ T8497] device veth0_vlan entered promiscuous mode [ 308.547853][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.578812][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.690248][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 308.921174][ T8517] device pim6reg1 entered promiscuous mode [ 308.937893][ T8520] device pim6reg1 entered promiscuous mode [ 310.359687][ T8548] device veth0_vlan left promiscuous mode [ 310.366599][ T8548] device veth0_vlan entered promiscuous mode [ 310.628361][ T8555] device veth0_vlan left promiscuous mode [ 310.663341][ T8555] device veth0_vlan entered promiscuous mode [ 310.824666][ T8562] device pim6reg1 entered promiscuous mode [ 311.080265][ T8573] device pim6reg1 entered promiscuous mode [ 311.514586][ T8584] syz.0.2492[8584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.514744][ T8584] syz.0.2492[8584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.698484][ T8588] device veth0_vlan left promiscuous mode [ 311.729584][ T8588] device veth0_vlan entered promiscuous mode [ 311.809890][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.828808][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.846476][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 312.607258][ T8620] device pim6reg1 entered promiscuous mode [ 313.178305][ T8637] device veth0_vlan left promiscuous mode [ 313.207773][ T8637] device veth0_vlan entered promiscuous mode [ 313.237236][ T8641] device veth0_vlan left promiscuous mode [ 313.259157][ T8641] device veth0_vlan entered promiscuous mode [ 313.333838][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.343025][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.350863][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 313.358771][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.373302][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.381051][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 313.775316][ T8661] device wg2 entered promiscuous mode [ 313.807990][ T8661] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.815126][ T8661] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.291639][ T8673] device veth0_vlan left promiscuous mode [ 314.332126][ T8673] device veth0_vlan entered promiscuous mode [ 314.532327][ T8678] device veth0_vlan left promiscuous mode [ 314.540052][ T8678] device veth0_vlan entered promiscuous mode [ 315.143086][ T8693] device veth0_vlan left promiscuous mode [ 315.170905][ T8693] device veth0_vlan entered promiscuous mode [ 315.238094][ T8690] device veth0_vlan left promiscuous mode [ 315.253619][ T8690] device veth0_vlan entered promiscuous mode [ 315.298724][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.316821][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.366493][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 315.496583][ T8708] device veth0_vlan left promiscuous mode [ 315.578651][ T8708] device veth0_vlan entered promiscuous mode [ 315.715299][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.754141][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.786438][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 315.794273][ T8709] device veth0_vlan left promiscuous mode [ 315.812937][ T8709] device veth0_vlan entered promiscuous mode [ 315.934687][ T8724] device veth0_vlan left promiscuous mode [ 315.941260][ T8724] device veth0_vlan entered promiscuous mode [ 316.995191][ T8751] device veth0_vlan left promiscuous mode [ 317.113348][ T8751] device veth0_vlan entered promiscuous mode [ 317.243205][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.256218][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.309092][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 318.744779][ T8803] device veth0_vlan left promiscuous mode [ 318.776739][ T8803] device veth0_vlan entered promiscuous mode [ 318.850642][ T8808] device veth0_vlan left promiscuous mode [ 318.868798][ T8808] device veth0_vlan entered promiscuous mode [ 319.623608][ T8851] device veth0_vlan left promiscuous mode [ 319.637344][ T8851] device veth0_vlan entered promiscuous mode [ 320.118644][ T8862] device veth0_vlan left promiscuous mode [ 320.252366][ T8862] device veth0_vlan entered promiscuous mode [ 320.366205][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.374571][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.458067][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 320.789421][ T24] audit: type=1400 audit(1750142978.860:157): avc: denied { create } for pid=8879 comm="syz.4.2585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 320.931249][ T8880] device sit0 left promiscuous mode [ 321.182844][ T8895] device sit0 entered promiscuous mode [ 321.456953][ T8908] device wg2 entered promiscuous mode [ 321.794848][ T8913] device veth0_vlan left promiscuous mode [ 321.913621][ T8913] device veth0_vlan entered promiscuous mode [ 322.663952][ T8937] device syzkaller0 entered promiscuous mode [ 323.648732][ T8963] device veth0_vlan left promiscuous mode [ 323.669649][ T8963] device veth0_vlan entered promiscuous mode [ 323.750035][ T8980] device pim6reg1 entered promiscuous mode [ 324.704892][ T9025] device pim6reg1 entered promiscuous mode [ 325.754066][ T9045] device syzkaller0 entered promiscuous mode [ 326.173538][ T9053] device syzkaller0 entered promiscuous mode [ 327.379781][ T9084] device pim6reg1 entered promiscuous mode [ 328.578256][ T9105] device veth0_vlan left promiscuous mode [ 328.625022][ T9105] device veth0_vlan entered promiscuous mode [ 328.646417][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.684297][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.701999][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 328.720287][ T9104] device veth0_vlan left promiscuous mode [ 328.775248][ T9104] device veth0_vlan entered promiscuous mode [ 329.019805][ T9126] device pim6reg1 entered promiscuous mode [ 329.378709][ T9119] device syzkaller0 entered promiscuous mode [ 329.518224][ T9132] device veth1_macvtap left promiscuous mode [ 329.543110][ T9132] device macsec0 entered promiscuous mode [ 329.623988][ T9133] device veth1_macvtap entered promiscuous mode [ 329.857836][ T9142] device veth0_vlan left promiscuous mode [ 329.911345][ T9142] device veth0_vlan entered promiscuous mode [ 330.395771][ T9162] device pim6reg1 entered promiscuous mode [ 330.787482][ T9169] device veth0_vlan left promiscuous mode [ 330.885933][ T9169] device veth0_vlan entered promiscuous mode [ 330.961096][ T9167] device veth0_vlan left promiscuous mode [ 330.981230][ T9167] device veth0_vlan entered promiscuous mode [ 331.035282][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.044085][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.051698][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 331.276907][ T9183] device veth0_vlan left promiscuous mode [ 331.303488][ T9183] device veth0_vlan entered promiscuous mode [ 331.359852][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.380458][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.412003][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 331.864698][ T9207] device veth0_vlan left promiscuous mode [ 331.881071][ T9207] device veth0_vlan entered promiscuous mode [ 331.925228][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.938888][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.047388][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 332.136480][ T9219] device pim6reg1 entered promiscuous mode [ 332.788042][ T9226] device pim6reg1 entered promiscuous mode [ 333.924096][ T9257] device veth0_vlan left promiscuous mode [ 333.954576][ T9257] device veth0_vlan entered promiscuous mode [ 334.277552][ T9259] device wg2 entered promiscuous mode [ 334.631637][ T9270] device pim6reg1 entered promiscuous mode [ 334.726909][ T9274] device veth0_vlan left promiscuous mode [ 334.736970][ T9274] device veth0_vlan entered promiscuous mode [ 335.564200][ T9310] device veth0_vlan left promiscuous mode [ 335.600681][ T9310] device veth0_vlan entered promiscuous mode [ 335.686611][ T9313] device sit0 left promiscuous mode [ 335.720041][ T9316] device sit0 entered promiscuous mode [ 335.928270][ T9324] device veth0_vlan left promiscuous mode [ 335.952320][ T9324] device veth0_vlan entered promiscuous mode [ 336.395896][ T9338] device syzkaller0 entered promiscuous mode [ 337.073043][ T9352] device veth0_vlan left promiscuous mode [ 337.100501][ T9352] device veth0_vlan entered promiscuous mode [ 337.150087][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.162764][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.170737][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 337.589766][ T9368] device syzkaller0 entered promiscuous mode [ 337.896780][ T9382] device pim6reg1 entered promiscuous mode [ 337.933958][ T9386] device syzkaller0 entered promiscuous mode [ 339.419594][ T9453] device syzkaller0 entered promiscuous mode [ 339.474302][ T9450] device pim6reg1 entered promiscuous mode [ 339.608825][ T9462] device pim6reg1 entered promiscuous mode [ 340.406759][ T9499] device syzkaller0 entered promiscuous mode [ 340.893780][ T9512] device pim6reg1 entered promiscuous mode [ 341.982413][ T9536] device veth0_vlan left promiscuous mode [ 342.035713][ T9536] device veth0_vlan entered promiscuous mode [ 342.075808][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.086852][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.094538][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 342.314634][ T9552] device veth0_vlan left promiscuous mode [ 342.348444][ T9552] device veth0_vlan entered promiscuous mode [ 342.417812][ T9560] device pim6reg1 entered promiscuous mode [ 342.655531][ T9566] device veth0_vlan left promiscuous mode [ 342.771183][ T9566] device veth0_vlan entered promiscuous mode [ 342.910602][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.926720][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.963009][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 343.145382][ T9580] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.182772][ T9580] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.190387][ T9580] device bridge_slave_0 entered promiscuous mode [ 343.254423][ T9589] device veth0_vlan left promiscuous mode [ 343.282644][ T9589] device veth0_vlan entered promiscuous mode [ 343.373560][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.382450][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.400496][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 343.421596][ T9580] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.431659][ T9580] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.459041][ T9580] device bridge_slave_1 entered promiscuous mode [ 343.578709][ T24] audit: type=1400 audit(1750143001.650:158): avc: denied { write } for pid=9580 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.645849][ T9630] device pim6reg1 entered promiscuous mode [ 343.698021][ T9627] device sit0 entered promiscuous mode [ 343.703945][ T24] audit: type=1400 audit(1750143001.680:159): avc: denied { read } for pid=9580 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 344.046976][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.054733][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.075184][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.083892][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.153850][ T2566] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.160969][ T2566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.182958][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.191739][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.200387][ T2566] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.207484][ T2566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.218997][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.232374][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.314101][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.326507][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.363933][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 344.376436][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.465708][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.484865][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.513917][ T9580] device veth0_vlan entered promiscuous mode [ 344.520573][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.532914][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.545986][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.561610][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.571532][ T9580] device veth1_macvtap entered promiscuous mode [ 344.584524][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.592329][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.601105][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.617966][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.626500][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.770739][ T808] device veth1_macvtap left promiscuous mode [ 344.781326][ T808] device veth0_vlan left promiscuous mode [ 344.947378][ T9682] syz.4.2821[9682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.947437][ T9682] syz.4.2821[9682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.025200][ T9682] device syzkaller0 entered promiscuous mode [ 345.645158][ T9714] device sit0 left promiscuous mode [ 345.718679][ T9712] device wg2 left promiscuous mode [ 345.789758][ T9716] device sit0 entered promiscuous mode [ 346.746162][ T9758] syz.1.2844[9758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.811357][ T9798] device veth0_vlan left promiscuous mode [ 348.873259][ T9798] device veth0_vlan entered promiscuous mode [ 349.029795][ T9800] device veth0_vlan left promiscuous mode [ 349.058873][ T9800] device veth0_vlan entered promiscuous mode [ 349.181914][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.201369][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.215636][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 349.230622][ T9809] device sit0 entered promiscuous mode [ 349.859308][ T9843] device veth0_vlan left promiscuous mode [ 349.914297][ T9843] device veth0_vlan entered promiscuous mode [ 350.189937][ T9862] device pim6reg1 entered promiscuous mode [ 351.649338][ T9883] device veth0_vlan left promiscuous mode [ 351.694133][ T9883] device veth0_vlan entered promiscuous mode [ 351.833331][ T9888] device syzkaller0 entered promiscuous mode [ 351.906465][ T9894] device syzkaller0 entered promiscuous mode [ 352.187649][ T9910] device sit0 left promiscuous mode [ 352.874064][ T9930] device veth0_vlan left promiscuous mode [ 352.983669][ T9930] device veth0_vlan entered promiscuous mode [ 353.059047][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.091787][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.153310][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 353.444500][ T9936] device veth0_vlan left promiscuous mode [ 353.455935][ T9936] device veth0_vlan entered promiscuous mode [ 353.503943][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.517759][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.536919][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 355.515229][ T9968] device veth0_vlan left promiscuous mode [ 355.531200][ T9968] device veth0_vlan entered promiscuous mode [ 355.693631][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.714486][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.748246][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 356.474482][ T9996] device pim6reg1 entered promiscuous mode [ 359.111540][T10044] device veth0_vlan left promiscuous mode [ 359.128855][T10044] device veth0_vlan entered promiscuous mode [ 359.197691][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.219369][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.235738][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 359.337729][T10050] device veth0_vlan left promiscuous mode [ 359.378655][T10050] device veth0_vlan entered promiscuous mode [ 359.454380][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.493706][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.502344][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 359.534934][T10061] device syzkaller0 entered promiscuous mode [ 359.853306][T10068] device syzkaller0 entered promiscuous mode [ 360.096206][T10080] device syzkaller0 entered promiscuous mode [ 361.645233][T10160] device veth0_vlan left promiscuous mode [ 361.657529][T10160] device veth0_vlan entered promiscuous mode [ 361.796992][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.806707][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.816363][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 362.039475][T10159] device syzkaller0 entered promiscuous mode [ 362.108664][T10136] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.115872][T10136] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.124261][T10136] device bridge_slave_0 entered promiscuous mode [ 362.132753][T10136] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.140154][T10136] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.147649][T10136] device bridge_slave_1 entered promiscuous mode [ 362.154308][T10171] device pim6reg1 entered promiscuous mode [ 362.516764][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.539979][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.636440][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.650939][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.660204][ T808] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.667398][ T808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.675010][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.684649][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.693795][ T808] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.700875][ T808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.727284][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.736912][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.745269][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.871791][T10201] device veth0_vlan left promiscuous mode [ 362.883040][T10201] device veth0_vlan entered promiscuous mode [ 362.896215][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.929710][ T2566] device bridge_slave_1 left promiscuous mode [ 362.936994][ T2566] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.954002][ T2566] device bridge_slave_0 left promiscuous mode [ 362.967939][ T2566] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.286286][T10136] device veth0_vlan entered promiscuous mode [ 363.296539][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.304936][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.312744][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.341011][T10136] device veth1_macvtap entered promiscuous mode [ 363.375656][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.384149][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.392843][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.434050][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.449214][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.497235][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.583468][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 363.951562][T10238] device veth0_vlan left promiscuous mode [ 363.960175][T10238] device veth0_vlan entered promiscuous mode [ 365.833708][T10288] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.840845][T10288] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.848339][T10288] device bridge_slave_0 entered promiscuous mode [ 365.931784][T10288] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.938953][T10288] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.946492][T10288] device bridge_slave_1 entered promiscuous mode [ 366.253401][T10288] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.260495][T10288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.267806][T10288] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.274824][T10288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.409497][ T24] audit: type=1400 audit(1750143024.480:160): avc: denied { setattr } for pid=10302 comm="syz.4.3008" path="pipe:[50689]" dev="pipefs" ino=50689 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 366.447121][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.476200][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.604097][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.611677][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.619432][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.627904][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.636378][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.643408][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.701901][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.711065][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.719528][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.726597][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.735920][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 366.744256][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.753080][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 366.761521][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.874802][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 366.985724][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 367.128098][T10308] device veth0_vlan left promiscuous mode [ 367.134340][T10308] device veth0_vlan entered promiscuous mode [ 367.151771][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.163254][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.171318][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 367.285324][ T2566] GPL: port 1(erspan0) entered disabled state [ 367.303657][ T2566] device erspan0 left promiscuous mode [ 367.309292][ T2566] GPL: port 1(erspan0) entered disabled state [ 367.319617][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 367.328037][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.337429][T10288] device veth0_vlan entered promiscuous mode [ 367.354858][T10288] device veth1_macvtap entered promiscuous mode [ 367.408654][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.417763][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.431053][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 367.440520][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 367.459308][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 367.467280][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 367.475744][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.485093][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 367.511335][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.841220][T10334] device sit0 entered promiscuous mode [ 367.996399][T10342] syz.2.3019[10342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.996466][T10342] syz.2.3019[10342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.147168][T10340] device wg2 left promiscuous mode [ 368.217496][T10343] device wg2 entered promiscuous mode [ 368.225239][ T2566] device dummy0 left promiscuous mode [ 368.231370][ T2566] GPL: port 2(dummy0) entered disabled state [ 368.318279][ T2566] device veth0_vlan left promiscuous mode [ 368.676417][T10350] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.683641][T10350] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.692165][T10352] device bridge_slave_1 left promiscuous mode [ 368.698968][T10352] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.706923][T10352] device bridge_slave_0 left promiscuous mode [ 368.713087][T10352] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.805173][T10358] device syzkaller0 entered promiscuous mode [ 369.119153][ T24] audit: type=1400 audit(1750143027.190:161): avc: denied { create } for pid=10369 comm="syz.1.3027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 369.456941][T10384] syz.0.3031[10384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.457022][T10384] syz.0.3031[10384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.266145][T10405] device veth0_vlan left promiscuous mode [ 370.285794][T10405] device veth0_vlan entered promiscuous mode [ 370.333872][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.348157][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 370.357669][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.401023][T10411] device veth0_vlan left promiscuous mode [ 370.407714][T10411] device veth0_vlan entered promiscuous mode [ 371.212633][T10424] device veth0_vlan left promiscuous mode [ 371.246495][T10424] device veth0_vlan entered promiscuous mode [ 371.314307][T10427] device veth0_vlan left promiscuous mode [ 371.376681][T10427] device veth0_vlan entered promiscuous mode [ 371.509487][T10429] device sit0 entered promiscuous mode [ 372.918561][T10484] device veth0_vlan left promiscuous mode [ 372.953326][T10484] device veth0_vlan entered promiscuous mode [ 373.016506][T10487] device veth1_macvtap left promiscuous mode [ 373.022552][T10487] device macsec0 left promiscuous mode [ 373.220392][T10498] device pim6reg1 entered promiscuous mode [ 373.795405][T10537] device veth0_vlan left promiscuous mode [ 373.814881][T10537] device veth0_vlan entered promiscuous mode [ 373.827501][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.835854][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.843580][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 373.910892][T10532] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.918200][T10532] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.926495][T10532] device bridge_slave_0 entered promiscuous mode [ 373.934313][T10532] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.941818][T10532] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.950662][T10532] device bridge_slave_1 entered promiscuous mode [ 374.353586][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 374.419274][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.596799][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 374.605957][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 374.614215][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.621275][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.629082][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 374.645775][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 374.653989][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.661024][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.668438][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.676351][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.686259][T10575] device pim6reg1 entered promiscuous mode [ 374.716790][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 374.756860][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 374.827654][T10532] device veth0_vlan entered promiscuous mode [ 374.854902][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.863759][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.871665][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.940978][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 374.959024][T10532] device veth1_macvtap entered promiscuous mode [ 374.987643][T10589] device pim6reg1 entered promiscuous mode [ 375.049007][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 375.067253][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 375.163554][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 375.173520][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 375.185722][T10591] device veth0_vlan left promiscuous mode [ 375.211834][T10591] device veth0_vlan entered promiscuous mode [ 375.289182][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.301189][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.318009][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.732366][T10607] ÿ: renamed from bond_slave_0 [ 375.738558][T10611] device pim6reg1 entered promiscuous mode [ 375.793255][T10611] syz.0.3095[10611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.793347][T10611] syz.0.3095[10611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.920151][T10610] ÿÿÿÿÿÿ: renamed from vlan1 [ 376.120961][T10633] device veth0_vlan left promiscuous mode [ 376.127691][T10633] device veth0_vlan entered promiscuous mode [ 376.170333][T10645] device sit0 left promiscuous mode [ 376.249769][T10647] device sit0 entered promiscuous mode [ 376.542638][T10622] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.550322][T10622] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.562802][T10622] device bridge_slave_0 entered promiscuous mode [ 376.721017][T10622] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.736228][T10622] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.804456][T10622] device bridge_slave_1 entered promiscuous mode [ 377.278353][T10684] device veth0_vlan left promiscuous mode [ 377.295315][T10684] device veth0_vlan entered promiscuous mode [ 377.335530][ T2566] device dummy0 left promiscuous mode [ 377.341082][ T2566] GPL: port 2(dummy0) entered disabled state [ 377.348413][ T2566] device veth1 left promiscuous mode [ 377.359514][ T2566] kfree: port 1(veth1) entered disabled state [ 377.375397][ T2566] device veth0_vlan left promiscuous mode [ 377.591355][T10695] syz.0.3115[10695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.591445][T10695] syz.0.3115[10695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.643292][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.663174][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.671063][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.683916][T10691] device pim6reg1 entered promiscuous mode [ 377.795870][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.808019][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.815549][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.825865][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.834145][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.841206][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.872555][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.882153][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.890454][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.897517][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.905770][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 377.918544][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.926616][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 377.934737][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.974977][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.983159][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.991193][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.003321][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 378.014722][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 378.024434][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 378.040889][T10622] device veth0_vlan entered promiscuous mode [ 378.082368][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 378.096955][T10622] device veth1_macvtap entered promiscuous mode [ 378.123890][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 378.136423][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 378.203154][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 378.225694][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 378.302951][T10718] device sit0 entered promiscuous mode [ 378.875691][T10725] device veth0_vlan left promiscuous mode [ 378.901635][T10725] device veth0_vlan entered promiscuous mode [ 379.432404][T10740] device syzkaller0 entered promiscuous mode [ 379.560229][T10743] device pim6reg1 entered promiscuous mode [ 379.655189][T10743] syz.4.3129[10743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.655273][T10743] syz.4.3129[10743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.882794][T10745] ÿÿÿÿÿÿ: renamed from vlan1 [ 380.040071][ T2566] GPL: port 1(erspan0) entered disabled state [ 380.080053][ T2566] device erspan0 left promiscuous mode [ 380.085555][ T2566] GPL: port 1(erspan0) entered disabled state [ 380.177090][T10763] device pim6reg1 entered promiscuous mode [ 380.201344][T10758] syz.2.3134[10758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.201438][T10758] syz.2.3134[10758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.339006][T10763] ÿÿÿÿÿÿ: renamed from vlan1 [ 380.486576][T10770] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.637375][T10774] device veth0_vlan left promiscuous mode [ 380.653346][T10774] device veth0_vlan entered promiscuous mode [ 380.726573][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.734966][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.750026][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 380.766166][ T2566] device dummy0 left promiscuous mode [ 380.771579][ T2566] GPL: port 2(dummy0) entered disabled state [ 380.781242][ T2566] device bridge_slave_1 left promiscuous mode [ 380.787632][ T2566] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.795004][ T2566] device bridge_slave_0 left promiscuous mode [ 380.805065][ T2566] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.773062][T10849] device pim6reg1 entered promiscuous mode [ 381.807333][T10847] device syzkaller0 entered promiscuous mode [ 383.379034][T10896] device veth1_macvtap left promiscuous mode [ 383.618314][T10904] device veth1_macvtap entered promiscuous mode [ 383.624634][T10904] device macsec0 entered promiscuous mode [ 384.518122][T10929] device veth0_vlan left promiscuous mode [ 384.533952][T10929] device veth0_vlan entered promiscuous mode [ 384.576792][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.588271][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.605174][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.681396][T10940] device wg2 entered promiscuous mode [ 384.948646][T10973] device veth0_vlan left promiscuous mode [ 384.963995][T10973] device veth0_vlan entered promiscuous mode [ 385.521651][T11006] device wg2 entered promiscuous mode [ 386.547660][T11038] device syzkaller0 entered promiscuous mode [ 386.884755][T11065] device pim6reg1 entered promiscuous mode [ 386.943483][T11065] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 387.408645][T11102] Â: renamed from pim6reg1 [ 388.459088][ T24] audit: type=1400 audit(1750143046.530:162): avc: denied { create } for pid=11130 comm="syz.1.3246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 388.488212][T11123] device veth0_vlan left promiscuous mode [ 388.508172][T11123] device veth0_vlan entered promiscuous mode [ 388.614233][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.641389][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.728883][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 389.658462][T11170] device syzkaller0 entered promiscuous mode [ 390.378317][T11180] device veth0_vlan left promiscuous mode [ 390.398365][T11180] device veth0_vlan entered promiscuous mode [ 390.425506][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.433935][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.442570][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 390.983398][T11212] device veth0_vlan left promiscuous mode [ 390.996350][T11212] device veth0_vlan entered promiscuous mode [ 391.251154][T11233] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 391.837612][T11239] device syzkaller0 entered promiscuous mode [ 393.498607][T11296] device veth0_vlan left promiscuous mode [ 393.520134][T11296] device veth0_vlan entered promiscuous mode [ 393.793688][T11313] device syzkaller0 entered promiscuous mode [ 395.436247][T11364] device veth0_vlan left promiscuous mode [ 395.444890][T11364] device veth0_vlan entered promiscuous mode [ 399.322201][T11525] syz.1.3365[11525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.322282][T11525] syz.1.3365[11525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.477292][T11525] device pim6reg1 entered promiscuous mode [ 399.534778][T11525] syz.1.3365[11525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.534861][T11525] syz.1.3365[11525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.647449][T11542] device veth0_vlan left promiscuous mode [ 399.799550][T11542] device veth0_vlan entered promiscuous mode [ 399.853158][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 399.896602][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 399.904207][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 399.912942][T11534] ÿÿÿÿÿÿ: renamed from vlan1 [ 400.406749][T11594] syz.4.3390[11594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.406832][T11594] syz.4.3390[11594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.427628][T11574] device veth0_vlan left promiscuous mode [ 400.494047][T11574] device veth0_vlan entered promiscuous mode [ 400.515381][T11598] syz.4.3390[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.515466][T11598] syz.4.3390[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.432082][T11642] device veth0_vlan left promiscuous mode [ 401.467218][T11642] device veth0_vlan entered promiscuous mode [ 401.478931][T11643] device veth0_vlan left promiscuous mode [ 401.495876][T11643] device veth0_vlan entered promiscuous mode [ 401.546613][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.564681][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.576833][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 401.959596][T11669] syz.4.3414[11669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.959680][T11669] syz.4.3414[11669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.452389][T11724] device syzkaller0 entered promiscuous mode [ 404.144480][T11768] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.448125][T11783] device sit0 left promiscuous mode [ 404.630982][T11801] device sit0 entered promiscuous mode [ 405.560066][T11828] device syzkaller0 entered promiscuous mode [ 405.938989][T11831] device veth0_vlan left promiscuous mode [ 405.956682][T11831] device veth0_vlan entered promiscuous mode [ 406.966168][T11871] device wg2 left promiscuous mode [ 407.019036][T11871] device wg2 entered promiscuous mode [ 409.275250][T11952] device sit0 left promiscuous mode [ 409.507714][T11963] bpf_get_probe_write_proto: 6 callbacks suppressed [ 409.507724][T11963] syz.4.3502[11963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.524556][T11963] syz.4.3502[11963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.639753][T11963] device pim6reg1 entered promiscuous mode [ 409.710054][T11967] syz.4.3502[11967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.710127][T11967] syz.4.3502[11967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.951903][T11977] device pim6reg1 entered promiscuous mode [ 409.977288][T11978] device veth0_vlan left promiscuous mode [ 409.986721][T11978] device veth0_vlan entered promiscuous mode [ 410.312029][T11989] device syzkaller0 entered promiscuous mode [ 410.412051][T11995] device veth0_vlan left promiscuous mode [ 410.505364][T11995] device veth0_vlan entered promiscuous mode [ 410.824163][ T24] audit: type=1400 audit(1750143068.890:163): avc: denied { ioctl } for pid=12018 comm="syz.4.3522" path="" dev="cgroup2" ino=141 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 410.863416][T12031] syz.3.3525[12031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.863503][T12031] syz.3.3525[12031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.890501][T12030] device pim6reg1 entered promiscuous mode [ 410.910996][T12030] syz.3.3525[12030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.911075][T12030] syz.3.3525[12030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.914641][T12026] device veth0_vlan left promiscuous mode [ 410.960615][T12026] device veth0_vlan entered promiscuous mode [ 411.291525][T12051] device sit0 left promiscuous mode [ 411.762979][T12082] syz.3.3542[12082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.763064][T12082] syz.3.3542[12082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.829234][T12082] device pim6reg1 entered promiscuous mode [ 412.473386][T12113] device veth0_vlan left promiscuous mode [ 412.496170][T12113] device veth0_vlan entered promiscuous mode [ 412.591137][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.627236][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.698877][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 413.117621][T12141] device syzkaller0 entered promiscuous mode [ 413.162622][T12152] device veth0_vlan left promiscuous mode [ 413.171167][T12152] device veth0_vlan entered promiscuous mode [ 413.219015][T12157] device pim6reg1 entered promiscuous mode [ 413.352789][ T24] audit: type=1400 audit(1750143071.420:164): avc: denied { create } for pid=12168 comm="syz.0.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 413.815463][T12216] FAULT_INJECTION: forcing a failure. [ 413.815463][T12216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.866067][T12216] CPU: 0 PID: 12216 Comm: syz.2.3588 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 413.877469][T12216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 413.887523][T12216] Call Trace: [ 413.890807][T12216] __dump_stack+0x21/0x24 [ 413.895134][T12216] dump_stack_lvl+0x169/0x1d8 [ 413.899801][T12216] ? thaw_kernel_threads+0x220/0x220 [ 413.905075][T12216] ? show_regs_print_info+0x18/0x18 [ 413.910258][T12216] ? ppp_write+0xb6/0x370 [ 413.914575][T12216] dump_stack+0x15/0x1c [ 413.918719][T12216] should_fail+0x3c1/0x510 [ 413.923127][T12216] should_fail_usercopy+0x1a/0x20 [ 413.928165][T12216] _copy_from_user+0x20/0xd0 [ 413.932741][T12216] ppp_write+0x174/0x370 [ 413.936968][T12216] ? ppp_read+0x750/0x750 [ 413.941283][T12216] vfs_write+0x32d/0xd60 [ 413.945598][T12216] ? __bpf_trace_kmem_free+0x6f/0x90 [ 413.950870][T12216] ? kernel_write+0x3c0/0x3c0 [ 413.955535][T12216] ? __fget_files+0x2c4/0x320 [ 413.960199][T12216] ? __fdget_pos+0x1f7/0x380 [ 413.964771][T12216] ? ksys_write+0x71/0x240 [ 413.969194][T12216] ksys_write+0x140/0x240 [ 413.973517][T12216] ? __ia32_sys_read+0x90/0x90 [ 413.978277][T12216] __x64_sys_write+0x7b/0x90 [ 413.982853][T12216] do_syscall_64+0x31/0x40 [ 413.987284][T12216] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 413.993163][T12216] RIP: 0033:0x7f51f5732929 [ 413.997572][T12216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.017164][T12216] RSP: 002b:00007f51f3d7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 414.025567][T12216] RAX: ffffffffffffffda RBX: 00007f51f595a080 RCX: 00007f51f5732929 [ 414.033529][T12216] RDX: 0000000000000009 RSI: 0000200000000280 RDI: 0000000000000007 [ 414.041491][T12216] RBP: 00007f51f3d7a090 R08: 0000000000000000 R09: 0000000000000000 [ 414.049460][T12216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.057418][T12216] R13: 0000000000000001 R14: 00007f51f595a080 R15: 00007ffd0d96dd58 [ 414.489645][T12224] device pim6reg1 entered promiscuous mode [ 414.625890][T12242] bpf_get_probe_write_proto: 7 callbacks suppressed [ 414.632801][T12242] syz.0.3598[12242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.632904][T12242] syz.0.3598[12242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.645690][T12242] device pim6reg1 entered promiscuous mode [ 414.697609][T12235] device veth0_vlan left promiscuous mode [ 414.736227][T12235] device veth0_vlan entered promiscuous mode [ 414.767036][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.790056][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.857396][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 414.974384][T12251] device veth0_vlan left promiscuous mode [ 414.981781][T12251] device veth0_vlan entered promiscuous mode [ 415.018963][T12258] device veth0_vlan left promiscuous mode [ 415.042099][T12258] device veth0_vlan entered promiscuous mode [ 415.048596][T12263] FAULT_INJECTION: forcing a failure. [ 415.048596][T12263] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.061719][T12263] CPU: 0 PID: 12263 Comm: syz.4.3604 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 415.073085][T12263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 415.083137][T12263] Call Trace: [ 415.086424][T12263] __dump_stack+0x21/0x24 [ 415.090741][T12263] dump_stack_lvl+0x169/0x1d8 [ 415.095410][T12263] ? thaw_kernel_threads+0x220/0x220 [ 415.100706][T12263] ? vsnprintf+0x1871/0x1960 [ 415.105302][T12263] ? show_regs_print_info+0x18/0x18 [ 415.110511][T12263] dump_stack+0x15/0x1c [ 415.114670][T12263] should_fail+0x3c1/0x510 [ 415.119083][T12263] should_fail_usercopy+0x1a/0x20 [ 415.124110][T12263] _copy_to_user+0x20/0x90 [ 415.128523][T12263] simple_read_from_buffer+0xe9/0x160 [ 415.133885][T12263] proc_fail_nth_read+0x19a/0x210 [ 415.138908][T12263] ? proc_fault_inject_write+0x2f0/0x2f0 [ 415.144529][T12263] ? rw_verify_area+0x1c0/0x360 [ 415.149369][T12263] ? proc_fault_inject_write+0x2f0/0x2f0 [ 415.154992][T12263] vfs_read+0x1fe/0xa10 [ 415.159146][T12263] ? kernel_read+0x70/0x70 [ 415.163555][T12263] ? __kasan_check_write+0x14/0x20 [ 415.168661][T12263] ? mutex_lock+0x8c/0xe0 [ 415.172991][T12263] ? mutex_trylock+0xa0/0xa0 [ 415.177588][T12263] ? __fget_files+0x2c4/0x320 [ 415.182269][T12263] ? __fdget_pos+0x2d2/0x380 [ 415.186858][T12263] ? ksys_read+0x71/0x240 [ 415.191184][T12263] ksys_read+0x140/0x240 [ 415.195422][T12263] ? vfs_write+0xd60/0xd60 [ 415.199831][T12263] __x64_sys_read+0x7b/0x90 [ 415.204327][T12263] do_syscall_64+0x31/0x40 [ 415.208734][T12263] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 415.214612][T12263] RIP: 0033:0x7f2aab80233c [ 415.219026][T12263] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 415.238629][T12263] RSP: 002b:00007f2aa9e4b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 415.247033][T12263] RAX: ffffffffffffffda RBX: 00007f2aaba2b080 RCX: 00007f2aab80233c [ 415.255019][T12263] RDX: 000000000000000f RSI: 00007f2aa9e4b0a0 RDI: 0000000000000006 [ 415.262988][T12263] RBP: 00007f2aa9e4b090 R08: 0000000000000000 R09: 0000000000000000 [ 415.270950][T12263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.278909][T12263] R13: 0000000000000001 R14: 00007f2aaba2b080 R15: 00007ffd334753b8 [ 415.445728][T12269] ÿÿÿÿÿÿ: renamed from vlan1 [ 415.808170][T12298] device veth0_vlan left promiscuous mode [ 415.851646][T12298] device veth0_vlan entered promiscuous mode [ 415.970052][T12312] syz.0.3620[12312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.970132][T12312] syz.0.3620[12312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.070919][T12312] device pim6reg1 entered promiscuous mode [ 418.597203][T12384] syz.1.3639[12384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.597310][T12384] syz.1.3639[12384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.647557][T12387] device pim6reg1 entered promiscuous mode [ 420.072004][T12417] device veth0_vlan left promiscuous mode [ 420.105688][T12417] device veth0_vlan entered promiscuous mode [ 420.191383][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.238833][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.279173][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 420.542371][T12433] syz.1.3654[12433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.542458][T12433] syz.1.3654[12433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.696812][T12433] device pim6reg1 entered promiscuous mode [ 421.139191][T12436] device pim6reg1 entered promiscuous mode [ 421.385667][T12450] device syzkaller0 entered promiscuous mode [ 421.998710][T12485] syz.0.3671[12485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.998805][T12485] syz.0.3671[12485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.298496][T12485] device pim6reg1 entered promiscuous mode [ 422.851219][T12499] device wg2 left promiscuous mode [ 423.226064][T12533] syz.1.3685[12533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.226168][T12533] syz.1.3685[12533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.274633][T12533] device pim6reg1 entered promiscuous mode [ 423.280513][T12535] syz.2.3686[12535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.292037][T12530] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.292354][T12535] syz.2.3686[12535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.304927][T12530] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.838743][T12553] device veth0_vlan left promiscuous mode [ 423.846763][T12553] device veth0_vlan entered promiscuous mode [ 423.956003][T12559] device sit0 left promiscuous mode [ 424.103019][T12563] device sit0 entered promiscuous mode [ 424.701564][T12589] syz.3.3701[12589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.701643][T12589] syz.3.3701[12589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.768547][T12589] device pim6reg1 entered promiscuous mode [ 425.590146][T12608] device syzkaller0 entered promiscuous mode [ 425.824684][T12626] device pim6reg1 entered promiscuous mode [ 425.938961][T12643] device veth1_macvtap left promiscuous mode [ 425.955624][T12643] device macsec0 entered promiscuous mode [ 426.040841][T12655] device pim6reg1 entered promiscuous mode [ 426.062126][T12656] device veth1_macvtap entered promiscuous mode [ 426.079241][T12659] syz.3.3721[12659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.079326][T12659] syz.3.3721[12659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.115178][T12659] device pim6reg1 entered promiscuous mode [ 428.784449][T12769] device wg2 left promiscuous mode [ 428.832183][T12769] device wg2 entered promiscuous mode [ 429.606064][T12796] device veth0_vlan left promiscuous mode [ 429.614236][T12796] device veth0_vlan entered promiscuous mode [ 430.077106][T12817] device veth0_vlan left promiscuous mode [ 430.144875][T12817] device veth0_vlan entered promiscuous mode [ 430.213238][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 430.250603][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 430.300803][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 430.583152][T12826] bridge0: port 3(veth0) entered blocking state [ 430.593529][T12826] bridge0: port 3(veth0) entered disabled state [ 430.643243][T12826] device veth0 entered promiscuous mode [ 430.676374][T12826] bridge0: port 3(veth0) entered blocking state [ 430.682741][T12826] bridge0: port 3(veth0) entered forwarding state [ 431.326818][ T24] audit: type=1400 audit(1750143089.390:165): avc: denied { create } for pid=12844 comm="syz.0.3775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 431.677632][T12854] device veth0_vlan left promiscuous mode [ 431.702251][T12854] device veth0_vlan entered promiscuous mode [ 432.196320][T12865] -1: renamed from syzkaller0 [ 432.585255][T12877] device wg2 entered promiscuous mode [ 434.050892][T12937] syz.3.3805[12937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.050981][T12937] syz.3.3805[12937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.177906][T12934] device pim6reg1 entered promiscuous mode [ 434.327410][T12934] syz.3.3805[12934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.327523][T12934] syz.3.3805[12934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.582845][T12957] device sit0 left promiscuous mode [ 434.698550][T12957] device sit0 entered promiscuous mode [ 435.307974][T12967] device macsec0 entered promiscuous mode [ 436.086386][T13008] device syzkaller0 entered promiscuous mode [ 437.257072][T13033] device wg2 entered promiscuous mode [ 437.357979][T13036] device wg2 left promiscuous mode [ 437.444194][T13036] device wg2 entered promiscuous mode [ 438.498280][T13085] ref_ctr_offset mismatch. inode: 0x496 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 438.649136][ T24] audit: type=1400 audit(1750143096.720:166): avc: denied { create } for pid=13082 comm="syz.0.3851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 438.728765][T13083] device wg2 entered promiscuous mode [ 439.018924][T13102] syz.4.3858[13102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.018997][T13102] syz.4.3858[13102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.097507][T13102] device pim6reg1 entered promiscuous mode [ 439.290167][T13102] syz.4.3858[13102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.291408][T13102] syz.4.3858[13102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.038523][T13141] GPL: port 1(erspan0) entered blocking state [ 440.057516][T13141] GPL: port 1(erspan0) entered disabled state [ 440.078980][T13141] device erspan0 entered promiscuous mode [ 440.126699][T13152] GPL: port 1(erspan0) entered blocking state [ 440.132808][T13152] GPL: port 1(erspan0) entered forwarding state [ 440.459809][T13176] device veth0_vlan left promiscuous mode [ 440.536595][T13176] device veth0_vlan entered promiscuous mode [ 440.708093][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.783619][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.828164][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 442.703898][T13251] device veth0_vlan left promiscuous mode [ 442.741216][T13251] device veth0_vlan entered promiscuous mode [ 443.173257][T13280] device veth0_vlan left promiscuous mode [ 443.179736][T13280] device veth0_vlan entered promiscuous mode [ 443.199342][T13281] GPL: port 2(dummy0) entered blocking state [ 443.208719][T13281] GPL: port 2(dummy0) entered disabled state [ 443.220024][T13281] device dummy0 entered promiscuous mode [ 443.226306][T13281] GPL: port 2(dummy0) entered blocking state [ 443.232391][T13281] GPL: port 2(dummy0) entered forwarding state [ 443.239489][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.256894][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.286737][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 444.055117][T13320] device veth0_vlan left promiscuous mode [ 444.076340][T13320] device veth0_vlan entered promiscuous mode [ 444.190191][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.198679][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.206367][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 445.215520][T13351] device veth0_vlan left promiscuous mode [ 445.241166][T13351] device veth0_vlan entered promiscuous mode [ 445.270438][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.278892][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.286751][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 445.910257][T13358] device veth0_vlan left promiscuous mode [ 446.043866][T13358] device veth0_vlan entered promiscuous mode [ 446.400145][T13374] GPL: port 1(erspan0) entered blocking state [ 446.416292][T13374] GPL: port 1(erspan0) entered disabled state [ 446.435502][T13374] device erspan0 entered promiscuous mode [ 446.458166][T13370] GPL: port 1(erspan0) entered blocking state [ 446.464548][T13370] GPL: port 1(erspan0) entered forwarding state [ 446.735704][T13389] device veth0_vlan left promiscuous mode [ 446.758461][T13389] device veth0_vlan entered promiscuous mode [ 448.010428][T13430] syz.4.3962[13430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.010489][T13430] syz.4.3962[13430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.510932][T13436] device veth0_vlan left promiscuous mode [ 448.534278][T13436] device veth0_vlan entered promiscuous mode [ 448.574632][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 448.583832][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 448.593849][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 448.765186][T13457] device syzkaller0 entered promiscuous mode [ 449.546263][T13474] device veth0_vlan left promiscuous mode [ 449.554373][T13474] device veth0_vlan entered promiscuous mode [ 450.876049][T13515] device veth0_vlan left promiscuous mode [ 450.888201][T13515] device veth0_vlan entered promiscuous mode [ 450.912057][T13520] FAULT_INJECTION: forcing a failure. [ 450.912057][T13520] name failslab, interval 1, probability 0, space 0, times 0 [ 450.987100][T13522] syz.4.3991[13522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.987181][T13522] syz.4.3991[13522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.020449][T13520] CPU: 1 PID: 13520 Comm: syz.2.3990 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 451.043222][T13520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 451.053285][T13520] Call Trace: [ 451.056592][T13520] __dump_stack+0x21/0x24 [ 451.060924][T13520] dump_stack_lvl+0x169/0x1d8 [ 451.065602][T13520] ? show_regs_print_info+0x18/0x18 [ 451.070807][T13520] dump_stack+0x15/0x1c [ 451.074966][T13520] should_fail+0x3c1/0x510 [ 451.079383][T13520] ? alloc_fdtable+0x93/0x270 [ 451.084076][T13520] __should_failslab+0xa4/0xe0 [ 451.088857][T13520] should_failslab+0x9/0x20 [ 451.093362][T13520] kmem_cache_alloc_trace+0x3a/0x2e0 [ 451.098652][T13520] ? _raw_spin_lock+0x8e/0xe0 [ 451.103334][T13520] alloc_fdtable+0x93/0x270 [ 451.107855][T13520] dup_fd+0x793/0xb20 [ 451.111849][T13520] copy_files+0xc9/0x160 [ 451.116099][T13520] ? dup_task_struct+0xbd0/0xbd0 [ 451.121042][T13520] ? security_task_alloc+0xfb/0x130 [ 451.126250][T13520] copy_process+0x10d7/0x32c0 [ 451.130928][T13520] ? memset+0x35/0x40 [ 451.134925][T13520] ? proc_fail_nth_read+0x210/0x210 [ 451.140129][T13520] ? __pidfd_prepare+0x150/0x150 [ 451.145071][T13520] ? rw_verify_area+0x1c0/0x360 [ 451.149941][T13520] ? vfs_write+0xac8/0xd60 [ 451.154366][T13520] ? __kasan_slab_free+0x11/0x20 [ 451.159307][T13520] kernel_clone+0x23f/0x940 [ 451.163815][T13520] ? kernel_write+0x3c0/0x3c0 [ 451.168501][T13520] ? create_io_thread+0x130/0x130 [ 451.173532][T13520] ? mutex_lock+0x8c/0xe0 [ 451.177867][T13520] __x64_sys_clone+0x176/0x1d0 [ 451.182634][T13520] ? __ia32_sys_vfork+0xf0/0xf0 [ 451.187492][T13520] ? ksys_write+0x1eb/0x240 [ 451.192017][T13520] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 451.198095][T13520] do_syscall_64+0x31/0x40 [ 451.202520][T13520] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 451.208413][T13520] RIP: 0033:0x7f51f5732929 [ 451.212832][T13520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 451.232453][T13520] RSP: 002b:00007f51f3d9afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 451.240881][T13520] RAX: ffffffffffffffda RBX: 00007f51f5959fa0 RCX: 00007f51f5732929 [ 451.248961][T13520] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 451.256950][T13520] RBP: 00007f51f3d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 451.264953][T13520] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 451.272949][T13520] R13: 0000000000000000 R14: 00007f51f5959fa0 R15: 00007ffd0d96dd58 [ 451.383383][T13522] device pim6reg1 entered promiscuous mode [ 451.421592][T13522] syz.4.3991[13522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.421674][T13522] syz.4.3991[13522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.696989][T13526] device veth0_vlan left promiscuous mode [ 451.816547][T13526] device veth0_vlan entered promiscuous mode [ 452.008349][T13532] FAULT_INJECTION: forcing a failure. [ 452.008349][T13532] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 452.082468][T13532] CPU: 1 PID: 13532 Comm: syz.4.3994 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 452.093888][T13532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 452.103931][T13532] Call Trace: [ 452.107226][T13532] __dump_stack+0x21/0x24 [ 452.111603][T13532] dump_stack_lvl+0x169/0x1d8 [ 452.116292][T13532] ? show_regs_print_info+0x18/0x18 [ 452.121495][T13532] ? do_sys_openat2+0x207/0x6d0 [ 452.126354][T13532] dump_stack+0x15/0x1c [ 452.130517][T13532] should_fail+0x3c1/0x510 [ 452.134938][T13532] should_fail_alloc_page+0x4f/0x60 [ 452.140143][T13532] __alloc_pages_nodemask+0x109/0x5f0 [ 452.145528][T13532] ? __fsnotify_parent+0x5f5/0x6c0 [ 452.150649][T13532] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 452.156203][T13532] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 452.162798][T13532] ? proc_fail_nth_read+0x210/0x210 [ 452.168012][T13532] ? rw_verify_area+0x1c0/0x360 [ 452.172883][T13532] kmalloc_order+0x4c/0x160 [ 452.177394][T13532] kmalloc_order_trace+0x16/0x80 [ 452.182345][T13532] __kmalloc+0x1ee/0x330 [ 452.186618][T13532] ? __fdget+0x1a1/0x230 [ 452.190898][T13532] map_lookup_and_delete_elem+0x314/0x530 [ 452.196625][T13532] __se_sys_bpf+0x454/0x680 [ 452.201138][T13532] ? __x64_sys_bpf+0x90/0x90 [ 452.205734][T13532] ? fpu__clear_all+0x20/0x20 [ 452.210427][T13532] __x64_sys_bpf+0x7b/0x90 [ 452.214835][T13532] do_syscall_64+0x31/0x40 [ 452.219236][T13532] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 452.225106][T13532] RIP: 0033:0x7f2aab803929 [ 452.229502][T13532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 452.249114][T13532] RSP: 002b:00007f2aa9e6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 452.257516][T13532] RAX: ffffffffffffffda RBX: 00007f2aaba2afa0 RCX: 00007f2aab803929 [ 452.265477][T13532] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 452.273437][T13532] RBP: 00007f2aa9e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 452.281395][T13532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 452.289357][T13532] R13: 0000000000000000 R14: 00007f2aaba2afa0 R15: 00007ffd334753b8 [ 452.754153][T13566] device syzkaller0 entered promiscuous mode [ 454.746698][T13599] Â: renamed from pim6reg1 [ 457.229363][T13692] device veth0_vlan left promiscuous mode [ 457.253262][T13692] device veth0_vlan entered promiscuous mode [ 457.386223][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.414947][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.519704][ T2566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 457.626637][T13705] device veth0_vlan left promiscuous mode [ 457.693579][T13705] device veth0_vlan entered promiscuous mode [ 457.800460][T13707] device wg2 left promiscuous mode [ 457.810184][T13709] device wg2 entered promiscuous mode [ 458.596904][T13723] device veth0_vlan left promiscuous mode [ 458.663107][T13723] device veth0_vlan entered promiscuous mode [ 459.449630][T13735] device veth0_vlan left promiscuous mode [ 459.466675][T13735] device veth0_vlan entered promiscuous mode [ 463.659381][T13841] FAULT_INJECTION: forcing a failure. [ 463.659381][T13841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.853313][T13841] CPU: 1 PID: 13841 Comm: syz.4.4084 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 463.864726][T13841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 463.874798][T13841] Call Trace: [ 463.878106][T13841] __dump_stack+0x21/0x24 [ 463.882438][T13841] dump_stack_lvl+0x169/0x1d8 [ 463.887117][T13841] ? thaw_kernel_threads+0x220/0x220 [ 463.892408][T13841] ? vsnprintf+0x1871/0x1960 [ 463.897010][T13841] ? show_regs_print_info+0x18/0x18 [ 463.902210][T13841] dump_stack+0x15/0x1c [ 463.906369][T13841] should_fail+0x3c1/0x510 [ 463.910797][T13841] should_fail_usercopy+0x1a/0x20 [ 463.915837][T13841] _copy_to_user+0x20/0x90 [ 463.920259][T13841] simple_read_from_buffer+0xe9/0x160 [ 463.925635][T13841] proc_fail_nth_read+0x19a/0x210 [ 463.930669][T13841] ? proc_fault_inject_write+0x2f0/0x2f0 [ 463.936309][T13841] ? rw_verify_area+0x1c0/0x360 [ 463.941167][T13841] ? proc_fault_inject_write+0x2f0/0x2f0 [ 463.946800][T13841] vfs_read+0x1fe/0xa10 [ 463.950969][T13841] ? kernel_read+0x70/0x70 [ 463.955389][T13841] ? __kasan_check_write+0x14/0x20 [ 463.960499][T13841] ? mutex_lock+0x8c/0xe0 [ 463.964835][T13841] ? mutex_trylock+0xa0/0xa0 [ 463.969421][T13841] ? __fget_files+0x2c4/0x320 [ 463.974105][T13841] ? __fdget_pos+0x2d2/0x380 [ 463.978696][T13841] ? ksys_read+0x71/0x240 [ 463.983021][T13841] ksys_read+0x140/0x240 [ 463.987275][T13841] ? vfs_write+0xd60/0xd60 [ 463.991708][T13841] ? fpu__clear_all+0x20/0x20 [ 463.996384][T13841] __x64_sys_read+0x7b/0x90 [ 464.000889][T13841] do_syscall_64+0x31/0x40 [ 464.005307][T13841] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 464.011196][T13841] RIP: 0033:0x7f2aab80233c [ 464.015615][T13841] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 464.035215][T13841] RSP: 002b:00007f2aa9e6c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 464.043646][T13841] RAX: ffffffffffffffda RBX: 00007f2aaba2afa0 RCX: 00007f2aab80233c [ 464.051619][T13841] RDX: 000000000000000f RSI: 00007f2aa9e6c0a0 RDI: 0000000000000006 [ 464.059612][T13841] RBP: 00007f2aa9e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 464.067576][T13841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.075548][T13841] R13: 0000000000000000 R14: 00007f2aaba2afa0 R15: 00007ffd334753b8 [ 465.487421][T13863] device veth0_vlan left promiscuous mode [ 465.550036][T13863] device veth0_vlan entered promiscuous mode [ 465.754067][T13879] syz.2.4097[13879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.754158][T13879] syz.2.4097[13879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.914297][T13879] device pim6reg1 entered promiscuous mode [ 465.994618][T13879] syz.2.4097[13879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.994700][T13879] syz.2.4097[13879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.201682][T13914] device veth0_vlan left promiscuous mode [ 467.241313][T13914] device veth0_vlan entered promiscuous mode [ 467.334624][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.343242][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.356271][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 467.708756][T13926] device veth0_vlan left promiscuous mode [ 467.728837][T13926] device veth0_vlan entered promiscuous mode [ 467.803546][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.812997][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.826736][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 469.414201][T13949] device veth0_vlan left promiscuous mode [ 469.500798][T13949] device veth0_vlan entered promiscuous mode [ 469.543572][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.553507][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.561319][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 469.866508][T13954] device pim6reg1 entered promiscuous mode [ 470.769694][T13970] syz.3.4129[13970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.769780][T13970] syz.3.4129[13970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.796291][T13974] device wg2 left promiscuous mode [ 470.860885][T13970] device pim6reg1 entered promiscuous mode [ 470.883842][T13972] device wg2 entered promiscuous mode [ 470.919403][T13980] syz.3.4129[13980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.919484][T13980] syz.3.4129[13980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.301129][T13990] device veth0_vlan left promiscuous mode [ 471.326503][T13990] device veth0_vlan entered promiscuous mode [ 472.628061][T14016] GPL: port 2(dummy0) entered blocking state [ 472.634332][T14016] GPL: port 2(dummy0) entered disabled state [ 472.729384][T14016] device dummy0 entered promiscuous mode [ 472.824287][T14016] GPL: port 2(dummy0) entered blocking state [ 472.830405][T14016] GPL: port 2(dummy0) entered forwarding state [ 473.032476][T14021] device syzkaller0 entered promiscuous mode [ 473.055754][T14025] device wg2 left promiscuous mode [ 473.063420][T14026] device wg2 entered promiscuous mode [ 473.084663][T14035] device veth0_vlan left promiscuous mode [ 473.122395][T14035] device veth0_vlan entered promiscuous mode [ 473.199545][T14046] device sit0 entered promiscuous mode [ 473.297616][T14044] device sit0 left promiscuous mode [ 473.372647][T14052] syz.4.4154[14052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.372732][T14052] syz.4.4154[14052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.391333][T14052] device pim6reg1 entered promiscuous mode [ 473.476401][T14052] syz.4.4154[14052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.476493][T14052] syz.4.4154[14052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.649692][T14104] device veth0_vlan left promiscuous mode [ 474.718960][T14104] device veth0_vlan entered promiscuous mode [ 475.186767][T14127] syz.4.4177[14127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.186866][T14127] syz.4.4177[14127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.233483][T14127] device pim6reg1 entered promiscuous mode [ 475.817540][T14147] device veth0_vlan left promiscuous mode [ 475.828519][T14147] device veth0_vlan entered promiscuous mode [ 475.854680][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.865212][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.873165][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 476.139230][T14161] device sit0 entered promiscuous mode [ 476.801683][T14172] device syzkaller0 entered promiscuous mode [ 476.828246][T14178] device syzkaller0 entered promiscuous mode [ 477.084657][T14187] bpf_get_probe_write_proto: 2 callbacks suppressed [ 477.084674][T14187] syz.2.4198[14187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.096203][T14187] syz.2.4198[14187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.160091][T14187] device pim6reg1 entered promiscuous mode [ 477.184040][T14187] syz.2.4198[14187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.184130][T14187] syz.2.4198[14187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.359371][T14197] device pim6reg1 entered promiscuous mode [ 477.389929][T14199] device veth0_vlan left promiscuous mode [ 477.397726][T14199] device veth0_vlan entered promiscuous mode [ 477.560441][T14208] device veth0_vlan left promiscuous mode [ 477.586353][T14208] device veth0_vlan entered promiscuous mode [ 477.619850][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.628752][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.678784][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 478.616611][T14248] device veth0_vlan left promiscuous mode [ 478.646823][T14248] device veth0_vlan entered promiscuous mode [ 478.657911][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.671591][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.697034][T14256] syz.0.4219[14256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.697087][T14256] syz.0.4219[14256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.709221][ T808] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 478.798997][T14256] €Â0: renamed from pim6reg1 [ 479.286910][T14275] device veth0_vlan left promiscuous mode [ 479.359401][T14275] device veth0_vlan entered promiscuous mode [ 480.129183][T14291] device veth0_vlan left promiscuous mode [ 480.139264][T14291] device veth0_vlan entered promiscuous mode [ 480.186212][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 480.194590][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 480.208013][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 480.646387][T14312] device syzkaller0 entered promiscuous mode [ 481.296053][T14330] device veth0_vlan left promiscuous mode [ 481.328666][T14330] device veth0_vlan entered promiscuous mode [ 481.382418][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.391150][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 481.398875][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 481.650483][T14358] device sit0 left promiscuous mode [ 481.791716][T14358] device sit0 entered promiscuous mode [ 484.427526][T14390] device veth0_vlan left promiscuous mode [ 484.458915][T14390] device veth0_vlan entered promiscuous mode [ 484.528264][T14388] device pim6reg1 entered promiscuous mode [ 486.610135][T14450] device pim6reg1 entered promiscuous mode [ 486.855153][T14477] device wg2 left promiscuous mode [ 486.964660][T14476] device sit0 left promiscuous mode [ 487.179956][T14479] device sit0 entered promiscuous mode [ 490.532581][T14546] device veth0_vlan left promiscuous mode [ 490.539499][T14546] device veth0_vlan entered promiscuous mode [ 491.576636][T14584] device veth0_vlan left promiscuous mode [ 491.583180][T14584] device veth0_vlan entered promiscuous mode [ 491.958780][T14591] device wg2 left promiscuous mode [ 492.022196][T14591] device wg2 entered promiscuous mode [ 492.675614][T14609] device sit0 entered promiscuous mode [ 493.265363][T14626] syz.1.4332[14626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.265447][T14626] syz.1.4332[14626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.521447][T14629] device syzkaller0 entered promiscuous mode [ 494.053805][T14638] syz.0.4336[14638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.053898][T14638] syz.0.4336[14638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.156466][T14638] syz.0.4336[14638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.276529][T14638] syz.0.4336[14638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.879140][T14660] device veth0_vlan left promiscuous mode [ 494.897615][T14660] device veth0_vlan entered promiscuous mode [ 495.591173][T14703] device syzkaller0 entered promiscuous mode [ 496.003115][T14715] device veth0_vlan left promiscuous mode [ 496.087518][T14715] device veth0_vlan entered promiscuous mode [ 496.969117][T14744] device veth1_macvtap left promiscuous mode [ 497.033284][T14742] device veth1_macvtap entered promiscuous mode [ 497.285253][T14761] syz.3.4371[14761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.285335][T14761] syz.3.4371[14761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.353361][T14761] device pim6reg1 entered promiscuous mode [ 497.422576][T14761] syz.3.4371[14761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.422645][T14761] syz.3.4371[14761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.443212][T14766] device veth0_vlan left promiscuous mode [ 497.461254][T14766] device veth0_vlan entered promiscuous mode [ 498.680467][T14807] device veth0_vlan left promiscuous mode [ 498.696990][T14807] device veth0_vlan entered promiscuous mode [ 499.646367][T14830] device syzkaller0 entered promiscuous mode [ 499.925220][T14833] FAULT_INJECTION: forcing a failure. [ 499.925220][T14833] name failslab, interval 1, probability 0, space 0, times 0 [ 499.946785][T14833] CPU: 0 PID: 14833 Comm: syz.2.4390 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 499.958175][T14833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 499.968217][T14833] Call Trace: [ 499.971497][T14833] __dump_stack+0x21/0x24 [ 499.975818][T14833] dump_stack_lvl+0x169/0x1d8 [ 499.980494][T14833] ? show_regs_print_info+0x18/0x18 [ 499.985676][T14833] ? rw_verify_area+0x1c0/0x360 [ 499.990519][T14833] dump_stack+0x15/0x1c [ 499.994665][T14833] should_fail+0x3c1/0x510 [ 499.999068][T14833] ? sock_alloc_inode+0x1b/0xb0 [ 500.003907][T14833] __should_failslab+0xa4/0xe0 [ 500.008659][T14833] should_failslab+0x9/0x20 [ 500.013149][T14833] kmem_cache_alloc+0x3d/0x2e0 [ 500.017912][T14833] ? find_next_zero_bit+0x83/0x110 [ 500.023035][T14833] ? sockfs_init_fs_context+0xb0/0xb0 [ 500.028421][T14833] sock_alloc_inode+0x1b/0xb0 [ 500.033101][T14833] ? sockfs_init_fs_context+0xb0/0xb0 [ 500.038479][T14833] new_inode_pseudo+0x62/0x210 [ 500.043244][T14833] __sock_create+0x12c/0x770 [ 500.047845][T14833] ? get_unused_fd_flags+0x92/0xa0 [ 500.052979][T14833] __sys_socketpair+0x1a1/0x590 [ 500.057842][T14833] __x64_sys_socketpair+0x9b/0xb0 [ 500.062878][T14833] do_syscall_64+0x31/0x40 [ 500.067316][T14833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 500.073220][T14833] RIP: 0033:0x7f51f5732929 [ 500.077653][T14833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 500.097267][T14833] RSP: 002b:00007f51f3d9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 500.105783][T14833] RAX: ffffffffffffffda RBX: 00007f51f5959fa0 RCX: 00007f51f5732929 [ 500.113783][T14833] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 500.121768][T14833] RBP: 00007f51f3d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 500.129751][T14833] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 500.137732][T14833] R13: 0000000000000000 R14: 00007f51f5959fa0 R15: 00007ffd0d96dd58 [ 500.188646][T14833] socket: no more sockets [ 501.557592][T14877] device veth0_vlan left promiscuous mode [ 501.578750][T14877] device veth0_vlan entered promiscuous mode [ 502.093082][T14894] device sit0 left promiscuous mode [ 502.309139][T14892] device veth0_vlan left promiscuous mode [ 502.329931][T14892] device veth0_vlan entered promiscuous mode [ 502.369253][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 502.387184][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 502.396699][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 503.041219][T14914] device veth0_vlan left promiscuous mode [ 503.085891][T14914] device veth0_vlan entered promiscuous mode [ 504.096783][T14938] device wg2 left promiscuous mode [ 504.322591][T14942] syz.2.4424[14942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.322671][T14942] syz.2.4424[14942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.396688][T14949] device pim6reg1 entered promiscuous mode [ 504.583050][T14942] syz.2.4424[14942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.583136][T14942] syz.2.4424[14942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.312289][T14971] FAULT_INJECTION: forcing a failure. [ 505.312289][T14971] name failslab, interval 1, probability 0, space 0, times 0 [ 505.336612][T14971] CPU: 0 PID: 14971 Comm: syz.4.4432 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 505.347982][T14971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 505.358043][T14971] Call Trace: [ 505.361351][T14971] __dump_stack+0x21/0x24 [ 505.365690][T14971] dump_stack_lvl+0x169/0x1d8 [ 505.370366][T14971] ? show_regs_print_info+0x18/0x18 [ 505.375566][T14971] dump_stack+0x15/0x1c [ 505.379724][T14971] should_fail+0x3c1/0x510 [ 505.384139][T14971] ? selinux_sk_alloc_security+0x63/0x140 [ 505.389868][T14971] __should_failslab+0xa4/0xe0 [ 505.394634][T14971] should_failslab+0x9/0x20 [ 505.399143][T14971] kmem_cache_alloc_trace+0x3a/0x2e0 [ 505.404429][T14971] ? sk_prot_alloc+0x5c/0x340 [ 505.409112][T14971] selinux_sk_alloc_security+0x63/0x140 [ 505.414658][T14971] security_sk_alloc+0x72/0xa0 [ 505.419422][T14971] sk_prot_alloc+0x138/0x340 [ 505.424015][T14971] sk_alloc+0x38/0x4e0 [ 505.428087][T14971] tipc_sk_create+0xe6/0x1df0 [ 505.432766][T14971] ? kmem_cache_alloc+0x165/0x2e0 [ 505.437790][T14971] ? __kasan_check_write+0x14/0x20 [ 505.442901][T14971] ? _raw_spin_lock+0x8e/0xe0 [ 505.447601][T14971] ? _raw_spin_trylock_bh+0x130/0x130 [ 505.452992][T14971] ? security_inode_alloc+0xc0/0x110 [ 505.458283][T14971] __sock_create+0x38d/0x770 [ 505.462876][T14971] __sys_socketpair+0x1a1/0x590 [ 505.467749][T14971] __x64_sys_socketpair+0x9b/0xb0 [ 505.472772][T14971] do_syscall_64+0x31/0x40 [ 505.477196][T14971] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.483092][T14971] RIP: 0033:0x7f2aab803929 [ 505.487512][T14971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 505.507122][T14971] RSP: 002b:00007f2aa9e6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 505.515561][T14971] RAX: ffffffffffffffda RBX: 00007f2aaba2afa0 RCX: 00007f2aab803929 [ 505.523531][T14971] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 505.531502][T14971] RBP: 00007f2aa9e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 505.539471][T14971] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 505.547446][T14971] R13: 0000000000000000 R14: 00007f2aaba2afa0 R15: 00007ffd334753b8 [ 505.582883][T14972] device veth0_vlan left promiscuous mode [ 505.620196][T14972] device veth0_vlan entered promiscuous mode [ 506.425540][T15014] FAULT_INJECTION: forcing a failure. [ 506.425540][T15014] name failslab, interval 1, probability 0, space 0, times 0 [ 506.474599][T15014] CPU: 0 PID: 15014 Comm: syz.2.4444 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 506.485996][T15014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 506.496049][T15014] Call Trace: [ 506.499346][T15014] __dump_stack+0x21/0x24 [ 506.503677][T15014] dump_stack_lvl+0x169/0x1d8 [ 506.508374][T15014] ? show_regs_print_info+0x18/0x18 [ 506.513582][T15014] dump_stack+0x15/0x1c [ 506.517747][T15014] should_fail+0x3c1/0x510 [ 506.522183][T15014] ? sock_alloc_inode+0x1b/0xb0 [ 506.527049][T15014] __should_failslab+0xa4/0xe0 [ 506.531821][T15014] should_failslab+0x9/0x20 [ 506.536358][T15014] kmem_cache_alloc+0x3d/0x2e0 [ 506.541146][T15014] ? sockfs_init_fs_context+0xb0/0xb0 [ 506.546534][T15014] sock_alloc_inode+0x1b/0xb0 [ 506.551215][T15014] ? sockfs_init_fs_context+0xb0/0xb0 [ 506.556592][T15014] new_inode_pseudo+0x62/0x210 [ 506.561470][T15014] __sock_create+0x12c/0x770 [ 506.566072][T15014] __sys_socketpair+0x218/0x590 [ 506.570932][T15014] __x64_sys_socketpair+0x9b/0xb0 [ 506.575963][T15014] do_syscall_64+0x31/0x40 [ 506.580402][T15014] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.586297][T15014] RIP: 0033:0x7f51f5732929 [ 506.590718][T15014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.610324][T15014] RSP: 002b:00007f51f3d9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 506.618749][T15014] RAX: ffffffffffffffda RBX: 00007f51f5959fa0 RCX: 00007f51f5732929 [ 506.626734][T15014] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 506.634715][T15014] RBP: 00007f51f3d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 506.642693][T15014] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 506.650669][T15014] R13: 0000000000000000 R14: 00007f51f5959fa0 R15: 00007ffd0d96dd58 [ 506.660510][T15014] socket: no more sockets [ 506.800000][T15021] syz.0.4446[15021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.800087][T15021] syz.0.4446[15021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.166440][T15021] device pim6reg1 entered promiscuous mode