last executing test programs: 21.269203476s ago: executing program 1 (id=1968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000002240)=""/4097}, 0x20) 17.268818564s ago: executing program 1 (id=1968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000002240)=""/4097}, 0x20) 14.320966161s ago: executing program 1 (id=1968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000002240)=""/4097}, 0x20) 11.628087664s ago: executing program 3 (id=2618): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000780)={r4}, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000800000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000000)={'veth0_to_bridge\x00', 0xc00}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r3, 0x58, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x4, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4}, [@alu={0x4, 0x0, 0xd, 0x8, 0x1, 0x2, 0xffffffffffffffff}]}, &(0x7f0000000440)='syzkaller\x00', 0xd8e5, 0x36, &(0x7f0000000480)=""/54, 0x41000, 0x21, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0xb, 0x4, 0xf1}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000840)=[r3], &(0x7f00000008c0)=[{0x1, 0x5, 0x6, 0x4}, {0x0, 0x1, 0x6, 0x8}, {0x3, 0x3, 0x9, 0x4}, {0x3, 0x2, 0x2, 0xb}, {0x2, 0x5, 0x1, 0xc}, {0x1, 0x4, 0xd, 0xb}, {0x2, 0x4, 0x8, 0xa}, {0x2, 0x4, 0xc, 0xa}, {0x2, 0x3, 0x1, 0xb3152b5852740843}], 0x10, 0x4}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81343a1100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000440)=r2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0xf, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf16, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0xfffffff8, 0xe1, &(0x7f0000000340)=""/225, 0x41100, 0x2, '\x00', r9, 0x25, r11, 0x8, &(0x7f0000000080)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x8, 0x63d}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[r1, r1, r1, r12], &(0x7f0000000500)=[{0x4, 0x1, 0xf, 0xc}, {0x3, 0x5, 0x0, 0x1}, {0x3, 0x4, 0x8, 0x5}, {0x2, 0x4, 0xa, 0x2}, {0x2, 0x3, 0xb, 0x8}, {0x3, 0x1, 0x7, 0x4}, {0x0, 0x5, 0xe, 0x3}], 0x10, 0x6}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r2}, 0xc) 11.28887593s ago: executing program 1 (id=1968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000002240)=""/4097}, 0x20) 9.330982009s ago: executing program 3 (id=2627): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, 0x0, 0x0) 9.237434521s ago: executing program 3 (id=2629): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x8, 0x7, 0x6, 0x4, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0xa}, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x15, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @alu={0x4, 0x1, 0x6, 0x9, 0x9, 0xffffffffffffffe0, 0xffffffffffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c230000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000014c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x104) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x13, 0x1a, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x19fcdd1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0xa7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x8a}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfec, 0x0, 0x0, 0x0, 0x7}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x10, 0x0, &(0x7f0000000300), 0x41000, 0x2a, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000001280)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000012c0)={0x3, 0x2, 0xf58f, 0x1}, 0x10, 0xffffffffffffffff, r6, 0x5, 0x0, &(0x7f0000001340)=[{0x3, 0x3, 0x7, 0x5}, {0x0, 0x5, 0x8, 0xb}, {0x4, 0x1, 0x7, 0x2}, {0x3, 0x4, 0x9, 0xc}, {0x5, 0x1, 0xe, 0x8}]}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001480)=r7, 0x4) r8 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext, 0x810, 0x9, 0x8, 0x2, 0x100000008001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 6.852477457s ago: executing program 0 (id=2652): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000700000085000000050000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00356f000000000000040000f7ffffff00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), 0x0}, 0x20) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004"], 0x0, 0x52}, 0x28) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x7, 0x7, 0x1, 0x9001, r3, 0xefd9cd9, '\x00', r5, r4, 0x2, 0x3, 0x0, 0xa, @value=r4}, 0x50) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', r5, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 6.440287565s ago: executing program 0 (id=2658): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) write$cgroup_int(r8, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r9}, 0x10) 5.802782267s ago: executing program 2 (id=2662): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="a60a0000000000006111800000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073012700000000009500008000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x19, &(0x7f0000000000)={0xfffffffe, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x46) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="a60a0000000000006111800000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073012700000000009500008000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x19, &(0x7f0000000000)={0xfffffffe, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x46) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) (async) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 5.720186519s ago: executing program 1 (id=1968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000002240)=""/4097}, 0x20) 3.642473309s ago: executing program 0 (id=2663): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7030000000000000000000000180100002020642500000000002020207b588616c34b3c3471a100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x7c8, 0x5, 0x1, 0x2}, {0x0, 0x0, 0x7, 0x7}, {0x401, 0x1, 0x6, 0xff}, {0x7ff, 0x5, 0x7f, 0xcfd4}, {0xff, 0x90, 0x1, 0x2}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) 3.642218589s ago: executing program 2 (id=2664): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) 3.641343519s ago: executing program 3 (id=2665): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="b400000000000100791050000000000063004800000000029500000000000000f84b023bf954d3d5cf8df1ab8f90da7f48cba700dd1f5e6e69e8fbef46ee3cec88a30647d1ca4ee731cfd4f8fd"], &(0x7f0000003ff6)='GPL\x00', 0x7, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff70}, 0x48) 3.335848935s ago: executing program 2 (id=2667): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x12a0, 0xa, 0x77ab69fc, 0x3, 0xffffffffffffffff, 0x8, '\x00', r2, 0xffffffffffffffff, 0x5, 0x3, 0x4, 0x9}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r3}, 0xc) 3.281896606s ago: executing program 0 (id=2668): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRESHEX=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)=r4}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1080a, 0x4, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x15, 0x0, 0x4000}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) write$cgroup_type(r7, &(0x7f00000001c0), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair(0xa, 0x3, 0x40, 0x0) 3.281236927s ago: executing program 2 (id=2669): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r1}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000400)={&(0x7f00000002c0)="e77a494c0128e9c31122d7d3ee3e358841b793921422511d1b6eb13124236fc9fd5407b872baa0e1e27824a27420ff5087eea3904a23a89c489662364e2062c8d3595b06a6f225668378ece522", &(0x7f0000000380)=""/119, &(0x7f0000000540)="7bc68f2d8a6efe0892e214ea503401d0e150b0b46b69645061d5249c95edc7f34388453c7698863ecb8e58442247165ba631915b5b3efb27327dc2348fb3b84e817398df46a628cbbfa95540c8bb56537fe82d82ff401d88ba8b25d6a5", &(0x7f0000000d00)="af3a47aade1300706b47e0a95b75dabd84536ef2c2f10a193f23a52979abf6e85c2626c98afe3ff1c78b9eccc6be14e0ecd4a167dc9e9e4cad966d936f01717caeaada9ddab882b8df58da5a3c80fa45da25e20c0e6e9740", 0xc3cc, 0xffffffffffffffff, 0x4}, 0x38) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007de0b7030000010000006a0a00fe00000000850000000d000000b700000001000000950000000000000075cd67b5b18065752a3ad500000000000000cb450063bc36005400000000000000ff7f00000001000000000000000000cb04fcbb0b5ba9918d37b056b9bbd11b6b9f260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fb4845124ef2e487204000000aaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aadffcc75fe369258673b5d053bdec75dca377232a790bce5a6f087ae8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aa000000000000000000000000008b798b4f7458d1863cc67d4c6a06e828e5216f601b19db9af1b5d356d0f062137d866d11be4b1260b06cca9098a3f0151fdbbd4e97d62ecc6405003a60f1c6edc76683073909826151e2b42bf0ed0c8cef3ba2a730a00c87c493db845b10e9468bdaeecc952a3fd2c46f3c1cde71a19d1a2982492abaa96765372831210e00d2bfea3b8df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f22542c133aadafdc96fdb49cc992dbdd5ac01ba51508951c7a7c5f5093bd6ca0916c3a12912715649c2b1c7193a4251b59d378d0616a48c7957e122665c8b7e89eddfc3783f000000000000000050572061dfb5248d3d4a1c37dcb92d9ef99e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf19524cf30f810da3204f4c93f4f5d7321acfefc4d1c9139ca4b65b9990995000000000000000000000000000000c8a3988cca41217c950554bb043cf364d709c2bf3ec46b75f1bce43e726210b53d362072bc120c076b4647afc595d97c288f5017088ac2b02ed97fc883a102ae6000044542e3aa7ada6d13ff93ec634a0fa0b5f41ed317b48b8b8c03b243d6e14b7087e2c5d41f8a51408e27283b54d04212cbb0f5af76b70b1bdcec7c0abe6407e7fa204b9919490af8bffca6fbbd2174a84328af4acc9c7ec655729125fc15da558cb6edfcdd0c3fca7130863d13369f79f1d13ac166249e4bffa4a272a0116b591a63bfca11205d216b34000000000000000045b5ade570aeb7cf89e900004dc6c89355082bdcb0b08b810cf63fd19a17f4d440f1546e8e5f8addedb88c7f7990947505d2fcd8cb14"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x1f2f, 0x18, 0x1e8, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x1e8, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000000), 0x0, 0xe8030000}, 0x23) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x18) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX=r0], 0xffdd) 3.173501609s ago: executing program 3 (id=2671): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x13, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x3, 0x0, 0x3, 0x7, 0x5, 0x10, 0xffffffffffffffe4}, @jmp={0x5, 0x0, 0x5, 0x3, 0x1, 0x30, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xca}, @generic={0x1, 0x4, 0x5, 0xfffe, 0x81}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc0189436, 0x2000141a) 3.127075719s ago: executing program 0 (id=2673): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488a86372"], 0x140) 3.11696457s ago: executing program 2 (id=2674): write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff4d0600000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00'}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(r2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000300)={'team_slave_1', 0x32, 0x30}, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xffffff1f}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xc, 0x9, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x5, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.817677345s ago: executing program 2 (id=2675): close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000280000000000000", @ANYRES32=0x1], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, 0x0, 0x0}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f0000000240)="f15ffb18a361bd8ed4040703c69f295dfdf61afae53625cb9d2917e62bfdea6d660ed1201d3d2e14d0a92efcb57076b772e27a4aa48a82138669f7d5ce420952a67179b902ff5e6bcdc87498474cd7976977ad78b5b0d39ebfc60ddfdb44804a227e53fea6a5fa93e3d845bd8850dab84e7482", &(0x7f0000000500)=""/223, &(0x7f00000008c0)="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", &(0x7f00000006c0)="46f13750e03e671a757cc836e6b890932cbfea545b724fc7d62e68005acca31c95435bae9e9fad0f8f7efdf265f3bca33bdd93ffd993df7b5e83e684ac2aa758e1e42a09cd9bd824ca1686e93f6dd4364effd101ec8b3f7bdaa07c548217717bffa5c5ca435e77af94c424813344101a8451f410a101cad72e3be98d4679e0a9b8944ab322a948c3ee9ece848cd8be1552b28528aa24b73d08f614f4b9bec60bb7aebf103706cbeaa9f1613b5b35", 0x6, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0xc, &(0x7f0000000780)=@framed={{}, [@ringbuf_output={{0x18, 0x5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0x80086601, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)=@o_path={0x0, 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000e40)=ANY=[@ANYBLOB="0000000000000000b70200"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.713350828s ago: executing program 3 (id=2677): bpf$PROG_LOAD(0x5, &(0x7f0000009240)={0x11, 0x35, &(0x7f0000000000)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x1}, 0x50) close(0x3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r7, @ANYRES64=r6], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e020000000000000000"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000040000000a00000000000000d2065b4b94ae40a24917fc159bfb3475084f832f122fccfb7143b13f1a04f772e0db7fbfdb5187beeccf8b021d99db584db79d4515f14a4660c9429ecf407a9f7c1f319a9a518c92", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="000000000100"/25], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r5}, 0xc) 2.649746619s ago: executing program 0 (id=2679): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0xf, &(0x7f00000008c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x10001, 0x9, 0x101, 0xffffffffffffffff, 0x100}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x4, 0x2}, 0x50) r4 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7], 0x18}, 0x8810) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) close(r8) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYRES32=r5, @ANYRES64=r4], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}, 0x0, 0x4, 0xffff, 0x0, 0x0, 0x2}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000500), 0x5fc, r3}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000000), &(0x7f0000000280)=r0}, 0x20) 1.461880312s ago: executing program 4 (id=2685): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.kill\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x2d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r3}, 0x18) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) (async) syz_clone(0xc2002011, 0x0, 0x0, 0x0, 0x0, 0x0) 1.236335876s ago: executing program 4 (id=2686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) (fail_nth: 2) 833.834814ms ago: executing program 4 (id=2687): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) (fail_nth: 5) 539.72306ms ago: executing program 4 (id=2688): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r7, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x48, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000004c0), &(0x7f0000000540), 0x8, 0xa5, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_ext={0x1c, 0xd, &(0x7f00000002c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}], &(0x7f0000000040)='GPL\x00', 0xd43, 0x0, 0x0, 0x40f00, 0x0, '\x00', r9, 0x0, r5, 0x8, &(0x7f0000000600)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x9, 0x2, 0x7}, 0x10, 0x1365e, 0xffffffffffffffff, 0x1, 0x0, &(0x7f00000007c0)=[{0x3, 0x4, 0x3, 0x9}], 0x10, 0x5}, 0x94) 479.643521ms ago: executing program 4 (id=2689): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488a86372"], 0x140) 84.356509ms ago: executing program 4 (id=2690): bpf$PROG_LOAD(0x5, &(0x7f0000009240)={0x11, 0x35, &(0x7f0000000000)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0xfffffffe, 0x5, 0x0, 0x40001, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/19], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000008c96"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000001c0)={'vlan0\x00', 0x2000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x31) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xd24}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x80, 0x0, 0x1ff, 0xfffffffd}, 0x0, 0x0, r4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000ecff2000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r8}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) 0s ago: executing program 1 (id=1968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000002240)=""/4097}, 0x20) kernel console output (not intermixed with test programs): 709][ T283] device veth1_macvtap entered promiscuous mode [ 23.773223][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 23.785044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.793499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.803382][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.811809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.820230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.828507][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.840859][ T282] device veth1_macvtap entered promiscuous mode [ 23.848541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.856844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.898094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.924056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.939942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.948729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.959215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.974577][ C1] hrtimer: interrupt took 95061 ns [ 23.984506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.638483][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 25.900578][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 25.900627][ T30] audit: type=1400 audit(1757087275.101:115): avc: denied { create } for pid=531 comm="syz.3.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 26.171262][ T564] device syzkaller0 entered promiscuous mode [ 26.202277][ T30] audit: type=1400 audit(1757087275.401:116): avc: denied { create } for pid=569 comm="syz.2.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 26.419584][ T30] audit: type=1400 audit(1757087275.621:117): avc: denied { attach_queue } for pid=596 comm="syz.3.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.464938][ T601] bridge0: port 3(veth0) entered blocking state [ 26.471339][ T601] bridge0: port 3(veth0) entered disabled state [ 26.478945][ T601] device veth0 entered promiscuous mode [ 26.490068][ T601] bridge0: port 3(veth0) entered blocking state [ 26.496420][ T601] bridge0: port 3(veth0) entered forwarding state [ 26.505309][ T601] device veth0 left promiscuous mode [ 26.510815][ T601] bridge0: port 3(veth0) entered disabled state [ 28.309994][ T947] syzkaller1: tun_chr_ioctl cmd 1074025681 [ 28.339173][ T947] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 28.364848][ T947] syzkaller1: linktype set to 773 [ 28.933985][ T30] audit: type=1400 audit(1757087278.131:118): avc: denied { tracepoint } for pid=1078 comm="syz.2.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.982267][ T30] audit: type=1400 audit(1757087278.181:119): avc: denied { create } for pid=1082 comm="syz.4.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 29.092193][ T30] audit: type=1400 audit(1757087278.291:120): avc: denied { create } for pid=1097 comm="syz.2.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.113510][ T30] audit: type=1400 audit(1757087278.291:121): avc: denied { read } for pid=1097 comm="syz.2.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.432929][ T30] audit: type=1400 audit(1757087278.631:122): avc: denied { write } for pid=1151 comm="syz.4.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.644543][ C0] sched: RT throttling activated [ 34.230796][ T1253] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 34.437691][ T1272] syz.3.447 (1272) used obsolete PPPIOCDETACH ioctl [ 34.653470][ T1286] device syzkaller0 entered promiscuous mode [ 34.709145][ T30] audit: type=1400 audit(1757087283.911:123): avc: denied { create } for pid=1293 comm="syz.3.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 34.811665][ T30] audit: type=1400 audit(1757087284.011:124): avc: denied { write } for pid=1306 comm="syz.4.465" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.913505][ T30] audit: type=1400 audit(1757087284.111:125): avc: denied { create } for pid=1318 comm="syz.4.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.976098][ T30] audit: type=1400 audit(1757087284.171:126): avc: denied { setopt } for pid=1329 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.531279][ T1389] cgroup: fork rejected by pids controller in /syz0 [ 35.715049][ T281] syz-executor (281) used greatest stack depth: 20928 bytes left [ 36.074712][ T1416] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.081894][ T1416] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.090099][ T1416] device bridge_slave_0 entered promiscuous mode [ 36.127262][ T1416] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.134335][ T1416] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.218347][ T1416] device bridge_slave_1 entered promiscuous mode [ 36.385603][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.406136][ T359] device bridge_slave_0 left promiscuous mode [ 36.412437][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.661667][ T30] audit: type=1400 audit(1757087285.861:127): avc: denied { create } for pid=1416 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.724585][ T30] audit: type=1400 audit(1757087285.861:128): avc: denied { write } for pid=1416 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.742889][ T1416] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.752098][ T1416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.759452][ T1416] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.766527][ T1416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.814070][ T464] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.821611][ T30] audit: type=1400 audit(1757087285.861:129): avc: denied { read } for pid=1416 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.842226][ T464] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.882685][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.893159][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.923232][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.960742][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.980589][ T30] audit: type=1400 audit(1757087286.181:130): avc: denied { ioctl } for pid=1478 comm="syz.2.543" path="pid:[4026532378]" dev="nsfs" ino=4026532378 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 36.984104][ T464] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.012192][ T464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.050659][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.084998][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.108949][ T464] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.116068][ T464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.153079][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.169667][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.195276][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.222121][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.247353][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.266996][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.282941][ T1416] device veth0_vlan entered promiscuous mode [ 37.291569][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.299814][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.343418][ T1416] device veth1_macvtap entered promiscuous mode [ 37.352135][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.360214][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.368058][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.377259][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.393570][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.415069][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.424960][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.433683][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.450167][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.789429][ T30] audit: type=1400 audit(1757087286.991:131): avc: denied { create } for pid=1546 comm="syz.0.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 39.102475][ T1695] dvmrp1: tun_chr_ioctl cmd 2148553947 [ 39.615333][ T1758] device pim6reg1 entered promiscuous mode [ 40.887605][ T1807] syzkaller0: create flow: hash 4150874977 index 1 [ 40.901787][ T368] syzkaller0: tun_net_xmit 76 [ 40.911624][ T368] syzkaller0: tun_net_xmit 48 [ 40.935086][ T368] syzkaller0: tun_net_xmit 76 [ 40.948774][ T1806] syzkaller0: delete flow: hash 4150874977 index 1 [ 41.368017][ T1877] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.375325][ T1877] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.415694][ T1877] device bridge_slave_1 left promiscuous mode [ 41.431047][ T1877] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.464010][ T1877] device bridge_slave_0 left promiscuous mode [ 41.473813][ T1877] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.795832][ T1939] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.803193][ T1939] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.849964][ T1939] device bridge_slave_1 left promiscuous mode [ 41.859757][ T1939] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.885269][ T1939] device bridge_slave_0 left promiscuous mode [ 41.901641][ T1939] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.211611][ T1996] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.218877][ T1996] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.255671][ T1996] device bridge_slave_1 left promiscuous mode [ 42.269621][ T1996] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.285676][ T1996] device bridge_slave_0 left promiscuous mode [ 42.314734][ T1996] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.770849][ T2041] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.778156][ T2041] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.801248][ T2041] device bridge_slave_1 left promiscuous mode [ 42.835315][ T2041] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.851633][ T2041] device bridge_slave_0 left promiscuous mode [ 42.864756][ T2041] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.047487][ T30] audit: type=1400 audit(1757087292.251:132): avc: denied { create } for pid=2064 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 43.233863][ T2089] syz.2.831[2089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.233959][ T2089] syz.2.831[2089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.461802][ T2231] syz.1.898[2231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.475157][ T2231] syz.1.898[2231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.504573][ T2231] syz.1.898[2231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.532133][ T2231] syz.1.898[2231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.569813][ T2241] ÿÿÿÿÿÿ: renamed from vlan1 [ 44.856402][ T2280] syz.1.920[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.856491][ T2280] syz.1.920[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.881951][ T2282] tap0: tun_chr_ioctl cmd 1074025681 [ 46.517923][ T2509] device pim6reg1 entered promiscuous mode [ 46.630906][ T2520] device wg2 entered promiscuous mode [ 47.985007][ T2703] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 47.990561][ T2703] dvmrp1: linktype set to 6 [ 48.019774][ T2710] device pim6reg1 entered promiscuous mode [ 49.015261][ T2869] device veth1_macvtap left promiscuous mode [ 49.021383][ T2869] device macsec0 entered promiscuous mode [ 49.161171][ T2897] syz.2.1217[2897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.161354][ T2897] syz.2.1217[2897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.175806][ T2891] device pim6reg1 entered promiscuous mode [ 49.601826][ T2957] syz.3.1247[2957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.601922][ T2957] syz.3.1247[2957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.416897][ T3082] device wg2 entered promiscuous mode [ 51.113899][ T3173] syz.3.1350[3173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.113971][ T3173] syz.3.1350[3173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.504330][ T3231] syz.1.1368[3231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.540199][ T3231] syz.1.1368[3231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.604464][ T3232] syz.1.1368[3232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.652991][ T3231] ip6_vti0: mtu greater than device maximum [ 52.711835][ T3232] syz.1.1368[3232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.890132][ T3271] device veth1_macvtap left promiscuous mode [ 55.430025][ T3321] device sit0 entered promiscuous mode [ 55.482124][ T30] audit: type=1400 audit(1757087304.681:133): avc: denied { create } for pid=3320 comm="syz.1.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 55.711648][ T3329] FAULT_INJECTION: forcing a failure. [ 55.711648][ T3329] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 55.875102][ T3329] CPU: 0 PID: 3329 Comm: syz.3.1392 Not tainted syzkaller #0 [ 55.882532][ T3329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 55.892624][ T3329] Call Trace: [ 55.895938][ T3329] [ 55.898889][ T3329] __dump_stack+0x21/0x30 [ 55.903257][ T3329] dump_stack_lvl+0xee/0x150 [ 55.907876][ T3329] ? show_regs_print_info+0x20/0x20 [ 55.913108][ T3329] ? vfs_write+0xc17/0xf70 [ 55.917547][ T3329] dump_stack+0x15/0x20 [ 55.921720][ T3329] should_fail+0x3c1/0x510 [ 55.926161][ T3329] should_fail_usercopy+0x1a/0x20 [ 55.931207][ T3329] _copy_from_user+0x20/0xd0 [ 55.935828][ T3329] __sys_bpf+0x233/0x730 [ 55.940091][ T3329] ? bpf_link_show_fdinfo+0x310/0x310 [ 55.945485][ T3329] ? debug_smp_processor_id+0x17/0x20 [ 55.950880][ T3329] __x64_sys_bpf+0x7c/0x90 [ 55.955318][ T3329] x64_sys_call+0x4b9/0x9a0 [ 55.959847][ T3329] do_syscall_64+0x4c/0xa0 [ 55.964287][ T3329] ? clear_bhb_loop+0x50/0xa0 [ 55.968989][ T3329] ? clear_bhb_loop+0x50/0xa0 [ 55.973699][ T3329] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.979628][ T3329] RIP: 0033:0x7fdb71db3be9 [ 55.984065][ T3329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.005599][ T3329] RSP: 002b:00007fdb707fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 56.014049][ T3329] RAX: ffffffffffffffda RBX: 00007fdb71feb090 RCX: 00007fdb71db3be9 [ 56.022047][ T3329] RDX: 0000000000000010 RSI: 0000200000000500 RDI: 0000000000000011 [ 56.030035][ T3329] RBP: 00007fdb707fb090 R08: 0000000000000000 R09: 0000000000000000 [ 56.038031][ T3329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.046032][ T3329] R13: 00007fdb71feb128 R14: 00007fdb71feb090 R15: 00007ffff9963778 [ 56.054043][ T3329] [ 56.192059][ T3348] syz.2.1416[3348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.194016][ T3348] syz.2.1416[3348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.662112][ T3374] ªªªªªª: renamed from vlan0 [ 60.707270][ T3453] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 67.888578][ T3689] Â: renamed from pim6reg1 [ 67.932130][ T30] audit: type=1400 audit(1757087317.131:134): avc: denied { create } for pid=3686 comm="syz.1.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 68.010453][ T30] audit: type=1400 audit(1757087317.161:135): avc: denied { ioctl } for pid=3695 comm="syz.2.1541" path="socket:[26588]" dev="sockfs" ino=26588 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 69.533303][ T3755] device sit0 left promiscuous mode [ 70.458210][ T3815] syz.2.1585[3815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.458287][ T3815] syz.2.1585[3815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.965873][ T3893] device pim6reg1 entered promiscuous mode [ 72.168005][ T3897] bond_slave_1: mtu less than device minimum [ 74.455286][ T3978] device syzkaller0 entered promiscuous mode [ 74.998675][ T4040] device syzkaller0 entered promiscuous mode [ 75.344187][ T4053] bond_slave_1: mtu less than device minimum [ 75.812340][ T4077] ªªªªªª: renamed from vlan0 [ 75.898973][ T4095] bond_slave_1: mtu less than device minimum [ 77.155688][ T4145] device syzkaller0 entered promiscuous mode [ 78.419823][ T30] audit: type=1400 audit(1757087327.621:136): avc: denied { create } for pid=4215 comm="syz.1.1736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 78.617217][ T4224] device veth1_macvtap left promiscuous mode [ 79.478199][ T4288] device pim6reg1 entered promiscuous mode [ 80.989430][ T4360] device sit0 entered promiscuous mode [ 83.265396][ T4411] device syzkaller0 entered promiscuous mode [ 83.354746][ T4413] device syzkaller0 left promiscuous mode [ 84.112289][ T4469] device sit0 left promiscuous mode [ 84.207518][ T4469] device sit0 entered promiscuous mode [ 86.437517][ T4521] device syzkaller0 entered promiscuous mode [ 87.241050][ T30] audit: type=1400 audit(1757087336.441:137): avc: denied { create } for pid=4532 comm="syz.3.1852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 89.293601][ T4610] device pim6reg1 entered promiscuous mode [ 96.717809][ T4698] device pim6reg1 entered promiscuous mode [ 98.455016][ T4768] syz.4.1942[4768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.455089][ T4768] syz.4.1942[4768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.529782][ T4824] Q±6ã`Ò˜: renamed from lo [ 99.858063][ T30] audit: type=1400 audit(1757087349.061:138): avc: denied { create } for pid=4848 comm="syz.2.1976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.894969][ T4833] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.904011][ T4833] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.921899][ T4833] device bridge_slave_0 entered promiscuous mode [ 99.931476][ T4833] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.949421][ T4833] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.012459][ T4859] syz.0.1977[4859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.012533][ T4859] syz.0.1977[4859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.055620][ T4833] device bridge_slave_1 entered promiscuous mode [ 100.608993][ T8] device bridge_slave_1 left promiscuous mode [ 100.617483][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.668746][ T8] device bridge_slave_0 left promiscuous mode [ 100.686098][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.952446][ T4833] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.959555][ T4833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.966889][ T4833] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.973926][ T4833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.001989][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.011393][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.072272][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.082748][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.092198][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.100905][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.109324][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.116417][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.132213][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.141699][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.160204][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.167304][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.478550][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.486939][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.506018][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.514270][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.529945][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.538764][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.558970][ T4833] device veth0_vlan entered promiscuous mode [ 101.573444][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.583571][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.592463][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.635104][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.659649][ T4833] device veth1_macvtap entered promiscuous mode [ 102.255642][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.269918][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.285272][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.367814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.435504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.518657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.546247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.850702][ T4966] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 103.559326][ T4977] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.584575][ T4977] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.592238][ T4977] device bridge_slave_0 entered promiscuous mode [ 103.667454][ T4977] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.699959][ T4977] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.711409][ T4977] device bridge_slave_1 entered promiscuous mode [ 103.719797][ T5011] syz.4.2025[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.725528][ T5011] syz.4.2025[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.978941][ T4977] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.997353][ T4977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.004835][ T4977] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.011870][ T4977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.097539][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.119802][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.134420][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.176500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.184870][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.191934][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.353279][ T5039] device syzkaller0 entered promiscuous mode [ 104.384292][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.392586][ T464] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.399659][ T464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.425826][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.444050][ T30] audit: type=1400 audit(1757087353.641:139): avc: denied { create } for pid=5053 comm="syz.0.2039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 104.454988][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.480541][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.490343][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.503842][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.512335][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.599629][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.614314][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.652627][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.661994][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.695231][ T4977] device veth0_vlan entered promiscuous mode [ 104.747557][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.758781][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.788955][ T8] device bridge_slave_1 left promiscuous mode [ 104.795899][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.803590][ T8] device bridge_slave_0 left promiscuous mode [ 104.810037][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.957004][ T8] device veth1_macvtap left promiscuous mode [ 104.964237][ T8] device veth0_vlan left promiscuous mode [ 105.172512][ T4977] device veth1_macvtap entered promiscuous mode [ 105.234937][ T5085] device syzkaller0 entered promiscuous mode [ 105.302612][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.320983][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.334918][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.362992][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.400764][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.565888][ T5110] device sit0 entered promiscuous mode [ 106.078694][ T5133] device macsec0 entered promiscuous mode [ 106.123275][ T5129] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.137235][ T5129] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.152472][ T5129] device bridge_slave_0 entered promiscuous mode [ 106.184818][ T5129] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.207449][ T5129] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.216371][ T5129] device bridge_slave_1 entered promiscuous mode [ 106.246607][ T5163] device wg2 left promiscuous mode [ 106.289955][ T5163] device wg2 entered promiscuous mode [ 106.633329][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.643242][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.671302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.699254][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.718516][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.725657][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.743984][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.765188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.773702][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.780805][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.788891][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.830225][ T5129] device veth0_vlan entered promiscuous mode [ 106.843442][ T5129] device veth1_macvtap entered promiscuous mode [ 106.861991][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.933290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.941199][ T30] audit: type=1400 audit(1757087356.131:140): avc: denied { create } for pid=5213 comm="syz.3.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 106.965014][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.977442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.990914][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 107.000088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.008709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 107.018266][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.027317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.035860][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.045136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.053602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.062542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 107.071117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.210284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.218143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.328876][ T5229] device syzkaller0 entered promiscuous mode [ 107.411084][ T8] device bridge_slave_1 left promiscuous mode [ 107.421851][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.429989][ T8] device bridge_slave_0 left promiscuous mode [ 107.436322][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.450269][ T8] device veth1_macvtap left promiscuous mode [ 107.457859][ T8] device veth0_vlan left promiscuous mode [ 107.613801][ T5235] device wg2 left promiscuous mode [ 108.427964][ T5256] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.439489][ T5256] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.472088][ T5256] device bridge_slave_0 entered promiscuous mode [ 108.547969][ T5256] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.563157][ T5256] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.571119][ T5256] device bridge_slave_1 entered promiscuous mode [ 108.815693][ T8] device bridge_slave_1 left promiscuous mode [ 108.824233][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.861899][ T8] device bridge_slave_0 left promiscuous mode [ 108.892934][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.930437][ T8] device veth1_macvtap left promiscuous mode [ 108.965010][ T8] device veth0_vlan left promiscuous mode [ 109.263746][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.271477][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.288314][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.306852][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.323922][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.331026][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.360141][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.378127][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.390255][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.397347][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.475671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.512663][ T30] audit: type=1400 audit(1757087358.711:141): avc: denied { create } for pid=5316 comm="syz.3.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 109.724227][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.732364][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.793914][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.802930][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.824674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 109.832867][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.850815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.858983][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.874462][ T5256] device veth0_vlan entered promiscuous mode [ 109.908024][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.925269][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.952829][ T5256] device veth1_macvtap entered promiscuous mode [ 110.029605][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.038471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.047090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.066602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.075193][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.202525][ T5412] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.260052][ T5412] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.267986][ T5412] device bridge_slave_0 entered promiscuous mode [ 112.310547][ T5412] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.338874][ T5412] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.384909][ T5412] device bridge_slave_1 entered promiscuous mode [ 112.733338][ T5412] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.740440][ T5412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.747779][ T5412] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.754831][ T5412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.103194][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.112342][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.124955][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.132634][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.203910][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.212479][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.219583][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.227238][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.235714][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.242860][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.329190][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.339909][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.356844][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.369390][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.377522][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.445953][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.483190][ T8] device bridge_slave_1 left promiscuous mode [ 113.491705][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.505108][ T8] device bridge_slave_0 left promiscuous mode [ 113.511727][ T30] audit: type=1400 audit(1757087362.711:142): avc: denied { create } for pid=5495 comm="syz.0.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 113.564461][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.572748][ T8] device veth1_macvtap left promiscuous mode [ 113.578941][ T30] audit: type=1400 audit(1757087362.751:143): avc: denied { create } for pid=5495 comm="syz.0.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 113.584585][ T8] device veth0_vlan left promiscuous mode [ 113.731971][ T5412] device veth0_vlan entered promiscuous mode [ 113.739059][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.747318][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.756827][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.764600][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.924242][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.932588][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.998686][ T5412] device veth1_macvtap entered promiscuous mode [ 114.152854][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.164984][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.173471][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.182667][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.191001][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.584981][ T5552] syz.4.2186[5552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.585086][ T5552] syz.4.2186[5552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.948101][ T5548] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.972406][ T5548] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.980399][ T5548] device bridge_slave_0 entered promiscuous mode [ 116.063025][ T5548] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.070899][ T5548] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.086068][ T5548] device bridge_slave_1 entered promiscuous mode [ 116.092894][ T5561] device sit0 left promiscuous mode [ 116.144007][ T5560] device sit0 entered promiscuous mode [ 116.440887][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.448373][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.481308][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 116.489827][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.498199][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.505252][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.512664][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.523480][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.531950][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.540160][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.547206][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.574236][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.583420][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.599016][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.610599][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.618883][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.626654][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.645243][ T5548] device veth0_vlan entered promiscuous mode [ 116.657430][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.666618][ T5548] device veth1_macvtap entered promiscuous mode [ 116.676324][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.684765][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.708981][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.717482][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 117.026496][ T8] device bridge_slave_1 left promiscuous mode [ 117.032693][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.040561][ T8] device bridge_slave_0 left promiscuous mode [ 117.046814][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.055369][ T8] device veth1_macvtap left promiscuous mode [ 117.061408][ T8] device veth0_vlan left promiscuous mode [ 117.704211][ T5603] device syzkaller0 entered promiscuous mode [ 118.081296][ T5601] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.090153][ T5601] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.105107][ T5601] device bridge_slave_0 entered promiscuous mode [ 118.167079][ T5601] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.174161][ T5601] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.203534][ T5601] device bridge_slave_1 entered promiscuous mode [ 118.389142][ T5632] device syzkaller0 entered promiscuous mode [ 118.625682][ T8] device bridge_slave_1 left promiscuous mode [ 118.631857][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.676053][ T8] device bridge_slave_0 left promiscuous mode [ 118.682243][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.760045][ T8] device veth1_macvtap left promiscuous mode [ 118.796709][ T8] device veth0_vlan left promiscuous mode [ 119.069535][ T5662] device syzkaller0 entered promiscuous mode [ 119.092877][ T5663] device syzkaller0 entered promiscuous mode [ 119.218688][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 119.230630][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.256650][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 119.265473][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 119.273709][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.280790][ T5367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.288971][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 119.297632][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 119.305895][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.312950][ T5367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.320904][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 119.329297][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.337520][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 119.354441][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 119.367971][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.394048][ T5601] device veth0_vlan entered promiscuous mode [ 119.425371][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 119.435321][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 119.443914][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 119.456350][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.465473][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.473051][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.481351][ T5674] tap0: tun_chr_ioctl cmd 1074025673 [ 119.592069][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.602597][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 119.619618][ T5601] device veth1_macvtap entered promiscuous mode [ 119.656346][ T5694] device syzkaller0 entered promiscuous mode [ 119.697274][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.735415][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 119.765222][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.773831][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.782880][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 120.972166][ T30] audit: type=1400 audit(1757087370.171:144): avc: denied { create } for pid=5737 comm="syz.2.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 121.042689][ T5728] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.075941][ T5728] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.083578][ T5728] device bridge_slave_0 entered promiscuous mode [ 121.118472][ T5728] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.127204][ T5728] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.134985][ T5728] device bridge_slave_1 entered promiscuous mode [ 121.226027][ T8] device bridge_slave_1 left promiscuous mode [ 121.232241][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.290424][ T8] device bridge_slave_0 left promiscuous mode [ 121.298068][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.307162][ T8] device veth1_macvtap left promiscuous mode [ 121.313252][ T8] device veth0_vlan left promiscuous mode [ 121.955525][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.991983][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.013235][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.080166][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.140918][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.148024][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.172266][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.218178][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.264183][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.318800][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.325931][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.342584][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.378453][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.530305][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.626859][ T5728] device veth0_vlan entered promiscuous mode [ 122.678806][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.696788][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.721889][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.754761][ T5822] @0Ù: renamed from bond_slave_1 [ 122.826204][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 122.834917][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 122.843450][ T5728] device veth1_macvtap entered promiscuous mode [ 122.868212][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 122.878101][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 122.887430][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.948770][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 122.999540][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.654900][ T8] device bridge_slave_1 left promiscuous mode [ 124.661083][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.692858][ T8] device bridge_slave_0 left promiscuous mode [ 124.705617][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.722745][ T8] device veth1_macvtap left promiscuous mode [ 124.734321][ T8] device veth0_vlan left promiscuous mode [ 124.974637][ T5876] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.981710][ T5876] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.998718][ T5876] device bridge_slave_0 entered promiscuous mode [ 125.172543][ T5876] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.191523][ T5876] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.201928][ T5876] device bridge_slave_1 entered promiscuous mode [ 125.410454][ T5923] device pim6reg1 entered promiscuous mode [ 125.928798][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.941230][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.991657][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.003745][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.012181][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.019232][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.027488][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.036051][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.044240][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.051293][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.111881][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.156684][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.211055][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.260329][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.316756][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.374441][ T5876] device veth0_vlan entered promiscuous mode [ 126.394385][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.403189][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.411983][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.421804][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.484942][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.555096][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.575316][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.610886][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.633600][ T5876] device veth1_macvtap entered promiscuous mode [ 126.676576][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.690420][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.718226][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.727176][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.735840][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.918846][ T30] audit: type=1400 audit(1757087377.121:145): avc: denied { create } for pid=5988 comm="syz.2.2313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 128.086432][ T8] device bridge_slave_1 left promiscuous mode [ 128.093801][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.128311][ T8] device bridge_slave_0 left promiscuous mode [ 128.164766][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.177610][ T8] device veth1_macvtap left promiscuous mode [ 128.208524][ T8] device veth0_vlan left promiscuous mode [ 128.569645][ T6009] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.576938][ T6009] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.585136][ T6009] device bridge_slave_0 entered promiscuous mode [ 128.624776][ T6009] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.631822][ T6009] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.664874][ T6009] device bridge_slave_1 entered promiscuous mode [ 131.714236][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.724833][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.754383][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.763754][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.772623][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.779734][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.787445][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.795891][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.804431][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.811518][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.844346][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.860931][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.876216][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.886317][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.894706][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.917647][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.933138][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.942450][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.975925][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.044891][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.067880][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.089387][ T6009] device veth0_vlan entered promiscuous mode [ 132.120279][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.135030][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.153407][ T6009] device veth1_macvtap entered promiscuous mode [ 132.169044][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.178854][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.192711][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.223627][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.244137][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.396163][ T8] device bridge_slave_1 left promiscuous mode [ 133.402284][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.409868][ T8] device bridge_slave_0 left promiscuous mode [ 133.416091][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.424068][ T8] device veth1_macvtap left promiscuous mode [ 133.430130][ T8] device veth0_vlan left promiscuous mode [ 133.665690][ T6102] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.703351][ T6102] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.796510][ T6102] device bridge_slave_0 entered promiscuous mode [ 133.865440][ T6121] tun0: tun_chr_ioctl cmd 1074025681 [ 133.871869][ T6102] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.893546][ T6102] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.901354][ T6102] device bridge_slave_1 entered promiscuous mode [ 134.437368][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.445171][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.467569][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.476144][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.487537][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.494669][ T5367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.503114][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.511963][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.520595][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.527779][ T5367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.563108][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.592469][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.671358][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.727932][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.782182][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.801397][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.817054][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.826161][ T6102] device veth0_vlan entered promiscuous mode [ 134.891604][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.903455][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.959019][ T6102] device veth1_macvtap entered promiscuous mode [ 135.024445][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.038505][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.047533][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.113682][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.129815][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.036295][ T8] device bridge_slave_1 left promiscuous mode [ 136.042442][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.050110][ T8] device bridge_slave_0 left promiscuous mode [ 136.056324][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.064342][ T8] device veth1_macvtap left promiscuous mode [ 136.070409][ T8] device veth0_vlan left promiscuous mode [ 136.718452][ T30] audit: type=1400 audit(1757087385.921:146): avc: denied { create } for pid=6213 comm="syz.2.2380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 137.270589][ T6219] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.288230][ T6219] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.315047][ T6219] device bridge_slave_0 entered promiscuous mode [ 137.418650][ T6219] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.436951][ T6219] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.461432][ T6219] device bridge_slave_1 entered promiscuous mode [ 137.741364][ T6240] device macsec0 left promiscuous mode [ 137.782083][ T6219] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.789197][ T6219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.796529][ T6219] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.803576][ T6219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.894365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.902597][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.910385][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.964323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.973060][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.980133][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.987737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.996023][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.003086][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.048966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.065798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.082619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.105463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.174838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.204291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.288812][ T6219] device veth0_vlan entered promiscuous mode [ 138.340019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.366733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.442222][ T6219] device veth1_macvtap entered promiscuous mode [ 138.481201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.489515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.518387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.529002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.538729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.551676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.566994][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.747346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.762519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.038773][ T6287] device veth0_vlan left promiscuous mode [ 139.060909][ T6287] device veth0_vlan entered promiscuous mode [ 139.166064][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.175641][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 139.187798][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.385821][ T5367] device bridge_slave_1 left promiscuous mode [ 140.398966][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.429864][ T5367] device bridge_slave_0 left promiscuous mode [ 140.448532][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.476675][ T5367] device veth1_macvtap left promiscuous mode [ 140.483966][ T5367] device veth0_vlan left promiscuous mode [ 140.957596][ T6310] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.057410][ T6310] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.086441][ T6310] device bridge_slave_0 entered promiscuous mode [ 141.109749][ T6310] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.174836][ T6310] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.191746][ T6310] device bridge_slave_1 entered promiscuous mode [ 141.869514][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.879015][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.898538][ T6402] device sit0 entered promiscuous mode [ 142.147736][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.176530][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.228465][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.235571][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.244188][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.252672][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.261181][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.268243][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.276241][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.321651][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.331716][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.359029][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.399946][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.435721][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.493806][ T6310] device veth0_vlan entered promiscuous mode [ 142.518238][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.534061][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.566279][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.585745][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.631658][ T6310] device veth1_macvtap entered promiscuous mode [ 142.653183][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 142.665737][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.674595][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.743331][ T6432] device sit0 left promiscuous mode [ 142.918191][ T6435] device sit0 entered promiscuous mode [ 143.131713][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.150402][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.171512][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.194956][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.246673][ T6456] device pim6reg1 entered promiscuous mode [ 144.849772][ T6478] device wg2 entered promiscuous mode [ 146.016127][ T6489] device syzkaller0 entered promiscuous mode [ 146.111570][ T6500] FAULT_INJECTION: forcing a failure. [ 146.111570][ T6500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.125839][ T6500] CPU: 0 PID: 6500 Comm: syz.0.2468 Not tainted syzkaller #0 [ 146.133242][ T6500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 146.143301][ T6500] Call Trace: [ 146.146575][ T6500] [ 146.149498][ T6500] __dump_stack+0x21/0x30 [ 146.153829][ T6500] dump_stack_lvl+0xee/0x150 [ 146.158411][ T6500] ? show_regs_print_info+0x20/0x20 [ 146.163600][ T6500] ? vfs_write+0xc17/0xf70 [ 146.168017][ T6500] dump_stack+0x15/0x20 [ 146.172168][ T6500] should_fail+0x3c1/0x510 [ 146.176577][ T6500] should_fail_usercopy+0x1a/0x20 [ 146.181609][ T6500] _copy_from_user+0x20/0xd0 [ 146.186210][ T6500] __sys_bpf+0x233/0x730 [ 146.190552][ T6500] ? bpf_link_show_fdinfo+0x310/0x310 [ 146.195933][ T6500] ? debug_smp_processor_id+0x17/0x20 [ 146.201310][ T6500] __x64_sys_bpf+0x7c/0x90 [ 146.205730][ T6500] x64_sys_call+0x4b9/0x9a0 [ 146.210236][ T6500] do_syscall_64+0x4c/0xa0 [ 146.214661][ T6500] ? clear_bhb_loop+0x50/0xa0 [ 146.219339][ T6500] ? clear_bhb_loop+0x50/0xa0 [ 146.224016][ T6500] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 146.229915][ T6500] RIP: 0033:0x7fb491bf6be9 [ 146.234324][ T6500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.253955][ T6500] RSP: 002b:00007fb49065f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 146.262368][ T6500] RAX: ffffffffffffffda RBX: 00007fb491e2dfa0 RCX: 00007fb491bf6be9 [ 146.270354][ T6500] RDX: 000000000000000c RSI: 00002000000000c0 RDI: 000000000000000a [ 146.278325][ T6500] RBP: 00007fb49065f090 R08: 0000000000000000 R09: 0000000000000000 [ 146.286399][ T6500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.294370][ T6500] R13: 00007fb491e2e038 R14: 00007fb491e2dfa0 R15: 00007ffe239ab108 [ 146.302341][ T6500] [ 146.315041][ T6492] device pim6reg1 entered promiscuous mode [ 146.331224][ T6484] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.342091][ T6484] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.364112][ T6484] device bridge_slave_0 entered promiscuous mode [ 146.396828][ T5367] device bridge_slave_1 left promiscuous mode [ 146.403012][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.444072][ T5367] device bridge_slave_0 left promiscuous mode [ 146.460498][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.485744][ T5367] device veth1_macvtap left promiscuous mode [ 146.499790][ T5367] device veth0_vlan left promiscuous mode [ 146.681286][ T6484] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.688390][ T6484] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.695942][ T6484] device bridge_slave_1 entered promiscuous mode [ 146.848852][ T6542] FAULT_INJECTION: forcing a failure. [ 146.848852][ T6542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.865357][ T6542] CPU: 1 PID: 6542 Comm: syz.0.2481 Not tainted syzkaller #0 [ 146.872786][ T6542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 146.882844][ T6542] Call Trace: [ 146.886143][ T6542] [ 146.889099][ T6542] __dump_stack+0x21/0x30 [ 146.893456][ T6542] dump_stack_lvl+0xee/0x150 [ 146.898066][ T6542] ? show_regs_print_info+0x20/0x20 [ 146.903285][ T6542] dump_stack+0x15/0x20 [ 146.907455][ T6542] should_fail+0x3c1/0x510 [ 146.911893][ T6542] should_fail_usercopy+0x1a/0x20 [ 146.916932][ T6542] _copy_to_user+0x20/0x90 [ 146.921377][ T6542] bpf_prog_test_run_raw_tp+0x4f2/0x660 [ 146.926943][ T6542] ? bpf_prog_test_run_tracing+0x4f0/0x4f0 [ 146.932772][ T6542] ? fput_many+0x15a/0x1a0 [ 146.937206][ T6542] ? bpf_prog_test_run_tracing+0x4f0/0x4f0 [ 146.943038][ T6542] bpf_prog_test_run+0x3d5/0x620 [ 146.947992][ T6542] ? bpf_prog_query+0x230/0x230 [ 146.952867][ T6542] ? selinux_bpf+0xce/0xf0 [ 146.957299][ T6542] ? security_bpf+0x82/0xa0 [ 146.961821][ T6542] __sys_bpf+0x52c/0x730 [ 146.966084][ T6542] ? bpf_link_show_fdinfo+0x310/0x310 [ 146.971483][ T6542] ? debug_smp_processor_id+0x17/0x20 [ 146.976879][ T6542] __x64_sys_bpf+0x7c/0x90 [ 146.981312][ T6542] x64_sys_call+0x4b9/0x9a0 [ 146.985823][ T6542] do_syscall_64+0x4c/0xa0 [ 146.990239][ T6542] ? clear_bhb_loop+0x50/0xa0 [ 146.994944][ T6542] ? clear_bhb_loop+0x50/0xa0 [ 146.999648][ T6542] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.005562][ T6542] RIP: 0033:0x7fb491bf6be9 [ 147.010008][ T6542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.029634][ T6542] RSP: 002b:00007fb49065f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.038064][ T6542] RAX: ffffffffffffffda RBX: 00007fb491e2dfa0 RCX: 00007fb491bf6be9 [ 147.046047][ T6542] RDX: 000000000000000c RSI: 00002000000000c0 RDI: 000000000000000a [ 147.054121][ T6542] RBP: 00007fb49065f090 R08: 0000000000000000 R09: 0000000000000000 [ 147.062106][ T6542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.070091][ T6542] R13: 00007fb491e2e038 R14: 00007fb491e2dfa0 R15: 00007ffe239ab108 [ 147.078083][ T6542] [ 147.448899][ T6582] FAULT_INJECTION: forcing a failure. [ 147.448899][ T6582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.462170][ T6582] CPU: 0 PID: 6582 Comm: syz.3.2493 Not tainted syzkaller #0 [ 147.469573][ T6582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 147.479741][ T6582] Call Trace: [ 147.483037][ T6582] [ 147.485982][ T6582] __dump_stack+0x21/0x30 [ 147.490343][ T6582] dump_stack_lvl+0xee/0x150 [ 147.494964][ T6582] ? show_regs_print_info+0x20/0x20 [ 147.500188][ T6582] dump_stack+0x15/0x20 [ 147.504364][ T6582] should_fail+0x3c1/0x510 [ 147.508801][ T6582] should_fail_usercopy+0x1a/0x20 [ 147.513849][ T6582] _copy_to_user+0x20/0x90 [ 147.518296][ T6582] simple_read_from_buffer+0xe9/0x160 [ 147.523691][ T6582] proc_fail_nth_read+0x19a/0x210 [ 147.528738][ T6582] ? proc_fault_inject_write+0x2f0/0x2f0 [ 147.534393][ T6582] ? security_file_permission+0x83/0xa0 [ 147.539962][ T6582] ? proc_fault_inject_write+0x2f0/0x2f0 [ 147.545614][ T6582] vfs_read+0x282/0xbe0 [ 147.549790][ T6582] ? __kasan_check_write+0x14/0x20 [ 147.554920][ T6582] ? kernel_read+0x1f0/0x1f0 [ 147.559524][ T6582] ? __kasan_check_write+0x14/0x20 [ 147.564660][ T6582] ? mutex_lock+0x95/0x1a0 [ 147.569097][ T6582] ? wait_for_completion_killable_timeout+0x10/0x10 [ 147.575706][ T6582] ? __fget_files+0x2c4/0x320 [ 147.580407][ T6582] ? __fdget_pos+0x2d2/0x380 [ 147.585041][ T6582] ? ksys_read+0x71/0x240 [ 147.589394][ T6582] ksys_read+0x140/0x240 [ 147.593651][ T6582] ? vfs_write+0xf70/0xf70 [ 147.598082][ T6582] ? debug_smp_processor_id+0x17/0x20 [ 147.603478][ T6582] __x64_sys_read+0x7b/0x90 [ 147.607997][ T6582] x64_sys_call+0x96d/0x9a0 [ 147.612517][ T6582] do_syscall_64+0x4c/0xa0 [ 147.616950][ T6582] ? clear_bhb_loop+0x50/0xa0 [ 147.621665][ T6582] ? clear_bhb_loop+0x50/0xa0 [ 147.626393][ T6582] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.632311][ T6582] RIP: 0033:0x7fdb71db25fc [ 147.636738][ T6582] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 147.656442][ T6582] RSP: 002b:00007fdb7081c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 147.664877][ T6582] RAX: ffffffffffffffda RBX: 00007fdb71feafa0 RCX: 00007fdb71db25fc [ 147.672868][ T6582] RDX: 000000000000000f RSI: 00007fdb7081c0a0 RDI: 0000000000000005 [ 147.680854][ T6582] RBP: 00007fdb7081c090 R08: 0000000000000000 R09: 0000000000000000 [ 147.688843][ T6582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.696838][ T6582] R13: 00007fdb71feb038 R14: 00007fdb71feafa0 R15: 00007ffff9963778 [ 147.704850][ T6582] [ 147.708801][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.729186][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.775126][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.786855][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.804041][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.811178][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.832080][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.840719][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.859701][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.866813][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.877905][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.886617][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.950699][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.004897][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.023654][ T6484] device veth0_vlan entered promiscuous mode [ 148.037505][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.082042][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.105411][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.165359][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.173641][ T6484] device veth1_macvtap entered promiscuous mode [ 148.235042][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.249548][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.324898][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.370443][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.534373][ T6624] device syzkaller0 entered promiscuous mode [ 149.875876][ T5367] device bridge_slave_1 left promiscuous mode [ 149.882008][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.889660][ T5367] device bridge_slave_0 left promiscuous mode [ 149.895876][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.903885][ T5367] device veth1_macvtap left promiscuous mode [ 149.909929][ T5367] device veth0_vlan left promiscuous mode [ 150.450623][ T6657] device pim6reg1 entered promiscuous mode [ 150.460561][ T6642] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.467884][ T6642] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.475615][ T6642] device bridge_slave_0 entered promiscuous mode [ 150.484369][ T6642] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.492065][ T6642] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.500059][ T6642] device bridge_slave_1 entered promiscuous mode [ 150.685513][ T30] audit: type=1400 audit(1757087399.881:147): avc: denied { create } for pid=6663 comm="syz.2.2521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 150.962338][ T6642] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.969429][ T6642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.976767][ T6642] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.984000][ T6642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.007249][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.015176][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.022463][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.032034][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.040331][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.047383][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.067666][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.079424][ T3549] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.086593][ T3549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.147007][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.168641][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.184167][ T6642] device veth0_vlan entered promiscuous mode [ 151.191198][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.200573][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.209303][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.216987][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.245035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.280920][ T6642] device veth1_macvtap entered promiscuous mode [ 151.308585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 151.324772][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.352971][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.362705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.424060][ T6706] device syzkaller0 entered promiscuous mode [ 151.554501][ T6642] syz-executor (6642) used greatest stack depth: 20608 bytes left [ 152.515569][ T5367] device bridge_slave_1 left promiscuous mode [ 152.521802][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.529436][ T5367] device bridge_slave_0 left promiscuous mode [ 152.535642][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.543637][ T5367] device veth1_macvtap left promiscuous mode [ 152.549709][ T5367] device veth0_vlan left promiscuous mode [ 153.213123][ T6714] device veth1_macvtap left promiscuous mode [ 153.223326][ T6714] device macsec0 left promiscuous mode [ 153.240686][ T6714] device veth1_macvtap entered promiscuous mode [ 153.254566][ T6714] device macsec0 entered promiscuous mode [ 153.297579][ T6714] device sit0 left promiscuous mode [ 153.306167][ T6731] FAULT_INJECTION: forcing a failure. [ 153.306167][ T6731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.347566][ T6731] CPU: 0 PID: 6731 Comm: syz.0.2543 Not tainted syzkaller #0 [ 153.355074][ T6731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 153.365147][ T6731] Call Trace: [ 153.368443][ T6731] [ 153.371391][ T6731] __dump_stack+0x21/0x30 [ 153.375740][ T6731] dump_stack_lvl+0xee/0x150 [ 153.380366][ T6731] ? show_regs_print_info+0x20/0x20 [ 153.385585][ T6731] ? vfs_write+0xc17/0xf70 [ 153.390001][ T6731] dump_stack+0x15/0x20 [ 153.394156][ T6731] should_fail+0x3c1/0x510 [ 153.398610][ T6731] should_fail_usercopy+0x1a/0x20 [ 153.403663][ T6731] _copy_from_user+0x20/0xd0 [ 153.408279][ T6731] __sys_bpf+0x233/0x730 [ 153.412549][ T6731] ? bpf_link_show_fdinfo+0x310/0x310 [ 153.417944][ T6731] ? debug_smp_processor_id+0x17/0x20 [ 153.423327][ T6731] __x64_sys_bpf+0x7c/0x90 [ 153.427757][ T6731] x64_sys_call+0x4b9/0x9a0 [ 153.432276][ T6731] do_syscall_64+0x4c/0xa0 [ 153.436756][ T6731] ? clear_bhb_loop+0x50/0xa0 [ 153.441444][ T6731] ? clear_bhb_loop+0x50/0xa0 [ 153.446127][ T6731] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 153.452029][ T6731] RIP: 0033:0x7fb491bf6be9 [ 153.456446][ T6731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.476062][ T6731] RSP: 002b:00007fb49065f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 153.484485][ T6731] RAX: ffffffffffffffda RBX: 00007fb491e2dfa0 RCX: 00007fb491bf6be9 [ 153.492467][ T6731] RDX: 000000000000000c RSI: 00002000000000c0 RDI: 000000000000000a [ 153.500443][ T6731] RBP: 00007fb49065f090 R08: 0000000000000000 R09: 0000000000000000 [ 153.508437][ T6731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.516406][ T6731] R13: 00007fb491e2e038 R14: 00007fb491e2dfa0 R15: 00007ffe239ab108 [ 153.524396][ T6731] [ 153.565945][ T6732] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.573167][ T6732] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.580784][ T6732] device bridge_slave_0 entered promiscuous mode [ 153.588069][ T6732] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.595212][ T6732] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.602867][ T6732] device bridge_slave_1 entered promiscuous mode [ 154.055324][ T6732] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.062398][ T6732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.069711][ T6732] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.076876][ T6732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.242642][ T6781] FAULT_INJECTION: forcing a failure. [ 154.242642][ T6781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.272006][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.292191][ T6781] CPU: 0 PID: 6781 Comm: syz.3.2557 Not tainted syzkaller #0 [ 154.299615][ T6781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 154.309687][ T6781] Call Trace: [ 154.312980][ T6781] [ 154.315927][ T6781] __dump_stack+0x21/0x30 [ 154.320280][ T6781] dump_stack_lvl+0xee/0x150 [ 154.324891][ T6781] ? show_regs_print_info+0x20/0x20 [ 154.330114][ T6781] dump_stack+0x15/0x20 [ 154.334291][ T6781] should_fail+0x3c1/0x510 [ 154.338719][ T6781] should_fail_usercopy+0x1a/0x20 [ 154.343767][ T6781] _copy_to_user+0x20/0x90 [ 154.348182][ T6781] bpf_prog_test_run_raw_tp+0x4f2/0x660 [ 154.353788][ T6781] ? bpf_prog_test_run_tracing+0x4f0/0x4f0 [ 154.359627][ T6781] ? fput_many+0x15a/0x1a0 [ 154.364075][ T6781] ? bpf_prog_test_run_tracing+0x4f0/0x4f0 [ 154.369899][ T6781] bpf_prog_test_run+0x3d5/0x620 [ 154.374869][ T6781] ? bpf_prog_query+0x230/0x230 [ 154.379735][ T6781] ? selinux_bpf+0xce/0xf0 [ 154.384307][ T6781] ? security_bpf+0x82/0xa0 [ 154.388832][ T6781] __sys_bpf+0x52c/0x730 [ 154.393090][ T6781] ? bpf_link_show_fdinfo+0x310/0x310 [ 154.398486][ T6781] ? debug_smp_processor_id+0x17/0x20 [ 154.403884][ T6781] __x64_sys_bpf+0x7c/0x90 [ 154.408317][ T6781] x64_sys_call+0x4b9/0x9a0 [ 154.412845][ T6781] do_syscall_64+0x4c/0xa0 [ 154.417283][ T6781] ? clear_bhb_loop+0x50/0xa0 [ 154.422017][ T6781] ? clear_bhb_loop+0x50/0xa0 [ 154.426722][ T6781] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.432643][ T6781] RIP: 0033:0x7fdb71db3be9 [ 154.437195][ T6781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.456837][ T6781] RSP: 002b:00007fdb7081c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 154.465299][ T6781] RAX: ffffffffffffffda RBX: 00007fdb71feafa0 RCX: 00007fdb71db3be9 [ 154.473293][ T6781] RDX: 000000000000000c RSI: 00002000000000c0 RDI: 000000000000000a [ 154.481280][ T6781] RBP: 00007fdb7081c090 R08: 0000000000000000 R09: 0000000000000000 [ 154.489272][ T6781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.497262][ T6781] R13: 00007fdb71feb038 R14: 00007fdb71feafa0 R15: 00007ffff9963778 [ 154.505250][ T6781] [ 154.508780][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.524798][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.559547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.570488][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.577590][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.587271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.595756][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.602803][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.652022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.662252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.671307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.695588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.706231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 154.721798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.754850][ T6732] device veth0_vlan entered promiscuous mode [ 154.801630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 154.821916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.874999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.882586][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.902895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.913618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.928503][ T6732] device veth1_macvtap entered promiscuous mode [ 155.083358][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.091890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.100331][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.108746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.117337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.180359][ T6818] FAULT_INJECTION: forcing a failure. [ 155.180359][ T6818] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.194421][ T6818] CPU: 0 PID: 6818 Comm: syz.2.2571 Not tainted syzkaller #0 [ 155.201822][ T6818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 155.211889][ T6818] Call Trace: [ 155.215180][ T6818] [ 155.218106][ T6818] __dump_stack+0x21/0x30 [ 155.222433][ T6818] dump_stack_lvl+0xee/0x150 [ 155.227022][ T6818] ? show_regs_print_info+0x20/0x20 [ 155.232259][ T6818] dump_stack+0x15/0x20 [ 155.236450][ T6818] should_fail+0x3c1/0x510 [ 155.240870][ T6818] should_fail_usercopy+0x1a/0x20 [ 155.245892][ T6818] _copy_to_user+0x20/0x90 [ 155.250303][ T6818] simple_read_from_buffer+0xe9/0x160 [ 155.255700][ T6818] proc_fail_nth_read+0x19a/0x210 [ 155.260720][ T6818] ? proc_fault_inject_write+0x2f0/0x2f0 [ 155.266353][ T6818] ? security_file_permission+0x83/0xa0 [ 155.271891][ T6818] ? proc_fault_inject_write+0x2f0/0x2f0 [ 155.277530][ T6818] vfs_read+0x282/0xbe0 [ 155.281696][ T6818] ? __kasan_check_write+0x14/0x20 [ 155.286801][ T6818] ? kernel_read+0x1f0/0x1f0 [ 155.291386][ T6818] ? __kasan_check_write+0x14/0x20 [ 155.296495][ T6818] ? mutex_lock+0x95/0x1a0 [ 155.300930][ T6818] ? wait_for_completion_killable_timeout+0x10/0x10 [ 155.307520][ T6818] ? __fget_files+0x2c4/0x320 [ 155.312197][ T6818] ? __fdget_pos+0x2d2/0x380 [ 155.316794][ T6818] ? ksys_read+0x71/0x240 [ 155.321137][ T6818] ksys_read+0x140/0x240 [ 155.325378][ T6818] ? vfs_write+0xf70/0xf70 [ 155.329788][ T6818] ? debug_smp_processor_id+0x17/0x20 [ 155.335156][ T6818] __x64_sys_read+0x7b/0x90 [ 155.339827][ T6818] x64_sys_call+0x96d/0x9a0 [ 155.344356][ T6818] do_syscall_64+0x4c/0xa0 [ 155.348773][ T6818] ? clear_bhb_loop+0x50/0xa0 [ 155.353443][ T6818] ? clear_bhb_loop+0x50/0xa0 [ 155.358129][ T6818] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 155.364022][ T6818] RIP: 0033:0x7efc9e1645fc [ 155.368434][ T6818] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 155.388031][ T6818] RSP: 002b:00007efc9cbce030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 155.396442][ T6818] RAX: ffffffffffffffda RBX: 00007efc9e39cfa0 RCX: 00007efc9e1645fc [ 155.404409][ T6818] RDX: 000000000000000f RSI: 00007efc9cbce0a0 RDI: 0000000000000005 [ 155.412392][ T6818] RBP: 00007efc9cbce090 R08: 0000000000000000 R09: 0000000000000000 [ 155.420361][ T6818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.428323][ T6818] R13: 00007efc9e39d038 R14: 00007efc9e39cfa0 R15: 00007ffc58ecb338 [ 155.436299][ T6818] [ 156.955164][ T5367] device bridge_slave_1 left promiscuous mode [ 156.961382][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.968921][ T5367] device bridge_slave_0 left promiscuous mode [ 156.975142][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.982933][ T5367] device veth1_macvtap left promiscuous mode [ 156.989106][ T5367] device veth0_vlan left promiscuous mode [ 157.618797][ T6855] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.630017][ T6855] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.638123][ T6855] device bridge_slave_0 entered promiscuous mode [ 157.717105][ T6855] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.734349][ T6855] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.747574][ T6855] device bridge_slave_1 entered promiscuous mode [ 157.988600][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.997989][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.016481][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.025552][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.071029][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.078141][ T5367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.085649][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.094071][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.102386][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.109457][ T5367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.130318][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.177873][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.190867][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.213214][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.222046][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.230958][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.238954][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.248220][ T6855] device veth0_vlan entered promiscuous mode [ 158.310536][ T6855] device veth1_macvtap entered promiscuous mode [ 158.332617][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.357532][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.412700][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.595093][ T359] device bridge_slave_1 left promiscuous mode [ 159.601241][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.608820][ T359] device bridge_slave_0 left promiscuous mode [ 159.615031][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.622797][ T359] device veth1_macvtap left promiscuous mode [ 159.628887][ T359] device veth0_vlan left promiscuous mode [ 160.450500][ T6918] device veth1_macvtap left promiscuous mode [ 160.472116][ T6925] device veth1_macvtap entered promiscuous mode [ 160.484226][ T6925] device macsec0 entered promiscuous mode [ 160.560585][ T6932] device veth0_vlan left promiscuous mode [ 160.566815][ T6932] device veth0_vlan entered promiscuous mode [ 160.603438][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.611981][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.619926][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.735182][ T6930] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.752586][ T6930] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.773580][ T6930] device bridge_slave_0 entered promiscuous mode [ 160.803531][ T30] audit: type=1400 audit(1757087410.001:148): avc: denied { create } for pid=6950 comm="syz.3.2610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 160.834737][ T6930] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.841783][ T6930] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.875091][ T6930] device bridge_slave_1 entered promiscuous mode [ 161.010911][ T6958] device pim6reg1 entered promiscuous mode [ 161.163751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.171389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.202633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.215725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.224130][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.231192][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.255385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.271543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.285365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.293617][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.301042][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.321019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.331593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.346915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.359624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.368020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.376962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.385894][ T6930] device veth0_vlan entered promiscuous mode [ 161.403279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.413148][ T6930] device veth1_macvtap entered promiscuous mode [ 161.428077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.440272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.596845][ T7001] FAULT_INJECTION: forcing a failure. [ 161.596845][ T7001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 161.609960][ T7001] CPU: 0 PID: 7001 Comm: syz.2.2624 Not tainted syzkaller #0 [ 161.617399][ T7001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 161.627471][ T7001] Call Trace: [ 161.630766][ T7001] [ 161.633711][ T7001] __dump_stack+0x21/0x30 [ 161.638065][ T7001] dump_stack_lvl+0xee/0x150 [ 161.642676][ T7001] ? show_regs_print_info+0x20/0x20 [ 161.647896][ T7001] ? __activate_page+0xd40/0xd40 [ 161.652852][ T7001] dump_stack+0x15/0x20 [ 161.657029][ T7001] should_fail+0x3c1/0x510 [ 161.661470][ T7001] should_fail_usercopy+0x1a/0x20 [ 161.666516][ T7001] copy_page_from_iter_atomic+0x3fb/0x1350 [ 161.672352][ T7001] ? pipe_zero+0x370/0x370 [ 161.676805][ T7001] generic_perform_write+0x307/0x670 [ 161.682111][ T7001] ? grab_cache_page_write_begin+0xb0/0xb0 [ 161.687951][ T7001] ? file_remove_privs+0x590/0x590 [ 161.693102][ T7001] ? rwsem_write_trylock+0x130/0x300 [ 161.698430][ T7001] ? clear_nonspinnable+0x60/0x60 [ 161.703485][ T7001] ? avc_policy_seqno+0x1b/0x70 [ 161.708355][ T7001] __generic_file_write_iter+0x268/0x480 [ 161.714016][ T7001] generic_file_write_iter+0xa9/0x1d0 [ 161.719414][ T7001] vfs_write+0x802/0xf70 [ 161.723681][ T7001] ? file_end_write+0x1b0/0x1b0 [ 161.728558][ T7001] ? wait_for_completion_killable_timeout+0x10/0x10 [ 161.735180][ T7001] ? __fget_files+0x2c4/0x320 [ 161.739886][ T7001] ? __fdget_pos+0x2d2/0x380 [ 161.744498][ T7001] ? ksys_write+0x71/0x240 [ 161.748932][ T7001] ksys_write+0x140/0x240 [ 161.753296][ T7001] ? __ia32_sys_read+0x90/0x90 [ 161.758093][ T7001] ? __bpf_trace_sys_enter+0x62/0x70 [ 161.763413][ T7001] __x64_sys_write+0x7b/0x90 [ 161.768024][ T7001] x64_sys_call+0x8ef/0x9a0 [ 161.772551][ T7001] do_syscall_64+0x4c/0xa0 [ 161.776989][ T7001] ? clear_bhb_loop+0x50/0xa0 [ 161.781691][ T7001] ? clear_bhb_loop+0x50/0xa0 [ 161.786405][ T7001] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.792321][ T7001] RIP: 0033:0x7efc9e165be9 [ 161.796756][ T7001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.816390][ T7001] RSP: 002b:00007efc9cbce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 161.824833][ T7001] RAX: ffffffffffffffda RBX: 00007efc9e39cfa0 RCX: 00007efc9e165be9 [ 161.832831][ T7001] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 161.840826][ T7001] RBP: 00007efc9cbce090 R08: 0000000000000000 R09: 0000000000000000 [ 161.848824][ T7001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.856815][ T7001] R13: 00007efc9e39d038 R14: 00007efc9e39cfa0 R15: 00007ffc58ecb338 [ 161.864829][ T7001] [ 162.585515][ T3549] device bridge_slave_1 left promiscuous mode [ 162.591737][ T3549] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.599580][ T3549] device bridge_slave_0 left promiscuous mode [ 162.607895][ T3549] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.615875][ T3549] device veth1_macvtap left promiscuous mode [ 162.621890][ T3549] device veth0_vlan left promiscuous mode [ 163.748398][ T30] audit: type=1400 audit(1757087412.951:149): avc: denied { read } for pid=7021 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 163.852130][ T30] audit: type=1400 audit(1757087412.951:150): avc: denied { open } for pid=7021 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 164.105058][ T7021] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.135337][ T7021] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.142790][ T7021] device bridge_slave_0 entered promiscuous mode [ 164.220743][ T7021] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.236918][ T7021] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.262263][ T7021] device bridge_slave_1 entered promiscuous mode [ 164.759772][ T7041] device wg2 entered promiscuous mode [ 164.900416][ T7052] bond_slave_1: mtu less than device minimum [ 165.021576][ T7021] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.028716][ T7021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.036209][ T7021] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.043250][ T7021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.441844][ T5367] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.449470][ T5367] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.449693][ T7068] FAULT_INJECTION: forcing a failure. [ 165.449693][ T7068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 165.469871][ T7068] CPU: 0 PID: 7068 Comm: syz.4.2643 Not tainted syzkaller #0 [ 165.477250][ T7068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 165.487319][ T7068] Call Trace: [ 165.490607][ T7068] [ 165.493542][ T7068] __dump_stack+0x21/0x30 [ 165.497882][ T7068] dump_stack_lvl+0xee/0x150 [ 165.502476][ T7068] ? show_regs_print_info+0x20/0x20 [ 165.507677][ T7068] ? __activate_page+0xd40/0xd40 [ 165.512616][ T7068] dump_stack+0x15/0x20 [ 165.516786][ T7068] should_fail+0x3c1/0x510 [ 165.521203][ T7068] should_fail_usercopy+0x1a/0x20 [ 165.526230][ T7068] copy_page_from_iter_atomic+0x3fb/0x1350 [ 165.532046][ T7068] ? pipe_zero+0x370/0x370 [ 165.536491][ T7068] generic_perform_write+0x307/0x670 [ 165.541977][ T7068] ? grab_cache_page_write_begin+0xb0/0xb0 [ 165.547804][ T7068] ? file_remove_privs+0x590/0x590 [ 165.552942][ T7068] ? rwsem_write_trylock+0x130/0x300 [ 165.558257][ T7068] ? clear_nonspinnable+0x60/0x60 [ 165.563302][ T7068] ? avc_policy_seqno+0x1b/0x70 [ 165.568181][ T7068] __generic_file_write_iter+0x268/0x480 [ 165.573841][ T7068] generic_file_write_iter+0xa9/0x1d0 [ 165.579237][ T7068] vfs_write+0x802/0xf70 [ 165.583500][ T7068] ? file_end_write+0x1b0/0x1b0 [ 165.588407][ T7068] ? wait_for_completion_killable_timeout+0x10/0x10 [ 165.595044][ T7068] ? __fget_files+0x2c4/0x320 [ 165.599755][ T7068] ? __fdget_pos+0x2d2/0x380 [ 165.604381][ T7068] ? ksys_write+0x71/0x240 [ 165.608825][ T7068] ksys_write+0x140/0x240 [ 165.613174][ T7068] ? __ia32_sys_read+0x90/0x90 [ 165.617953][ T7068] ? debug_smp_processor_id+0x17/0x20 [ 165.623351][ T7068] __x64_sys_write+0x7b/0x90 [ 165.627945][ T7068] x64_sys_call+0x8ef/0x9a0 [ 165.632459][ T7068] do_syscall_64+0x4c/0xa0 [ 165.636881][ T7068] ? clear_bhb_loop+0x50/0xa0 [ 165.641569][ T7068] ? clear_bhb_loop+0x50/0xa0 [ 165.646264][ T7068] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.652164][ T7068] RIP: 0033:0x7fc8ea743be9 [ 165.656586][ T7068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.676194][ T7068] RSP: 002b:00007fc8e91ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 165.684615][ T7068] RAX: ffffffffffffffda RBX: 00007fc8ea97afa0 RCX: 00007fc8ea743be9 [ 165.692593][ T7068] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 165.700578][ T7068] RBP: 00007fc8e91ac090 R08: 0000000000000000 R09: 0000000000000000 [ 165.708591][ T7068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.716574][ T7068] R13: 00007fc8ea97b038 R14: 00007fc8ea97afa0 R15: 00007ffe638965b8 [ 165.724569][ T7068] [ 165.813182][ T7077] device pim6reg1 entered promiscuous mode [ 165.868734][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.888893][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.911045][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.925092][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.943170][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.950290][ T5367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.961022][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.972446][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.981049][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.988132][ T5367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.029896][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.039600][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.048525][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.089028][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.116374][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.125355][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.138391][ T7021] device veth0_vlan entered promiscuous mode [ 166.145354][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.205307][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.261794][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.275367][ T7101] syz.2.2655 uses obsolete (PF_INET,SOCK_PACKET) [ 166.323122][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.443576][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.452107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.461803][ T7021] device veth1_macvtap entered promiscuous mode [ 166.514908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.532186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.570980][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.614934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.650075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.673035][ T7106] device sit0 entered promiscuous mode [ 166.681511][ T7116] FAULT_INJECTION: forcing a failure. [ 166.681511][ T7116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.694733][ T7116] CPU: 0 PID: 7116 Comm: syz.4.2660 Not tainted syzkaller #0 [ 166.702132][ T7116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 166.712204][ T7116] Call Trace: [ 166.715512][ T7116] [ 166.718456][ T7116] __dump_stack+0x21/0x30 [ 166.722820][ T7116] dump_stack_lvl+0xee/0x150 [ 166.727435][ T7116] ? show_regs_print_info+0x20/0x20 [ 166.732678][ T7116] ? __activate_page+0xd40/0xd40 [ 166.737643][ T7116] dump_stack+0x15/0x20 [ 166.741818][ T7116] should_fail+0x3c1/0x510 [ 166.746254][ T7116] should_fail_usercopy+0x1a/0x20 [ 166.751297][ T7116] copy_page_from_iter_atomic+0x3fb/0x1350 [ 166.757171][ T7116] ? pipe_zero+0x370/0x370 [ 166.761614][ T7116] generic_perform_write+0x307/0x670 [ 166.766957][ T7116] ? grab_cache_page_write_begin+0xb0/0xb0 [ 166.772796][ T7116] ? file_remove_privs+0x590/0x590 [ 166.777927][ T7116] ? rwsem_write_trylock+0x130/0x300 [ 166.783241][ T7116] ? clear_nonspinnable+0x60/0x60 [ 166.788299][ T7116] ? avc_policy_seqno+0x1b/0x70 [ 166.793172][ T7116] __generic_file_write_iter+0x268/0x480 [ 166.798825][ T7116] generic_file_write_iter+0xa9/0x1d0 [ 166.804214][ T7116] vfs_write+0x802/0xf70 [ 166.808505][ T7116] ? file_end_write+0x1b0/0x1b0 [ 166.813379][ T7116] ? wait_for_completion_killable_timeout+0x10/0x10 [ 166.819980][ T7116] ? __fget_files+0x2c4/0x320 [ 166.824687][ T7116] ? __fdget_pos+0x2d2/0x380 [ 166.829290][ T7116] ? ksys_write+0x71/0x240 [ 166.833718][ T7116] ksys_write+0x140/0x240 [ 166.838064][ T7116] ? __ia32_sys_read+0x90/0x90 [ 166.842840][ T7116] ? debug_smp_processor_id+0x17/0x20 [ 166.848239][ T7116] __x64_sys_write+0x7b/0x90 [ 166.852839][ T7116] x64_sys_call+0x8ef/0x9a0 [ 166.857347][ T7116] do_syscall_64+0x4c/0xa0 [ 166.861779][ T7116] ? clear_bhb_loop+0x50/0xa0 [ 166.866474][ T7116] ? clear_bhb_loop+0x50/0xa0 [ 166.871171][ T7116] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.877083][ T7116] RIP: 0033:0x7fc8ea743be9 [ 166.881519][ T7116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.901144][ T7116] RSP: 002b:00007fc8e91ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 166.909581][ T7116] RAX: ffffffffffffffda RBX: 00007fc8ea97afa0 RCX: 00007fc8ea743be9 [ 166.917573][ T7116] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 166.925542][ T7116] RBP: 00007fc8e91ac090 R08: 0000000000000000 R09: 0000000000000000 [ 166.933516][ T7116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.941492][ T7116] R13: 00007fc8ea97b038 R14: 00007fc8ea97afa0 R15: 00007ffe638965b8 [ 166.949476][ T7116] [ 167.080859][ T7118] syz.4.2661[7118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.080953][ T7118] syz.4.2661[7118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.676038][ T8] device bridge_slave_1 left promiscuous mode [ 167.693774][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.701848][ T8] device bridge_slave_0 left promiscuous mode [ 167.708216][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.716720][ T8] device veth1_macvtap left promiscuous mode [ 167.722817][ T8] device veth0_vlan left promiscuous mode [ 169.197330][ T7131] FAULT_INJECTION: forcing a failure. [ 169.197330][ T7131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.210449][ T7131] CPU: 0 PID: 7131 Comm: syz.4.2666 Not tainted syzkaller #0 [ 169.217858][ T7131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 169.227926][ T7131] Call Trace: [ 169.231217][ T7131] [ 169.234167][ T7131] __dump_stack+0x21/0x30 [ 169.238508][ T7131] dump_stack_lvl+0xee/0x150 [ 169.243104][ T7131] ? show_regs_print_info+0x20/0x20 [ 169.248479][ T7131] ? __activate_page+0xd40/0xd40 [ 169.253432][ T7131] dump_stack+0x15/0x20 [ 169.257601][ T7131] should_fail+0x3c1/0x510 [ 169.262027][ T7131] should_fail_usercopy+0x1a/0x20 [ 169.267057][ T7131] copy_page_from_iter_atomic+0x3fb/0x1350 [ 169.272873][ T7131] ? pipe_zero+0x370/0x370 [ 169.277300][ T7131] generic_perform_write+0x307/0x670 [ 169.282596][ T7131] ? grab_cache_page_write_begin+0xb0/0xb0 [ 169.288411][ T7131] ? file_remove_privs+0x590/0x590 [ 169.293525][ T7131] ? rwsem_write_trylock+0x130/0x300 [ 169.298809][ T7131] ? clear_nonspinnable+0x60/0x60 [ 169.303836][ T7131] ? avc_policy_seqno+0x1b/0x70 [ 169.308685][ T7131] __generic_file_write_iter+0x268/0x480 [ 169.314317][ T7131] generic_file_write_iter+0xa9/0x1d0 [ 169.319689][ T7131] vfs_write+0x802/0xf70 [ 169.323944][ T7131] ? file_end_write+0x1b0/0x1b0 [ 169.328798][ T7131] ? wait_for_completion_killable_timeout+0x10/0x10 [ 169.335386][ T7131] ? __fget_files+0x2c4/0x320 [ 169.340068][ T7131] ? __fdget_pos+0x2d2/0x380 [ 169.344774][ T7131] ? ksys_write+0x71/0x240 [ 169.349192][ T7131] ksys_write+0x140/0x240 [ 169.353518][ T7131] ? __ia32_sys_read+0x90/0x90 [ 169.358474][ T7131] ? debug_smp_processor_id+0x17/0x20 [ 169.363871][ T7131] __x64_sys_write+0x7b/0x90 [ 169.368546][ T7131] x64_sys_call+0x8ef/0x9a0 [ 169.373050][ T7131] do_syscall_64+0x4c/0xa0 [ 169.377467][ T7131] ? clear_bhb_loop+0x50/0xa0 [ 169.382169][ T7131] ? clear_bhb_loop+0x50/0xa0 [ 169.386848][ T7131] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 169.392745][ T7131] RIP: 0033:0x7fc8ea743be9 [ 169.397160][ T7131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.416872][ T7131] RSP: 002b:00007fc8e91ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 169.425315][ T7131] RAX: ffffffffffffffda RBX: 00007fc8ea97afa0 RCX: 00007fc8ea743be9 [ 169.433303][ T7131] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 169.441293][ T7131] RBP: 00007fc8e91ac090 R08: 0000000000000000 R09: 0000000000000000 [ 169.449265][ T7131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.457234][ T7131] R13: 00007fc8ea97b038 R14: 00007fc8ea97afa0 R15: 00007ffe638965b8 [ 169.465243][ T7131] [ 169.531516][ T7141] device syzkaller0 entered promiscuous mode [ 169.583148][ T7144] device syzkaller0 entered promiscuous mode [ 169.653172][ T7137] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.660435][ T7137] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.668063][ T7137] device bridge_slave_0 entered promiscuous mode [ 169.680698][ T7137] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.689370][ T7137] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.697198][ T7137] device bridge_slave_1 entered promiscuous mode [ 169.719279][ T7156] FAULT_INJECTION: forcing a failure. [ 169.719279][ T7156] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.732403][ T7156] CPU: 1 PID: 7156 Comm: syz.4.2672 Not tainted syzkaller #0 [ 169.739877][ T7156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 169.750020][ T7156] Call Trace: [ 169.753313][ T7156] [ 169.756243][ T7156] __dump_stack+0x21/0x30 [ 169.760570][ T7156] dump_stack_lvl+0xee/0x150 [ 169.765156][ T7156] ? show_regs_print_info+0x20/0x20 [ 169.770376][ T7156] ? __activate_page+0xd40/0xd40 [ 169.775408][ T7156] dump_stack+0x15/0x20 [ 169.779590][ T7156] should_fail+0x3c1/0x510 [ 169.784029][ T7156] should_fail_usercopy+0x1a/0x20 [ 169.789081][ T7156] copy_page_from_iter_atomic+0x3fb/0x1350 [ 169.794921][ T7156] ? pipe_zero+0x370/0x370 [ 169.799371][ T7156] generic_perform_write+0x307/0x670 [ 169.804691][ T7156] ? grab_cache_page_write_begin+0xb0/0xb0 [ 169.810526][ T7156] ? file_remove_privs+0x590/0x590 [ 169.815753][ T7156] ? rwsem_write_trylock+0x130/0x300 [ 169.821063][ T7156] ? clear_nonspinnable+0x60/0x60 [ 169.826113][ T7156] ? avc_policy_seqno+0x1b/0x70 [ 169.830992][ T7156] __generic_file_write_iter+0x268/0x480 [ 169.836665][ T7156] generic_file_write_iter+0xa9/0x1d0 [ 169.842073][ T7156] vfs_write+0x802/0xf70 [ 169.846360][ T7156] ? file_end_write+0x1b0/0x1b0 [ 169.851235][ T7156] ? wait_for_completion_killable_timeout+0x10/0x10 [ 169.857845][ T7156] ? __fget_files+0x2c4/0x320 [ 169.862554][ T7156] ? __fdget_pos+0x2d2/0x380 [ 169.867181][ T7156] ? ksys_write+0x71/0x240 [ 169.871613][ T7156] ksys_write+0x140/0x240 [ 169.875970][ T7156] ? __ia32_sys_read+0x90/0x90 [ 169.880756][ T7156] ? debug_smp_processor_id+0x17/0x20 [ 169.886151][ T7156] __x64_sys_write+0x7b/0x90 [ 169.890769][ T7156] x64_sys_call+0x8ef/0x9a0 [ 169.895292][ T7156] do_syscall_64+0x4c/0xa0 [ 169.899725][ T7156] ? clear_bhb_loop+0x50/0xa0 [ 169.904422][ T7156] ? clear_bhb_loop+0x50/0xa0 [ 169.909114][ T7156] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 169.915030][ T7156] RIP: 0033:0x7fc8ea743be9 [ 169.919456][ T7156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.939081][ T7156] RSP: 002b:00007fc8e91ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 169.947519][ T7156] RAX: ffffffffffffffda RBX: 00007fc8ea97afa0 RCX: 00007fc8ea743be9 [ 169.955508][ T7156] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 169.963495][ T7156] RBP: 00007fc8e91ac090 R08: 0000000000000000 R09: 0000000000000000 [ 169.971487][ T7156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.979467][ T7156] R13: 00007fc8ea97b038 R14: 00007fc8ea97afa0 R15: 00007ffe638965b8 [ 169.987460][ T7156] [ 170.193952][ T7169] syz.3.2677[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.194020][ T7169] syz.3.2677[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.405884][ T7137] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.424369][ T7137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.431750][ T7137] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.438969][ T7137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.746463][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.760673][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.049378][ T7194] device syzkaller0 entered promiscuous mode [ 171.183119][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.190743][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.219063][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.227505][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.235994][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.243041][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.269077][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.277472][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.286151][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.293217][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.421853][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.434842][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.541203][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.549593][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.632607][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.641426][ T7206] FAULT_INJECTION: forcing a failure. [ 171.641426][ T7206] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.642011][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.654545][ T7206] CPU: 0 PID: 7206 Comm: syz.4.2686 Not tainted syzkaller #0 [ 171.654572][ T7206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 171.680132][ T7206] Call Trace: [ 171.683418][ T7206] [ 171.686446][ T7206] __dump_stack+0x21/0x30 [ 171.690780][ T7206] dump_stack_lvl+0xee/0x150 [ 171.695376][ T7206] ? show_regs_print_info+0x20/0x20 [ 171.700589][ T7206] ? __activate_page+0xd40/0xd40 [ 171.705522][ T7206] ? mntput_no_expire+0xfb/0x6c0 [ 171.710455][ T7206] dump_stack+0x15/0x20 [ 171.714613][ T7206] should_fail+0x3c1/0x510 [ 171.719194][ T7206] should_fail_usercopy+0x1a/0x20 [ 171.724239][ T7206] copy_page_from_iter_atomic+0x3fb/0x1350 [ 171.730060][ T7206] ? pipe_zero+0x370/0x370 [ 171.734493][ T7206] generic_perform_write+0x307/0x670 [ 171.739791][ T7206] ? grab_cache_page_write_begin+0xb0/0xb0 [ 171.745681][ T7206] ? file_remove_privs+0x590/0x590 [ 171.750825][ T7206] ? rwsem_write_trylock+0x130/0x300 [ 171.756102][ T7206] ? putname+0x111/0x160 [ 171.760338][ T7206] ? clear_nonspinnable+0x60/0x60 [ 171.765362][ T7206] ? avc_policy_seqno+0x1b/0x70 [ 171.770220][ T7206] __generic_file_write_iter+0x268/0x480 [ 171.775850][ T7206] generic_file_write_iter+0xa9/0x1d0 [ 171.781215][ T7206] vfs_write+0x802/0xf70 [ 171.785474][ T7206] ? file_end_write+0x1b0/0x1b0 [ 171.790335][ T7206] ? wait_for_completion_killable_timeout+0x10/0x10 [ 171.796933][ T7206] ? __fget_files+0x2c4/0x320 [ 171.801621][ T7206] ? __fdget_pos+0x2d2/0x380 [ 171.806299][ T7206] ? ksys_write+0x71/0x240 [ 171.810740][ T7206] ksys_write+0x140/0x240 [ 171.815061][ T7206] ? __ia32_sys_read+0x90/0x90 [ 171.819813][ T7206] ? debug_smp_processor_id+0x17/0x20 [ 171.825200][ T7206] __x64_sys_write+0x7b/0x90 [ 171.829788][ T7206] x64_sys_call+0x8ef/0x9a0 [ 171.834303][ T7206] do_syscall_64+0x4c/0xa0 [ 171.838710][ T7206] ? clear_bhb_loop+0x50/0xa0 [ 171.843394][ T7206] ? clear_bhb_loop+0x50/0xa0 [ 171.848067][ T7206] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.853961][ T7206] RIP: 0033:0x7fc8ea743be9 [ 171.858364][ T7206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.878007][ T7206] RSP: 002b:00007fc8e91ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 171.886414][ T7206] RAX: ffffffffffffffda RBX: 00007fc8ea97afa0 RCX: 00007fc8ea743be9 [ 171.894380][ T7206] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 171.902338][ T7206] RBP: 00007fc8e91ac090 R08: 0000000000000000 R09: 0000000000000000 [ 171.910300][ T7206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.918267][ T7206] R13: 00007fc8ea97b038 R14: 00007fc8ea97afa0 R15: 00007ffe638965b8 [ 171.926263][ T7206] [ 171.963007][ T7208] FAULT_INJECTION: forcing a failure. [ 171.963007][ T7208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.976203][ T7208] CPU: 1 PID: 7208 Comm: syz.4.2687 Not tainted syzkaller #0 [ 171.983570][ T7208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 171.993639][ T7208] Call Trace: [ 171.996915][ T7208] [ 171.999842][ T7208] __dump_stack+0x21/0x30 [ 172.004181][ T7208] dump_stack_lvl+0xee/0x150 [ 172.008764][ T7208] ? show_regs_print_info+0x20/0x20 [ 172.013954][ T7208] ? __activate_page+0xd40/0xd40 [ 172.018885][ T7208] dump_stack+0x15/0x20 [ 172.023033][ T7208] should_fail+0x3c1/0x510 [ 172.027441][ T7208] should_fail_usercopy+0x1a/0x20 [ 172.032457][ T7208] copy_page_from_iter_atomic+0x3fb/0x1350 [ 172.038261][ T7208] ? pipe_zero+0x370/0x370 [ 172.042692][ T7208] generic_perform_write+0x307/0x670 [ 172.047974][ T7208] ? grab_cache_page_write_begin+0xb0/0xb0 [ 172.053774][ T7208] ? file_remove_privs+0x590/0x590 [ 172.058875][ T7208] ? rwsem_write_trylock+0x130/0x300 [ 172.064149][ T7208] ? putname+0x111/0x160 [ 172.068380][ T7208] ? clear_nonspinnable+0x60/0x60 [ 172.073392][ T7208] ? avc_policy_seqno+0x1b/0x70 [ 172.078239][ T7208] __generic_file_write_iter+0x268/0x480 [ 172.083865][ T7208] generic_file_write_iter+0xa9/0x1d0 [ 172.089230][ T7208] vfs_write+0x802/0xf70 [ 172.093466][ T7208] ? file_end_write+0x1b0/0x1b0 [ 172.098305][ T7208] ? wait_for_completion_killable_timeout+0x10/0x10 [ 172.104883][ T7208] ? __fget_files+0x2c4/0x320 [ 172.109575][ T7208] ? __fdget_pos+0x2d2/0x380 [ 172.114189][ T7208] ? ksys_write+0x71/0x240 [ 172.118594][ T7208] ksys_write+0x140/0x240 [ 172.122915][ T7208] ? __ia32_sys_read+0x90/0x90 [ 172.127673][ T7208] ? debug_smp_processor_id+0x17/0x20 [ 172.133055][ T7208] __x64_sys_write+0x7b/0x90 [ 172.137633][ T7208] x64_sys_call+0x8ef/0x9a0 [ 172.142234][ T7208] do_syscall_64+0x4c/0xa0 [ 172.146644][ T7208] ? clear_bhb_loop+0x50/0xa0 [ 172.151318][ T7208] ? clear_bhb_loop+0x50/0xa0 [ 172.155987][ T7208] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.161871][ T7208] RIP: 0033:0x7fc8ea743be9 [ 172.166286][ T7208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.185899][ T7208] RSP: 002b:00007fc8e91ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 172.194322][ T7208] RAX: ffffffffffffffda RBX: 00007fc8ea97afa0 RCX: 00007fc8ea743be9 [ 172.202296][ T7208] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 172.210265][ T7208] RBP: 00007fc8e91ac090 R08: 0000000000000000 R09: 0000000000000000 [ 172.218239][ T7208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.226210][ T7208] R13: 00007fc8ea97b038 R14: 00007fc8ea97afa0 R15: 00007ffe638965b8 [ 172.234188][ T7208] [ 172.243426][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.251977][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.277157][ T7137] device veth0_vlan entered promiscuous mode [ 172.289085][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.296730][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.357710][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.366480][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.399324][ T7137] device veth1_macvtap entered promiscuous mode [ 172.636095][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.643982][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.652312][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.660851][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.669493][ T5367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=1968 state=3 status=67 (errno 32: Broken pipe) [ 173.003934][ T30] audit: type=1400 audit(1757087422.201:151): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14102]" dev="pipefs" ino=14102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 174.595397][ T8] device bridge_slave_1 left promiscuous mode [ 174.601539][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.609150][ T8] device bridge_slave_0 left promiscuous mode [ 174.615365][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.623300][ T8] device veth1_macvtap left promiscuous mode [ 174.629498][ T8] device veth0_vlan left promiscuous mode [ 176.277000][ T8] device veth0_vlan left promiscuous mode [ 176.283058][ T8] device veth1_macvtap left promiscuous mode [ 176.289147][ T8] device veth0_vlan left promiscuous mode [ 178.595350][ T8] device veth1_macvtap left promiscuous mode