last executing test programs: 24.928926364s ago: executing program 1 (id=5725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 22.171186231s ago: executing program 1 (id=5725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 17.533702981s ago: executing program 1 (id=5725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13.832868174s ago: executing program 1 (id=5725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10.181277045s ago: executing program 1 (id=5725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.689180827s ago: executing program 1 (id=5725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.22668516s ago: executing program 0 (id=6088): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4000004) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x11, 0x7ae, 0x4, 0x0, 0x880, 0xffffffffffffffff, 0x2975, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001", @ANYRES64], 0xfdef) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r4}, 0x8) 2.02031125s ago: executing program 2 (id=6093): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000d30000000800000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r1}, &(0x7f0000000040), &(0x7f0000000940)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000540)="c70f625598f3ec879376c3ca5090d1", 0x0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0xa0380, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x5, 0x8, 0xf}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r3}, 0xc) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x4854, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2}}]}}, 0x0, 0x32}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="850000000f0000009500000000000000141dea02fed2b50f0af040050ea87da2f56bcaf5f4f51b1034a5cc3f7c69da721e2fd23097996dce4a7e37bb8c9a8a86ec403f601d8c2178694eccc938eab450c164c46f650e7c7ff5af63f9b3b4df045a30a2143f811bbb0c7aa1"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r5}, 0x18) r6 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70a0000000000008500000095000000b7000000000000009500000000002d00"], &(0x7f0000000200)='GPL\x00', 0x2, 0x1007, &(0x7f0000000440)=""/4103, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb}, 0x24) 1.841671439s ago: executing program 2 (id=6098): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) mkdir(0x0, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6c69f68dc1cf3e78, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0xfffffffffffffcc0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa0}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair(0x1a, 0xa, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) 1.480820637s ago: executing program 4 (id=6099): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x18050, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e0a, 0x1, @perf_bp={0x0, 0x3}, 0x1216, 0x10000, 0x5, 0x6, 0x8, 0x7, 0x3, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000600000791090000000000007000000002000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3f}, 0x48) 1.480508286s ago: executing program 4 (id=6100): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x7f}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r2, 0x0, 0x0}, 0x10) 1.480047116s ago: executing program 4 (id=6101): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xfffffffffffffe45) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400003f000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) 1.4092592s ago: executing program 3 (id=6102): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) 1.357279183s ago: executing program 4 (id=6103): bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 1.300883506s ago: executing program 3 (id=6104): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="b70000008100003bbfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105400000000001d400500000000004704000001ed00000f030000000000001d440000000000006b0a00fe000000007313000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff31a8fd3c0fd8b7ff831028e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646c0200000000000000020000e35208b0bb0d2cd829e654400e2438ec649dc76128610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda82fc9c4d7ecc7a803bf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714f62ba7a54f0c33d39000d0bfed3a6a59ff616236fd8f2477184bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06fa2e04cfe0649226c697d9e8eaade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00023ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a83469620c6e74e1f46132559c4f8700a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88f15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a920099c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40fc5d2f55ff07c53147de202ce517b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661061173f359e9052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff26b61aac8aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3ba18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e26534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336dfaa6d5d164301190bc2d4c04087729033342045804a28082abc3b4762302a271722fb515f31e0dd115a292f1e68481a62c49d15ea5460a29c60b1058fb7aa9bf4ee3cbe11b03711a15d730646b72d074dab1e8c429339f3460d324c17a4a8bfc7d7eab45bef00664d6dc82300000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000040)=r0) close(0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x7, 0x0, 0x200000, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40200000000000063910800000000000500000000000000950074ba65f1418d"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x21) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000680), 0xb50, r2}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4, r2}, 0xc) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) 1.300202166s ago: executing program 2 (id=6105): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0xfdef}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x808e, 0x300}, 0x40002002) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071182b000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.300053246s ago: executing program 0 (id=6106): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1.245049258s ago: executing program 0 (id=6107): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xd6}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x0, 0x1}, 0x50) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0004f678ec630000000066"], 0xd) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x8202) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_ttl={{0x14, 0x0, 0x2, 0xcb}}], 0x18}, 0x40) syz_clone(0x11000000, &(0x7f0000000680)="3fa6bd36439ba86928949f473e021bc2a6d5f8e0665df37f25d38d7be2a61f383919365e384e00f97d21852ae38c6a1b647c", 0x32, &(0x7f0000000740), &(0x7f0000000b00), &(0x7f0000000b40)="f9dec4f6779f2a47a73800316ab8534bb74a5a45bc99837ee2c16bbc9d2ae05e27f422b01d1cd64a0c3eda2bac4d6255f501f077d20daf48f1009b92688d1844742bdf49f4e2e0f00768b51ed65842255c747816a0ba7a3446d44d5fab3f66cda63c04ed4c615c8694d839c76172d8f36fa31619e1a348a54a6fb73ddd5d0cee260f30a85d8dd7dda31c6ff6cea01a1f9aaeafa4dbacf8544575e8") gettid() getpid() r7 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 523.577624ms ago: executing program 3 (id=6108): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xffb0}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x4000}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x600}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff13}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x9}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x5, 0x1, 0x7, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 432.774939ms ago: executing program 4 (id=6109): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000340)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000030000", @ANYRESDEC], 0xffdd) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x20) 409.74302ms ago: executing program 2 (id=6110): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000000000ff000000000000100085000000180000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095000000000000007f0cff0a196e6d57113f3eab28c85d691f724ad140108934a3e3efa560dc8db4700e191ff5f03fd7f83f6e1e9aaee2afc55f025e56e0ded37be12657f5e837cfc27b55"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x2f00, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 385.258331ms ago: executing program 0 (id=6111): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x241f, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002a0, 0x11, 0x0, &(0x7f00000002c0)="000000952ba300"/17, 0x0, 0x6639, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000}, 0x50) 340.678033ms ago: executing program 3 (id=6112): perf_event_open(&(0x7f0000000fc0)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={&(0x7f0000000400), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb5e}, 0x9000, 0x4, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x50) close(0x3) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x76}]}, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000078850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x9, 0x5, 0x7, 0xc1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x3f, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x54}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r5}, 0x38) syz_clone(0x83100000, &(0x7f0000000000)="d0996acbf5c6de1496ca535ac35388211a446ea38b9e9604e8d436344b54470def0610e6744bb20845f1cb2a3637b71ba960ff71a48cd26a84148b06e6", 0x3d, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140)="a3faa253f744b35eff508fed9b5e134ddd01f6ecba24720fcfebeb000305afa382fcb1be6befc48bebbcf9704ac220f8206d19e8aaddcd09ab083a3d856093b72c4ec5c90dd6dd17eb1f7251d0f345a320d7b376e89bc04f98954ccc09c22b35031e483c0ad140c33980513a74e04f432cbbac47a974d6ea45d50801f3802c880b52961f447529d34e55d040b22c9795aad802b94b55912d63c96579802e1cc44d1f032ff4fd5e3f10e8eda75e94096e4fb615cc39df3648d861f6a4544b7b") 340.494553ms ago: executing program 0 (id=6113): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="611534000000000061134c00000ffff0bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf67000000000000350607000fff07206706000002000000160300000ee60060bf050000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000005574d074fa7e93447a88c0fbab48660aae7cdf367ef0e4538279b6113de5b94e1056f443305145c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 328.559174ms ago: executing program 2 (id=6114): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000feffffffb7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b70500000800000085006800a7000000180100ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0x7}, 0x44, 0x5, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f0000000040), 0x4) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001040)='\'f', 0x2}], 0x1}, 0x4091) (async) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000001280), 0x4) (async) recvmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) (async) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) 295.785626ms ago: executing program 0 (id=6115): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000034f0e61000000000000000007000000bb7f1a007600feff000020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) 124.652134ms ago: executing program 2 (id=6116): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000580)={0x9, &(0x7f00000004c0)=[{0x0, 0xa, 0xf}, {0x5, 0xd, 0x93, 0x7fffffff}, {0x200, 0x3, 0x10, 0x8}, {0xfffd, 0x1, 0x4, 0x4}, {0x2, 0xff, 0xb1, 0x3}, {0x3, 0x1, 0x72, 0x9}, {0xe, 0x40, 0x39, 0x9}, {0xbe, 0x5, 0x8, 0x10}, {0x4, 0x6, 0x1, 0x6}]}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x54, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)="82fd52d7cd68672ea280d56f634eb9d833", 0x0}, 0x20) socketpair(0x1, 0x1, 0xa, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0}, 0xfffffffffffffceb) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360", @ANYRESDEC], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) 121.465914ms ago: executing program 3 (id=6117): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x44}, 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async, rerun: 64) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) (async) r3 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r5, &(0x7f0000000300), &(0x7f0000000380)=""/67}, 0x20) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0), &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0xdd, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x25, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xcc90, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x2}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbc, 0x0, 0x0, 0x0, 0xcf44}, @exit, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1719dea9, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0x5, &(0x7f0000000140)=""/5, 0x41100, 0x9, '\x00', r6, 0x0, r3, 0x8, &(0x7f0000000800)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x3, 0x6, 0x1}, 0x10, 0x24c2c, r2, 0x3, 0x0, &(0x7f0000000a80)=[{0x5, 0x5, 0xe, 0x3325f8898b47d99}, {0x2, 0x2, 0xf, 0x3}, {0x0, 0x2, 0xe, 0xb}], 0x10, 0xf}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000040000000f000000000000100c000000003030003d20334583d81efe9294025f3535d5ef8a115585746f44e7157c11136f5c4858c609e6fdc8ab7c67471c3ecd5d196661045a618ef38bba73288ea53423da9a522f11d692114c5bb213bcc87384aace181bb53a6be7f10f0b45b269b76c67a838a60315b205d275727f8dbf37313ace7aff3f138366ee224ed1c41c30748ee74c507ce9bcebe0ba440dcb42047df599e63252c2eef8ac6549bc7c4cf6fa4c44097d8a22dfba0ae5fba6adf299ff13d8e2ffb6151734ed9ad6030000000000000038d2"], &(0x7f00000004c0)=""/244, 0x28, 0xf4, 0x0, 0x200, 0x10000}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x8, 0x81, 0x1, 0x1, r1, 0x7a, '\x00', r6, r7, 0x7fff, 0x8000002, 0x5, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000880), 0x2, 0x0) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r12 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r11) socketpair(0x2b, 0xa, 0x80000000, &(0x7f0000000040)) 54.648948ms ago: executing program 4 (id=6118): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000780)={0x4, &(0x7f0000000600)=[{0x45, 0x0, 0x2, 0x2}, {0x45}, {0x2, 0x0, 0xd, 0x7}, {0x6}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x7, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0, @exit]}, &(0x7f0000000000)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x6, 0x0, &(0x7f00000002c0)="0000ffffffff", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x18, 0x3, 0x0, &(0x7f0000000280)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x25}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) 0s ago: executing program 3 (id=6119): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0xd, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000078850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6e5a, 0x4}}, 0x0, 0xffffffffffffffff, r2, 0x8) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x97, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, r4, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, r4, 0x0) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000010c0), 0x101000, 0x0) ioctl$TUNSETLINK(r8, 0x400454cd, 0x306) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000001040)=[0x0, 0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x51, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x50) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001700)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x7, '\x00', r9, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="150000001000000008"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x77) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r13}, &(0x7f0000000080)=0x2000000, &(0x7f0000000100)}, 0x20) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001780)={0x1b, 0x0, 0x0, 0x227c, 0x0, r7, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001880)={0x4, 0x22, &(0x7f0000001180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0x7, 0x4, 0x3, 0xffffffffffffffff, 0x4}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2248}, @generic={0x5, 0xc, 0x3, 0xb, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000012c0)='GPL\x00', 0x7, 0x8, &(0x7f0000001300)=""/8, 0x41100, 0x4, '\x00', 0x0, @fallback=0xc, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001640)={0x4, 0x6, 0x1, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000001800)=[0xffffffffffffffff, r12, r10, r13, r6, r1, r7, r7, r14, r1], &(0x7f0000001840)=[{0x3, 0x2, 0x3, 0x4}, {0x5, 0x5, 0x4, 0x6}, {0x3, 0x2, 0x6}], 0x10, 0x3}, 0x94) kernel console output (not intermixed with test programs): 00000000001 [ 458.784556][T13199] R13: 00007f2572646038 R14: 00007f2572645fa0 R15: 00007ffd4b96a908 [ 458.792602][T13199] [ 459.864464][T13241] device syzkaller0 entered promiscuous mode [ 461.592666][T13278] device syzkaller0 entered promiscuous mode [ 461.812540][T13289] device syzkaller0 entered promiscuous mode [ 462.088764][T13302] device syzkaller0 entered promiscuous mode [ 462.261525][T13311] device syzkaller0 entered promiscuous mode [ 462.743790][T13335] device syzkaller0 entered promiscuous mode [ 462.786355][T13339] FAULT_INJECTION: forcing a failure. [ 462.786355][T13339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.820628][T13339] CPU: 1 PID: 13339 Comm: syz.0.4609 Tainted: G W syzkaller #0 [ 462.829541][T13339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 462.839652][T13339] Call Trace: [ 462.842972][T13339] [ 462.845935][T13339] __dump_stack+0x21/0x30 [ 462.850310][T13339] dump_stack_lvl+0x110/0x170 [ 462.855390][T13339] ? show_regs_print_info+0x20/0x20 [ 462.860656][T13339] ? has_cap_mac_admin+0x370/0x370 [ 462.865824][T13339] dump_stack+0x15/0x20 [ 462.870020][T13339] should_fail+0x3c1/0x510 [ 462.874570][T13339] should_fail_usercopy+0x1a/0x20 [ 462.879831][T13339] _copy_from_user+0x20/0xd0 [ 462.884472][T13339] get_user_ifreq+0x6c/0x180 [ 462.889104][T13339] sock_ioctl+0x606/0x6e0 [ 462.893481][T13339] ? sock_poll+0x3f0/0x3f0 [ 462.897947][T13339] ? security_file_ioctl+0x84/0xa0 [ 462.903231][T13339] ? sock_poll+0x3f0/0x3f0 [ 462.907872][T13339] __se_sys_ioctl+0x121/0x1a0 [ 462.912779][T13339] __x64_sys_ioctl+0x7b/0x90 [ 462.917505][T13339] x64_sys_call+0x2f/0x9a0 [ 462.921973][T13339] do_syscall_64+0x4c/0xa0 [ 462.926565][T13339] ? clear_bhb_loop+0x50/0xa0 [ 462.931291][T13339] ? clear_bhb_loop+0x50/0xa0 [ 462.936095][T13339] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 462.942346][T13339] RIP: 0033:0x7fc3c5595799 [ 462.946803][T13339] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 462.966446][T13339] RSP: 002b:00007fc3c3ff0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.974911][T13339] RAX: ffffffffffffffda RBX: 00007fc3c580efa0 RCX: 00007fc3c5595799 [ 462.983018][T13339] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 462.991026][T13339] RBP: 00007fc3c3ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 462.999133][T13339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.007175][T13339] R13: 00007fc3c580f038 R14: 00007fc3c580efa0 R15: 00007ffe76c4bfd8 [ 463.015391][T13339] [ 463.185805][T13348] device syzkaller0 entered promiscuous mode [ 463.933651][T13376] device syzkaller0 entered promiscuous mode [ 464.016256][T13379] device syzkaller0 entered promiscuous mode [ 464.358507][T13391] device syzkaller0 entered promiscuous mode [ 464.846573][T13410] device syzkaller0 entered promiscuous mode [ 465.041435][T13419] device syzkaller0 entered promiscuous mode [ 465.077337][T13419] FAULT_INJECTION: forcing a failure. [ 465.077337][T13419] name failslab, interval 1, probability 0, space 0, times 0 [ 465.103970][T13421] device syzkaller0 entered promiscuous mode [ 465.111259][T13419] CPU: 1 PID: 13419 Comm: syz.3.4637 Tainted: G W syzkaller #0 [ 465.120172][T13419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 465.130257][T13419] Call Trace: [ 465.133574][T13419] [ 465.136616][T13419] __dump_stack+0x21/0x30 [ 465.141352][T13419] dump_stack_lvl+0x110/0x170 [ 465.146368][T13419] ? show_regs_print_info+0x20/0x20 [ 465.151729][T13419] dump_stack+0x15/0x20 [ 465.155938][T13419] should_fail+0x3c1/0x510 [ 465.160547][T13419] ? alloc_skb_with_frags+0xa8/0x620 [ 465.166324][T13419] __should_failslab+0xa4/0xe0 [ 465.171316][T13419] should_failslab+0x9/0x20 [ 465.175958][T13419] slab_pre_alloc_hook+0x3b/0xe0 [ 465.181038][T13419] ? alloc_skb_with_frags+0xa8/0x620 [ 465.186500][T13419] ? alloc_skb_with_frags+0xa8/0x620 [ 465.188009][T13423] device syzkaller0 entered promiscuous mode [ 465.191998][T13419] __kmalloc_track_caller+0x6c/0x2c0 [ 465.192028][T13419] ? alloc_skb_with_frags+0xa8/0x620 [ 465.192056][T13419] ? alloc_skb_with_frags+0xa8/0x620 [ 465.214707][T13419] __alloc_skb+0x21a/0x740 [ 465.219338][T13419] alloc_skb_with_frags+0xa8/0x620 [ 465.224706][T13419] sock_alloc_send_pskb+0x87f/0x9a0 [ 465.230114][T13419] ? sock_kzfree_s+0x60/0x60 [ 465.234761][T13419] ? iov_iter_advance+0x1f9/0x360 [ 465.239840][T13419] tun_get_user+0xb41/0x3400 [ 465.244484][T13419] ? kmem_cache_free+0xa0/0x320 [ 465.249374][T13419] ? putname+0x111/0x160 [ 465.253729][T13419] ? do_syscall_64+0x4c/0xa0 [ 465.258467][T13419] ? tun_do_read+0x1d30/0x1d30 [ 465.263340][T13419] ? kstrtouint_from_user+0x1c4/0x220 [ 465.268963][T13419] ? kstrtol_from_user+0x2a0/0x2a0 [ 465.274499][T13419] ? avc_policy_seqno+0x1b/0x70 [ 465.279618][T13419] ? selinux_file_permission+0x2aa/0x510 [ 465.285407][T13419] tun_chr_write_iter+0x1eb/0x2e0 [ 465.290460][T13419] vfs_write+0x835/0xfd0 [ 465.294736][T13419] ? file_end_write+0x1b0/0x1b0 [ 465.299609][T13419] ? __fget_files+0x2c4/0x320 [ 465.304425][T13419] ? __fdget_pos+0x1f7/0x380 [ 465.309588][T13419] ? ksys_write+0x71/0x250 [ 465.314349][T13419] ksys_write+0x149/0x250 [ 465.318895][T13419] ? __ia32_sys_read+0x90/0x90 [ 465.323698][T13419] ? debug_smp_processor_id+0x17/0x20 [ 465.329125][T13419] __x64_sys_write+0x7b/0x90 [ 465.333826][T13419] x64_sys_call+0x8ef/0x9a0 [ 465.338361][T13419] do_syscall_64+0x4c/0xa0 [ 465.342819][T13419] ? clear_bhb_loop+0x50/0xa0 [ 465.347510][T13419] ? clear_bhb_loop+0x50/0xa0 [ 465.352202][T13419] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 465.358378][T13419] RIP: 0033:0x7f8511c6b799 [ 465.362807][T13419] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 465.383420][T13419] RSP: 002b:00007f85106c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 465.392112][T13419] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 465.400106][T13419] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 000000000000000a [ 465.408092][T13419] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 465.416207][T13419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.424297][T13419] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 465.432419][T13419] [ 465.810109][T13441] device syzkaller0 entered promiscuous mode [ 466.169308][T13453] device syzkaller0 entered promiscuous mode [ 466.505385][T13452] device syzkaller0 entered promiscuous mode [ 466.633747][T13465] device syzkaller0 entered promiscuous mode [ 466.813673][T13473] device syzkaller0 entered promiscuous mode [ 466.841660][ T30] audit: type=1400 audit(1774361691.946:154): avc: denied { create } for pid=13476 comm="syz.4.4655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 467.082265][T13491] device syzkaller0 entered promiscuous mode [ 467.188712][T13500] device syzkaller0 entered promiscuous mode [ 467.352796][T13509] device syzkaller0 entered promiscuous mode [ 467.561147][T13513] device syzkaller0 entered promiscuous mode [ 467.658766][T13529] FAULT_INJECTION: forcing a failure. [ 467.658766][T13529] name failslab, interval 1, probability 0, space 0, times 0 [ 467.671839][T13529] CPU: 1 PID: 13529 Comm: syz.4.4675 Tainted: G W syzkaller #0 [ 467.680737][T13529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 467.690824][T13529] Call Trace: [ 467.694124][T13529] [ 467.697085][T13529] __dump_stack+0x21/0x30 [ 467.701448][T13529] dump_stack_lvl+0x110/0x170 [ 467.706338][T13529] ? show_regs_print_info+0x20/0x20 [ 467.711645][T13529] dump_stack+0x15/0x20 [ 467.716015][T13529] should_fail+0x3c1/0x510 [ 467.720554][T13529] __should_failslab+0xa4/0xe0 [ 467.725338][T13529] should_failslab+0x9/0x20 [ 467.729868][T13529] slab_pre_alloc_hook+0x3b/0xe0 [ 467.734831][T13529] ? vm_area_dup+0x26/0x210 [ 467.739350][T13529] kmem_cache_alloc+0x44/0x260 [ 467.744131][T13529] vm_area_dup+0x26/0x210 [ 467.748473][T13529] copy_mm+0x947/0x13c0 [ 467.752732][T13529] ? copy_signal+0x600/0x600 [ 467.757338][T13529] ? __init_rwsem+0xfc/0x1d0 [ 467.761939][T13529] ? copy_signal+0x4cb/0x600 [ 467.766541][T13529] copy_process+0x117c/0x3250 [ 467.771246][T13529] ? __kasan_check_write+0x14/0x20 [ 467.776473][T13529] ? __pidfd_prepare+0x150/0x150 [ 467.781748][T13529] kernel_clone+0x233/0x960 [ 467.786287][T13529] ? create_io_thread+0x170/0x170 [ 467.791326][T13529] ? __kasan_check_write+0x14/0x20 [ 467.796457][T13529] ? mutex_unlock+0x8f/0x230 [ 467.801069][T13529] __x64_sys_clone+0x198/0x210 [ 467.805852][T13529] ? __kasan_check_write+0x14/0x20 [ 467.810988][T13529] ? __ia32_sys_vfork+0x130/0x130 [ 467.816122][T13529] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 467.822208][T13529] x64_sys_call+0x41f/0x9a0 [ 467.826727][T13529] do_syscall_64+0x4c/0xa0 [ 467.831172][T13529] ? clear_bhb_loop+0x50/0xa0 [ 467.835947][T13529] ? clear_bhb_loop+0x50/0xa0 [ 467.840646][T13529] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 467.846569][T13529] RIP: 0033:0x7fe4eea7e799 [ 467.851016][T13529] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 467.870639][T13529] RSP: 002b:00007fe4ed4d8fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 467.879162][T13529] RAX: ffffffffffffffda RBX: 00007fe4eecf7fa0 RCX: 00007fe4eea7e799 [ 467.887246][T13529] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 467.895527][T13529] RBP: 00007fe4ed4d9090 R08: 0000000000000000 R09: 0000000000000000 [ 467.904123][T13529] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 467.912476][T13529] R13: 00007fe4eecf8038 R14: 00007fe4eecf7fa0 R15: 00007ffdf90f1c28 [ 467.921117][T13529] [ 467.946925][T13527] device syzkaller0 entered promiscuous mode [ 468.004060][T13532] device syzkaller0 entered promiscuous mode [ 468.132896][T13544] device syzkaller0 entered promiscuous mode [ 468.175380][T13549] device syzkaller0 entered promiscuous mode [ 468.953890][T13576] device syzkaller0 entered promiscuous mode [ 469.065786][T13581] device syzkaller0 entered promiscuous mode [ 469.645129][T13600] device syzkaller0 entered promiscuous mode [ 469.872980][T13612] device syzkaller0 entered promiscuous mode [ 469.945561][T13614] device syzkaller0 entered promiscuous mode [ 470.004128][T13616] device syzkaller0 entered promiscuous mode [ 470.013327][T13616] FAULT_INJECTION: forcing a failure. [ 470.013327][T13616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 470.026771][T13616] CPU: 0 PID: 13616 Comm: syz.4.4706 Tainted: G W syzkaller #0 [ 470.039109][T13616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 470.049799][T13616] Call Trace: [ 470.053096][T13616] [ 470.056037][T13616] __dump_stack+0x21/0x30 [ 470.060389][T13616] dump_stack_lvl+0x110/0x170 [ 470.065079][T13616] ? show_regs_print_info+0x20/0x20 [ 470.070477][T13616] ? __kasan_kmalloc+0xec/0x110 [ 470.075579][T13616] ? __kmalloc_track_caller+0x13c/0x2c0 [ 470.081157][T13616] ? __alloc_skb+0x21a/0x740 [ 470.085921][T13616] ? alloc_skb_with_frags+0xa8/0x620 [ 470.091473][T13616] ? tun_get_user+0xb41/0x3400 [ 470.096482][T13616] ? tun_chr_write_iter+0x1eb/0x2e0 [ 470.101784][T13616] ? vfs_write+0x835/0xfd0 [ 470.106310][T13616] ? ksys_write+0x149/0x250 [ 470.111020][T13616] dump_stack+0x15/0x20 [ 470.115203][T13616] should_fail+0x3c1/0x510 [ 470.119628][T13616] should_fail_alloc_page+0x55/0x80 [ 470.124838][T13616] prepare_alloc_pages+0x156/0x610 [ 470.129962][T13616] ? __alloc_pages_bulk+0xad0/0xad0 [ 470.135206][T13616] __alloc_pages+0x11d/0x460 [ 470.140104][T13616] ? prep_new_page+0x110/0x110 [ 470.145405][T13616] ? __alloc_skb+0x463/0x740 [ 470.150564][T13616] alloc_skb_with_frags+0x20c/0x620 [ 470.155922][T13616] sock_alloc_send_pskb+0x87f/0x9a0 [ 470.161537][T13616] ? sock_kzfree_s+0x60/0x60 [ 470.166250][T13616] ? iov_iter_advance+0x1f9/0x360 [ 470.171529][T13616] tun_get_user+0xb41/0x3400 [ 470.176171][T13616] ? tun_do_read+0x1d30/0x1d30 [ 470.181362][T13616] ? kstrtouint_from_user+0x1c4/0x220 [ 470.186887][T13616] ? kstrtol_from_user+0x2a0/0x2a0 [ 470.192251][T13616] ? avc_policy_seqno+0x1b/0x70 [ 470.197231][T13616] ? selinux_file_permission+0x2aa/0x510 [ 470.202909][T13616] tun_chr_write_iter+0x1eb/0x2e0 [ 470.207952][T13616] vfs_write+0x835/0xfd0 [ 470.212326][T13616] ? putname+0x111/0x160 [ 470.216612][T13616] ? file_end_write+0x1b0/0x1b0 [ 470.221571][T13616] ? __fget_files+0x2c4/0x320 [ 470.226284][T13616] ? __fdget_pos+0x1f7/0x380 [ 470.230910][T13616] ? ksys_write+0x71/0x250 [ 470.235481][T13616] ksys_write+0x149/0x250 [ 470.239865][T13616] ? __ia32_sys_read+0x90/0x90 [ 470.244862][T13616] ? debug_smp_processor_id+0x17/0x20 [ 470.250271][T13616] __x64_sys_write+0x7b/0x90 [ 470.254968][T13616] x64_sys_call+0x8ef/0x9a0 [ 470.259546][T13616] do_syscall_64+0x4c/0xa0 [ 470.264004][T13616] ? clear_bhb_loop+0x50/0xa0 [ 470.268754][T13616] ? clear_bhb_loop+0x50/0xa0 [ 470.273457][T13616] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 470.279374][T13616] RIP: 0033:0x7fe4eea7e799 [ 470.283820][T13616] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 470.304987][T13616] RSP: 002b:00007fe4ed4d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 470.315706][T13616] RAX: ffffffffffffffda RBX: 00007fe4eecf7fa0 RCX: 00007fe4eea7e799 [ 470.323923][T13616] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 000000000000000a [ 470.332463][T13616] RBP: 00007fe4ed4d9090 R08: 0000000000000000 R09: 0000000000000000 [ 470.341585][T13616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 470.349765][T13616] R13: 00007fe4eecf8038 R14: 00007fe4eecf7fa0 R15: 00007ffdf90f1c28 [ 470.358022][T13616] [ 470.625835][T13624] device syzkaller0 entered promiscuous mode [ 470.912233][T13636] device syzkaller0 entered promiscuous mode [ 471.393905][T13631] device syzkaller0 entered promiscuous mode [ 471.522198][T13647] device syzkaller0 entered promiscuous mode [ 471.654225][T13667] bridge0: port 3(gretap0) entered blocking state [ 471.668813][T13667] bridge0: port 3(gretap0) entered disabled state [ 471.682879][T13667] device gretap0 entered promiscuous mode [ 471.689252][T13667] bridge0: port 3(gretap0) entered blocking state [ 471.695827][T13667] bridge0: port 3(gretap0) entered forwarding state [ 471.930084][T13681] device syzkaller0 entered promiscuous mode [ 471.956894][T13692] device syzkaller0 entered promiscuous mode [ 472.273980][T13710] FAULT_INJECTION: forcing a failure. [ 472.273980][T13710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.287813][T13710] CPU: 1 PID: 13710 Comm: syz.1.4741 Tainted: G W syzkaller #0 [ 472.297353][T13710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 472.307726][T13710] Call Trace: [ 472.311047][T13710] [ 472.314091][T13710] __dump_stack+0x21/0x30 [ 472.318469][T13710] dump_stack_lvl+0x110/0x170 [ 472.323228][T13710] ? show_regs_print_info+0x20/0x20 [ 472.328564][T13710] dump_stack+0x15/0x20 [ 472.332787][T13710] should_fail+0x3c1/0x510 [ 472.337232][T13710] should_fail_usercopy+0x1a/0x20 [ 472.342319][T13710] _copy_to_user+0x20/0x90 [ 472.347126][T13710] simple_read_from_buffer+0xe9/0x160 [ 472.352706][T13710] proc_fail_nth_read+0x1a6/0x220 [ 472.357849][T13710] ? proc_fault_inject_write+0x310/0x310 [ 472.363684][T13710] ? security_file_permission+0x83/0xa0 [ 472.369262][T13710] ? proc_fault_inject_write+0x310/0x310 [ 472.375057][T13710] vfs_read+0x28d/0xc40 [ 472.379265][T13710] ? kernel_read+0x1f0/0x1f0 [ 472.384422][T13710] ? __kasan_check_write+0x14/0x20 [ 472.389559][T13710] ? mutex_lock+0x9b/0x1c0 [ 472.394203][T13710] ? wait_for_completion_killable_timeout+0x10/0x10 [ 472.401350][T13710] ? __fget_files+0x2c4/0x320 [ 472.406282][T13710] ? __fdget_pos+0x2d2/0x380 [ 472.411006][T13710] ? ksys_read+0x71/0x250 [ 472.415367][T13710] ksys_read+0x149/0x250 [ 472.419644][T13710] ? vfs_write+0xfd0/0xfd0 [ 472.424089][T13710] ? debug_smp_processor_id+0x17/0x20 [ 472.429483][T13710] __x64_sys_read+0x7b/0x90 [ 472.434011][T13710] x64_sys_call+0x96d/0x9a0 [ 472.438542][T13710] do_syscall_64+0x4c/0xa0 [ 472.443103][T13710] ? clear_bhb_loop+0x50/0xa0 [ 472.448161][T13710] ? clear_bhb_loop+0x50/0xa0 [ 472.452870][T13710] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 472.458806][T13710] RIP: 0033:0x7fe3d35fdfce [ 472.463240][T13710] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 472.483498][T13710] RSP: 002b:00007fe3d2097fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 472.492057][T13710] RAX: ffffffffffffffda RBX: 00007fe3d20986c0 RCX: 00007fe3d35fdfce [ 472.500128][T13710] RDX: 000000000000000f RSI: 00007fe3d20980a0 RDI: 0000000000000005 [ 472.508110][T13710] RBP: 00007fe3d2098090 R08: 0000000000000000 R09: 0000000000000000 [ 472.516195][T13710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.524271][T13710] R13: 00007fe3d38b7038 R14: 00007fe3d38b6fa0 R15: 00007ffd21f6b048 [ 472.532609][T13710] [ 473.258209][T13723] device syzkaller0 entered promiscuous mode [ 473.511562][T13740] FAULT_INJECTION: forcing a failure. [ 473.511562][T13740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.555315][T13740] CPU: 1 PID: 13740 Comm: syz.0.4751 Tainted: G W syzkaller #0 [ 473.564349][T13740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 473.574433][T13740] Call Trace: [ 473.577732][T13740] [ 473.580770][T13740] __dump_stack+0x21/0x30 [ 473.585140][T13740] dump_stack_lvl+0x110/0x170 [ 473.590193][T13740] ? show_regs_print_info+0x20/0x20 [ 473.595422][T13740] dump_stack+0x15/0x20 [ 473.599782][T13740] should_fail+0x3c1/0x510 [ 473.604258][T13740] should_fail_alloc_page+0x55/0x80 [ 473.609493][T13740] prepare_alloc_pages+0x156/0x610 [ 473.614674][T13740] ? __alloc_pages_bulk+0xad0/0xad0 [ 473.620304][T13740] __alloc_pages+0x11d/0x460 [ 473.625125][T13740] ? prep_new_page+0x110/0x110 [ 473.630018][T13740] ? __mod_node_page_state+0x9e/0xd0 [ 473.635327][T13740] pte_alloc_one+0x70/0x190 [ 473.639863][T13740] ? pfn_modify_allowed+0x2f0/0x2f0 [ 473.645178][T13740] __pte_alloc+0x75/0x2a0 [ 473.649624][T13740] ? __kasan_check_write+0x14/0x20 [ 473.654767][T13740] ? _raw_spin_lock+0x94/0xf0 [ 473.659466][T13740] ? free_pgtables+0x280/0x280 [ 473.664265][T13740] ? __kasan_check_write+0x14/0x20 [ 473.669400][T13740] copy_page_range+0x237c/0x28d0 [ 473.674471][T13740] ? pfn_valid+0x1d0/0x1d0 [ 473.679042][T13740] copy_mm+0xbf2/0x13c0 [ 473.683276][T13740] ? copy_signal+0x600/0x600 [ 473.688607][T13740] ? __init_rwsem+0xfc/0x1d0 [ 473.693238][T13740] ? copy_signal+0x4cb/0x600 [ 473.697853][T13740] copy_process+0x117c/0x3250 [ 473.702652][T13740] ? __kasan_check_write+0x14/0x20 [ 473.707790][T13740] ? __pidfd_prepare+0x150/0x150 [ 473.712757][T13740] kernel_clone+0x233/0x960 [ 473.717378][T13740] ? create_io_thread+0x170/0x170 [ 473.722434][T13740] ? __kasan_check_write+0x14/0x20 [ 473.727572][T13740] ? mutex_unlock+0x8f/0x230 [ 473.732187][T13740] __x64_sys_clone+0x198/0x210 [ 473.736994][T13740] ? __kasan_check_write+0x14/0x20 [ 473.742296][T13740] ? __ia32_sys_vfork+0x130/0x130 [ 473.747451][T13740] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 473.753572][T13740] x64_sys_call+0x41f/0x9a0 [ 473.758128][T13740] do_syscall_64+0x4c/0xa0 [ 473.762577][T13740] ? clear_bhb_loop+0x50/0xa0 [ 473.767273][T13740] ? clear_bhb_loop+0x50/0xa0 [ 473.772067][T13740] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 473.777993][T13740] RIP: 0033:0x7fc3c5595799 [ 473.782437][T13740] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 473.802830][T13740] RSP: 002b:00007fc3c3feffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 473.811446][T13740] RAX: ffffffffffffffda RBX: 00007fc3c580efa0 RCX: 00007fc3c5595799 [ 473.819542][T13740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 473.827655][T13740] RBP: 00007fc3c3ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 473.835645][T13740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 473.843638][T13740] R13: 00007fc3c580f038 R14: 00007fc3c580efa0 R15: 00007ffe76c4bfd8 [ 473.851641][T13740] [ 474.073522][T13759] device syzkaller0 entered promiscuous mode [ 475.368490][T13788] device syzkaller0 entered promiscuous mode [ 475.716034][T13799] device syzkaller0 entered promiscuous mode [ 476.098704][T13818] device sit0 entered promiscuous mode [ 476.556090][T13828] device syzkaller0 entered promiscuous mode [ 476.651391][T13837] device syzkaller0 entered promiscuous mode [ 476.717642][T13839] device syzkaller0 entered promiscuous mode [ 479.058156][T13855] device syzkaller0 entered promiscuous mode [ 479.221183][T13864] device syzkaller0 entered promiscuous mode [ 479.783957][T13891] device syzkaller0 entered promiscuous mode [ 479.940156][T13899] device syzkaller0 entered promiscuous mode [ 480.344853][T13912] device syzkaller0 entered promiscuous mode [ 480.451731][T13914] device syzkaller0 entered promiscuous mode [ 480.471254][T13921] tap0: tun_chr_ioctl cmd 1074025677 [ 480.476747][T13921] tap0: linktype set to 823 [ 480.644743][T13934] device syzkaller0 entered promiscuous mode [ 480.880843][T13950] device syzkaller0 entered promiscuous mode [ 481.557329][T13973] device syzkaller0 entered promiscuous mode [ 481.717515][T13983] device syzkaller0 entered promiscuous mode [ 481.794824][T13990] device syzkaller0 left promiscuous mode [ 481.840069][T13994] device syzkaller0 entered promiscuous mode [ 482.664005][T14020] device syzkaller0 entered promiscuous mode [ 483.415392][T14044] FAULT_INJECTION: forcing a failure. [ 483.415392][T14044] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.451826][T14044] CPU: 0 PID: 14044 Comm: syz.1.4850 Tainted: G W syzkaller #0 [ 483.460748][T14044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 483.470829][T14044] Call Trace: [ 483.474227][T14044] [ 483.477298][T14044] __dump_stack+0x21/0x30 [ 483.481650][T14044] dump_stack_lvl+0x110/0x170 [ 483.486358][T14044] ? show_regs_print_info+0x20/0x20 [ 483.491584][T14044] dump_stack+0x15/0x20 [ 483.495758][T14044] should_fail+0x3c1/0x510 [ 483.500212][T14044] should_fail_usercopy+0x1a/0x20 [ 483.505296][T14044] _copy_from_user+0x20/0xd0 [ 483.509999][T14044] ___sys_recvmsg+0x173/0x5c0 [ 483.514786][T14044] ? __sys_recvmsg+0x270/0x270 [ 483.519682][T14044] ? __fdget+0x1a1/0x230 [ 483.523971][T14044] __x64_sys_recvmsg+0x203/0x2f0 [ 483.529214][T14044] ? ___sys_recvmsg+0x5c0/0x5c0 [ 483.534091][T14044] ? debug_smp_processor_id+0x17/0x20 [ 483.539486][T14044] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 483.545572][T14044] x64_sys_call+0x705/0x9a0 [ 483.550100][T14044] do_syscall_64+0x4c/0xa0 [ 483.554537][T14044] ? clear_bhb_loop+0x50/0xa0 [ 483.559314][T14044] ? clear_bhb_loop+0x50/0xa0 [ 483.564007][T14044] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 483.569934][T14044] RIP: 0033:0x7fe3d363d799 [ 483.574460][T14044] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 483.594411][T14044] RSP: 002b:00007fe3d2098028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 483.602941][T14044] RAX: ffffffffffffffda RBX: 00007fe3d38b6fa0 RCX: 00007fe3d363d799 [ 483.611145][T14044] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000005 [ 483.619183][T14044] RBP: 00007fe3d2098090 R08: 0000000000000000 R09: 0000000000000000 [ 483.627358][T14044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.635546][T14044] R13: 00007fe3d38b7038 R14: 00007fe3d38b6fa0 R15: 00007ffd21f6b048 [ 483.644856][T14044] [ 483.925751][T14054] device syzkaller0 entered promiscuous mode [ 483.946479][T14054] FAULT_INJECTION: forcing a failure. [ 483.946479][T14054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.998756][T14054] CPU: 0 PID: 14054 Comm: syz.3.4853 Tainted: G W syzkaller #0 [ 484.007784][T14054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 484.018147][T14054] Call Trace: [ 484.021894][T14054] [ 484.025121][T14054] __dump_stack+0x21/0x30 [ 484.029497][T14054] dump_stack_lvl+0x110/0x170 [ 484.034202][T14054] ? show_regs_print_info+0x20/0x20 [ 484.039707][T14054] ? __alloc_skb+0x21a/0x740 [ 484.044342][T14054] ? tun_get_user+0xb41/0x3400 [ 484.049248][T14054] ? tun_chr_write_iter+0x1eb/0x2e0 [ 484.054565][T14054] dump_stack+0x15/0x20 [ 484.058759][T14054] should_fail+0x3c1/0x510 [ 484.063214][T14054] should_fail_alloc_page+0x55/0x80 [ 484.068896][T14054] prepare_alloc_pages+0x156/0x610 [ 484.074476][T14054] ? __alloc_pages_bulk+0xad0/0xad0 [ 484.079819][T14054] __alloc_pages+0x11d/0x460 [ 484.084797][T14054] ? prep_new_page+0x110/0x110 [ 484.089938][T14054] ? __alloc_skb+0x463/0x740 [ 484.094986][T14054] alloc_skb_with_frags+0x20c/0x620 [ 484.100216][T14054] sock_alloc_send_pskb+0x87f/0x9a0 [ 484.105688][T14054] ? sock_kzfree_s+0x60/0x60 [ 484.110344][T14054] ? iov_iter_advance+0x1f9/0x360 [ 484.115649][T14054] tun_get_user+0xb41/0x3400 [ 484.120413][T14054] ? kmem_cache_free+0xa0/0x320 [ 484.125398][T14054] ? putname+0x111/0x160 [ 484.129698][T14054] ? do_syscall_64+0x4c/0xa0 [ 484.134410][T14054] ? tun_do_read+0x1d30/0x1d30 [ 484.139390][T14054] ? kstrtouint_from_user+0x1c4/0x220 [ 484.144946][T14054] ? kstrtol_from_user+0x2a0/0x2a0 [ 484.150099][T14054] ? avc_policy_seqno+0x1b/0x70 [ 484.155069][T14054] ? selinux_file_permission+0x2aa/0x510 [ 484.160738][T14054] tun_chr_write_iter+0x1eb/0x2e0 [ 484.165794][T14054] vfs_write+0x835/0xfd0 [ 484.170069][T14054] ? file_end_write+0x1b0/0x1b0 [ 484.175144][T14054] ? __fget_files+0x2c4/0x320 [ 484.179974][T14054] ? __fdget_pos+0x1f7/0x380 [ 484.184588][T14054] ? ksys_write+0x71/0x250 [ 484.189114][T14054] ksys_write+0x149/0x250 [ 484.193562][T14054] ? __ia32_sys_read+0x90/0x90 [ 484.198359][T14054] ? debug_smp_processor_id+0x17/0x20 [ 484.203763][T14054] __x64_sys_write+0x7b/0x90 [ 484.208465][T14054] x64_sys_call+0x8ef/0x9a0 [ 484.213086][T14054] do_syscall_64+0x4c/0xa0 [ 484.217527][T14054] ? clear_bhb_loop+0x50/0xa0 [ 484.222224][T14054] ? clear_bhb_loop+0x50/0xa0 [ 484.226923][T14054] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 484.232847][T14054] RIP: 0033:0x7f8511c6b799 [ 484.237548][T14054] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 484.257295][T14054] RSP: 002b:00007f85106c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 484.265977][T14054] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 484.274201][T14054] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 000000000000000a [ 484.282421][T14054] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 484.290777][T14054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.298909][T14054] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 484.306929][T14054] [ 484.370473][T14061] device syzkaller0 entered promiscuous mode [ 484.786288][T14072] device syzkaller0 entered promiscuous mode [ 485.694839][T14092] device syzkaller0 entered promiscuous mode [ 485.812840][T14096] device syzkaller0 entered promiscuous mode [ 486.878532][T14125] device syzkaller0 entered promiscuous mode [ 487.675716][T14158] device syzkaller0 entered promiscuous mode [ 487.763621][T14163] device syzkaller0 entered promiscuous mode [ 487.909910][T14169] device syzkaller0 entered promiscuous mode [ 487.933665][T14167] device syzkaller0 entered promiscuous mode [ 487.940892][T14167] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 487.951185][T14169] FAULT_INJECTION: forcing a failure. [ 487.951185][T14169] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 488.025988][T14169] CPU: 0 PID: 14169 Comm: syz.1.4900 Tainted: G W syzkaller #0 [ 488.035102][T14169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 488.045197][T14169] Call Trace: [ 488.048507][T14169] [ 488.051469][T14169] __dump_stack+0x21/0x30 [ 488.055960][T14169] dump_stack_lvl+0x110/0x170 [ 488.061204][T14169] ? show_regs_print_info+0x20/0x20 [ 488.066445][T14169] ? __alloc_skb+0x21a/0x740 [ 488.071161][T14169] ? tun_get_user+0xb41/0x3400 [ 488.075980][T14169] ? tun_chr_write_iter+0x1eb/0x2e0 [ 488.081329][T14169] dump_stack+0x15/0x20 [ 488.085521][T14169] should_fail+0x3c1/0x510 [ 488.090173][T14169] should_fail_alloc_page+0x55/0x80 [ 488.095495][T14169] prepare_alloc_pages+0x156/0x610 [ 488.100659][T14169] ? __alloc_pages_bulk+0xad0/0xad0 [ 488.106140][T14169] __alloc_pages+0x11d/0x460 [ 488.110862][T14169] ? prep_new_page+0x110/0x110 [ 488.115801][T14169] ? __alloc_skb+0x463/0x740 [ 488.120432][T14169] alloc_skb_with_frags+0x20c/0x620 [ 488.125664][T14169] sock_alloc_send_pskb+0x87f/0x9a0 [ 488.131045][T14169] ? sock_kzfree_s+0x60/0x60 [ 488.135905][T14169] ? iov_iter_advance+0x1f9/0x360 [ 488.141316][T14169] tun_get_user+0xb41/0x3400 [ 488.146046][T14169] ? kmem_cache_free+0xa0/0x320 [ 488.151386][T14169] ? putname+0x111/0x160 [ 488.155799][T14169] ? do_syscall_64+0x4c/0xa0 [ 488.160428][T14169] ? tun_do_read+0x1d30/0x1d30 [ 488.165234][T14169] ? kstrtouint_from_user+0x1c4/0x220 [ 488.170753][T14169] ? kstrtol_from_user+0x2a0/0x2a0 [ 488.175990][T14169] ? avc_policy_seqno+0x1b/0x70 [ 488.180881][T14169] ? selinux_file_permission+0x2aa/0x510 [ 488.186550][T14169] tun_chr_write_iter+0x1eb/0x2e0 [ 488.191611][T14169] vfs_write+0x835/0xfd0 [ 488.196057][T14169] ? file_end_write+0x1b0/0x1b0 [ 488.200929][T14169] ? __fget_files+0x2c4/0x320 [ 488.205632][T14169] ? __fdget_pos+0x1f7/0x380 [ 488.210346][T14169] ? ksys_write+0x71/0x250 [ 488.214779][T14169] ksys_write+0x149/0x250 [ 488.219127][T14169] ? __ia32_sys_read+0x90/0x90 [ 488.223993][T14169] ? debug_smp_processor_id+0x17/0x20 [ 488.229744][T14169] __x64_sys_write+0x7b/0x90 [ 488.234358][T14169] x64_sys_call+0x8ef/0x9a0 [ 488.238963][T14169] do_syscall_64+0x4c/0xa0 [ 488.243426][T14169] ? clear_bhb_loop+0x50/0xa0 [ 488.248143][T14169] ? clear_bhb_loop+0x50/0xa0 [ 488.252888][T14169] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 488.258813][T14169] RIP: 0033:0x7fe3d363d799 [ 488.263251][T14169] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 488.283659][T14169] RSP: 002b:00007fe3d2098028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 488.292098][T14169] RAX: ffffffffffffffda RBX: 00007fe3d38b6fa0 RCX: 00007fe3d363d799 [ 488.300170][T14169] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 000000000000000a [ 488.308162][T14169] RBP: 00007fe3d2098090 R08: 0000000000000000 R09: 0000000000000000 [ 488.316240][T14169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 488.324453][T14169] R13: 00007fe3d38b7038 R14: 00007fe3d38b6fa0 R15: 00007ffd21f6b048 [ 488.333087][T14169] [ 488.496858][T14185] device syzkaller0 entered promiscuous mode [ 488.860662][T14197] device syzkaller0 entered promiscuous mode [ 490.044102][T14227] device syzkaller0 entered promiscuous mode [ 494.134136][T14278] device syzkaller0 entered promiscuous mode [ 494.262642][T14284] device syzkaller0 entered promiscuous mode [ 494.333705][T14291] device syzkaller0 entered promiscuous mode [ 494.612867][T14302] device syzkaller0 entered promiscuous mode [ 494.670427][T14300] device syzkaller0 entered promiscuous mode [ 496.044517][T14327] device syzkaller0 entered promiscuous mode [ 496.455136][T14347] tap0: tun_chr_ioctl cmd 2147767511 [ 497.158618][T14368] device syzkaller0 entered promiscuous mode [ 497.392310][T14375] device syzkaller0 entered promiscuous mode [ 497.400165][ T30] audit: type=1400 audit(1774361722.506:155): avc: denied { append } for pid=14367 comm="syz.4.4968" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 497.790383][T14387] device syzkaller0 left promiscuous mode [ 498.026146][T14401] device syzkaller0 entered promiscuous mode [ 498.330165][T14405] device syzkaller0 entered promiscuous mode [ 498.924818][T14432] device syzkaller0 entered promiscuous mode [ 499.226831][T14446] device erspan0 entered promiscuous mode [ 500.115806][T14496] device syzkaller0 entered promiscuous mode [ 500.310996][T14502] device syzkaller0 entered promiscuous mode [ 500.353290][T14508] device syzkaller0 entered promiscuous mode [ 500.512315][T14511] device syzkaller0 entered promiscuous mode [ 500.631199][T14523] FAULT_INJECTION: forcing a failure. [ 500.631199][T14523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 500.669182][T14523] CPU: 1 PID: 14523 Comm: syz.0.5019 Tainted: G W syzkaller #0 [ 500.678356][T14523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 500.688726][T14523] Call Trace: [ 500.692042][T14523] [ 500.695098][T14523] __dump_stack+0x21/0x30 [ 500.699671][T14523] dump_stack_lvl+0x110/0x170 [ 500.704474][T14523] ? show_regs_print_info+0x20/0x20 [ 500.709715][T14523] ? vfs_write+0xc72/0xfd0 [ 500.714370][T14523] dump_stack+0x15/0x20 [ 500.718558][T14523] should_fail+0x3c1/0x510 [ 500.723090][T14523] should_fail_usercopy+0x1a/0x20 [ 500.728292][T14523] _copy_from_user+0x20/0xd0 [ 500.733117][T14523] __sys_bpf+0x258/0x7d0 [ 500.737615][T14523] ? bpf_link_show_fdinfo+0x330/0x330 [ 500.743385][T14523] ? debug_smp_processor_id+0x17/0x20 [ 500.748835][T14523] __x64_sys_bpf+0x7c/0x90 [ 500.753312][T14523] x64_sys_call+0x4b9/0x9a0 [ 500.758278][T14523] do_syscall_64+0x4c/0xa0 [ 500.762726][T14523] ? clear_bhb_loop+0x50/0xa0 [ 500.767515][T14523] ? clear_bhb_loop+0x50/0xa0 [ 500.772217][T14523] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 500.778140][T14523] RIP: 0033:0x7fc3c5595799 [ 500.782585][T14523] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 500.802222][T14523] RSP: 002b:00007fc3c3ff0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 500.810683][T14523] RAX: ffffffffffffffda RBX: 00007fc3c580efa0 RCX: 00007fc3c5595799 [ 500.818771][T14523] RDX: 0000000000000010 RSI: 0000200000000200 RDI: 000000000000000a [ 500.826791][T14523] RBP: 00007fc3c3ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 500.834841][T14523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 500.843043][T14523] R13: 00007fc3c580f038 R14: 00007fc3c580efa0 R15: 00007ffe76c4bfd8 [ 500.851319][T14523] [ 501.046076][T14539] device syzkaller0 entered promiscuous mode [ 501.060560][T14546] device sit0 entered promiscuous mode [ 501.396455][T14568] device syzkaller0 entered promiscuous mode [ 501.674242][ T30] audit: type=1400 audit(1774361726.776:156): avc: denied { associate } for pid=14580 comm="syz.2.5044" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 502.215488][T14597] device syzkaller0 entered promiscuous mode [ 502.296817][T14601] device syzkaller0 entered promiscuous mode [ 502.401027][T14606] device syzkaller0 entered promiscuous mode [ 502.484818][T14604] FAULT_INJECTION: forcing a failure. [ 502.484818][T14604] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 502.569179][T14604] CPU: 1 PID: 14604 Comm: syz.3.5053 Tainted: G W syzkaller #0 [ 502.578197][T14604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 502.588687][T14604] Call Trace: [ 502.591993][T14604] [ 502.594972][T14604] __dump_stack+0x21/0x30 [ 502.599342][T14604] dump_stack_lvl+0x110/0x170 [ 502.604092][T14604] ? show_regs_print_info+0x20/0x20 [ 502.609329][T14604] dump_stack+0x15/0x20 [ 502.613515][T14604] should_fail+0x3c1/0x510 [ 502.617967][T14604] should_fail_usercopy+0x1a/0x20 [ 502.623087][T14604] _copy_from_iter+0x21e/0x1070 [ 502.627980][T14604] ? stack_trace_save+0xf0/0xf0 [ 502.632958][T14604] ? copy_mc_pipe_to_iter+0x770/0x770 [ 502.638644][T14604] ? stack_trace_save+0xa6/0xf0 [ 502.643561][T14604] tun_get_user+0x415/0x3400 [ 502.648274][T14604] ? ____kasan_slab_free+0x125/0x160 [ 502.653604][T14604] ? kmem_cache_free+0xa0/0x320 [ 502.658513][T14604] ? putname+0x111/0x160 [ 502.662867][T14604] ? do_sys_openat2+0x6df/0x7f0 [ 502.667754][T14604] ? do_syscall_64+0x4c/0xa0 [ 502.672558][T14604] ? tun_do_read+0x1d30/0x1d30 [ 502.677365][T14604] ? kstrtouint_from_user+0x1c4/0x220 [ 502.682775][T14604] ? kstrtol_from_user+0x2a0/0x2a0 [ 502.687912][T14604] ? avc_policy_seqno+0x1b/0x70 [ 502.692921][T14604] ? selinux_file_permission+0x2aa/0x510 [ 502.698600][T14604] tun_chr_write_iter+0x1eb/0x2e0 [ 502.703764][T14604] vfs_write+0x835/0xfd0 [ 502.708033][T14604] ? file_end_write+0x1b0/0x1b0 [ 502.712917][T14604] ? __fget_files+0x2c4/0x320 [ 502.717850][T14604] ? __fdget_pos+0x1f7/0x380 [ 502.722476][T14604] ? ksys_write+0x71/0x250 [ 502.726947][T14604] ksys_write+0x149/0x250 [ 502.731297][T14604] ? __ia32_sys_read+0x90/0x90 [ 502.736186][T14604] ? debug_smp_processor_id+0x17/0x20 [ 502.741622][T14604] __x64_sys_write+0x7b/0x90 [ 502.746325][T14604] x64_sys_call+0x8ef/0x9a0 [ 502.750965][T14604] do_syscall_64+0x4c/0xa0 [ 502.755494][T14604] ? clear_bhb_loop+0x50/0xa0 [ 502.760200][T14604] ? clear_bhb_loop+0x50/0xa0 [ 502.764899][T14604] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 502.770828][T14604] RIP: 0033:0x7f8511c6b799 [ 502.775358][T14604] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 502.795124][T14604] RSP: 002b:00007f85106c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 502.803656][T14604] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 502.811924][T14604] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 502.819950][T14604] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 502.827955][T14604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 502.835959][T14604] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 502.843967][T14604] [ 504.009423][T14640] device syzkaller0 entered promiscuous mode [ 506.088595][T14726] device syzkaller0 entered promiscuous mode [ 506.535679][T14749] device syzkaller0 entered promiscuous mode [ 506.604426][T14748] device syzkaller0 entered promiscuous mode [ 507.477354][T14777] device syzkaller0 entered promiscuous mode [ 507.712008][T14781] device syzkaller0 entered promiscuous mode [ 507.943442][T14795] device syzkaller0 entered promiscuous mode [ 508.769372][T14827] device syzkaller0 entered promiscuous mode [ 509.182373][T14844] device syzkaller0 entered promiscuous mode [ 509.462421][T14856] device syzkaller0 entered promiscuous mode [ 509.943826][ T30] audit: type=1400 audit(1774361735.046:157): avc: denied { create } for pid=14874 comm="syz.4.5144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 510.538724][T14891] device syzkaller0 entered promiscuous mode [ 510.628906][T14895] device syzkaller0 entered promiscuous mode [ 511.152353][T14913] FAULT_INJECTION: forcing a failure. [ 511.152353][T14913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 511.214162][T14913] CPU: 0 PID: 14913 Comm: syz.0.5160 Tainted: G W syzkaller #0 [ 511.223204][T14913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 511.233680][T14913] Call Trace: [ 511.237072][T14913] [ 511.240030][T14913] __dump_stack+0x21/0x30 [ 511.244396][T14913] dump_stack_lvl+0x110/0x170 [ 511.249122][T14913] ? show_regs_print_info+0x20/0x20 [ 511.254507][T14913] ? ctx_sched_in+0x259/0x2f0 [ 511.259229][T14913] dump_stack+0x15/0x20 [ 511.263517][T14913] should_fail+0x3c1/0x510 [ 511.268052][T14913] should_fail_alloc_page+0x55/0x80 [ 511.273532][T14913] prepare_alloc_pages+0x156/0x610 [ 511.278856][T14913] ? __alloc_pages_bulk+0xad0/0xad0 [ 511.284211][T14913] ? perf_sched_cb_inc+0x240/0x240 [ 511.289459][T14913] __alloc_pages+0x11d/0x460 [ 511.294103][T14913] ? prep_new_page+0x110/0x110 [ 511.298907][T14913] ? __schedule+0xb76/0x14c0 [ 511.303714][T14913] ? release_firmware_map_entry+0x190/0x190 [ 511.310428][T14913] pte_alloc_one+0x70/0x190 [ 511.315404][T14913] ? pfn_modify_allowed+0x2f0/0x2f0 [ 511.320896][T14913] ? __kasan_check_read+0x11/0x20 [ 511.326069][T14913] ? preempt_schedule_common+0xbe/0xf0 [ 511.331559][T14913] ? preempt_schedule+0xbc/0xd0 [ 511.336983][T14913] __pte_alloc+0x75/0x2a0 [ 511.341331][T14913] ? __kasan_check_write+0x14/0x20 [ 511.346460][T14913] ? _raw_spin_lock+0x94/0xf0 [ 511.351260][T14913] ? free_pgtables+0x280/0x280 [ 511.356078][T14913] ? __kasan_check_write+0x14/0x20 [ 511.361238][T14913] copy_page_range+0x237c/0x28d0 [ 511.366250][T14913] ? pfn_valid+0x1d0/0x1d0 [ 511.370685][T14913] copy_mm+0xbf2/0x13c0 [ 511.374856][T14913] ? copy_signal+0x600/0x600 [ 511.379572][T14913] ? __init_rwsem+0xfc/0x1d0 [ 511.384198][T14913] ? copy_signal+0x4cb/0x600 [ 511.388906][T14913] copy_process+0x117c/0x3250 [ 511.393606][T14913] ? __kasan_check_write+0x14/0x20 [ 511.398752][T14913] ? __pidfd_prepare+0x150/0x150 [ 511.403708][T14913] kernel_clone+0x233/0x960 [ 511.408250][T14913] ? create_io_thread+0x170/0x170 [ 511.413301][T14913] ? __kasan_check_write+0x14/0x20 [ 511.418517][T14913] ? mutex_unlock+0x8f/0x230 [ 511.423214][T14913] __x64_sys_clone+0x198/0x210 [ 511.428515][T14913] ? __kasan_check_write+0x14/0x20 [ 511.434218][T14913] ? __ia32_sys_vfork+0x130/0x130 [ 511.439496][T14913] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 511.445934][T14913] x64_sys_call+0x41f/0x9a0 [ 511.450645][T14913] do_syscall_64+0x4c/0xa0 [ 511.455108][T14913] ? clear_bhb_loop+0x50/0xa0 [ 511.459800][T14913] ? clear_bhb_loop+0x50/0xa0 [ 511.464495][T14913] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 511.470436][T14913] RIP: 0033:0x7fc3c5595799 [ 511.474963][T14913] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 511.494597][T14913] RSP: 002b:00007fc3c3feffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 511.503224][T14913] RAX: ffffffffffffffda RBX: 00007fc3c580efa0 RCX: 00007fc3c5595799 [ 511.511913][T14913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 511.520097][T14913] RBP: 00007fc3c3ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 511.528357][T14913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 511.536838][T14913] R13: 00007fc3c580f038 R14: 00007fc3c580efa0 R15: 00007ffe76c4bfd8 [ 511.544863][T14913] [ 512.668461][T14946] device syzkaller0 entered promiscuous mode [ 512.702082][T14948] device syzkaller0 entered promiscuous mode [ 514.161485][T14986] device syzkaller0 entered promiscuous mode [ 514.206357][T14989] device syzkaller0 entered promiscuous mode [ 514.724231][T15012] device syzkaller0 entered promiscuous mode [ 515.164790][T15026] device syzkaller0 entered promiscuous mode [ 515.581805][T15048] device syzkaller0 entered promiscuous mode [ 515.912213][T15064] device syzkaller0 entered promiscuous mode [ 516.023739][T15073] device syzkaller0 entered promiscuous mode [ 516.164096][T15077] device syzkaller0 entered promiscuous mode [ 516.932560][T15100] device syzkaller0 entered promiscuous mode [ 517.093919][T15105] device syzkaller0 entered promiscuous mode [ 517.264236][T15112] device syzkaller0 entered promiscuous mode [ 517.295222][T15114] device syzkaller0 entered promiscuous mode [ 517.457008][ T30] audit: type=1400 audit(1774361742.556:158): avc: denied { create } for pid=15124 comm="syz.1.5234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 517.668272][T15132] device syzkaller0 entered promiscuous mode [ 517.895048][T15153] device syzkaller0 entered promiscuous mode [ 518.051813][T15162] device syzkaller0 entered promiscuous mode [ 518.237979][T15169] device syzkaller0 entered promiscuous mode [ 518.480402][T15177] ¿: renamed from bond_slave_0 [ 518.622447][T15185] device syzkaller0 entered promiscuous mode [ 518.647058][T15185] device syzkaller0 left promiscuous mode [ 518.678125][T15185] device syzkaller0 entered promiscuous mode [ 518.749702][T15185] device wg2 entered promiscuous mode [ 519.249541][T15196] device syzkaller0 entered promiscuous mode [ 520.102471][T15234] device syzkaller0 entered promiscuous mode [ 520.234977][T15247] device syzkaller0 entered promiscuous mode [ 521.089072][T15263] device syzkaller0 entered promiscuous mode [ 521.166208][T15259] GPL: port 1(erspan0) entered blocking state [ 521.178588][T15259] GPL: port 1(erspan0) entered disabled state [ 521.203035][T15259] device erspan0 entered promiscuous mode [ 521.286416][T15271] GPL: port 1(erspan0) entered blocking state [ 521.292802][T15271] GPL: port 1(erspan0) entered forwarding state [ 521.327428][T15276] device syzkaller0 entered promiscuous mode [ 521.361781][T15283] device syzkaller0 entered promiscuous mode [ 521.461464][T15291] device syzkaller0 entered promiscuous mode [ 521.489976][T15292] device syzkaller0 entered promiscuous mode [ 521.598855][T15299] device syzkaller0 entered promiscuous mode [ 521.777531][T15306] device syzkaller0 entered promiscuous mode [ 521.824094][T15309] device syzkaller0 entered promiscuous mode [ 521.862067][T15320] device syzkaller0 entered promiscuous mode [ 522.038449][T15328] device syzkaller0 entered promiscuous mode [ 522.079820][T15330] device syzkaller0 entered promiscuous mode [ 522.858373][T15340] device syzkaller0 entered promiscuous mode [ 523.580920][T15371] device syzkaller0 entered promiscuous mode [ 524.241122][T15399] device syzkaller0 entered promiscuous mode [ 524.950896][T15410] device syzkaller0 entered promiscuous mode [ 525.136109][T15428] device syzkaller0 entered promiscuous mode [ 525.373154][T15444] device syzkaller0 entered promiscuous mode [ 525.558654][T15454] device syzkaller0 entered promiscuous mode [ 525.927659][T15466] device syzkaller0 entered promiscuous mode [ 526.137639][T15487] FAULT_INJECTION: forcing a failure. [ 526.137639][T15487] name failslab, interval 1, probability 0, space 0, times 0 [ 526.154425][T15487] CPU: 1 PID: 15487 Comm: syz.3.5367 Tainted: G W syzkaller #0 [ 526.163691][T15487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 526.173799][T15487] Call Trace: [ 526.177113][T15487] [ 526.180067][T15487] __dump_stack+0x21/0x30 [ 526.184453][T15487] dump_stack_lvl+0x110/0x170 [ 526.189175][T15487] ? show_regs_print_info+0x20/0x20 [ 526.194784][T15487] dump_stack+0x15/0x20 [ 526.199338][T15487] should_fail+0x3c1/0x510 [ 526.203797][T15487] __should_failslab+0xa4/0xe0 [ 526.208687][T15487] should_failslab+0x9/0x20 [ 526.213226][T15487] slab_pre_alloc_hook+0x3b/0xe0 [ 526.218387][T15487] ? anon_vma_clone+0xc0/0x500 [ 526.223319][T15487] kmem_cache_alloc+0x44/0x260 [ 526.228140][T15487] anon_vma_clone+0xc0/0x500 [ 526.232855][T15487] anon_vma_fork+0x8c/0x510 [ 526.237677][T15487] copy_mm+0x9de/0x13c0 [ 526.241869][T15487] ? copy_signal+0x600/0x600 [ 526.246487][T15487] ? __init_rwsem+0xfc/0x1d0 [ 526.251292][T15487] ? copy_signal+0x4cb/0x600 [ 526.256177][T15487] copy_process+0x117c/0x3250 [ 526.261063][T15487] ? __kasan_check_write+0x14/0x20 [ 526.266313][T15487] ? __pidfd_prepare+0x150/0x150 [ 526.271381][T15487] kernel_clone+0x233/0x960 [ 526.276020][T15487] ? create_io_thread+0x170/0x170 [ 526.281274][T15487] ? __kasan_check_write+0x14/0x20 [ 526.286553][T15487] ? mutex_unlock+0x8f/0x230 [ 526.291402][T15487] __x64_sys_clone+0x198/0x210 [ 526.296181][T15487] ? __kasan_check_write+0x14/0x20 [ 526.301307][T15487] ? __ia32_sys_vfork+0x130/0x130 [ 526.306677][T15487] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 526.312858][T15487] x64_sys_call+0x41f/0x9a0 [ 526.317562][T15487] do_syscall_64+0x4c/0xa0 [ 526.322089][T15487] ? clear_bhb_loop+0x50/0xa0 [ 526.327105][T15487] ? clear_bhb_loop+0x50/0xa0 [ 526.331802][T15487] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 526.337954][T15487] RIP: 0033:0x7f8511c6b799 [ 526.342817][T15487] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 526.363345][T15487] RSP: 002b:00007f85106c5fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 526.371872][T15487] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 526.380011][T15487] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 526.388395][T15487] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 526.396572][T15487] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 526.404932][T15487] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 526.413150][T15487] [ 527.585102][T15512] device syzkaller0 entered promiscuous mode [ 527.631691][T15521] device syzkaller0 entered promiscuous mode [ 527.687426][T15531] device syzkaller0 entered promiscuous mode [ 528.791032][T15565] device syzkaller0 entered promiscuous mode [ 528.848660][T15569] device syzkaller0 entered promiscuous mode [ 528.976957][T15576] device syzkaller0 entered promiscuous mode [ 529.083264][T15569] syzkaller0: tun_net_xmit 1280 [ 530.295557][T15633] device syzkaller0 entered promiscuous mode [ 530.743961][T15658] device syzkaller0 entered promiscuous mode [ 531.037775][T15663] device syzkaller0 entered promiscuous mode [ 531.167758][T15666] device syzkaller0 entered promiscuous mode [ 531.899129][T15707] tap0: tun_chr_ioctl cmd 2147767511 [ 531.962517][T15709] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 532.966131][T15739] device syzkaller0 entered promiscuous mode [ 533.091312][T15743] device syzkaller0 entered promiscuous mode [ 533.296760][T15759] device syzkaller0 entered promiscuous mode [ 533.901833][T15789] device syzkaller0 entered promiscuous mode [ 534.006766][T15781] device sit0 entered promiscuous mode [ 534.245504][T15801] device ip_vti0 entered promiscuous mode [ 534.396212][T15810] device syzkaller0 entered promiscuous mode [ 534.427253][T15808] tap0: tun_chr_ioctl cmd 1074025677 [ 534.435930][T15808] tap0: linktype set to 780 [ 534.747401][T15825] device syzkaller0 entered promiscuous mode [ 534.849189][T15832] FAULT_INJECTION: forcing a failure. [ 534.849189][T15832] name failslab, interval 1, probability 0, space 0, times 0 [ 534.894194][T15832] CPU: 1 PID: 15832 Comm: syz.3.5486 Tainted: G W syzkaller #0 [ 534.903174][T15832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 534.913700][T15832] Call Trace: [ 534.917009][T15832] [ 534.920051][T15832] __dump_stack+0x21/0x30 [ 534.924507][T15832] dump_stack_lvl+0x110/0x170 [ 534.929536][T15832] ? show_regs_print_info+0x20/0x20 [ 534.935179][T15832] dump_stack+0x15/0x20 [ 534.939384][T15832] should_fail+0x3c1/0x510 [ 534.943834][T15832] __should_failslab+0xa4/0xe0 [ 534.948728][T15832] should_failslab+0x9/0x20 [ 534.953835][T15832] slab_pre_alloc_hook+0x3b/0xe0 [ 534.958814][T15832] ? anon_vma_clone+0xc0/0x500 [ 534.963818][T15832] kmem_cache_alloc+0x44/0x260 [ 534.968628][T15832] anon_vma_clone+0xc0/0x500 [ 534.973434][T15832] anon_vma_fork+0x8c/0x510 [ 534.977977][T15832] copy_mm+0x9de/0x13c0 [ 534.983182][T15832] ? copy_signal+0x600/0x600 [ 534.988319][T15832] ? __init_rwsem+0xfc/0x1d0 [ 534.993587][T15832] ? copy_signal+0x4cb/0x600 [ 534.998235][T15832] copy_process+0x117c/0x3250 [ 535.003044][T15832] ? __kasan_check_write+0x14/0x20 [ 535.008210][T15832] ? __pidfd_prepare+0x150/0x150 [ 535.010371][T15820] device syzkaller0 entered promiscuous mode [ 535.013180][T15832] kernel_clone+0x233/0x960 [ 535.013208][T15832] ? create_io_thread+0x170/0x170 [ 535.013232][T15832] ? __kasan_check_write+0x14/0x20 [ 535.013253][T15832] ? mutex_unlock+0x8f/0x230 [ 535.013276][T15832] __x64_sys_clone+0x198/0x210 [ 535.013298][T15832] ? __kasan_check_write+0x14/0x20 [ 535.013321][T15832] ? __ia32_sys_vfork+0x130/0x130 [ 535.013349][T15832] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 535.013375][T15832] x64_sys_call+0x41f/0x9a0 [ 535.013396][T15832] do_syscall_64+0x4c/0xa0 [ 535.013419][T15832] ? clear_bhb_loop+0x50/0xa0 [ 535.013438][T15832] ? clear_bhb_loop+0x50/0xa0 [ 535.013457][T15832] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 535.013481][T15832] RIP: 0033:0x7f8511c6b799 [ 535.090250][T15832] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 535.110544][T15832] RSP: 002b:00007f85106c5fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 535.118992][T15832] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 535.126993][T15832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 535.135410][T15832] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 535.143421][T15832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 535.151618][T15832] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 535.160335][T15832] [ 535.214020][T15839] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 535.645393][T15864] device syzkaller0 entered promiscuous mode [ 535.835652][T15870] ªªªªªª: renamed from vlan0 [ 536.232431][T15886] device syzkaller0 entered promiscuous mode [ 537.495200][T15933] device syzkaller0 entered promiscuous mode [ 539.795442][T16013] device syzkaller0 entered promiscuous mode [ 541.395680][T16052] device syzkaller0 entered promiscuous mode [ 544.179512][T16137] device syzkaller0 entered promiscuous mode [ 545.638437][T16168] device syzkaller0 entered promiscuous mode [ 545.827468][T16167] device syzkaller0 entered promiscuous mode [ 547.119666][T16211] device syzkaller0 entered promiscuous mode [ 547.516019][T16229] device syzkaller0 entered promiscuous mode [ 547.928390][T16237] device syzkaller0 entered promiscuous mode [ 548.070966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 548.111433][T16247] FAULT_INJECTION: forcing a failure. [ 548.111433][T16247] name failslab, interval 1, probability 0, space 0, times 0 [ 548.129558][T16247] CPU: 0 PID: 16247 Comm: syz.3.5627 Tainted: G W syzkaller #0 [ 548.138468][T16247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 548.148745][T16247] Call Trace: [ 548.152140][T16247] [ 548.155100][T16247] __dump_stack+0x21/0x30 [ 548.159693][T16247] dump_stack_lvl+0x110/0x170 [ 548.164763][T16247] ? show_regs_print_info+0x20/0x20 [ 548.170020][T16247] dump_stack+0x15/0x20 [ 548.174448][T16247] should_fail+0x3c1/0x510 [ 548.179360][T16247] __should_failslab+0xa4/0xe0 [ 548.184700][T16247] should_failslab+0x9/0x20 [ 548.190032][T16247] slab_pre_alloc_hook+0x3b/0xe0 [ 548.195196][T16247] ? __alloc_skb+0xe0/0x740 [ 548.200713][T16247] kmem_cache_alloc+0x44/0x260 [ 548.205884][T16247] __alloc_skb+0xe0/0x740 [ 548.210268][T16247] alloc_skb_with_frags+0xa8/0x620 [ 548.215430][T16247] sock_alloc_send_pskb+0x87f/0x9a0 [ 548.220725][T16247] ? sock_kzfree_s+0x60/0x60 [ 548.225538][T16247] ? iov_iter_advance+0x1f9/0x360 [ 548.230633][T16247] tun_get_user+0xb41/0x3400 [ 548.235362][T16247] ? kmem_cache_free+0xa0/0x320 [ 548.240350][T16247] ? putname+0x111/0x160 [ 548.244649][T16247] ? do_syscall_64+0x4c/0xa0 [ 548.249287][T16247] ? tun_do_read+0x1d30/0x1d30 [ 548.254327][T16247] ? kstrtouint_from_user+0x1c4/0x220 [ 548.259872][T16247] ? kstrtol_from_user+0x2a0/0x2a0 [ 548.265375][T16247] ? avc_policy_seqno+0x1b/0x70 [ 548.270352][T16247] ? selinux_file_permission+0x2aa/0x510 [ 548.276029][T16247] tun_chr_write_iter+0x1eb/0x2e0 [ 548.281193][T16247] vfs_write+0x835/0xfd0 [ 548.285474][T16247] ? file_end_write+0x1b0/0x1b0 [ 548.290355][T16247] ? __fget_files+0x2c4/0x320 [ 548.295065][T16247] ? __fdget_pos+0x1f7/0x380 [ 548.299709][T16247] ? ksys_write+0x71/0x250 [ 548.304154][T16247] ksys_write+0x149/0x250 [ 548.308631][T16247] ? __ia32_sys_read+0x90/0x90 [ 548.313612][T16247] ? debug_smp_processor_id+0x17/0x20 [ 548.319530][T16247] __x64_sys_write+0x7b/0x90 [ 548.324156][T16247] x64_sys_call+0x8ef/0x9a0 [ 548.328724][T16247] do_syscall_64+0x4c/0xa0 [ 548.334045][T16247] ? clear_bhb_loop+0x50/0xa0 [ 548.338750][T16247] ? clear_bhb_loop+0x50/0xa0 [ 548.343461][T16247] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 548.349765][T16247] RIP: 0033:0x7f8511c6b799 [ 548.354483][T16247] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 548.375109][T16247] RSP: 002b:00007f85106c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 548.384118][T16247] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 548.392392][T16247] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 548.400514][T16247] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 548.408525][T16247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.417526][T16247] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 548.425641][T16247] [ 548.515250][T16267] device syzkaller0 entered promiscuous mode [ 548.554621][T16268] device syzkaller0 entered promiscuous mode [ 549.666512][T16318] device syzkaller0 entered promiscuous mode [ 550.194289][T16338] device syzkaller0 entered promiscuous mode [ 551.121855][T16352] device syzkaller0 entered promiscuous mode [ 552.289148][T16401] device syzkaller0 entered promiscuous mode [ 552.689671][T16413] device syzkaller0 entered promiscuous mode [ 553.332465][T16426] device syzkaller0 entered promiscuous mode [ 554.702881][T16468] device syzkaller0 entered promiscuous mode [ 557.305553][T16541] device syzkaller0 entered promiscuous mode [ 557.345700][T16541] FAULT_INJECTION: forcing a failure. [ 557.345700][T16541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 557.509562][T16541] CPU: 1 PID: 16541 Comm: syz.4.5721 Tainted: G W syzkaller #0 [ 557.518576][T16541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 557.528903][T16541] Call Trace: [ 557.532215][T16541] [ 557.535216][T16541] __dump_stack+0x21/0x30 [ 557.539588][T16541] dump_stack_lvl+0x110/0x170 [ 557.544394][T16541] ? show_regs_print_info+0x20/0x20 [ 557.549643][T16541] ? __kasan_kmalloc+0xec/0x110 [ 557.554539][T16541] ? __kmalloc_track_caller+0x13c/0x2c0 [ 557.560275][T16541] ? __alloc_skb+0x21a/0x740 [ 557.565459][T16541] ? alloc_skb_with_frags+0xa8/0x620 [ 557.571048][T16541] ? tun_get_user+0xb41/0x3400 [ 557.575852][T16541] ? tun_chr_write_iter+0x1eb/0x2e0 [ 557.581368][T16541] ? vfs_write+0x835/0xfd0 [ 557.585821][T16541] ? ksys_write+0x149/0x250 [ 557.590526][T16541] dump_stack+0x15/0x20 [ 557.594897][T16541] should_fail+0x3c1/0x510 [ 557.599361][T16541] should_fail_alloc_page+0x55/0x80 [ 557.604762][T16541] prepare_alloc_pages+0x156/0x610 [ 557.610009][T16541] ? __alloc_pages_bulk+0xad0/0xad0 [ 557.615251][T16541] __alloc_pages+0x11d/0x460 [ 557.619969][T16541] ? prep_new_page+0x110/0x110 [ 557.624774][T16541] ? __alloc_skb+0x463/0x740 [ 557.629420][T16541] alloc_skb_with_frags+0x20c/0x620 [ 557.634649][T16541] sock_alloc_send_pskb+0x87f/0x9a0 [ 557.640142][T16541] ? sock_kzfree_s+0x60/0x60 [ 557.644767][T16541] ? iov_iter_advance+0x1f9/0x360 [ 557.649923][T16541] tun_get_user+0xb41/0x3400 [ 557.654550][T16541] ? kmem_cache_free+0xa0/0x320 [ 557.659551][T16541] ? putname+0x111/0x160 [ 557.663911][T16541] ? do_syscall_64+0x4c/0xa0 [ 557.668622][T16541] ? tun_do_read+0x1d30/0x1d30 [ 557.673432][T16541] ? kstrtouint_from_user+0x1c4/0x220 [ 557.678949][T16541] ? kstrtol_from_user+0x2a0/0x2a0 [ 557.684093][T16541] ? avc_policy_seqno+0x1b/0x70 [ 557.688976][T16541] ? selinux_file_permission+0x2aa/0x510 [ 557.694776][T16541] tun_chr_write_iter+0x1eb/0x2e0 [ 557.699843][T16541] vfs_write+0x835/0xfd0 [ 557.704205][T16541] ? file_end_write+0x1b0/0x1b0 [ 557.709085][T16541] ? __fget_files+0x2c4/0x320 [ 557.713819][T16541] ? __fdget_pos+0x1f7/0x380 [ 557.718450][T16541] ? ksys_write+0x71/0x250 [ 557.723103][T16541] ksys_write+0x149/0x250 [ 557.727463][T16541] ? __ia32_sys_read+0x90/0x90 [ 557.732376][T16541] ? debug_smp_processor_id+0x17/0x20 [ 557.737808][T16541] __x64_sys_write+0x7b/0x90 [ 557.742558][T16541] x64_sys_call+0x8ef/0x9a0 [ 557.747257][T16541] do_syscall_64+0x4c/0xa0 [ 557.751721][T16541] ? clear_bhb_loop+0x50/0xa0 [ 557.756522][T16541] ? clear_bhb_loop+0x50/0xa0 [ 557.761342][T16541] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 557.767552][T16541] RIP: 0033:0x7fe4eea7e799 [ 557.772003][T16541] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 557.791759][T16541] RSP: 002b:00007fe4ed4d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 557.800197][T16541] RAX: ffffffffffffffda RBX: 00007fe4eecf7fa0 RCX: 00007fe4eea7e799 [ 557.808270][T16541] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 557.816256][T16541] RBP: 00007fe4ed4d9090 R08: 0000000000000000 R09: 0000000000000000 [ 557.824417][T16541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.832550][T16541] R13: 00007fe4eecf8038 R14: 00007fe4eecf7fa0 R15: 00007ffdf90f1c28 [ 557.840641][T16541] [ 557.988468][ T30] audit: type=1400 audit(1774361783.086:159): avc: denied { mounton } for pid=16554 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 558.396697][T16554] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.410823][T16554] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.420090][T16554] device bridge_slave_0 entered promiscuous mode [ 558.427858][T16554] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.435308][T16554] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.444113][T16554] device bridge_slave_1 entered promiscuous mode [ 558.578750][T16554] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.586470][T16554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 558.593844][T16554] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.600993][T16554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 558.625613][ T4771] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.643383][ T4771] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.770289][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 558.792476][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 558.872188][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 558.911878][ T4771] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.919283][ T4771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 558.988685][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 559.035882][ T4771] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.044387][ T4771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.187604][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 559.198383][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 559.226253][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 559.246506][T16554] device veth0_vlan entered promiscuous mode [ 559.285594][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 559.297115][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 559.343187][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 559.550731][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 559.761712][T16554] device veth1_macvtap entered promiscuous mode [ 559.828365][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 559.857188][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 559.907837][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 559.950765][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 559.967286][ T30] audit: type=1400 audit(1774361785.066:160): avc: denied { unmount } for pid=16554 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 560.170221][ T302] device bridge_slave_1 left promiscuous mode [ 560.186739][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.216604][ T302] device bridge_slave_0 left promiscuous mode [ 560.256575][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.290244][ T302] device veth0_vlan left promiscuous mode [ 561.223219][T16621] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.270433][T16621] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.298287][T16621] device bridge_slave_0 entered promiscuous mode [ 561.354118][T16621] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.366700][T16621] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.404869][T16621] device bridge_slave_1 entered promiscuous mode [ 561.822389][T16653] device syzkaller0 entered promiscuous mode [ 561.927958][T16657] device syzkaller0 entered promiscuous mode [ 562.008462][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 562.026533][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 562.046843][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 562.096817][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 562.121082][ T4771] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.128177][ T4771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 562.169127][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 562.179635][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 562.197272][ T4771] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.204490][ T4771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 562.328430][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 562.361732][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 562.432772][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 562.463616][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 562.479438][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 562.515946][T16621] device veth0_vlan entered promiscuous mode [ 562.643965][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 562.703426][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 562.759481][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 562.835317][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 562.904831][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 562.922900][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 562.946310][T16621] device veth1_macvtap entered promiscuous mode [ 563.036728][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 563.069845][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 563.139292][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 563.187656][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 563.197939][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 563.216654][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 563.235366][ T4771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 563.254923][ T302] device bridge_slave_1 left promiscuous mode [ 563.270198][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.288215][ T302] device bridge_slave_0 left promiscuous mode [ 563.307521][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.318599][ T302] device veth1_macvtap left promiscuous mode [ 563.328030][ T302] device veth0_vlan left promiscuous mode [ 564.318654][T16706] device syzkaller0 entered promiscuous mode [ 564.382695][T16696] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.395923][T16696] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.414349][T16696] device bridge_slave_0 entered promiscuous mode [ 564.426650][T16696] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.464880][T16696] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.482848][T16696] device bridge_slave_1 entered promiscuous mode [ 566.664021][T16723] device syzkaller0 entered promiscuous mode [ 566.771645][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 566.781145][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 566.840861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 566.862481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.882463][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.889712][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.897891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 566.913840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 566.938608][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.945756][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.968046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 567.012983][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 567.030169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 567.069278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 567.088131][ T302] device bridge_slave_1 left promiscuous mode [ 567.095147][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.103447][ T302] device bridge_slave_0 left promiscuous mode [ 567.109855][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.118328][ T302] device veth1_macvtap left promiscuous mode [ 567.124515][ T302] device veth0_vlan left promiscuous mode [ 567.257393][T16696] device veth0_vlan entered promiscuous mode [ 567.264603][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 567.273534][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 567.281500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 567.307313][T16696] device veth1_macvtap entered promiscuous mode [ 567.320839][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 567.335564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 567.363804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 568.063256][T16772] FAULT_INJECTION: forcing a failure. [ 568.063256][T16772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.099450][T16772] CPU: 1 PID: 16772 Comm: syz.2.5796 Tainted: G W syzkaller #0 [ 568.108551][T16772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 568.119505][T16772] Call Trace: [ 568.122845][T16772] [ 568.125819][T16772] __dump_stack+0x21/0x30 [ 568.130208][T16772] dump_stack_lvl+0x110/0x170 [ 568.134922][T16772] ? show_regs_print_info+0x20/0x20 [ 568.140171][T16772] ? migrate_enable+0x1a5/0x2a0 [ 568.145229][T16772] ? migrate_disable+0x180/0x180 [ 568.150206][T16772] dump_stack+0x15/0x20 [ 568.154479][T16772] should_fail+0x3c1/0x510 [ 568.159002][T16772] should_fail_usercopy+0x1a/0x20 [ 568.164133][T16772] _copy_from_user+0x20/0xd0 [ 568.168740][T16772] generic_map_update_batch+0x4ac/0x760 [ 568.174305][T16772] ? generic_map_delete_batch+0x520/0x520 [ 568.180047][T16772] ? bpf_map_do_batch+0x99/0x5f0 [ 568.185002][T16772] ? generic_map_delete_batch+0x520/0x520 [ 568.190732][T16772] bpf_map_do_batch+0x463/0x5f0 [ 568.195609][T16772] __sys_bpf+0x65c/0x7d0 [ 568.199875][T16772] ? bpf_link_show_fdinfo+0x330/0x330 [ 568.205273][T16772] __x64_sys_bpf+0x7c/0x90 [ 568.209706][T16772] x64_sys_call+0x4b9/0x9a0 [ 568.214225][T16772] do_syscall_64+0x4c/0xa0 [ 568.218654][T16772] ? clear_bhb_loop+0x50/0xa0 [ 568.223341][T16772] ? clear_bhb_loop+0x50/0xa0 [ 568.228035][T16772] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 568.233943][T16772] RIP: 0033:0x7f25723cc799 [ 568.238376][T16772] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 568.258091][T16772] RSP: 002b:00007f2570e27028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 568.266521][T16772] RAX: ffffffffffffffda RBX: 00007f2572645fa0 RCX: 00007f25723cc799 [ 568.274600][T16772] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 568.282587][T16772] RBP: 00007f2570e27090 R08: 0000000000000000 R09: 0000000000000000 [ 568.290572][T16772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.298817][T16772] R13: 00007f2572646038 R14: 00007f2572645fa0 R15: 00007ffd4b96a908 [ 568.306909][T16772] [ 568.336240][T16780] device syzkaller0 entered promiscuous mode [ 568.380237][ T30] audit: type=1400 audit(1774361793.486:161): avc: denied { create } for pid=16782 comm="syz.4.5800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 568.508338][T16791] device syzkaller0 entered promiscuous mode [ 568.698726][T16784] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.902566][T16784] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.974882][T16784] device bridge_slave_0 entered promiscuous mode [ 569.044635][T16809] device syzkaller0 entered promiscuous mode [ 569.066949][T16784] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.128440][T16784] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.190520][T16784] device bridge_slave_1 entered promiscuous mode [ 569.252893][T16812] sock: sock_set_timeout: `syz.0.5809' (pid 16812) tries to set negative timeout [ 569.347713][T16812] device syzkaller0 entered promiscuous mode [ 570.393206][ T302] device bridge_slave_1 left promiscuous mode [ 570.409274][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.447359][ T302] device bridge_slave_0 left promiscuous mode [ 570.456859][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.468258][ T302] device veth1_macvtap left promiscuous mode [ 570.475029][ T302] device veth0_vlan left promiscuous mode [ 570.643515][T16822] device syzkaller0 entered promiscuous mode [ 570.674176][T16835] device syzkaller0 entered promiscuous mode [ 570.697438][T16838] device syzkaller0 entered promiscuous mode [ 570.853930][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 570.871496][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.005271][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 571.014235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.023393][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.030580][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.129252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 571.189695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 571.259150][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.266232][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.464997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 571.473715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 571.482486][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 571.491158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 571.500332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.508719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 571.525383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 571.582306][T16784] device veth0_vlan entered promiscuous mode [ 571.589215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 571.599530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 571.632586][T16861] FAULT_INJECTION: forcing a failure. [ 571.632586][T16861] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 571.649463][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 571.657189][T16861] CPU: 0 PID: 16861 Comm: syz.4.5824 Tainted: G W syzkaller #0 [ 571.666069][T16861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 571.676159][T16861] Call Trace: [ 571.679577][T16861] [ 571.682558][T16861] __dump_stack+0x21/0x30 [ 571.686921][T16861] dump_stack_lvl+0x110/0x170 [ 571.691643][T16861] ? show_regs_print_info+0x20/0x20 [ 571.696978][T16861] ? migrate_enable+0x1a5/0x2a0 [ 571.702209][T16861] ? migrate_disable+0x180/0x180 [ 571.707681][T16861] dump_stack+0x15/0x20 [ 571.712048][T16861] should_fail+0x3c1/0x510 [ 571.716492][T16861] should_fail_usercopy+0x1a/0x20 [ 571.721634][T16861] _copy_from_user+0x20/0xd0 [ 571.726240][T16861] generic_map_update_batch+0x45a/0x760 [ 571.731854][T16861] ? generic_map_delete_batch+0x520/0x520 [ 571.737605][T16861] ? bpf_map_do_batch+0x385/0x5f0 [ 571.742796][T16861] ? generic_map_delete_batch+0x520/0x520 [ 571.748937][T16861] bpf_map_do_batch+0x463/0x5f0 [ 571.754087][T16861] __sys_bpf+0x65c/0x7d0 [ 571.758371][T16861] ? bpf_link_show_fdinfo+0x330/0x330 [ 571.763866][T16861] __x64_sys_bpf+0x7c/0x90 [ 571.768430][T16861] x64_sys_call+0x4b9/0x9a0 [ 571.772958][T16861] do_syscall_64+0x4c/0xa0 [ 571.777404][T16861] ? clear_bhb_loop+0x50/0xa0 [ 571.782196][T16861] ? clear_bhb_loop+0x50/0xa0 [ 571.786900][T16861] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 571.792952][T16861] RIP: 0033:0x7fe4eea7e799 [ 571.797385][T16861] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 571.817117][T16861] RSP: 002b:00007fe4ed4d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 571.825572][T16861] RAX: ffffffffffffffda RBX: 00007fe4eecf7fa0 RCX: 00007fe4eea7e799 [ 571.833833][T16861] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 571.841846][T16861] RBP: 00007fe4ed4d9090 R08: 0000000000000000 R09: 0000000000000000 [ 571.850025][T16861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 571.858012][T16861] R13: 00007fe4eecf8038 R14: 00007fe4eecf7fa0 R15: 00007ffdf90f1c28 [ 571.866017][T16861] [ 571.894985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.918035][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 571.943447][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 571.955653][T16784] device veth1_macvtap entered promiscuous mode [ 571.973422][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 572.029356][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.037746][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.088673][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.097413][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 572.850400][T16888] device syzkaller0 entered promiscuous mode [ 573.171377][T16902] device syzkaller0 entered promiscuous mode [ 573.214727][T16891] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.227861][T16891] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.240782][T16891] device bridge_slave_0 entered promiscuous mode [ 573.286210][T16891] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.336076][T16891] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.390809][T16891] device bridge_slave_1 entered promiscuous mode [ 573.432532][ T302] device bridge_slave_1 left promiscuous mode [ 573.440272][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.448700][ T302] device bridge_slave_0 left promiscuous mode [ 573.455210][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.464665][ T302] device veth1_macvtap left promiscuous mode [ 573.470925][ T302] device veth0_vlan left promiscuous mode [ 573.750171][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 573.769294][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 573.815728][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 573.825203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.835347][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.843002][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.853475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 573.862243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 573.871031][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.878472][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.892630][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 573.942615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 573.994219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 574.039950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 574.055830][T16891] device veth0_vlan entered promiscuous mode [ 574.072526][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.081697][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 574.091419][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 574.104245][T16891] device veth1_macvtap entered promiscuous mode [ 574.116405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 574.135750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 574.157624][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 574.219837][T16944] FAULT_INJECTION: forcing a failure. [ 574.219837][T16944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.239143][T16944] CPU: 1 PID: 16944 Comm: syz.0.5853 Tainted: G W syzkaller #0 [ 574.248239][T16944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 574.258814][T16944] Call Trace: [ 574.262123][T16944] [ 574.265247][T16944] __dump_stack+0x21/0x30 [ 574.269677][T16944] dump_stack_lvl+0x110/0x170 [ 574.274549][T16944] ? show_regs_print_info+0x20/0x20 [ 574.279804][T16944] ? migrate_enable+0x1a5/0x2a0 [ 574.284873][T16944] ? migrate_disable+0x180/0x180 [ 574.289842][T16944] dump_stack+0x15/0x20 [ 574.294386][T16944] should_fail+0x3c1/0x510 [ 574.299088][T16944] should_fail_usercopy+0x1a/0x20 [ 574.304141][T16944] _copy_from_user+0x20/0xd0 [ 574.308971][T16944] generic_map_update_batch+0x4ac/0x760 [ 574.314565][T16944] ? generic_map_delete_batch+0x520/0x520 [ 574.320325][T16944] ? generic_map_delete_batch+0x520/0x520 [ 574.326106][T16944] bpf_map_do_batch+0x463/0x5f0 [ 574.331009][T16944] __sys_bpf+0x65c/0x7d0 [ 574.335812][T16944] ? bpf_link_show_fdinfo+0x330/0x330 [ 574.341478][T16944] ? debug_smp_processor_id+0x17/0x20 [ 574.347009][T16944] __x64_sys_bpf+0x7c/0x90 [ 574.351467][T16944] x64_sys_call+0x4b9/0x9a0 [ 574.356005][T16944] do_syscall_64+0x4c/0xa0 [ 574.360451][T16944] ? clear_bhb_loop+0x50/0xa0 [ 574.365685][T16944] ? clear_bhb_loop+0x50/0xa0 [ 574.370497][T16944] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 574.376612][T16944] RIP: 0033:0x7fc3c5595799 [ 574.381071][T16944] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 574.400947][T16944] RSP: 002b:00007fc3c3ff0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 574.409420][T16944] RAX: ffffffffffffffda RBX: 00007fc3c580efa0 RCX: 00007fc3c5595799 [ 574.417511][T16944] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 574.425522][T16944] RBP: 00007fc3c3ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 574.433538][T16944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.441545][T16944] R13: 00007fc3c580f038 R14: 00007fc3c580efa0 R15: 00007ffe76c4bfd8 [ 574.450445][T16944] [ 575.200451][T16957] device syzkaller0 entered promiscuous mode [ 575.377905][T16974] device syzkaller0 entered promiscuous mode [ 575.440330][T16964] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.447570][T16964] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.455525][T16964] device bridge_slave_0 entered promiscuous mode [ 575.463931][T16964] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.471477][T16964] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.479749][T16964] device bridge_slave_1 entered promiscuous mode [ 575.571665][T16988] device syzkaller0 entered promiscuous mode [ 575.852987][T16998] device syzkaller0 entered promiscuous mode [ 576.196616][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 576.220703][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 576.299018][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 576.340453][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 576.435025][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.442340][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.476047][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 576.484635][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 576.514738][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.522219][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.549396][T17018] device syzkaller0 entered promiscuous mode [ 576.555988][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 576.588780][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 576.623940][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 576.655879][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 576.666506][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 576.695268][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 576.703635][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.722850][T17025] device syzkaller0 entered promiscuous mode [ 576.733326][T16964] device veth0_vlan entered promiscuous mode [ 576.740102][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.747986][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.821846][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 576.830745][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 576.841200][T16964] device veth1_macvtap entered promiscuous mode [ 576.854556][ T10] device bridge_slave_1 left promiscuous mode [ 576.861159][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.869424][ T10] device bridge_slave_0 left promiscuous mode [ 576.875779][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.884952][ T10] device veth1_macvtap left promiscuous mode [ 576.891781][ T10] device veth0_vlan left promiscuous mode [ 577.117339][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 577.126256][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 577.135481][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 577.170699][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 577.179838][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 577.284901][T17041] device syzkaller0 entered promiscuous mode [ 578.546331][T17056] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.553973][T17056] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.568678][T17056] device bridge_slave_0 entered promiscuous mode [ 578.576567][T17056] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.584195][T17056] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.591967][T17056] device bridge_slave_1 entered promiscuous mode [ 578.660867][T17056] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.668213][T17056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 578.675682][T17056] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.683117][T17056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 578.790164][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.808692][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.011019][ T10] device bridge_slave_1 left promiscuous mode [ 579.017300][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.081798][ T10] device bridge_slave_0 left promiscuous mode [ 579.189129][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.222509][ T10] device veth1_macvtap left promiscuous mode [ 579.252796][ T10] device veth0_vlan left promiscuous mode [ 579.413220][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 579.439675][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.521921][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 579.552173][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.591188][T16720] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.598291][T16720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.785919][T17095] device syzkaller0 entered promiscuous mode [ 579.893303][T17056] device veth0_vlan entered promiscuous mode [ 579.907746][T17056] device veth1_macvtap entered promiscuous mode [ 579.969175][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 579.999659][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 580.058922][T16720] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.066158][T16720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 580.133289][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 580.142613][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 580.151492][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 580.160275][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 580.168525][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 580.177329][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 580.185953][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 580.194900][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 580.203749][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 580.212558][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 580.220990][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 580.257368][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 580.265586][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 580.286353][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 580.295933][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 580.346446][T17103] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 580.355026][T17103] syzkaller0: linktype set to 6 [ 580.368093][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 580.380183][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 580.507282][T17118] device syzkaller0 entered promiscuous mode [ 581.320008][ T10] device bridge_slave_1 left promiscuous mode [ 581.326449][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.334649][ T10] device bridge_slave_0 left promiscuous mode [ 581.340890][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.349627][ T10] device veth1_macvtap left promiscuous mode [ 581.355673][ T10] device veth0_vlan left promiscuous mode [ 581.628440][T17143] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.636156][T17143] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.645201][T17143] device bridge_slave_0 entered promiscuous mode [ 581.715629][T17141] device syzkaller0 entered promiscuous mode [ 581.757046][T17143] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.771006][T17143] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.801919][T17143] device bridge_slave_1 entered promiscuous mode [ 582.211448][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 582.235063][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 582.287145][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 582.355749][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 582.364113][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.371208][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.378782][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 582.389806][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 582.398331][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.406112][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.437847][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 582.456458][T17172] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.465167][T17172] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.602367][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 582.620995][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 582.656979][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 582.695530][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 582.704556][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 582.713026][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 582.792103][T17143] device veth0_vlan entered promiscuous mode [ 582.826154][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 582.866056][T17143] device veth1_macvtap entered promiscuous mode [ 583.068787][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 583.080283][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 583.160635][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 583.175791][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 584.400081][ T10] device bridge_slave_1 left promiscuous mode [ 584.406470][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.414519][ T10] device bridge_slave_0 left promiscuous mode [ 584.420817][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.429972][ T10] device veth1_macvtap left promiscuous mode [ 584.444244][ T10] device veth0_vlan left promiscuous mode [ 584.807155][T17228] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.852859][T17228] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.251076][T17228] device bridge_slave_0 entered promiscuous mode [ 585.259797][T17228] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.267210][T17228] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.276963][T17228] device bridge_slave_1 entered promiscuous mode [ 585.886556][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 585.899488][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 585.936581][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 585.998530][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 586.039307][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.046400][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.139740][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 586.188481][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 586.240530][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 586.294369][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.301710][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.420277][T17276] device syzkaller0 entered promiscuous mode [ 586.640907][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 586.668818][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 586.739396][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 586.777916][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 586.864023][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 586.883028][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 586.906385][T17228] device veth0_vlan entered promiscuous mode [ 586.930277][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 586.949231][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 586.968458][T17288] device syzkaller0 entered promiscuous mode [ 587.020686][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 587.028542][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 587.073175][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 587.089966][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 587.118677][T17228] device veth1_macvtap entered promiscuous mode [ 587.208745][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 587.240109][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 587.350563][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 587.400119][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 587.804125][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 587.941490][T17321] tap0: tun_chr_ioctl cmd 1074025677 [ 587.980739][T17321] tap0: linktype set to 780 [ 589.075264][T17329] device syzkaller0 entered promiscuous mode [ 589.116487][T17340] FAULT_INJECTION: forcing a failure. [ 589.116487][T17340] name failslab, interval 1, probability 0, space 0, times 0 [ 589.130191][T17340] CPU: 1 PID: 17340 Comm: syz.3.5985 Tainted: G W syzkaller #0 [ 589.135257][T17334] device syzkaller0 entered promiscuous mode [ 589.139089][T17340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 589.139105][T17340] Call Trace: [ 589.139111][T17340] [ 589.139119][T17340] __dump_stack+0x21/0x30 [ 589.139148][T17340] dump_stack_lvl+0x110/0x170 [ 589.139169][T17340] ? show_regs_print_info+0x20/0x20 [ 589.139194][T17340] dump_stack+0x15/0x20 [ 589.139212][T17340] should_fail+0x3c1/0x510 [ 589.139233][T17340] __should_failslab+0xa4/0xe0 [ 589.139255][T17340] should_failslab+0x9/0x20 [ 589.139275][T17340] slab_pre_alloc_hook+0x3b/0xe0 [ 589.199280][T17340] ? anon_vma_clone+0xc0/0x500 [ 589.204066][T17340] kmem_cache_alloc+0x44/0x260 [ 589.208845][T17340] anon_vma_clone+0xc0/0x500 [ 589.213447][T17340] anon_vma_fork+0x8c/0x510 [ 589.217962][T17340] copy_mm+0x9de/0x13c0 [ 589.222136][T17340] ? copy_signal+0x600/0x600 [ 589.226854][T17340] ? __init_rwsem+0xfc/0x1d0 [ 589.231474][T17340] ? copy_signal+0x4cb/0x600 [ 589.236086][T17340] copy_process+0x117c/0x3250 [ 589.240785][T17340] ? __kasan_check_write+0x14/0x20 [ 589.245912][T17340] ? __pidfd_prepare+0x150/0x150 [ 589.251052][T17340] kernel_clone+0x233/0x960 [ 589.255597][T17340] ? create_io_thread+0x170/0x170 [ 589.260637][T17340] ? __kasan_check_write+0x14/0x20 [ 589.265852][T17340] ? mutex_unlock+0x8f/0x230 [ 589.270579][T17340] __x64_sys_clone+0x198/0x210 [ 589.275359][T17340] ? __kasan_check_write+0x14/0x20 [ 589.280624][T17340] ? __ia32_sys_vfork+0x130/0x130 [ 589.286123][T17340] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 589.292410][T17340] x64_sys_call+0x41f/0x9a0 [ 589.296943][T17340] do_syscall_64+0x4c/0xa0 [ 589.301413][T17340] ? clear_bhb_loop+0x50/0xa0 [ 589.306114][T17340] ? clear_bhb_loop+0x50/0xa0 [ 589.310894][T17340] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 589.316918][T17340] RIP: 0033:0x7f8511c6b799 [ 589.321350][T17340] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 589.341505][T17340] RSP: 002b:00007f85106c5fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 589.350202][T17340] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 589.358285][T17340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 589.366444][T17340] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 589.374702][T17340] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 589.382894][T17340] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 589.390974][T17340] [ 589.495210][T17337] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.503195][T17337] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.511169][T17337] device bridge_slave_0 entered promiscuous mode [ 589.534662][T17337] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.542311][T17337] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.550225][T17337] device bridge_slave_1 entered promiscuous mode [ 590.129014][T17375] device syzkaller0 entered promiscuous mode [ 590.146654][ T10] device bridge_slave_1 left promiscuous mode [ 590.155680][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.173959][ T10] device bridge_slave_0 left promiscuous mode [ 590.186032][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.201427][ T10] device veth1_macvtap left promiscuous mode [ 590.213034][ T10] device veth0_vlan left promiscuous mode [ 590.457343][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 590.465674][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 590.499182][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 590.537320][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 590.564236][T16720] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.571571][T16720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.599122][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 590.615969][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 590.639397][T16720] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.646591][T16720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.677825][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 590.746146][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 590.795996][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 590.804648][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 590.819259][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 590.834466][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 590.922276][T17337] device veth0_vlan entered promiscuous mode [ 590.929434][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 590.989646][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 591.049361][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 591.067054][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 591.109706][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 591.122280][T17337] device veth1_macvtap entered promiscuous mode [ 591.203213][T17414] device syzkaller0 entered promiscuous mode [ 591.276322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 591.295340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 591.365629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 591.417201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 591.426096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 591.606786][T17428] device syzkaller0 entered promiscuous mode [ 592.855716][T17433] device syzkaller0 entered promiscuous mode [ 593.357427][T17443] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.372390][T17443] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.399629][T17443] device bridge_slave_0 entered promiscuous mode [ 593.408701][T17443] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.415853][T17443] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.423532][T17443] device bridge_slave_1 entered promiscuous mode [ 593.540528][T17461] device syzkaller0 entered promiscuous mode [ 593.612181][T17443] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.619294][T17443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.626714][T17443] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.633818][T17443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.694337][T17472] FAULT_INJECTION: forcing a failure. [ 593.694337][T17472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 593.707863][T17472] CPU: 0 PID: 17472 Comm: syz.0.6031 Tainted: G W syzkaller #0 [ 593.716745][T17472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 593.727812][T17472] Call Trace: [ 593.731384][T17472] [ 593.734430][T17472] __dump_stack+0x21/0x30 [ 593.738794][T17472] dump_stack_lvl+0x110/0x170 [ 593.743510][T17472] ? show_regs_print_info+0x20/0x20 [ 593.748739][T17472] ? migrate_enable+0x1a5/0x2a0 [ 593.753618][T17472] ? migrate_disable+0x180/0x180 [ 593.758585][T17472] dump_stack+0x15/0x20 [ 593.762775][T17472] should_fail+0x3c1/0x510 [ 593.767227][T17472] should_fail_usercopy+0x1a/0x20 [ 593.772274][T17472] _copy_from_user+0x20/0xd0 [ 593.777041][T17472] generic_map_update_batch+0x4ac/0x760 [ 593.782716][T17472] ? generic_map_delete_batch+0x520/0x520 [ 593.788579][T17472] ? generic_map_delete_batch+0x520/0x520 [ 593.794689][T17472] bpf_map_do_batch+0x463/0x5f0 [ 593.799574][T17472] __sys_bpf+0x65c/0x7d0 [ 593.803962][T17472] ? bpf_link_show_fdinfo+0x330/0x330 [ 593.809541][T17472] ? debug_smp_processor_id+0x17/0x20 [ 593.815139][T17472] __x64_sys_bpf+0x7c/0x90 [ 593.819593][T17472] x64_sys_call+0x4b9/0x9a0 [ 593.824506][T17472] do_syscall_64+0x4c/0xa0 [ 593.829524][T17472] ? clear_bhb_loop+0x50/0xa0 [ 593.834776][T17472] ? clear_bhb_loop+0x50/0xa0 [ 593.839582][T17472] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 593.845544][T17472] RIP: 0033:0x7fc3c5595799 [ 593.850082][T17472] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 593.870001][T17472] RSP: 002b:00007fc3c3ff0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 593.878539][T17472] RAX: ffffffffffffffda RBX: 00007fc3c580efa0 RCX: 00007fc3c5595799 [ 593.886869][T17472] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 593.897967][T17472] RBP: 00007fc3c3ff0090 R08: 0000000000000000 R09: 0000000000000000 [ 593.906161][T17472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 593.914343][T17472] R13: 00007fc3c580f038 R14: 00007fc3c580efa0 R15: 00007ffe76c4bfd8 [ 593.922360][T17472] [ 594.015692][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 594.027303][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 594.036621][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 594.047488][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 594.056657][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 594.142962][T17443] device veth0_vlan entered promiscuous mode [ 594.158388][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 594.199781][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 594.224625][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 594.275516][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 594.367663][T17443] device veth1_macvtap entered promiscuous mode [ 594.956636][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 594.981234][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 595.001859][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 595.044955][T17498] device syzkaller0 entered promiscuous mode [ 595.078656][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 595.093639][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 595.103009][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 595.111870][T16720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 595.401326][ T10] device bridge_slave_1 left promiscuous mode [ 595.407548][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.471767][ T10] device bridge_slave_0 left promiscuous mode [ 595.506336][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.536444][ T10] device veth1_macvtap left promiscuous mode [ 595.550325][ T10] device veth0_vlan left promiscuous mode [ 596.325549][T17519] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.332995][T17519] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.340800][T17519] device bridge_slave_0 entered promiscuous mode [ 596.357556][T17519] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.364835][T17519] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.372726][T17519] device bridge_slave_1 entered promiscuous mode [ 596.464279][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 596.473442][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.490074][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 596.498588][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.507241][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.514360][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.522716][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 596.531743][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 596.540465][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.547666][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.572776][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 596.580547][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 596.588640][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 596.610694][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 596.622892][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.631714][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.640028][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.654634][T17519] device veth0_vlan entered promiscuous mode [ 596.665884][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 596.675580][T17519] device veth1_macvtap entered promiscuous mode [ 596.686545][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 596.703675][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 596.748099][T17530] device syzkaller0 entered promiscuous mode [ 596.972385][T17543] device syzkaller0 entered promiscuous mode [ 597.190735][T17546] device syzkaller0 entered promiscuous mode [ 597.838371][T17537] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.849047][T17537] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.857012][T17537] device bridge_slave_0 entered promiscuous mode [ 597.865204][ T10] device dummy0 left promiscuous mode [ 597.871120][ T10] ¥: port 1(dummy0) entered disabled state [ 597.878324][ T10] device veth0_to_team left promiscuous mode [ 597.885468][ T10] Ÿë: port 1(veth0_to_team) entered disabled state [ 597.894204][ T10] device bridge_slave_1 left promiscuous mode [ 597.901007][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.908784][ T10] device bridge_slave_0 left promiscuous mode [ 597.915786][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.930788][ T10] device veth0_vlan left promiscuous mode [ 597.955365][ T10] device veth1_macvtap left promiscuous mode [ 597.961939][ T10] device veth0_vlan left promiscuous mode [ 598.828792][T17537] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.846353][T17537] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.898919][T17537] device bridge_slave_1 entered promiscuous mode [ 598.982023][T17583] device syzkaller0 entered promiscuous mode [ 600.982113][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 601.007022][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 601.030992][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 601.045857][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.058150][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.065380][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.093755][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 601.110377][T17611] FAULT_INJECTION: forcing a failure. [ 601.110377][T17611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.116018][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 601.125357][T17611] CPU: 1 PID: 17611 Comm: syz.3.6078 Tainted: G W syzkaller #0 [ 601.140954][T17611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 601.151122][T17611] Call Trace: [ 601.154428][T17611] [ 601.157388][T17611] __dump_stack+0x21/0x30 [ 601.161744][T17611] dump_stack_lvl+0x110/0x170 [ 601.166439][T17611] ? show_regs_print_info+0x20/0x20 [ 601.171652][T17611] dump_stack+0x15/0x20 [ 601.175927][T17611] should_fail+0x3c1/0x510 [ 601.180362][T17611] should_fail_alloc_page+0x55/0x80 [ 601.185592][T17611] prepare_alloc_pages+0x156/0x610 [ 601.190729][T17611] ? __alloc_pages_bulk+0xad0/0xad0 [ 601.195944][T17611] __alloc_pages+0x11d/0x460 [ 601.200548][T17611] ? prep_new_page+0x110/0x110 [ 601.205329][T17611] ? arch_stack_walk+0xee/0x140 [ 601.210292][T17611] pte_alloc_one+0x70/0x190 [ 601.215021][T17611] ? pfn_modify_allowed+0x2f0/0x2f0 [ 601.220234][T17611] ? stack_trace_save+0xa6/0xf0 [ 601.225114][T17611] ? __stack_depot_save+0x34/0x480 [ 601.230245][T17611] ? copy_mm+0x9de/0x13c0 [ 601.234590][T17611] __pte_alloc+0x75/0x2a0 [ 601.238933][T17611] ? __kasan_check_write+0x14/0x20 [ 601.244067][T17611] ? _raw_spin_lock+0x94/0xf0 [ 601.248762][T17611] ? free_pgtables+0x280/0x280 [ 601.253540][T17611] ? __kasan_check_write+0x14/0x20 [ 601.258782][T17611] copy_page_range+0x237c/0x28d0 [ 601.263760][T17611] ? pfn_valid+0x1d0/0x1d0 [ 601.268204][T17611] copy_mm+0xbf2/0x13c0 [ 601.272389][T17611] ? copy_signal+0x600/0x600 [ 601.277044][T17611] ? __init_rwsem+0xfc/0x1d0 [ 601.281666][T17611] ? copy_signal+0x4cb/0x600 [ 601.286283][T17611] copy_process+0x117c/0x3250 [ 601.290985][T17611] ? __kasan_check_write+0x14/0x20 [ 601.296293][T17611] ? __pidfd_prepare+0x150/0x150 [ 601.301331][T17611] kernel_clone+0x233/0x960 [ 601.305945][T17611] ? create_io_thread+0x170/0x170 [ 601.310986][T17611] ? __kasan_check_write+0x14/0x20 [ 601.316119][T17611] ? mutex_unlock+0x8f/0x230 [ 601.320727][T17611] __x64_sys_clone+0x198/0x210 [ 601.325530][T17611] ? __kasan_check_write+0x14/0x20 [ 601.330653][T17611] ? __ia32_sys_vfork+0x130/0x130 [ 601.335704][T17611] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 601.341875][T17611] x64_sys_call+0x41f/0x9a0 [ 601.346488][T17611] do_syscall_64+0x4c/0xa0 [ 601.350916][T17611] ? clear_bhb_loop+0x50/0xa0 [ 601.355609][T17611] ? clear_bhb_loop+0x50/0xa0 [ 601.360296][T17611] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 601.366199][T17611] RIP: 0033:0x7f8511c6b799 [ 601.370633][T17611] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 601.390263][T17611] RSP: 002b:00007f85106c5fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 601.398787][T17611] RAX: ffffffffffffffda RBX: 00007f8511ee4fa0 RCX: 00007f8511c6b799 [ 601.407040][T17611] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 601.415125][T17611] RBP: 00007f85106c6090 R08: 0000000000000000 R09: 0000000000000000 [ 601.423114][T17611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 601.431515][T17611] R13: 00007f8511ee5038 R14: 00007f8511ee4fa0 R15: 00007fffcc492d38 [ 601.439635][T17611] [ 601.474323][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 601.483227][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 601.490411][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 601.519798][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 601.528825][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 601.560660][T17621] device syzkaller0 entered promiscuous mode [ 601.574744][T17537] device veth0_vlan entered promiscuous mode [ 601.592994][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 601.610409][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 601.618682][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 601.628586][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 601.653789][T17537] device veth1_macvtap entered promiscuous mode [ 601.677623][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 601.686950][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 601.696437][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 601.799265][ C0] Illegal XDP return value 16128, expect packet loss! [ 602.680365][ T10] device bridge_slave_1 left promiscuous mode [ 602.686517][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.694154][ T10] device bridge_slave_0 left promiscuous mode [ 602.700450][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.708643][ T10] device veth1_macvtap left promiscuous mode [ 602.714769][ T10] device veth0_vlan left promiscuous mode [ 603.177631][T17637] device syzkaller0 entered promiscuous mode [ 603.208723][T17636] device syzkaller0 entered promiscuous mode [ 603.558514][T17640] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.568909][T17640] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.578199][T17640] device bridge_slave_0 entered promiscuous mode [ 603.597148][T17640] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.604861][T17640] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.613494][T17640] device bridge_slave_1 entered promiscuous mode [ 603.665581][T17667] FAULT_INJECTION: forcing a failure. [ 603.665581][T17667] name failslab, interval 1, probability 0, space 0, times 0 [ 603.678759][T17667] CPU: 1 PID: 17667 Comm: syz.4.6097 Tainted: G W syzkaller #0 [ 603.687680][T17667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 603.697935][T17667] Call Trace: [ 603.701232][T17667] [ 603.704177][T17667] __dump_stack+0x21/0x30 [ 603.708549][T17667] dump_stack_lvl+0x110/0x170 [ 603.713336][T17667] ? show_regs_print_info+0x20/0x20 [ 603.718644][T17667] dump_stack+0x15/0x20 [ 603.723199][T17667] should_fail+0x3c1/0x510 [ 603.727641][T17667] __should_failslab+0xa4/0xe0 [ 603.732643][T17667] should_failslab+0x9/0x20 [ 603.737171][T17667] slab_pre_alloc_hook+0x3b/0xe0 [ 603.742131][T17667] ? anon_vma_fork+0x200/0x510 [ 603.747096][T17667] kmem_cache_alloc+0x44/0x260 [ 603.752082][T17667] anon_vma_fork+0x200/0x510 [ 603.756708][T17667] copy_mm+0x9de/0x13c0 [ 603.760889][T17667] ? copy_signal+0x600/0x600 [ 603.765502][T17667] ? __init_rwsem+0xfc/0x1d0 [ 603.770151][T17667] ? copy_signal+0x4cb/0x600 [ 603.774765][T17667] copy_process+0x117c/0x3250 [ 603.779477][T17667] ? __kasan_check_write+0x14/0x20 [ 603.784738][T17667] ? __pidfd_prepare+0x150/0x150 [ 603.790003][T17667] kernel_clone+0x233/0x960 [ 603.794625][T17667] ? create_io_thread+0x170/0x170 [ 603.799682][T17667] ? __kasan_check_write+0x14/0x20 [ 603.804956][T17667] ? mutex_unlock+0x8f/0x230 [ 603.809580][T17667] __x64_sys_clone+0x198/0x210 [ 603.814364][T17667] ? __kasan_check_write+0x14/0x20 [ 603.819511][T17667] ? __ia32_sys_vfork+0x130/0x130 [ 603.825017][T17667] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 603.831130][T17667] x64_sys_call+0x41f/0x9a0 [ 603.835755][T17667] do_syscall_64+0x4c/0xa0 [ 603.840200][T17667] ? clear_bhb_loop+0x50/0xa0 [ 603.844928][T17667] ? clear_bhb_loop+0x50/0xa0 [ 603.849626][T17667] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 603.855551][T17667] RIP: 0033:0x7f819f064799 [ 603.859989][T17667] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 603.879804][T17667] RSP: 002b:00007f819dabefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 603.888811][T17667] RAX: ffffffffffffffda RBX: 00007f819f2ddfa0 RCX: 00007f819f064799 [ 603.897259][T17667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040800000 [ 603.905435][T17667] RBP: 00007f819dabf090 R08: 0000000000000000 R09: 0000000000000000 [ 603.913777][T17667] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 603.921893][T17667] R13: 00007f819f2de038 R14: 00007f819f2ddfa0 R15: 00007ffe8b86b7e8 [ 603.929919][T17667] [ 604.143935][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 604.159503][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.185069][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 604.206476][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.231797][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.239020][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.276755][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 604.356527][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.415587][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.422896][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.652432][T17696] device syzkaller0 entered promiscuous mode [ 604.689267][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 604.723158][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 604.780178][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.829598][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.915014][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 605.022144][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 605.036179][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 605.051242][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 605.066841][T17640] device veth0_vlan entered promiscuous mode [ 605.119083][T17704] device syzkaller0 entered promiscuous mode [ 605.146546][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 605.162380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 605.211810][T17640] device veth1_macvtap entered promiscuous mode [ 605.277144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 605.289358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 605.364336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 605.426444][T17728] device syzkaller0 entered promiscuous mode [ 605.446316][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 605.469526][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 605.613258][T17640] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 605.625214][T17640] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 605.633663][T17640] CPU: 0 PID: 17640 Comm: syz-executor Tainted: G W syzkaller #0 [ 605.642706][T17640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 605.652790][T17640] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 605.658468][T17640] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 0e 40 38 ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 eb 3f 38 ff 41 f6 45 00 01 48 89 [ 605.678382][T17640] RSP: 0018:ffffc90000ba7a00 EFLAGS: 00010246 [ 605.684491][T17640] RAX: dffffc0000000000 RBX: ffff88811e01a630 RCX: 1ffff11023c034c6 [ 605.692843][T17640] RDX: ffffffff819c9ca0 RSI: 1ffff11022335e4a RDI: ffff88811e01a620 [ 605.701245][T17640] RBP: ffffc90000ba7a60 R08: ffff8881119af26f R09: 1ffff11022335e4d [ 605.709516][T17640] R10: dffffc0000000000 R11: ffffed1022335e4e R12: 1ffff11023c034c7 [ 605.717717][T17640] R13: 0000000000000000 R14: ffff88811e01a620 R15: 0000000000000000 [ 605.725929][T17640] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 605.734983][T17640] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 605.741891][T17640] CR2: 00007f85106a5d58 CR3: 000000011138e000 CR4: 00000000003506b0 [ 605.750346][T17640] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 605.758361][T17640] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 605.766375][T17640] Call Trace: [ 605.769708][T17640] [ 605.772754][T17640] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 605.779703][T17640] vma_interval_tree_remove+0xadc/0xb00 [ 605.785406][T17640] unlink_file_vma+0xda/0xf0 [ 605.790030][T17640] free_pgtables+0x139/0x280 [ 605.794659][T17640] exit_mmap+0x433/0x8b0 [ 605.799114][T17640] ? vm_brk+0x30/0x30 [ 605.803125][T17640] ? mutex_unlock+0x8f/0x230 [ 605.807754][T17640] ? uprobe_clear_state+0x2c1/0x320 [ 605.812996][T17640] __mmput+0x93/0x320 [ 605.817200][T17640] ? mmput+0x48/0x150 [ 605.821212][T17640] mmput+0x50/0x150 [ 605.825047][T17640] do_exit+0x9f2/0x27e0 [ 605.829343][T17640] ? put_task_struct+0x90/0x90 [ 605.834137][T17640] ? __fdget_pos+0x1f7/0x380 [ 605.838859][T17640] ? ksys_write+0x1e4/0x250 [ 605.843395][T17640] ? __ia32_sys_read+0x90/0x90 [ 605.848283][T17640] do_group_exit+0x141/0x310 [ 605.853078][T17640] ? debug_smp_processor_id+0x17/0x20 [ 605.858694][T17640] __x64_sys_exit_group+0x3f/0x40 [ 605.863757][T17640] x64_sys_call+0x832/0x9a0 [ 605.868295][T17640] do_syscall_64+0x4c/0xa0 [ 605.872745][T17640] ? clear_bhb_loop+0x50/0xa0 [ 605.877457][T17640] ? clear_bhb_loop+0x50/0xa0 [ 605.882299][T17640] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 605.888239][T17640] RIP: 0033:0x7fa4fce1f799 [ 605.892794][T17640] Code: Unable to access opcode bytes at RIP 0x7fa4fce1f76f. [ 605.900599][T17640] RSP: 002b:00007ffd1de8b118 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 605.909222][T17640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa4fce1f799 [ 605.917409][T17640] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 [ 605.925416][T17640] RBP: 00007fa4fce8d0e0 R08: 0000000000000000 R09: 0000000000000003 [ 605.933422][T17640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.941690][T17640] R13: 0000000000000003 R14: 00000000ffffffff R15: 00007ffd1de8b2d0 [ 605.949698][T17640] [ 605.952734][T17640] Modules linked in: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 605.958039][ T30] audit: type=1400 audit(1774361831.056:162): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14632]" dev="pipefs" ino=14632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 606.017202][T17640] ---[ end trace eeeca1bd9f2857a2 ]--- [ 606.022801][T17640] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 606.028877][T17640] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 0e 40 38 ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 eb 3f 38 ff 41 f6 45 00 01 48 89 [ 606.059359][T17640] RSP: 0018:ffffc90000ba7a00 EFLAGS: 00010246 [ 606.086136][T17640] RAX: dffffc0000000000 RBX: ffff88811e01a630 RCX: 1ffff11023c034c6 [ 606.109003][T17640] RDX: ffffffff819c9ca0 RSI: 1ffff11022335e4a RDI: ffff88811e01a620 [ 606.117232][ T30] audit: type=1400 audit(1774361831.086:163): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 606.158988][T17640] RBP: ffffc90000ba7a60 R08: ffff8881119af26f R09: 1ffff11022335e4d [ 606.177189][T17640] R10: dffffc0000000000 R11: ffffed1022335e4e R12: 1ffff11023c034c7 [ 606.185656][ T30] audit: type=1400 audit(1774361831.086:164): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 606.208795][T17640] R13: 0000000000000000 R14: ffff88811e01a620 R15: 0000000000000000 [ 606.228281][T17640] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 606.247812][T17640] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 606.255064][ T30] audit: type=1400 audit(1774361831.086:165): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 606.277254][T17640] CR2: 00007f85106c6660 CR3: 000000011de34000 CR4: 00000000003506b0 [ 606.285553][T17640] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 606.293868][T17640] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 606.302391][ T30] audit: type=1400 audit(1774361831.086:166): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 606.325130][T17640] Kernel panic - not syncing: Fatal exception [ 606.332264][T17640] Kernel Offset: disabled [ 606.336795][T17640] Rebooting in 86400 seconds..