last executing test programs: 17.812231364s ago: executing program 1 (id=774): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1e1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000122) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2}, 0x94) close(0x3) 15.002395325s ago: executing program 1 (id=774): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1e1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000122) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2}, 0x94) close(0x3) 12.084867959s ago: executing program 1 (id=774): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1e1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000122) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2}, 0x94) close(0x3) 8.179034146s ago: executing program 1 (id=774): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1e1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000122) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2}, 0x94) close(0x3) 5.793333202s ago: executing program 1 (id=774): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1e1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000122) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2}, 0x94) close(0x3) 4.486752105s ago: executing program 4 (id=1046): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x18}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x1a}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0x50}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xa, 0x9}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r2, @ANYBLOB='\b\x00'/20, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0400e5ff00000000c600000000000000000000000000000000000000c167bc75d30343477a6b31d22d965aa3b514e77a94b28502cd1d20133f58fccc349cb9a20f11e034be1c1e0419754574d1bb6fe2959cbc9f648837a6c28cbaf8dc3ed1da5bf7214caf5c7d9d3acf28982ca9f85ea2c0b6d0d569028dc4e2a588097369ab2848d0d02fbf8e3d33e8f97f3dd333418f5db6272b10b4b4d89340b5326b7d653eab63e72242ac0af221a5996a8bc49701277458ea92f93f038da8194d4d012370a368cb9b70fd4fe284f2fcaa1a52f07d24da0b538cf73271d212ff4579d9d470856b3fc9546ebcc0b78d3f4a21cdb8d2f5a73875fc98a0"], 0x50) 4.413353157s ago: executing program 4 (id=1047): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x5, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbf, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xb3, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x9, [@union={0x7, 0x8, 0x0, 0x5, 0x0, 0x7, [{0xe, 0x1, 0x7}, {0xa, 0x5, 0xff}, {0x5, 0x1, 0x800}, {0xc, 0x0, 0xfff}, {0x1, 0x2, 0x8}, {0x9, 0x0, 0x7}, {0xb, 0x4, 0x3ff}, {0x3, 0x5c3f, 0xf}]}, @enum={0x3, 0xa, 0x0, 0x6, 0x4, [{0x0, 0x6923}, {0xe, 0x3}, {0xa, 0x5}, {0x3, 0x7}, {0x10, 0x1}, {0xf, 0xa}, {0xe, 0x72d}, {0x9, 0x9}, {0x9, 0x40}, {0x9, 0xdd}]}, @decl_tag={0xa, 0x0, 0x0, 0x11, 0x5, 0x8}]}, {0x0, [0x30, 0x5f, 0x0, 0x5f, 0x30, 0x2e, 0x30]}}, &(0x7f0000000900)=""/33, 0xf9, 0x21, 0x1, 0xe}, 0x28) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7bffffff04000000080000000100001c77000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x16}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @map_fd={0x18, 0xa, 0x1, 0x0, r5}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x21, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb39, 0x0, 0x0, 0x0, 0x5d}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x86}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x60, &(0x7f0000000180)=""/96, 0x40f00, 0x20, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b00)=[r5, r0, r0, r0, r0, r0], &(0x7f0000000b40)=[{0x0, 0x6, 0xf, 0x4}, {0x4, 0x3, 0x4}, {0x1, 0x1, 0xe, 0x7}, {0x0, 0x3, 0x3, 0x7}], 0x10, 0x3}, 0x94) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000008c0)=0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000220000000000000", @ANYRES32=0x1, @ANYBLOB="7eba00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x1, '\x00', r3, r4, 0x4, 0x1, 0x5}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r8, &(0x7f00000000c0)="7c61d53ceb7d5f606e3e776caf6dd8", &(0x7f0000000100)=""/33, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r9}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="18500000ae5203ba000000000000000095"], &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x94) r12 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r11) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x0, 0x10, 0xfc, 0x0, 0x0, 0x200, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x6531aa1a, 0xeb}, 0x0, 0xc8, 0x9, 0x0, 0xffffffffffffffff, 0x5a, 0x0, 0x0, 0x8, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 2.753256911s ago: executing program 1 (id=774): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1e1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000122) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2}, 0x94) close(0x3) 1.604273278s ago: executing program 2 (id=1066): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x9, 0x0, 0x8001, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)}, 0x40) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x14, &(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000700000700000086000000bf0900000000000055090100000000009500000000000000bd0a"], &(0x7f0000000080)='GPL\x00', 0x3, 0x100f, &(0x7f0000001cc0)=""/4111, 0x41100, 0x2}, 0x94) (async) write$cgroup_int(r1, &(0x7f0000000200)=0x1, 0x12) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000009702000020febfff7a0af0fff8ff00f869a4f0ff00000000b70600001218d1fe2d640500000000002404000000ffffffd404000020000000b704000010000020720700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fca868f0399d909a63396c113943219aab9d607000000cb3924b611f5969f62c28b22edf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa8a23f1740637c48468766af54043000000ec44631ac2622cdcae18c3d14bfbe96dd87235b44174f7c034318508f49f09781dc7a2cfbb9a0f119e31975f551557f05dc2dc2739e2e735d0ab961dac07f4f6d8aa1c3f16765d427c0e01000000fe4c16737d50d2a4bfc463450d524eacf2b734b0289c7a3a16eeca71296746681d61af491e4fa734318e0d72b8dbbc2b2b869af2f87903000000b6ecc7de09a2257e908cd92e664fa7aba7f07474863333c460e34caf0806a7e2575a56fba3eadd8efbd5dae6c024585d972b1bf8c4e872bba38160be9e92b6ddb90fc51b894917b50876b5708e64e70f7d8225da90ce9bc019084873ed07c0c59c4ba053fe77e0d37ccc3318da2e9fefaf025527e734ed1de5d12b4c56ca3b03dc121086061d1f26821a428d28eefa22ead6a3dab9388da53263b81ebe6be197a48a63440000a356240c4e2df57457000100000000000000000000008d2516510b29804b3cc034c19cef0d773f01064709edd63a185cbab8456c25283b9514b220fe401503ff536478088eb9fd932a0703a7bf9ea40429b2d49177824f210a69f8e5227fd32e7d5a2c7ecf57ac64509224090000000000000096e5a55d2c805bf725b9d14756c8cfa292aae0872866cf9fe063317741a0db9081d4393a7f9bcc0917d60a11b4a9ece831660ce625de441cef915eba31255d163f7033045ceb97f8ea006efc5b84f75ca1fb74c9faef444eb12f46b435de87feb2f7f2d7fb659395e4b38178b5c67e6ac100000000000000001b2e77bd5de136fa1bec1a26c622bb9662d9ee70147acc5605aa2318855cb8b918000000c5f265dcb5dce05f94ea051c4e8dcdf37d01ad7aff64f84ce32b841c799f47c2949725285fc50f1dd3f5e264023082eec752704c1f598151aa7d29e0d79522df196278acf327a74777d1f658f50c27020198770ff8ebef9df1b750d56d4d195ad7a267c46b3348b0e03ed33b5bca13cafc304dc6da78d20f029742d8d2f36acfdd331081ca00c1d5c8b7bed2ef603d6e7f1764246aab2d7d531559a971939a038055ac28625ec837f824ff537cd67993a3589be73a18680da50287b9e962b1a0235c290346a21ca5de55c49c78e411c791617000ef8df75411a5d300000000000000e0ffffff004deb8d49806823655735bd6deb49edb2e42f4ed9e6e9080366660b847bf03c144f6796920726dcf29e9a6c808459e82cbb0000000000000000000000000000000000006b5530865aaa7aa6171f66f2bca881a4201588427bb65ed3d5e7a74e9b5ece44067d4a9875a310bc7ec42b844b9eb3c9083560ef5c92b8a01188d615efbf70893d2eaf76517e990021fa5020a71023bca1194ad87cade480ba3dce8f57294e31ca24a8d181210bb6d18ff2c58293c2e314a7447ed3a1c870908aa8e3b33e6a94c7381bce9fa71dcbb758451f247e38d80d66e03d7564a5cddfaf06574b05cefb2670f30c2d501ee625ce3ffc08f15b53d28ce552c1807bc6866f06098a0e5517068aa48f2a82496fe83ee85218fe7f52b48742c7055f2a144c13e9c54be60b0a4f979ef7eb216897875946dc6ca1571930b1cf7c93de103f5289f782ae538e02612c717a76c787a873936eb8dcf1bfe581cc8ef965a0424bc140939e3274e251e519d188f6af680402c49458065dccfcb4f0d4f2ec9cf6fb3cf0a1807e34fb8d0108007734c1d2bc6a9d32d2560a88bad976b6000100002b712e632eeca810fb73fc8aaef94acf8bde18b9149cadc688254eabbe91f943592ccf68e717bcc6852828bd621e3a9dcb1cc6f1a6d1915200d95087838c2dc0a002c3aa554f725b965714144652cdc14761b0236f1a05b7f50f4149057e63d713103b5a6c2919161efc165a2e6981d76d29c95ad9f180135fb8962f59495fd33be3a6d35274941790bc1bd9da5e9c67c39de2c9f6fe35b8f528edbd8ea2a77dccdc3fe247feb121d9440a3ea9012a9d23a7e3110b0f25c5f8bf803d688de4d92b5dfdbd69fb8b426b55c10ba01b5f18b10cce8de3369300000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2}, 0x48) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000300)=r7) (async) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 1.602985308s ago: executing program 4 (id=1068): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 1.577682319s ago: executing program 4 (id=1069): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) write$cgroup_int(r1, &(0x7f00000001c0), 0xfffffdef) (fail_nth: 10) ioctl$TUNSETIFF(r1, 0x5421, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 1.556986689s ago: executing program 2 (id=1071): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000003}, 0x2, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000002600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 1.261092629s ago: executing program 2 (id=1073): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup=r0, 0x8, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0]}, 0x40) 1.260078719s ago: executing program 3 (id=1074): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 1.217845181s ago: executing program 4 (id=1075): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/2848], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffd78, 0x10, &(0x7f0000000000), 0x143}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 1.217333301s ago: executing program 2 (id=1076): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x15, 0x7, 0x0, &(0x7f00000000c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.21564677s ago: executing program 3 (id=1077): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) 1.063020165s ago: executing program 3 (id=1078): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000080000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x81fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r5, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x3d, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000001c0)=r7) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 1.062662695s ago: executing program 0 (id=1079): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) write$cgroup_int(r1, &(0x7f00000001c0)=0x8700000000000000, 0xfffffdef) ioctl$TUNSETIFF(r1, 0x5421, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 959.494979ms ago: executing program 0 (id=1080): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x480, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x001', @ANYRES32=0x0], 0x48) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c23003f) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x8000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}, 0x10}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x6, 0x1}, {0xf, 0x5}, {0x7, 0x1}, {0xe, 0x4}, {0xe, 0x5}, {0x10, 0x4}, {0x5, 0x1}]}, @func={0x4, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x7e}, 0x28) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 802.476284ms ago: executing program 2 (id=1081): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000034f0e61000000000000000004000000bb7f1a007600feff180020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) 427.662226ms ago: executing program 0 (id=1082): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/2848], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffd78, 0x10, &(0x7f0000000000), 0x143}, 0x48) 426.890636ms ago: executing program 3 (id=1083): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x2, 0x0, 0xfe}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800700}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 384.151308ms ago: executing program 0 (id=1084): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001680), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x43}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1a, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000830081000000000000000000550901001600000095000000000000183b0000030000000a000000006af200184000000400000000000000000000001827000000", @ANYRES32, @ANYBLOB="00000000010000003a3508000100000018110000"], &(0x7f0000000040)='GPL\x00', 0xffff8001, 0x35, &(0x7f0000000200)=""/53, 0x41000, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x3, 0xe2c, 0xab97}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000540)=[{0x4, 0x5, 0xd, 0xc}, {0x3, 0x5, 0x4}, {0x4, 0x100, 0x9, 0xb}, {0x2, 0x2, 0x2, 0x7}, {0x0, 0x4, 0x4, 0x4}], 0x10, 0x5}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r0, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000940)=[0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f00000009c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 256.857562ms ago: executing program 3 (id=1085): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000005c0)={0x7f, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={@fallback, r0, 0x30, 0x39, 0xffffffffffffffff, @void, @void, @void, @value=r1}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xb0ff}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800700}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 176.631674ms ago: executing program 4 (id=1086): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x5, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbf, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xb3, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x9, [@union={0x7, 0x8, 0x0, 0x5, 0x0, 0x7, [{0xe, 0x1, 0x7}, {0xa, 0x5, 0xff}, {0x5, 0x1, 0x800}, {0xc, 0x0, 0xfff}, {0x1, 0x2, 0x8}, {0x9, 0x0, 0x7}, {0xb, 0x4, 0x3ff}, {0x3, 0x5c3f, 0xf}]}, @enum={0x3, 0xa, 0x0, 0x6, 0x4, [{0x0, 0x6923}, {0xe, 0x3}, {0xa, 0x5}, {0x3, 0x7}, {0x10, 0x1}, {0xf, 0xa}, {0xe, 0x72d}, {0x9, 0x9}, {0x9, 0x40}, {0x9, 0xdd}]}, @decl_tag={0xa, 0x0, 0x0, 0x11, 0x5, 0x8}]}, {0x0, [0x30, 0x5f, 0x0, 0x5f, 0x30, 0x2e, 0x30]}}, &(0x7f0000000900)=""/33, 0xf9, 0x21, 0x1, 0xe}, 0x28) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7bffffff04000000080000000100001c77000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x16}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @map_fd={0x18, 0xa, 0x1, 0x0, r5}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x21, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb39, 0x0, 0x0, 0x0, 0x5d}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x86}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x60, &(0x7f0000000180)=""/96, 0x40f00, 0x20, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b00)=[r5, r0, r0, r0, r0, r0], &(0x7f0000000b40)=[{0x0, 0x6, 0xf, 0x4}, {0x4, 0x3, 0x4}, {0x1, 0x1, 0xe, 0x7}, {0x0, 0x3, 0x3, 0x7}], 0x10, 0x3}, 0x94) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000008c0)=0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000220000000000000", @ANYRES32=0x1, @ANYBLOB="7eba00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x1, '\x00', r3, r4, 0x4, 0x1, 0x5}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r8, &(0x7f00000000c0)="7c61d53ceb7d5f606e3e776caf6dd8", &(0x7f0000000100)=""/33, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r9}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="18500000ae5203ba000000000000000095"], &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x94) r12 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r11) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x0, 0x10, 0xfc, 0x0, 0x0, 0x200, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x6531aa1a, 0xeb}, 0x0, 0xc8, 0x9, 0x0, 0xffffffffffffffff, 0x5a, 0x0, 0x0, 0x8, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 138.926436ms ago: executing program 0 (id=1087): socketpair(0x20, 0x1, 0x0, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xd, &(0x7f0000000180)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffff8}, [@call={0x85, 0x0, 0x0, 0x36}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r2, 0x0, 0xe, 0x0, &(0x7f0000000140)="05a42f284a5bf1fa61960ae8f0f9", 0x0, 0x4fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r3 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r4, 0x20, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000c80)=""/4096, 0x1000}}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r3, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1d, 0x6, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x1, 0x3, 0x8, 0x4, 0x20, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xca}, @jmp={0x5, 0x1, 0xc, 0xb, 0x8, 0x10, 0x92e4c5e2f2ef6224}, @jmp={0x5, 0x0, 0x4, 0xa, 0x1, 0x50, 0xfffffffffffffffc}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x1}], &(0x7f0000000500)='GPL\x00', 0x0, 0xaf, &(0x7f0000000540)=""/175, 0x41100, 0xa, '\x00', r7, @lsm=0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x5, 0xc, 0x6b, 0x8}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0, 0x10, 0x1}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000600)={0x0, r6}, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x43a003, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{}, &(0x7f0000000b40), &(0x7f0000000b80)='%pi6 \x00'}, 0x20) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x0) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000680)={'batadv_slave_1\x00', 0x200}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000b98bc2c900000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) r10 = getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000240)="c495", 0x2}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c, 0x1, 0x2, {r10, 0xee01, 0xee01}}}], 0x20, 0x10}, 0xa8d1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x2, '\x00', r7, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0x2000000, 0xe, 0x0, &(0x7f0000000380)="0000000000000000000000000400", 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYRES32=r7, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x16, '\x00', r7, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r11, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 101.716287ms ago: executing program 2 (id=1088): r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8983, &(0x7f00000008c0)='Zk3\xd7\xbd\x02\xee\x1fYS\xb9\xe0F\x7f\x96\xbe\fB2\xe4\xa0%H3\xf7\xbd\xfc\xa2\xcf&\xf1\x00\x81\xce\xfa\x9e\xc8\xff\xfb\xc1\xa9\xc2\x84\xcfag\xb6\x8d\x1f\x0e?\xaf\xd9\xe0\x9eF\xd6\xff\xfdg\xc2\xcb<\x93i\xf8DJDR\xf3-\xdf\x02d\x8a\x8b\v\xef|\x81<\xef\x8e\x9e1\x95\xcc\'\x8b\xbe\xa1\xade\xc5\x8at\xb4\xef\xef\xfb\n\xdd\x8f7\xf5\x8a\xc6\x85\rVF\xed\x9a\x8b\xaf\xc5NM\x8d\x98\x8d\xaf\xe4\xf3\xdc\xdd\xd1 $s|\xb8\xe8\xf2YW\xd1#\x94\xce+L\xfe\x86\x83\xee\xec-\x15t\xcd\x91\x0fL\x9e\xbee\xd8\xa7\x18\xd6\x88\x15.\xe2\x18+\x9a01\xccb\xf1ll\xeev\xf0\x0f\xab\xd0q\xddf\x83\x95\xe3\xb1.\x1a\xc4D\xa7\x15\xe0G\xa5\xe6\x8c\xfd\xbdP\x1f\x98G\x8e&yJB\x84\xa7\xc7t(\xde\xecs\x12Qy\aL\xc8\v\xfc\xc5\xb8m\xadd\xc4\v\xce\xbdXi\x0e\xe1\xe0\xf2s\x1cw\xd4\xe8l\xc7K\xf7\xf3L\xd2\xbf\x8a\xf6\xd6m\xe7\x97\xc15`\x81\xc1wU@\xec\xa5\x014\x9a\xa1\xaa\x1ev\xd4\xcb\xc5\xe1\x8c\x9f\xc8(\xfd.\x15b\x95\xc9\xc3\x86\xd0\xef\xf1n\f\xb6tL\xd5Na\xa3\xfb\xb8o\xb4') perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x80000001, 0x8}, 0xc) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/360, @ANYRES32=r2, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="05000000020000000100"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000007f00000000000000b202000018010000202073cf23000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000060000001845000005000000000000000000000085100000050000009500000000000000b0603f7d2e3457b20af1a594bc5ed36d360b15dac68806461414d2a4327aeb7c3cec482d5986c5ebfdf4eef0eeb0fc7204a6a68b231104d00d5957a2260fb6d21691d2ca36614e49cd459220959b483c3fde745dae289383817742820000000000000000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000240)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x0, 0x3, 0xfffffffe}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r8, r9, r2, r3, r3], 0x0, 0x10, 0x8004}, 0x94) r10 = syz_clone(0x1022400, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r13 = openat$cgroup_procs(r12, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r13, &(0x7f0000000080)=r10, 0x12) 1.10377ms ago: executing program 3 (id=1089): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18069e020000070000008b29632fb76c9e6c00"/34], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000180)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b22868cd415ab9bc48b055a8b3f92b143cb16138c206513a045af2101e7e3c507bedee404330f117181", 0x0, 0x0, 0x0, 0x1}, 0x38) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x9}, 0x10, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xfffffffe, '\x00', 0x0, r0, 0x0, 0x100}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000600"/27], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) close(r3) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 0 (id=1090): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0x3) (fail_nth: 1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.9' (ED25519) to the list of known hosts. [ 54.380069][ T28] audit: type=1400 audit(1774965977.319:64): avc: denied { mounton } for pid=277 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 54.381668][ T277] cgroup: Unknown subsys name 'net' [ 54.403134][ T28] audit: type=1400 audit(1774965977.319:65): avc: denied { mount } for pid=277 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 54.430563][ T28] audit: type=1400 audit(1774965977.359:66): avc: denied { unmount } for pid=277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 54.430720][ T277] cgroup: Unknown subsys name 'devices' [ 54.546227][ T277] cgroup: Unknown subsys name 'hugetlb' [ 54.551861][ T277] cgroup: Unknown subsys name 'rlimit' [ 54.664386][ T28] audit: type=1400 audit(1774965977.609:67): avc: denied { setattr } for pid=277 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.687708][ T28] audit: type=1400 audit(1774965977.609:68): avc: denied { mounton } for pid=277 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 54.695840][ T279] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 54.712612][ T28] audit: type=1400 audit(1774965977.609:69): avc: denied { mount } for pid=277 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 54.744331][ T28] audit: type=1400 audit(1774965977.669:70): avc: denied { relabelto } for pid=279 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 54.758400][ T277] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 54.770344][ T28] audit: type=1400 audit(1774965977.669:71): avc: denied { write } for pid=279 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 54.805449][ T28] audit: type=1400 audit(1774965977.689:72): avc: denied { read } for pid=277 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 54.831328][ T28] audit: type=1400 audit(1774965977.689:73): avc: denied { open } for pid=277 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 55.569326][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.576533][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.585000][ T285] device bridge_slave_0 entered promiscuous mode [ 55.593460][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.600835][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.608476][ T285] device bridge_slave_1 entered promiscuous mode [ 55.672664][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.679989][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.688563][ T289] device bridge_slave_0 entered promiscuous mode [ 55.697025][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.704334][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.711772][ T289] device bridge_slave_1 entered promiscuous mode [ 55.747870][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.754987][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.763451][ T286] device bridge_slave_0 entered promiscuous mode [ 55.773955][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.781412][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.789086][ T286] device bridge_slave_1 entered promiscuous mode [ 55.858050][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.865381][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.873028][ T287] device bridge_slave_0 entered promiscuous mode [ 55.893720][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.900947][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.908465][ T287] device bridge_slave_1 entered promiscuous mode [ 55.951881][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.959118][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.966781][ T288] device bridge_slave_0 entered promiscuous mode [ 55.986815][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.993947][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.001612][ T288] device bridge_slave_1 entered promiscuous mode [ 56.101574][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.108752][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.121770][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.128848][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.136389][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.143606][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.151924][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.159167][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.167544][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.174602][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.194651][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.201714][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.209008][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.216043][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.238058][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.245147][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.252520][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.259576][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.290813][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.298391][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.305838][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.314116][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.321923][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.329445][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.336894][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.344417][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.351636][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.359293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.366720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.389038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.396893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.405419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.413654][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.420867][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.428449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.436842][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.443860][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.451359][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.459843][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.466981][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.474555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.482704][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.489753][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.497264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.505362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.524170][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.532787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.541154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.568972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.588624][ T285] device veth0_vlan entered promiscuous mode [ 56.595812][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.604063][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.611122][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.618607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.627269][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.634483][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.641815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.650191][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.657215][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.665333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.673621][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.680687][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.688191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.696021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.703497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.711865][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.720280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.728545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.736946][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.745168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.753280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 56.761341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.772788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.781008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.799093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.807299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.815549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.825205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.833367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.846075][ T287] device veth0_vlan entered promiscuous mode [ 56.858616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.866722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.874329][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.881796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 56.890464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.903470][ T289] device veth0_vlan entered promiscuous mode [ 56.916956][ T288] device veth0_vlan entered promiscuous mode [ 56.929879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.938609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.947069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.955261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.962812][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.971210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.979600][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.986743][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.994458][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.002949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.011262][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.020663][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.028295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.036233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.044630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.052974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.061664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.070144][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.080059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.087712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.095364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.103689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.116446][ T288] device veth1_macvtap entered promiscuous mode [ 57.128646][ T287] device veth1_macvtap entered promiscuous mode [ 57.136525][ T285] device veth1_macvtap entered promiscuous mode [ 57.144771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.153303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.161292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.173359][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.181631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.192671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.201109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.211582][ T289] device veth1_macvtap entered promiscuous mode [ 57.224051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.232065][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.240692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.249645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.258053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.266898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.275482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.289458][ T286] device veth0_vlan entered promiscuous mode [ 57.303322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.311736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.320369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 57.328961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.337520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.346238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.354950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.362867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.371231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.379734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.388310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.395873][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.404370][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.412644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.431671][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 57.435410][ T286] device veth1_macvtap entered promiscuous mode [ 57.446943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.455959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.464912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.501925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.512792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.635474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.652674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.894093][ C1] hrtimer: interrupt took 26868 ns [ 60.029306][ T363] device syzkaller0 entered promiscuous mode [ 60.616691][ T378] ±ÿ: renamed from team_slave_1 [ 60.754768][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 60.754791][ T28] audit: type=1400 audit(1774965983.699:107): avc: denied { create } for pid=366 comm="syz.2.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 60.865458][ T28] audit: type=1400 audit(1774965983.699:108): avc: denied { create } for pid=377 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 64.017985][ T28] audit: type=1400 audit(1774965986.959:109): avc: denied { write } for pid=434 comm="syz.4.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 69.096785][ T28] audit: type=1400 audit(1774965992.039:110): avc: denied { create } for pid=478 comm="syz.4.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 72.709495][ T507] device syzkaller0 entered promiscuous mode [ 72.875515][ T28] audit: type=1400 audit(1774965995.819:111): avc: denied { relabelfrom } for pid=506 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 73.087992][ T28] audit: type=1400 audit(1774965995.819:112): avc: denied { relabelto } for pid=506 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 82.254477][ T28] audit: type=1400 audit(1774966005.199:113): avc: denied { tracepoint } for pid=599 comm="syz.2.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 82.735982][ T28] audit: type=1400 audit(1774966005.679:114): avc: denied { setopt } for pid=595 comm="syz.3.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.844839][ T613] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.852044][ T613] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.867780][ T28] audit: type=1400 audit(1774966005.779:115): avc: denied { read } for pid=595 comm="syz.3.93" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 82.938088][ T28] audit: type=1400 audit(1774966005.789:116): avc: denied { open } for pid=595 comm="syz.3.93" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 83.049416][ T613] device bridge_slave_1 left promiscuous mode [ 83.058859][ T613] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.068428][ T28] audit: type=1400 audit(1774966005.909:117): avc: denied { ioctl } for pid=595 comm="syz.3.93" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x745a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 83.095707][ T613] device bridge_slave_0 left promiscuous mode [ 83.108856][ T613] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.887610][ T28] audit: type=1400 audit(1774966008.829:118): avc: denied { create } for pid=650 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 87.852575][ T28] audit: type=1400 audit(1774966010.789:119): avc: denied { create } for pid=666 comm="syz.4.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 88.894528][ T680] Driver unsupported XDP return value 0 on prog (id 84) dev N/A, expect packet loss! [ 89.084807][ T28] audit: type=1400 audit(1774966012.029:120): avc: denied { create } for pid=679 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 89.266395][ T680] device veth1_macvtap left promiscuous mode [ 89.298764][ T683] device veth1_macvtap entered promiscuous mode [ 89.352281][ T683] device macsec0 entered promiscuous mode [ 90.180132][ T701] device bridge0 entered promiscuous mode [ 94.838822][ T826] device syzkaller0 entered promiscuous mode [ 95.700333][ T28] audit: type=1400 audit(1774966018.639:121): avc: denied { read } for pid=863 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 95.879321][ T28] audit: type=1400 audit(1774966018.729:122): avc: denied { write } for pid=869 comm="syz.1.183" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 95.974996][ T830] device bridge0 entered promiscuous mode [ 98.256731][ T903] device syzkaller0 entered promiscuous mode [ 102.520638][ T28] audit: type=1400 audit(1774966025.459:123): avc: denied { create } for pid=1030 comm="syz.4.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.027930][ T1027] syz.3.235 (1027) used greatest stack depth: 21792 bytes left [ 105.787613][ T16] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 105.787644][ T1059] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 105.877237][ T28] audit: type=1400 audit(1774966028.819:124): avc: denied { create } for pid=1112 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 109.408122][ T28] audit: type=1400 audit(1774966032.349:125): avc: denied { create } for pid=1305 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 113.425025][ T1495] FAULT_INJECTION: forcing a failure. [ 113.425025][ T1495] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 113.458230][ T1495] CPU: 0 PID: 1495 Comm: syz.0.405 Not tainted syzkaller #0 [ 113.465548][ T1495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 113.475623][ T1495] Call Trace: [ 113.478901][ T1495] [ 113.481828][ T1495] __dump_stack+0x21/0x24 [ 113.486267][ T1495] dump_stack_lvl+0x110/0x170 [ 113.490949][ T1495] ? __cfi_dump_stack_lvl+0x8/0x8 [ 113.496068][ T1495] ? memcpy+0x56/0x70 [ 113.500197][ T1495] dump_stack+0x15/0x24 [ 113.504369][ T1495] should_fail_ex+0x3d4/0x520 [ 113.509056][ T1495] should_fail+0xb/0x10 [ 113.513219][ T1495] should_fail_usercopy+0x1a/0x20 [ 113.518259][ T1495] strncpy_from_user+0x24/0x2d0 [ 113.523205][ T1495] bpf_prog_load+0x1fe/0x16a0 [ 113.527882][ T1495] ? map_freeze+0x390/0x390 [ 113.532384][ T1495] ? selinux_bpf+0xc7/0xf0 [ 113.536815][ T1495] ? security_bpf+0x93/0xb0 [ 113.541318][ T1495] __sys_bpf+0x57b/0x850 [ 113.545551][ T1495] ? bpf_link_show_fdinfo+0x330/0x330 [ 113.551097][ T1495] ? __cfi_ksys_write+0x10/0x10 [ 113.555940][ T1495] ? do_user_addr_fault+0x9ac/0x1050 [ 113.561392][ T1495] ? debug_smp_processor_id+0x17/0x20 [ 113.566804][ T1495] __x64_sys_bpf+0x7c/0x90 [ 113.571333][ T1495] x64_sys_call+0x488/0x9a0 [ 113.575854][ T1495] do_syscall_64+0x4c/0xa0 [ 113.580297][ T1495] ? clear_bhb_loop+0x30/0x80 [ 113.585001][ T1495] ? clear_bhb_loop+0x30/0x80 [ 113.589818][ T1495] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 113.595733][ T1495] RIP: 0033:0x7ffa7319c819 [ 113.600257][ T1495] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 113.620230][ T1495] RSP: 002b:00007ffa74107028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.628645][ T1495] RAX: ffffffffffffffda RBX: 00007ffa73415fa0 RCX: 00007ffa7319c819 [ 113.636630][ T1495] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 113.644706][ T1495] RBP: 00007ffa74107090 R08: 0000000000000000 R09: 0000000000000000 [ 113.652690][ T1495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.660758][ T1495] R13: 00007ffa73416038 R14: 00007ffa73415fa0 R15: 00007ffc3cb16628 [ 113.668925][ T1495] [ 116.141956][ T1571] batadv0: tun_chr_ioctl cmd 1074025677 [ 116.184524][ T1571] batadv0: linktype set to 270 [ 116.912761][ T28] audit: type=1400 audit(1774966039.849:126): avc: denied { create } for pid=1594 comm="syz.2.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 116.934235][ T1595] bridge0: port 3(ip6gretap0) entered blocking state [ 116.941025][ T1595] bridge0: port 3(ip6gretap0) entered disabled state [ 117.121860][ T1595] device ip6gretap0 entered promiscuous mode [ 117.154504][ T1595] bridge0: port 3(ip6gretap0) entered blocking state [ 117.161335][ T1595] bridge0: port 3(ip6gretap0) entered forwarding state [ 117.420368][ T28] audit: type=1400 audit(1774966040.359:127): avc: denied { append } for pid=1601 comm="syz.1.445" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 117.633198][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.648855][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.466775][ T1716] bridge0: port 3(ip6gretap0) entered disabled state [ 120.482345][ T1716] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.496777][ T1716] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.772057][ T1728] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.779383][ T1728] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.048548][ T28] audit: type=1400 audit(1774966043.989:128): avc: denied { create } for pid=1763 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 121.400264][ T1802] FAULT_INJECTION: forcing a failure. [ 121.400264][ T1802] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 121.413756][ T1802] CPU: 1 PID: 1802 Comm: syz.0.521 Not tainted syzkaller #0 [ 121.421150][ T1802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 121.431220][ T1802] Call Trace: [ 121.434502][ T1802] [ 121.437437][ T1802] __dump_stack+0x21/0x24 [ 121.441783][ T1802] dump_stack_lvl+0x110/0x170 [ 121.446477][ T1802] ? __cfi_dump_stack_lvl+0x8/0x8 [ 121.451522][ T1802] ? prep_new_page+0x1c/0x110 [ 121.456220][ T1802] dump_stack+0x15/0x24 [ 121.460408][ T1802] should_fail_ex+0x3d4/0x520 [ 121.465191][ T1802] should_fail_alloc_page+0x61/0x90 [ 121.470407][ T1802] prepare_alloc_pages+0x148/0x600 [ 121.475539][ T1802] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 121.480780][ T1802] __alloc_pages+0x15b/0x610 [ 121.485486][ T1802] ? __cfi___alloc_pages+0x10/0x10 [ 121.490777][ T1802] ? __alloc_pages+0x1fa/0x610 [ 121.495555][ T1802] ? __cfi___alloc_pages+0x10/0x10 [ 121.500839][ T1802] ? __kasan_check_write+0x14/0x20 [ 121.505966][ T1802] ? _raw_spin_lock+0x94/0xf0 [ 121.510836][ T1802] pte_alloc_one+0x70/0x190 [ 121.515361][ T1802] ? __cfi_pte_alloc_one+0x10/0x10 [ 121.520470][ T1802] ? _raw_spin_unlock+0x4c/0x70 [ 121.525309][ T1802] ? __pmd_alloc+0x402/0x4b0 [ 121.529889][ T1802] ? __kasan_check_write+0x14/0x20 [ 121.535069][ T1802] __pte_alloc+0x75/0x2a0 [ 121.539474][ T1802] ? __cfi___pmd_alloc+0x10/0x10 [ 121.544393][ T1802] ? __cfi___pte_alloc+0x10/0x10 [ 121.549402][ T1802] ? __kasan_check_read+0x11/0x20 [ 121.554415][ T1802] handle_mm_fault+0x2338/0x26c0 [ 121.559347][ T1802] ? __cfi_handle_mm_fault+0x10/0x10 [ 121.564620][ T1802] ? down_read_trylock+0x27f/0x660 [ 121.569895][ T1802] ? lock_mm_and_find_vma+0x9e/0x320 [ 121.575274][ T1802] ? do_user_addr_fault+0x2ee/0x1050 [ 121.580543][ T1802] do_user_addr_fault+0x63b/0x1050 [ 121.585725][ T1802] exc_page_fault+0x51/0xb0 [ 121.590210][ T1802] asm_exc_page_fault+0x27/0x30 [ 121.595107][ T1802] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 121.600810][ T1802] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 121.620441][ T1802] RSP: 0018:ffffc90010c27e60 EFLAGS: 00050297 [ 121.626503][ T1802] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 00002000000001c0 [ 121.634464][ T1802] RDX: ffff888113c28000 RSI: 0000000000000005 RDI: 0000000000000000 [ 121.642435][ T1802] RBP: ffffc90010c27ec8 R08: ffff8881118d0c27 R09: 1ffff1102231a184 [ 121.650478][ T1802] R10: dffffc0000000000 R11: ffffed102231a185 R12: 000000000000000a [ 121.658530][ T1802] R13: 00002000000001c0 R14: 0000000000000004 R15: 0000000000000000 [ 121.666586][ T1802] ? __sys_socketpair+0xac/0x5b0 [ 121.671612][ T1802] __x64_sys_socketpair+0x9b/0xb0 [ 121.676623][ T1802] x64_sys_call+0x6e/0x9a0 [ 121.681024][ T1802] do_syscall_64+0x4c/0xa0 [ 121.685510][ T1802] ? clear_bhb_loop+0x30/0x80 [ 121.690177][ T1802] ? clear_bhb_loop+0x30/0x80 [ 121.694867][ T1802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.700850][ T1802] RIP: 0033:0x7ffa7319c819 [ 121.705252][ T1802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.724924][ T1802] RSP: 002b:00007ffa74107028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 121.733349][ T1802] RAX: ffffffffffffffda RBX: 00007ffa73415fa0 RCX: 00007ffa7319c819 [ 121.741302][ T1802] RDX: 0000000080000000 RSI: 000000000000000a RDI: 000000000000002a [ 121.749264][ T1802] RBP: 00007ffa74107090 R08: 0000000000000000 R09: 0000000000000000 [ 121.757325][ T1802] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 121.765288][ T1802] R13: 00007ffa73416038 R14: 00007ffa73415fa0 R15: 00007ffc3cb16628 [ 121.773245][ T1802] [ 121.925233][ T28] audit: type=1400 audit(1774966044.869:129): avc: denied { create } for pid=1814 comm="syz.0.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 122.109106][ T1835] device syzkaller0 entered promiscuous mode [ 122.138075][ T1847] FAULT_INJECTION: forcing a failure. [ 122.138075][ T1847] name failslab, interval 1, probability 0, space 0, times 1 [ 122.150810][ T1847] CPU: 0 PID: 1847 Comm: syz.4.538 Not tainted syzkaller #0 [ 122.158157][ T1847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 122.168208][ T1847] Call Trace: [ 122.171480][ T1847] [ 122.174484][ T1847] __dump_stack+0x21/0x24 [ 122.178814][ T1847] dump_stack_lvl+0x110/0x170 [ 122.183561][ T1847] ? __cfi_dump_stack_lvl+0x8/0x8 [ 122.188656][ T1847] ? __mod_node_page_state+0x9e/0xd0 [ 122.194043][ T1847] dump_stack+0x15/0x24 [ 122.198186][ T1847] should_fail_ex+0x3d4/0x520 [ 122.202849][ T1847] ? __anon_vma_prepare+0x51/0x420 [ 122.207955][ T1847] __should_failslab+0xac/0xf0 [ 122.212821][ T1847] should_failslab+0x9/0x20 [ 122.217339][ T1847] kmem_cache_alloc+0x3b/0x330 [ 122.222441][ T1847] __anon_vma_prepare+0x51/0x420 [ 122.227390][ T1847] handle_mm_fault+0x248c/0x26c0 [ 122.232421][ T1847] ? __cfi_handle_mm_fault+0x10/0x10 [ 122.237829][ T1847] ? down_read_trylock+0x27f/0x660 [ 122.242980][ T1847] ? lock_mm_and_find_vma+0x9e/0x320 [ 122.248386][ T1847] ? do_user_addr_fault+0x2ee/0x1050 [ 122.253787][ T1847] do_user_addr_fault+0x63b/0x1050 [ 122.258924][ T1847] exc_page_fault+0x51/0xb0 [ 122.263724][ T1847] asm_exc_page_fault+0x27/0x30 [ 122.268867][ T1847] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 122.274600][ T1847] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 122.294475][ T1847] RSP: 0018:ffffc9000f68fe60 EFLAGS: 00050297 [ 122.300636][ T1847] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 00002000000001c0 [ 122.308613][ T1847] RDX: ffff888113d88000 RSI: 0000000000000005 RDI: 0000000000000000 [ 122.316659][ T1847] RBP: ffffc9000f68fec8 R08: ffff88810b7ff7a7 R09: 1ffff110216ffef4 [ 122.324616][ T1847] R10: dffffc0000000000 R11: ffffed10216ffef5 R12: 000000000000000a [ 122.332569][ T1847] R13: 00002000000001c0 R14: 0000000000000004 R15: 0000000000000000 [ 122.340541][ T1847] ? __sys_socketpair+0xac/0x5b0 [ 122.345474][ T1847] __x64_sys_socketpair+0x9b/0xb0 [ 122.350590][ T1847] x64_sys_call+0x6e/0x9a0 [ 122.355187][ T1847] do_syscall_64+0x4c/0xa0 [ 122.359771][ T1847] ? clear_bhb_loop+0x30/0x80 [ 122.364432][ T1847] ? clear_bhb_loop+0x30/0x80 [ 122.369092][ T1847] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 122.374969][ T1847] RIP: 0033:0x7f63e0f9c819 [ 122.379373][ T1847] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 122.398961][ T1847] RSP: 002b:00007f63e1e6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 122.407445][ T1847] RAX: ffffffffffffffda RBX: 00007f63e1215fa0 RCX: 00007f63e0f9c819 [ 122.415487][ T1847] RDX: 0000000080000000 RSI: 000000000000000a RDI: 000000000000002a [ 122.423457][ T1847] RBP: 00007f63e1e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 122.431517][ T1847] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 122.439491][ T1847] R13: 00007f63e1216038 R14: 00007f63e1215fa0 R15: 00007ffd69bd0ce8 [ 122.447472][ T1847] [ 122.857560][ T28] audit: type=1400 audit(1774966045.799:130): avc: denied { create } for pid=1874 comm="syz.2.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 123.077761][ T1900] device syzkaller0 entered promiscuous mode [ 123.277191][ T1924] FAULT_INJECTION: forcing a failure. [ 123.277191][ T1924] name failslab, interval 1, probability 0, space 0, times 0 [ 123.488354][ T1924] CPU: 1 PID: 1924 Comm: syz.1.567 Not tainted syzkaller #0 [ 123.495764][ T1924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 123.506000][ T1924] Call Trace: [ 123.509285][ T1924] [ 123.512426][ T1924] __dump_stack+0x21/0x24 [ 123.516772][ T1924] dump_stack_lvl+0x110/0x170 [ 123.521540][ T1924] ? __cfi_dump_stack_lvl+0x8/0x8 [ 123.526652][ T1924] ? mas_prev+0x21c/0x3f0 [ 123.531147][ T1924] dump_stack+0x15/0x24 [ 123.535452][ T1924] should_fail_ex+0x3d4/0x520 [ 123.540113][ T1924] ? __anon_vma_prepare+0x9a/0x420 [ 123.545209][ T1924] __should_failslab+0xac/0xf0 [ 123.549960][ T1924] should_failslab+0x9/0x20 [ 123.554442][ T1924] kmem_cache_alloc+0x3b/0x330 [ 123.559194][ T1924] ? __anon_vma_prepare+0x51/0x420 [ 123.564326][ T1924] __anon_vma_prepare+0x9a/0x420 [ 123.569282][ T1924] handle_mm_fault+0x248c/0x26c0 [ 123.574207][ T1924] ? __cfi_handle_mm_fault+0x10/0x10 [ 123.579485][ T1924] ? down_read_trylock+0x27f/0x660 [ 123.584584][ T1924] ? lock_mm_and_find_vma+0x9e/0x320 [ 123.589855][ T1924] ? do_user_addr_fault+0x2ee/0x1050 [ 123.595214][ T1924] do_user_addr_fault+0x63b/0x1050 [ 123.600321][ T1924] exc_page_fault+0x51/0xb0 [ 123.604893][ T1924] asm_exc_page_fault+0x27/0x30 [ 123.609724][ T1924] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 123.615638][ T1924] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 123.635394][ T1924] RSP: 0018:ffffc90011337e60 EFLAGS: 00050297 [ 123.641453][ T1924] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 00002000000001c0 [ 123.649669][ T1924] RDX: ffff8881182a0000 RSI: 0000000000000005 RDI: 0000000000000000 [ 123.657625][ T1924] RBP: ffffc90011337ec8 R08: ffff8881123f6f27 R09: 1ffff1102247ede4 [ 123.665901][ T1924] R10: dffffc0000000000 R11: ffffed102247ede5 R12: 000000000000000a [ 123.673935][ T1924] R13: 00002000000001c0 R14: 0000000000000004 R15: 0000000000000000 [ 123.681897][ T1924] ? __sys_socketpair+0xac/0x5b0 [ 123.686838][ T1924] __x64_sys_socketpair+0x9b/0xb0 [ 123.691847][ T1924] x64_sys_call+0x6e/0x9a0 [ 123.696274][ T1924] do_syscall_64+0x4c/0xa0 [ 123.700863][ T1924] ? clear_bhb_loop+0x30/0x80 [ 123.705545][ T1924] ? clear_bhb_loop+0x30/0x80 [ 123.710233][ T1924] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 123.716210][ T1924] RIP: 0033:0x7f585d19c819 [ 123.720612][ T1924] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 123.740297][ T1924] RSP: 002b:00007f585e06e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 123.748734][ T1924] RAX: ffffffffffffffda RBX: 00007f585d415fa0 RCX: 00007f585d19c819 [ 123.757177][ T1924] RDX: 0000000080000000 RSI: 000000000000000a RDI: 000000000000002a [ 123.765521][ T1924] RBP: 00007f585e06e090 R08: 0000000000000000 R09: 0000000000000000 [ 123.773680][ T1924] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 123.781908][ T1924] R13: 00007f585d416038 R14: 00007f585d415fa0 R15: 00007ffe0c3f9fd8 [ 123.789886][ T1924] [ 124.318502][ T28] audit: type=1400 audit(1774966047.259:131): avc: denied { create } for pid=1928 comm="syz.4.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.116855][ T2063] device syz_tun entered promiscuous mode [ 127.211167][ T2068] FAULT_INJECTION: forcing a failure. [ 127.211167][ T2068] name failslab, interval 1, probability 0, space 0, times 0 [ 127.242114][ T2068] CPU: 0 PID: 2068 Comm: syz.4.621 Not tainted syzkaller #0 [ 127.249433][ T2068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 127.259493][ T2068] Call Trace: [ 127.262776][ T2068] [ 127.265792][ T2068] __dump_stack+0x21/0x24 [ 127.270229][ T2068] dump_stack_lvl+0x110/0x170 [ 127.274907][ T2068] ? __cfi_dump_stack_lvl+0x8/0x8 [ 127.279936][ T2068] ? avc_has_perm+0x163/0x250 [ 127.284619][ T2068] dump_stack+0x15/0x24 [ 127.288781][ T2068] should_fail_ex+0x3d4/0x520 [ 127.293607][ T2068] __should_failslab+0xac/0xf0 [ 127.298567][ T2068] should_failslab+0x9/0x20 [ 127.303290][ T2068] slab_pre_alloc_hook+0x30/0x1e0 [ 127.308350][ T2068] kmem_cache_alloc_lru+0x49/0x280 [ 127.313478][ T2068] ? sock_alloc_inode+0x28/0xc0 [ 127.318341][ T2068] sock_alloc_inode+0x28/0xc0 [ 127.323018][ T2068] ? __cfi_sock_alloc_inode+0x10/0x10 [ 127.328400][ T2068] new_inode_pseudo+0x70/0x1f0 [ 127.333168][ T2068] __sock_create+0x12c/0x7c0 [ 127.337851][ T2068] __sys_socketpair+0x1a1/0x5b0 [ 127.342812][ T2068] __x64_sys_socketpair+0x9b/0xb0 [ 127.347949][ T2068] x64_sys_call+0x6e/0x9a0 [ 127.352369][ T2068] do_syscall_64+0x4c/0xa0 [ 127.356902][ T2068] ? clear_bhb_loop+0x30/0x80 [ 127.361575][ T2068] ? clear_bhb_loop+0x30/0x80 [ 127.366257][ T2068] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 127.372157][ T2068] RIP: 0033:0x7f63e0f9c819 [ 127.376572][ T2068] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 127.396378][ T2068] RSP: 002b:00007f63e1e6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 127.404808][ T2068] RAX: ffffffffffffffda RBX: 00007f63e1215fa0 RCX: 00007f63e0f9c819 [ 127.412784][ T2068] RDX: 0000000080000000 RSI: 000000000000000a RDI: 000000000000002a [ 127.420932][ T2068] RBP: 00007f63e1e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 127.429011][ T2068] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 127.437075][ T2068] R13: 00007f63e1216038 R14: 00007f63e1215fa0 R15: 00007ffd69bd0ce8 [ 127.445317][ T2068] [ 127.477835][ T28] audit: type=1400 audit(1774966050.419:132): avc: denied { create } for pid=2073 comm="syz.3.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 127.534659][ T2068] socket: no more sockets [ 127.964018][ T2104] device wg2 entered promiscuous mode [ 128.481206][ T28] audit: type=1400 audit(1774966051.419:133): avc: denied { create } for pid=2134 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 128.602838][ T2135] device syzkaller0 entered promiscuous mode [ 129.250983][ T2155] -: renamed from syzkaller0 [ 129.383840][ T2164] device syzkaller0 entered promiscuous mode [ 129.481726][ T2164] device veth1_macvtap left promiscuous mode [ 129.518540][ T2164] device veth1_macvtap entered promiscuous mode [ 129.551132][ T2164] device macsec0 entered promiscuous mode [ 129.799074][ T28] audit: type=1400 audit(1774966052.739:134): avc: denied { create } for pid=2184 comm="syz.1.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 129.961287][ T2188] FAULT_INJECTION: forcing a failure. [ 129.961287][ T2188] name failslab, interval 1, probability 0, space 0, times 0 [ 130.030622][ T2188] CPU: 0 PID: 2188 Comm: syz.2.670 Not tainted syzkaller #0 [ 130.037940][ T2188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 130.047999][ T2188] Call Trace: [ 130.051282][ T2188] [ 130.054225][ T2188] __dump_stack+0x21/0x24 [ 130.058574][ T2188] dump_stack_lvl+0x110/0x170 [ 130.063262][ T2188] ? __cfi_dump_stack_lvl+0x8/0x8 [ 130.068296][ T2188] ? __cfi_avc_has_perm+0x10/0x10 [ 130.074203][ T2188] dump_stack+0x15/0x24 [ 130.078653][ T2188] should_fail_ex+0x3d4/0x520 [ 130.083385][ T2188] __should_failslab+0xac/0xf0 [ 130.088160][ T2188] ? __request_module+0x2a7/0x910 [ 130.093454][ T2188] should_failslab+0x9/0x20 [ 130.098019][ T2188] __kmem_cache_alloc_node+0x3d/0x2c0 [ 130.103669][ T2188] ? __request_module+0x2a7/0x910 [ 130.109165][ T2188] kmalloc_trace+0x29/0xb0 [ 130.113677][ T2188] ? __sock_create+0x2fc/0x7c0 [ 130.118451][ T2188] __request_module+0x2a7/0x910 [ 130.123580][ T2188] ? __kasan_slab_alloc+0x72/0x80 [ 130.128764][ T2188] ? __cfi___request_module+0x10/0x10 [ 130.134404][ T2188] ? security_inode_alloc+0x33/0x120 [ 130.139714][ T2188] ? _raw_spin_lock+0x94/0xf0 [ 130.144422][ T2188] ? __cfi__raw_spin_lock+0x10/0x10 [ 130.149732][ T2188] ? security_inode_alloc+0xd1/0x120 [ 130.155112][ T2188] ? inode_init_always+0x714/0x960 [ 130.160236][ T2188] __sock_create+0x2fc/0x7c0 [ 130.164845][ T2188] __sys_socketpair+0x1a1/0x5b0 [ 130.169722][ T2188] __x64_sys_socketpair+0x9b/0xb0 [ 130.174756][ T2188] x64_sys_call+0x6e/0x9a0 [ 130.179277][ T2188] do_syscall_64+0x4c/0xa0 [ 130.183727][ T2188] ? clear_bhb_loop+0x30/0x80 [ 130.188423][ T2188] ? clear_bhb_loop+0x30/0x80 [ 130.193126][ T2188] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 130.199117][ T2188] RIP: 0033:0x7f449659c819 [ 130.203532][ T2188] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 130.223399][ T2188] RSP: 002b:00007f4497400028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 130.231822][ T2188] RAX: ffffffffffffffda RBX: 00007f4496815fa0 RCX: 00007f449659c819 [ 130.239870][ T2188] RDX: 0000000080000000 RSI: 000000000000000a RDI: 000000000000002a [ 130.247886][ T2188] RBP: 00007f4497400090 R08: 0000000000000000 R09: 0000000000000000 [ 130.255863][ T2188] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 130.263928][ T2188] R13: 00007f4496816038 R14: 00007f4496815fa0 R15: 00007ffe988e1ff8 [ 130.272114][ T2188] [ 131.107015][ T2246] FAULT_INJECTION: forcing a failure. [ 131.107015][ T2246] name failslab, interval 1, probability 0, space 0, times 0 [ 131.205244][ T2246] CPU: 1 PID: 2246 Comm: syz.2.693 Not tainted syzkaller #0 [ 131.212754][ T2246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 131.223645][ T2246] Call Trace: [ 131.227111][ T2246] [ 131.230148][ T2246] __dump_stack+0x21/0x24 [ 131.234593][ T2246] dump_stack_lvl+0x110/0x170 [ 131.239470][ T2246] ? __cfi_dump_stack_lvl+0x8/0x8 [ 131.244601][ T2246] dump_stack+0x15/0x24 [ 131.249118][ T2246] should_fail_ex+0x3d4/0x520 [ 131.253984][ T2246] __should_failslab+0xac/0xf0 [ 131.258779][ T2246] ? __request_module+0x2c3/0x910 [ 131.263908][ T2246] should_failslab+0x9/0x20 [ 131.269136][ T2246] __kmem_cache_alloc_node+0x3d/0x2c0 [ 131.274531][ T2246] ? __request_module+0x2c3/0x910 [ 131.279660][ T2246] __kmalloc_node_track_caller+0xa0/0x1e0 [ 131.285512][ T2246] ? __kasan_kmalloc+0x95/0xb0 [ 131.290562][ T2246] kstrdup+0x3b/0x80 [ 131.294483][ T2246] __request_module+0x2c3/0x910 [ 131.299499][ T2246] ? __kasan_slab_alloc+0x72/0x80 [ 131.304671][ T2246] ? __cfi___request_module+0x10/0x10 [ 131.310173][ T2246] ? security_inode_alloc+0x33/0x120 [ 131.315481][ T2246] ? _raw_spin_lock+0x94/0xf0 [ 131.320183][ T2246] ? __cfi__raw_spin_lock+0x10/0x10 [ 131.325497][ T2246] ? security_inode_alloc+0xd1/0x120 [ 131.330897][ T2246] ? inode_init_always+0x714/0x960 [ 131.336196][ T2246] __sock_create+0x2fc/0x7c0 [ 131.340807][ T2246] __sys_socketpair+0x1a1/0x5b0 [ 131.346132][ T2246] __x64_sys_socketpair+0x9b/0xb0 [ 131.351624][ T2246] x64_sys_call+0x6e/0x9a0 [ 131.356243][ T2246] do_syscall_64+0x4c/0xa0 [ 131.360767][ T2246] ? clear_bhb_loop+0x30/0x80 [ 131.365547][ T2246] ? clear_bhb_loop+0x30/0x80 [ 131.370427][ T2246] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 131.376684][ T2246] RIP: 0033:0x7f449659c819 [ 131.381117][ T2246] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 131.400905][ T2246] RSP: 002b:00007f4497400028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 131.409506][ T2246] RAX: ffffffffffffffda RBX: 00007f4496815fa0 RCX: 00007f449659c819 [ 131.418192][ T2246] RDX: 0000000080000000 RSI: 000000000000000a RDI: 000000000000002a [ 131.426399][ T2246] RBP: 00007f4497400090 R08: 0000000000000000 R09: 0000000000000000 [ 131.435077][ T2246] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000002 [ 131.443762][ T2246] R13: 00007f4496816038 R14: 00007f4496815fa0 R15: 00007ffe988e1ff8 [ 131.452275][ T2246] [ 132.171844][ T28] audit: type=1400 audit(1774966055.099:135): avc: denied { create } for pid=2275 comm="syz.3.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 133.374348][ T2316] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.388518][ T2316] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.443383][ T2316] device bridge0 left promiscuous mode [ 133.752900][ T2325] device wg2 entered promiscuous mode [ 133.810087][ T2336] FAULT_INJECTION: forcing a failure. [ 133.810087][ T2336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.855192][ T2336] CPU: 0 PID: 2336 Comm: syz.2.726 Not tainted syzkaller #0 [ 133.862600][ T2336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 133.872840][ T2336] Call Trace: [ 133.876222][ T2336] [ 133.879165][ T2336] __dump_stack+0x21/0x24 [ 133.883511][ T2336] dump_stack_lvl+0x110/0x170 [ 133.888245][ T2336] ? __cfi_dump_stack_lvl+0x8/0x8 [ 133.893474][ T2336] dump_stack+0x15/0x24 [ 133.897675][ T2336] should_fail_ex+0x3d4/0x520 [ 133.902368][ T2336] should_fail+0xb/0x10 [ 133.906541][ T2336] should_fail_usercopy+0x1a/0x20 [ 133.911579][ T2336] _copy_to_user+0x1e/0x90 [ 133.916010][ T2336] simple_read_from_buffer+0xe9/0x160 [ 133.921402][ T2336] proc_fail_nth_read+0x1a6/0x220 [ 133.926445][ T2336] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 133.932002][ T2336] ? security_file_permission+0x94/0xb0 [ 133.937556][ T2336] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 133.943214][ T2336] vfs_read+0x27a/0x910 [ 133.947377][ T2336] ? __cfi_vfs_read+0x10/0x10 [ 133.952042][ T2336] ? __kasan_check_write+0x14/0x20 [ 133.957138][ T2336] ? mutex_lock+0x93/0x1b0 [ 133.961538][ T2336] ? __cfi_mutex_lock+0x10/0x10 [ 133.966372][ T2336] ? __fdget_pos+0x2cd/0x380 [ 133.970947][ T2336] ? ksys_read+0x71/0x250 [ 133.975264][ T2336] ksys_read+0x149/0x250 [ 133.979490][ T2336] ? __cfi_ksys_read+0x10/0x10 [ 133.984666][ T2336] __x64_sys_read+0x7b/0x90 [ 133.989245][ T2336] x64_sys_call+0x2f/0x9a0 [ 133.993819][ T2336] do_syscall_64+0x4c/0xa0 [ 133.998231][ T2336] ? clear_bhb_loop+0x30/0x80 [ 134.002894][ T2336] ? clear_bhb_loop+0x30/0x80 [ 134.007813][ T2336] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.013863][ T2336] RIP: 0033:0x7f449655d04e [ 134.018355][ T2336] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 134.038307][ T2336] RSP: 002b:00007f44973fffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 134.046714][ T2336] RAX: ffffffffffffffda RBX: 00007f44974006c0 RCX: 00007f449655d04e [ 134.054954][ T2336] RDX: 000000000000000f RSI: 00007f44974000a0 RDI: 0000000000000003 [ 134.063012][ T2336] RBP: 00007f4497400090 R08: 0000000000000000 R09: 0000000000000000 [ 134.071151][ T2336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 134.079380][ T2336] R13: 00007f4496816038 R14: 00007f4496815fa0 R15: 00007ffe988e1ff8 [ 134.087345][ T2336] [ 134.586961][ T2357] device syzkaller0 entered promiscuous mode [ 135.266718][ T2388] device syzkaller0 entered promiscuous mode [ 135.343147][ T2395] device bridge0 left promiscuous mode [ 136.548785][ T28] audit: type=1400 audit(1774966059.489:136): avc: denied { write } for pid=2458 comm="syz.1.770" name="cgroup.subtree_control" dev="cgroup2" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 136.625434][ T28] audit: type=1400 audit(1774966059.509:137): avc: denied { open } for pid=2458 comm="syz.1.770" path="" dev="cgroup2" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 137.549859][ T2477] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.557935][ T2477] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.565580][ T2477] device bridge_slave_0 entered promiscuous mode [ 137.572933][ T2477] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.580742][ T2477] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.589572][ T2477] device bridge_slave_1 entered promiscuous mode [ 137.935976][ T43] device bridge_slave_1 left promiscuous mode [ 137.942159][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.005057][ T43] device bridge_slave_0 left promiscuous mode [ 138.014808][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.025240][ T43] device veth1_macvtap left promiscuous mode [ 138.031813][ T43] device veth0_vlan left promiscuous mode [ 138.180822][ T28] audit: type=1400 audit(1774966061.119:138): avc: denied { create } for pid=2477 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.210095][ T28] audit: type=1400 audit(1774966061.139:139): avc: denied { write } for pid=2477 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.233145][ T28] audit: type=1400 audit(1774966061.139:140): avc: denied { read } for pid=2477 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.311758][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.319891][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.339263][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.350350][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.371537][ T531] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.378632][ T531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.407004][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.420008][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.431959][ T531] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.439082][ T531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.492215][ T2542] device syzkaller0 entered promiscuous mode [ 138.507351][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.515192][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.523860][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.532917][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.541874][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.584775][ T2477] device veth0_vlan entered promiscuous mode [ 138.598158][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.614609][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.697665][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.799751][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.830514][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.857392][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.910994][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.980580][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.020783][ T2477] device veth1_macvtap entered promiscuous mode [ 139.108449][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.132946][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.189651][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.304326][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.334800][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.121782][ T2588] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.162356][ T2588] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.215940][ T2588] device bridge_slave_0 entered promiscuous mode [ 140.249603][ T2588] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.263184][ T2588] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.285618][ T2588] device bridge_slave_1 entered promiscuous mode [ 140.581864][ T43] device bridge_slave_1 left promiscuous mode [ 140.594533][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.694629][ T43] device bridge_slave_0 left promiscuous mode [ 140.700838][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.776149][ T43] device veth1_macvtap left promiscuous mode [ 140.784480][ T43] device veth0_vlan left promiscuous mode [ 141.220481][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.261199][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.297998][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.333066][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.353463][ T265] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.360548][ T265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.376777][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.392178][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.408981][ T265] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.416075][ T265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.443302][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.451776][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.461294][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.495284][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 141.508720][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.524426][ T2588] device veth0_vlan entered promiscuous mode [ 141.537184][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 141.546229][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.582731][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.590785][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.598991][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.608300][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.629880][ T2588] device veth1_macvtap entered promiscuous mode [ 141.650398][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.659362][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.667924][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.681452][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 141.690269][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.309616][ T2646] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.354001][ T2646] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.361764][ T2646] device bridge_slave_0 entered promiscuous mode [ 142.434534][ T2646] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.442802][ T2646] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.450929][ T2646] device bridge_slave_1 entered promiscuous mode [ 142.581943][ T2672] device syzkaller0 entered promiscuous mode [ 142.875146][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.883239][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.908415][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.936221][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.954377][ T2064] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.961444][ T2064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.004202][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.034369][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.054224][ T2064] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.061371][ T2064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.124184][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.214421][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.262834][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.291671][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.360953][ T2646] device veth0_vlan entered promiscuous mode [ 143.395298][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.418285][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.443722][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.501264][ T2646] device veth1_macvtap entered promiscuous mode [ 143.542883][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.611115][ T43] device bridge_slave_1 left promiscuous mode [ 143.618552][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.634658][ T43] device bridge_slave_0 left promiscuous mode [ 143.647498][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.740559][ T43] device veth1_macvtap left promiscuous mode [ 143.792564][ T43] device veth0_vlan left promiscuous mode [ 144.026329][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.053520][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.065161][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.073587][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.859134][ T2756] FAULT_INJECTION: forcing a failure. [ 144.859134][ T2756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.899242][ T43] device bridge_slave_1 left promiscuous mode [ 144.944169][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.971115][ T2756] CPU: 1 PID: 2756 Comm: syz.4.875 Not tainted syzkaller #0 [ 144.978437][ T2756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 144.988672][ T2756] Call Trace: [ 144.991951][ T2756] [ 144.994892][ T2756] __dump_stack+0x21/0x24 [ 144.999227][ T2756] dump_stack_lvl+0x110/0x170 [ 145.003886][ T2756] ? __cfi_dump_stack_lvl+0x8/0x8 [ 145.008895][ T2756] ? __cfi_gfp_zone+0x10/0x10 [ 145.013556][ T2756] dump_stack+0x15/0x24 [ 145.017694][ T2756] should_fail_ex+0x3d4/0x520 [ 145.022789][ T2756] should_fail+0xb/0x10 [ 145.026933][ T2756] should_fail_usercopy+0x1a/0x20 [ 145.031951][ T2756] _copy_from_iter+0x196/0x1010 [ 145.036794][ T2756] ? __alloc_pages+0x1fa/0x610 [ 145.041629][ T2756] ? __cfi__copy_from_iter+0x10/0x10 [ 145.047068][ T2756] ? __cfi___alloc_pages+0x10/0x10 [ 145.052175][ T2756] ? __kasan_check_write+0x14/0x20 [ 145.057273][ T2756] ? _raw_spin_lock_irq+0x95/0xf0 [ 145.062453][ T2756] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 145.067988][ T2756] copy_page_from_iter+0x1d2/0x2b0 [ 145.073179][ T2756] pipe_write+0x7d8/0x1970 [ 145.077584][ T2756] ? __cfi_pipe_write+0x10/0x10 [ 145.082425][ T2756] ? selinux_file_permission+0x3ef/0x510 [ 145.088308][ T2756] ? fsnotify_perm+0x67/0x5b0 [ 145.092979][ T2756] ? security_file_permission+0x8a/0xb0 [ 145.098508][ T2756] vfs_write+0x603/0xce0 [ 145.102738][ T2756] ? __cfi_vfs_write+0x10/0x10 [ 145.107577][ T2756] ? __fget_files+0x2d5/0x330 [ 145.112236][ T2756] ? __fdget_pos+0x1f2/0x380 [ 145.116806][ T2756] ? ksys_write+0x71/0x250 [ 145.121215][ T2756] ksys_write+0x149/0x250 [ 145.125530][ T2756] ? __cfi_ksys_write+0x10/0x10 [ 145.130363][ T2756] ? debug_smp_processor_id+0x17/0x20 [ 145.135830][ T2756] __x64_sys_write+0x7b/0x90 [ 145.140865][ T2756] x64_sys_call+0x27b/0x9a0 [ 145.145548][ T2756] do_syscall_64+0x4c/0xa0 [ 145.150069][ T2756] ? clear_bhb_loop+0x30/0x80 [ 145.154912][ T2756] ? clear_bhb_loop+0x30/0x80 [ 145.159583][ T2756] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 145.165641][ T2756] RIP: 0033:0x7f63e0f9c819 [ 145.170037][ T2756] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 145.189721][ T2756] RSP: 002b:00007f63e1e6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 145.198225][ T2756] RAX: ffffffffffffffda RBX: 00007f63e1215fa0 RCX: 00007f63e0f9c819 [ 145.206275][ T2756] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 145.214421][ T2756] RBP: 00007f63e1e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 145.222647][ T2756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.230703][ T2756] R13: 00007f63e1216038 R14: 00007f63e1215fa0 R15: 00007ffd69bd0ce8 [ 145.238937][ T2756] [ 145.250898][ T43] device bridge_slave_0 left promiscuous mode [ 145.308999][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.342797][ T43] device veth1_macvtap left promiscuous mode [ 145.352884][ T43] device veth0_vlan left promiscuous mode [ 145.629026][ T2776] device syzkaller0 entered promiscuous mode [ 145.662302][ T2771] device syzkaller0 entered promiscuous mode [ 145.820920][ T2761] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.828233][ T2761] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.837499][ T2761] device bridge_slave_0 entered promiscuous mode [ 145.864122][ T2761] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.871768][ T2761] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.896780][ T2761] device bridge_slave_1 entered promiscuous mode [ 146.040627][ T2761] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.047704][ T2761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.055023][ T2761] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.062057][ T2761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.165532][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.173686][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.204390][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.247275][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.258064][ T2821] ref_ctr_offset mismatch. inode: 0x3df offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 146.274724][ T531] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.282082][ T531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.304415][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.320537][ T531] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.327727][ T531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.483027][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.574789][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.594551][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.602356][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.622508][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.642737][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.723566][ T2761] device veth0_vlan entered promiscuous mode [ 146.751352][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 146.760139][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 146.780335][ T2761] device veth1_macvtap entered promiscuous mode [ 146.795411][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 146.804593][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 146.821039][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 146.864624][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 146.881602][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.892559][ T2850] FAULT_INJECTION: forcing a failure. [ 146.892559][ T2850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.919222][ T2850] CPU: 0 PID: 2850 Comm: syz.0.911 Not tainted syzkaller #0 [ 146.926732][ T2850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 146.937160][ T2850] Call Trace: [ 146.940457][ T2850] [ 146.943594][ T2850] __dump_stack+0x21/0x24 [ 146.948823][ T2850] dump_stack_lvl+0x110/0x170 [ 146.953540][ T2850] ? __cfi_dump_stack_lvl+0x8/0x8 [ 146.958756][ T2850] dump_stack+0x15/0x24 [ 146.963136][ T2850] should_fail_ex+0x3d4/0x520 [ 146.967959][ T2850] should_fail_alloc_page+0x61/0x90 [ 146.973184][ T2850] prepare_alloc_pages+0x148/0x600 [ 146.978326][ T2850] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 146.983721][ T2850] ? _copy_from_iter+0x20b/0x1010 [ 146.988761][ T2850] __alloc_pages+0x15b/0x610 [ 146.993353][ T2850] ? __cfi___alloc_pages+0x10/0x10 [ 146.998515][ T2850] ? __kasan_check_write+0x14/0x20 [ 147.003731][ T2850] ? _raw_spin_lock_irq+0x95/0xf0 [ 147.008884][ T2850] ? copy_page_from_iter+0x235/0x2b0 [ 147.014194][ T2850] pipe_write+0x590/0x1970 [ 147.018632][ T2850] ? __cfi_pipe_write+0x10/0x10 [ 147.023506][ T2850] ? selinux_file_permission+0x3ef/0x510 [ 147.029158][ T2850] ? fsnotify_perm+0x67/0x5b0 [ 147.033944][ T2850] ? security_file_permission+0x8a/0xb0 [ 147.039604][ T2850] vfs_write+0x603/0xce0 [ 147.043860][ T2850] ? __cfi_vfs_write+0x10/0x10 [ 147.048631][ T2850] ? __fget_files+0x2d5/0x330 [ 147.053319][ T2850] ? __fdget_pos+0x1f2/0x380 [ 147.057918][ T2850] ? ksys_write+0x71/0x250 [ 147.062348][ T2850] ksys_write+0x149/0x250 [ 147.066773][ T2850] ? __cfi_ksys_write+0x10/0x10 [ 147.071640][ T2850] ? debug_smp_processor_id+0x17/0x20 [ 147.077035][ T2850] __x64_sys_write+0x7b/0x90 [ 147.081721][ T2850] x64_sys_call+0x27b/0x9a0 [ 147.086224][ T2850] do_syscall_64+0x4c/0xa0 [ 147.090635][ T2850] ? clear_bhb_loop+0x30/0x80 [ 147.095304][ T2850] ? clear_bhb_loop+0x30/0x80 [ 147.100007][ T2850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 147.106204][ T2850] RIP: 0033:0x7ffa7319c819 [ 147.110604][ T2850] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 147.130379][ T2850] RSP: 002b:00007ffa74107028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 147.139012][ T2850] RAX: ffffffffffffffda RBX: 00007ffa73415fa0 RCX: 00007ffa7319c819 [ 147.147153][ T2850] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 147.155215][ T2850] RBP: 00007ffa74107090 R08: 0000000000000000 R09: 0000000000000000 [ 147.163189][ T2850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.171238][ T2850] R13: 00007ffa73416038 R14: 00007ffa73415fa0 R15: 00007ffc3cb16628 [ 147.179208][ T2850] [ 147.327365][ T2855] -: renamed from syzkaller0 [ 148.004509][ T43] device bridge_slave_1 left promiscuous mode [ 148.010720][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.018351][ T43] device bridge_slave_0 left promiscuous mode [ 148.024587][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.032329][ T43] device veth1_macvtap left promiscuous mode [ 148.038489][ T43] device veth0_vlan left promiscuous mode [ 148.376940][ T2882] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.386036][ T2882] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.422072][ T2882] device bridge_slave_0 entered promiscuous mode [ 148.471457][ T2882] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.478734][ T2882] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.486255][ T2882] device bridge_slave_1 entered promiscuous mode [ 148.544299][ T2882] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.551449][ T2882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.558815][ T2882] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.565885][ T2882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.769170][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.777688][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.979694][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.112307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.209130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.278892][ T2923] FAULT_INJECTION: forcing a failure. [ 149.278892][ T2923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.297183][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.304460][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.316319][ T2923] CPU: 0 PID: 2923 Comm: syz.4.937 Not tainted syzkaller #0 [ 149.323811][ T2923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 149.334089][ T2923] Call Trace: [ 149.337466][ T2923] [ 149.340403][ T2923] __dump_stack+0x21/0x24 [ 149.344838][ T2923] dump_stack_lvl+0x110/0x170 [ 149.349519][ T2923] ? __cfi_dump_stack_lvl+0x8/0x8 [ 149.354629][ T2923] ? __cfi_gfp_zone+0x10/0x10 [ 149.359309][ T2923] dump_stack+0x15/0x24 [ 149.363561][ T2923] should_fail_ex+0x3d4/0x520 [ 149.368243][ T2923] should_fail+0xb/0x10 [ 149.372418][ T2923] should_fail_usercopy+0x1a/0x20 [ 149.377452][ T2923] _copy_from_iter+0x196/0x1010 [ 149.382319][ T2923] ? __alloc_pages+0x1fa/0x610 [ 149.387102][ T2923] ? __cfi__copy_from_iter+0x10/0x10 [ 149.392489][ T2923] ? __cfi___alloc_pages+0x10/0x10 [ 149.397634][ T2923] ? __kasan_check_write+0x14/0x20 [ 149.402747][ T2923] ? _raw_spin_lock_irq+0x95/0xf0 [ 149.407970][ T2923] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 149.413526][ T2923] copy_page_from_iter+0x1d2/0x2b0 [ 149.418702][ T2923] pipe_write+0x7d8/0x1970 [ 149.423132][ T2923] ? __cfi_pipe_write+0x10/0x10 [ 149.427999][ T2923] ? selinux_file_permission+0x3ef/0x510 [ 149.433992][ T2923] ? fsnotify_perm+0x67/0x5b0 [ 149.438701][ T2923] ? security_file_permission+0x8a/0xb0 [ 149.440845][ T2882] device veth0_vlan entered promiscuous mode [ 149.444257][ T2923] vfs_write+0x603/0xce0 [ 149.444278][ T2923] ? __cfi_vfs_write+0x10/0x10 [ 149.459199][ T2923] ? __fget_files+0x2d5/0x330 [ 149.464145][ T2923] ? __fdget_pos+0x1f2/0x380 [ 149.468910][ T2923] ? ksys_write+0x71/0x250 [ 149.473423][ T2923] ksys_write+0x149/0x250 [ 149.477841][ T2923] ? __cfi_ksys_write+0x10/0x10 [ 149.482698][ T2923] ? debug_smp_processor_id+0x17/0x20 [ 149.488073][ T2923] __x64_sys_write+0x7b/0x90 [ 149.492662][ T2923] x64_sys_call+0x27b/0x9a0 [ 149.497261][ T2923] do_syscall_64+0x4c/0xa0 [ 149.501693][ T2923] ? clear_bhb_loop+0x30/0x80 [ 149.506377][ T2923] ? clear_bhb_loop+0x30/0x80 [ 149.511576][ T2923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.517711][ T2923] RIP: 0033:0x7f63e0f9c819 [ 149.522138][ T2923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 149.542016][ T2923] RSP: 002b:00007f63e1e6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 149.550618][ T2923] RAX: ffffffffffffffda RBX: 00007f63e1215fa0 RCX: 00007f63e0f9c819 [ 149.558695][ T2923] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 149.566693][ T2923] RBP: 00007f63e1e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 149.574671][ T2923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.582657][ T2923] R13: 00007f63e1216038 R14: 00007f63e1215fa0 R15: 00007ffd69bd0ce8 [ 149.591007][ T2923] [ 149.594798][ T2882] device veth1_macvtap entered promiscuous mode [ 149.649050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.687786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.753034][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.760166][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.775423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.783922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.792301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.816722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.825592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.834323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.842943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.851463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.860092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 149.869019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 149.880328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.888590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.898429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.907323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.916104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.925780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.933443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.946635][ T2932] -: renamed from syzkaller0 [ 150.635006][ T265] device bridge_slave_1 left promiscuous mode [ 150.641155][ T265] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.648797][ T265] device bridge_slave_0 left promiscuous mode [ 150.655435][ T265] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.663558][ T265] device veth1_macvtap left promiscuous mode [ 150.669769][ T265] device veth0_vlan left promiscuous mode [ 151.078951][ T2958] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.086208][ T2958] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.093824][ T2958] device bridge_slave_0 entered promiscuous mode [ 151.201959][ T2958] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.210007][ T2958] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.218799][ T2958] device bridge_slave_1 entered promiscuous mode [ 151.438141][ T2958] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.445245][ T2958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.452792][ T2958] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.460018][ T2958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.520840][ T2982] -: renamed from syzkaller0 [ 151.554965][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.569103][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.590850][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.615449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.634808][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.642151][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.679108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.712210][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.719356][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.726942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.745875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.212824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.246658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.259814][ T2958] device veth0_vlan entered promiscuous mode [ 152.280080][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.293623][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.335912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.347005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.366288][ T2958] device veth1_macvtap entered promiscuous mode [ 152.441212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.459146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.485571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.538828][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.547340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.619586][ T3010] FAULT_INJECTION: forcing a failure. [ 152.619586][ T3010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.634972][ T3010] CPU: 0 PID: 3010 Comm: syz.2.968 Not tainted syzkaller #0 [ 152.642283][ T3010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 152.652517][ T3010] Call Trace: [ 152.656259][ T3010] [ 152.659415][ T3010] __dump_stack+0x21/0x24 [ 152.663984][ T3010] dump_stack_lvl+0x110/0x170 [ 152.668693][ T3010] ? __cfi_dump_stack_lvl+0x8/0x8 [ 152.673949][ T3010] dump_stack+0x15/0x24 [ 152.678304][ T3010] should_fail_ex+0x3d4/0x520 [ 152.683188][ T3010] should_fail_alloc_page+0x61/0x90 [ 152.688398][ T3010] prepare_alloc_pages+0x148/0x600 [ 152.693886][ T3010] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 152.699226][ T3010] ? _copy_from_iter+0x20b/0x1010 [ 152.704446][ T3010] __alloc_pages+0x15b/0x610 [ 152.709046][ T3010] ? __cfi___alloc_pages+0x10/0x10 [ 152.714166][ T3010] ? __kasan_check_write+0x14/0x20 [ 152.719395][ T3010] ? _raw_spin_lock_irq+0x95/0xf0 [ 152.724442][ T3010] ? copy_page_from_iter+0x235/0x2b0 [ 152.729844][ T3010] pipe_write+0x590/0x1970 [ 152.734446][ T3010] ? __cfi_pipe_write+0x10/0x10 [ 152.739555][ T3010] ? selinux_file_permission+0x3ef/0x510 [ 152.745195][ T3010] ? fsnotify_perm+0x67/0x5b0 [ 152.749974][ T3010] ? security_file_permission+0x8a/0xb0 [ 152.755524][ T3010] vfs_write+0x603/0xce0 [ 152.759854][ T3010] ? __cfi_vfs_write+0x10/0x10 [ 152.764642][ T3010] ? __fget_files+0x2d5/0x330 [ 152.769575][ T3010] ? __fdget_pos+0x1f2/0x380 [ 152.774162][ T3010] ? ksys_write+0x71/0x250 [ 152.778579][ T3010] ksys_write+0x149/0x250 [ 152.782918][ T3010] ? __cfi_ksys_write+0x10/0x10 [ 152.787768][ T3010] ? debug_smp_processor_id+0x17/0x20 [ 152.793327][ T3010] __x64_sys_write+0x7b/0x90 [ 152.798004][ T3010] x64_sys_call+0x27b/0x9a0 [ 152.802585][ T3010] do_syscall_64+0x4c/0xa0 [ 152.807165][ T3010] ? clear_bhb_loop+0x30/0x80 [ 152.811827][ T3010] ? clear_bhb_loop+0x30/0x80 [ 152.816588][ T3010] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.822568][ T3010] RIP: 0033:0x7f449659c819 [ 152.827082][ T3010] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 152.847239][ T3010] RSP: 002b:00007f4497400028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 152.856005][ T3010] RAX: ffffffffffffffda RBX: 00007f4496815fa0 RCX: 00007f449659c819 [ 152.864363][ T3010] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 152.872689][ T3010] RBP: 00007f4497400090 R08: 0000000000000000 R09: 0000000000000000 [ 152.880658][ T3010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.888713][ T3010] R13: 00007f4496816038 R14: 00007f4496815fa0 R15: 00007ffe988e1ff8 [ 152.896863][ T3010] [ 152.975183][ T2958] syz-executor (2958) used greatest stack depth: 21568 bytes left [ 153.579343][ T3016] device syzkaller0 entered promiscuous mode [ 153.598254][ T24] syzkaller0: tun_net_xmit 48 [ 153.611656][ T3016] syzkaller0: tun_net_xmit 1280 [ 153.637349][ T3016] syzkaller0: create flow: hash 2613045906 index 1 [ 153.928149][ T3014] syzkaller0: delete flow: hash 2613045906 index 1 [ 154.256637][ T28] audit: type=1400 audit(1774966077.199:141): avc: denied { create } for pid=3046 comm="syz.4.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 154.285638][ T8] device bridge_slave_1 left promiscuous mode [ 154.292972][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.326379][ T8] device bridge_slave_0 left promiscuous mode [ 154.383997][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.440730][ T8] device veth1_macvtap left promiscuous mode [ 154.492511][ T8] device veth0_vlan left promiscuous mode [ 154.897466][ T3032] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.921130][ T3032] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.931149][ T3032] device bridge_slave_0 entered promiscuous mode [ 155.005007][ T3032] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.025175][ T3032] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.055450][ T3032] device bridge_slave_1 entered promiscuous mode [ 155.750705][ T3088] FAULT_INJECTION: forcing a failure. [ 155.750705][ T3088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.764505][ T3088] CPU: 1 PID: 3088 Comm: syz.3.991 Not tainted syzkaller #0 [ 155.771803][ T3088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 155.781941][ T3088] Call Trace: [ 155.785215][ T3088] [ 155.788138][ T3088] __dump_stack+0x21/0x24 [ 155.792472][ T3088] dump_stack_lvl+0x110/0x170 [ 155.797242][ T3088] ? __cfi_dump_stack_lvl+0x8/0x8 [ 155.802273][ T3088] ? __cfi_gfp_zone+0x10/0x10 [ 155.806955][ T3088] dump_stack+0x15/0x24 [ 155.811296][ T3088] should_fail_ex+0x3d4/0x520 [ 155.816026][ T3088] should_fail+0xb/0x10 [ 155.820192][ T3088] should_fail_usercopy+0x1a/0x20 [ 155.825411][ T3088] _copy_from_iter+0x196/0x1010 [ 155.830267][ T3088] ? __alloc_pages+0x1fa/0x610 [ 155.835044][ T3088] ? __cfi__copy_from_iter+0x10/0x10 [ 155.840463][ T3088] ? __cfi___alloc_pages+0x10/0x10 [ 155.845669][ T3088] ? __kasan_check_write+0x14/0x20 [ 155.850766][ T3088] ? _raw_spin_lock_irq+0x95/0xf0 [ 155.855772][ T3088] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 155.861299][ T3088] copy_page_from_iter+0x1d2/0x2b0 [ 155.866403][ T3088] pipe_write+0x7d8/0x1970 [ 155.870822][ T3088] ? __cfi_pipe_write+0x10/0x10 [ 155.875691][ T3088] ? selinux_file_permission+0x3ef/0x510 [ 155.881325][ T3088] ? fsnotify_perm+0x67/0x5b0 [ 155.886011][ T3088] ? security_file_permission+0x8a/0xb0 [ 155.891729][ T3088] vfs_write+0x603/0xce0 [ 155.895960][ T3088] ? __cfi_vfs_write+0x10/0x10 [ 155.900742][ T3088] ? __fget_files+0x2d5/0x330 [ 155.905403][ T3088] ? __fdget_pos+0x1f2/0x380 [ 155.909969][ T3088] ? ksys_write+0x71/0x250 [ 155.914376][ T3088] ksys_write+0x149/0x250 [ 155.918683][ T3088] ? __cfi_ksys_write+0x10/0x10 [ 155.923519][ T3088] ? debug_smp_processor_id+0x17/0x20 [ 155.928874][ T3088] __x64_sys_write+0x7b/0x90 [ 155.933446][ T3088] x64_sys_call+0x27b/0x9a0 [ 155.937965][ T3088] do_syscall_64+0x4c/0xa0 [ 155.942364][ T3088] ? clear_bhb_loop+0x30/0x80 [ 155.947027][ T3088] ? clear_bhb_loop+0x30/0x80 [ 155.951699][ T3088] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 155.957577][ T3088] RIP: 0033:0x7f12ded9c819 [ 155.961989][ T3088] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 155.981576][ T3088] RSP: 002b:00007f12dfd34028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 155.990172][ T3088] RAX: ffffffffffffffda RBX: 00007f12df015fa0 RCX: 00007f12ded9c819 [ 155.998236][ T3088] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 156.006197][ T3088] RBP: 00007f12dfd34090 R08: 0000000000000000 R09: 0000000000000000 [ 156.014165][ T3088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.022213][ T3088] R13: 00007f12df016038 R14: 00007f12df015fa0 R15: 00007ffee32515f8 [ 156.030178][ T3088] [ 156.038807][ T3032] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.045893][ T3032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.053162][ T3032] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.060205][ T3032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.080157][ T265] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.087965][ T265] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.185504][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.193500][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.240536][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.249041][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.258065][ T265] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.265142][ T265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.274004][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.283050][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.302299][ T265] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.309396][ T265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.316951][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.326074][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.334510][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.344883][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.445523][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 156.455014][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.521762][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 156.542826][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.582708][ T3032] device veth0_vlan entered promiscuous mode [ 156.601903][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.623793][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.638482][ T3032] device veth1_macvtap entered promiscuous mode [ 156.645995][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.656378][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.668847][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.722535][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.734242][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.744391][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.754649][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.594954][ T8] device bridge_slave_1 left promiscuous mode [ 157.606023][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.628911][ T8] device bridge_slave_0 left promiscuous mode [ 157.656702][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.697121][ T8] device veth1_macvtap left promiscuous mode [ 157.703878][ T8] device veth0_vlan left promiscuous mode [ 158.240104][ T3148] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.252332][ T3148] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.260727][ T3148] device bridge_slave_0 entered promiscuous mode [ 158.269669][ T3148] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.289936][ T3148] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.297609][ T3148] device bridge_slave_1 entered promiscuous mode [ 158.537894][ T28] audit: type=1400 audit(1774966081.479:142): avc: denied { create } for pid=3171 comm="syz.3.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 158.568066][ T3170] device veth0_vlan left promiscuous mode [ 158.608286][ T3170] device veth0_vlan entered promiscuous mode [ 158.630839][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.664097][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.672682][ T2064] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.679756][ T2064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.715737][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.725002][ T2064] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.732057][ T2064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.739747][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.776382][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.812391][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.845129][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.876803][ T3148] device veth0_vlan entered promiscuous mode [ 158.891224][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.935100][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.969887][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.981092][ T265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.999447][ T3148] device veth1_macvtap entered promiscuous mode [ 159.048025][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.091697][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.234665][ T8] device bridge_slave_1 left promiscuous mode [ 160.240795][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.248761][ T8] device bridge_slave_0 left promiscuous mode [ 160.255103][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.262977][ T8] device veth1_macvtap left promiscuous mode [ 160.269126][ T8] device veth0_vlan left promiscuous mode [ 160.396913][ T3215] 1: renamed from syzkaller0 [ 160.590409][ T3223] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.621547][ T3223] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.642978][ T3223] device bridge_slave_0 entered promiscuous mode [ 160.650314][ T3223] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.657502][ T3223] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.665223][ T3223] device bridge_slave_1 entered promiscuous mode [ 160.820978][ T3223] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.828103][ T3223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.835420][ T3223] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.842471][ T3223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.853523][ T3257] FAULT_INJECTION: forcing a failure. [ 160.853523][ T3257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.867207][ T3257] CPU: 1 PID: 3257 Comm: syz.3.1050 Not tainted syzkaller #0 [ 160.874600][ T3257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 160.884660][ T3257] Call Trace: [ 160.887943][ T3257] [ 160.890878][ T3257] __dump_stack+0x21/0x24 [ 160.895231][ T3257] dump_stack_lvl+0x110/0x170 [ 160.899925][ T3257] ? __cfi_dump_stack_lvl+0x8/0x8 [ 160.904967][ T3257] dump_stack+0x15/0x24 [ 160.909152][ T3257] should_fail_ex+0x3d4/0x520 [ 160.913933][ T3257] should_fail+0xb/0x10 [ 160.918105][ T3257] should_fail_usercopy+0x1a/0x20 [ 160.923148][ T3257] _copy_from_iter+0x196/0x1010 [ 160.928012][ T3257] ? __alloc_pages+0x1fa/0x610 [ 160.932803][ T3257] ? __cfi__copy_from_iter+0x10/0x10 [ 160.938111][ T3257] ? __cfi___alloc_pages+0x10/0x10 [ 160.943245][ T3257] ? __kasan_check_write+0x14/0x20 [ 160.948369][ T3257] ? _raw_spin_lock_irq+0x95/0xf0 [ 160.953413][ T3257] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 160.958976][ T3257] copy_page_from_iter+0x1d2/0x2b0 [ 160.964105][ T3257] pipe_write+0x7d8/0x1970 [ 160.968554][ T3257] ? __cfi_pipe_write+0x10/0x10 [ 160.973443][ T3257] ? selinux_file_permission+0x3ef/0x510 [ 160.979268][ T3257] ? fsnotify_perm+0x67/0x5b0 [ 160.983958][ T3257] ? security_file_permission+0x8a/0xb0 [ 160.989531][ T3257] vfs_write+0x603/0xce0 [ 160.993774][ T3257] ? __cfi_vfs_write+0x10/0x10 [ 160.998551][ T3257] ? __fget_files+0x2d5/0x330 [ 161.003422][ T3257] ? __fdget_pos+0x1f2/0x380 [ 161.008028][ T3257] ? ksys_write+0x71/0x250 [ 161.012537][ T3257] ksys_write+0x149/0x250 [ 161.017058][ T3257] ? __cfi_ksys_write+0x10/0x10 [ 161.021927][ T3257] ? debug_smp_processor_id+0x17/0x20 [ 161.027404][ T3257] __x64_sys_write+0x7b/0x90 [ 161.032187][ T3257] x64_sys_call+0x27b/0x9a0 [ 161.036709][ T3257] do_syscall_64+0x4c/0xa0 [ 161.041232][ T3257] ? clear_bhb_loop+0x30/0x80 [ 161.045930][ T3257] ? clear_bhb_loop+0x30/0x80 [ 161.050621][ T3257] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 161.056527][ T3257] RIP: 0033:0x7f12ded9c819 [ 161.060985][ T3257] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 161.080776][ T3257] RSP: 002b:00007f12dfd34028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 161.089190][ T3257] RAX: ffffffffffffffda RBX: 00007f12df015fa0 RCX: 00007f12ded9c819 [ 161.097249][ T3257] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 161.105473][ T3257] RBP: 00007f12dfd34090 R08: 0000000000000000 R09: 0000000000000000 [ 161.113428][ T3257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.121388][ T3257] R13: 00007f12df016038 R14: 00007f12df015fa0 R15: 00007ffee32515f8 [ 161.129347][ T3257] [ 161.172996][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.185692][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.203237][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.254334][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.274130][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.288348][ T531] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.295448][ T531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.308432][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.318597][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.329578][ T531] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.336673][ T531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.412851][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.443965][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.490828][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.557216][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.585030][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.613646][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.669822][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.713512][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.777526][ T3223] device veth0_vlan entered promiscuous mode [ 161.788873][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.810023][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.891317][ T3223] device veth1_macvtap entered promiscuous mode [ 161.913307][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.957184][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.017469][ T2064] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.065192][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.121656][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.153537][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 162.176623][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.815381][ T8] device bridge_slave_1 left promiscuous mode [ 162.821555][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.844530][ T8] device bridge_slave_0 left promiscuous mode [ 162.850691][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.859344][ T8] device veth1_macvtap left promiscuous mode [ 162.865966][ T8] device veth0_vlan left promiscuous mode [ 163.515989][ T3311] FAULT_INJECTION: forcing a failure. [ 163.515989][ T3311] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.564152][ T3311] CPU: 1 PID: 3311 Comm: syz.4.1069 Not tainted syzkaller #0 [ 163.571648][ T3311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 163.581712][ T3311] Call Trace: [ 163.585000][ T3311] [ 163.587935][ T3311] __dump_stack+0x21/0x24 [ 163.592277][ T3311] dump_stack_lvl+0x110/0x170 [ 163.596979][ T3311] ? __cfi_dump_stack_lvl+0x8/0x8 [ 163.602016][ T3311] dump_stack+0x15/0x24 [ 163.606183][ T3311] should_fail_ex+0x3d4/0x520 [ 163.610882][ T3311] should_fail_alloc_page+0x61/0x90 [ 163.616098][ T3311] prepare_alloc_pages+0x148/0x600 [ 163.621249][ T3311] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 163.626465][ T3311] ? _copy_from_iter+0x20b/0x1010 [ 163.631591][ T3311] __alloc_pages+0x15b/0x610 [ 163.636285][ T3311] ? __cfi___alloc_pages+0x10/0x10 [ 163.641385][ T3311] ? __kasan_check_write+0x14/0x20 [ 163.646515][ T3311] ? _raw_spin_lock_irq+0x95/0xf0 [ 163.651536][ T3311] ? copy_page_from_iter+0x235/0x2b0 [ 163.656815][ T3311] pipe_write+0x590/0x1970 [ 163.661222][ T3311] ? __cfi_pipe_write+0x10/0x10 [ 163.666050][ T3311] ? selinux_file_permission+0x3ef/0x510 [ 163.671680][ T3311] ? fsnotify_perm+0x67/0x5b0 [ 163.676350][ T3311] ? security_file_permission+0x8a/0xb0 [ 163.681887][ T3311] vfs_write+0x603/0xce0 [ 163.686110][ T3311] ? __cfi_vfs_write+0x10/0x10 [ 163.691023][ T3311] ? __fget_files+0x2d5/0x330 [ 163.695690][ T3311] ? __fdget_pos+0x1f2/0x380 [ 163.700276][ T3311] ? ksys_write+0x71/0x250 [ 163.704749][ T3311] ksys_write+0x149/0x250 [ 163.709074][ T3311] ? __cfi_ksys_write+0x10/0x10 [ 163.714015][ T3311] ? debug_smp_processor_id+0x17/0x20 [ 163.719394][ T3311] __x64_sys_write+0x7b/0x90 [ 163.723967][ T3311] x64_sys_call+0x27b/0x9a0 [ 163.728452][ T3311] do_syscall_64+0x4c/0xa0 [ 163.732858][ T3311] ? clear_bhb_loop+0x30/0x80 [ 163.737573][ T3311] ? clear_bhb_loop+0x30/0x80 [ 163.742344][ T3311] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 163.748303][ T3311] RIP: 0033:0x7f63e0f9c819 [ 163.752736][ T3311] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 163.772514][ T3311] RSP: 002b:00007f63e1e6c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 163.780913][ T3311] RAX: ffffffffffffffda RBX: 00007f63e1215fa0 RCX: 00007f63e0f9c819 [ 163.788876][ T3311] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 163.796892][ T3311] RBP: 00007f63e1e6c090 R08: 0000000000000000 R09: 0000000000000000 [ 163.804855][ T3311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.812839][ T3311] R13: 00007f63e1216038 R14: 00007f63e1215fa0 R15: 00007ffd69bd0ce8 [ 163.820888][ T3311] [ 164.031258][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.146050][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.226661][ T3317] device bridge_slave_0 entered promiscuous mode [ 164.233842][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.241300][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.248830][ T3317] device bridge_slave_1 entered promiscuous mode [ 164.326058][ T3342] device syzkaller0 entered promiscuous mode [ 164.886866][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.905443][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.007408][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.023136][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.031950][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.039040][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.046866][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.055397][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.063720][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.070813][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.099412][ T3373] FAULT_INJECTION: forcing a failure. [ 165.099412][ T3373] name failslab, interval 1, probability 0, space 0, times 0 [ 165.104499][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.130259][ T3373] CPU: 1 PID: 3373 Comm: syz.0.1090 Not tainted syzkaller #0 [ 165.137677][ T3373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 165.147738][ T3373] Call Trace: [ 165.151021][ T3373] [ 165.153944][ T3373] __dump_stack+0x21/0x24 [ 165.158276][ T3373] dump_stack_lvl+0x110/0x170 [ 165.163125][ T3373] ? __cfi_dump_stack_lvl+0x8/0x8 [ 165.168147][ T3373] dump_stack+0x15/0x24 [ 165.172299][ T3373] should_fail_ex+0x3d4/0x520 [ 165.176990][ T3373] __should_failslab+0xac/0xf0 [ 165.181753][ T3373] ? tracepoint_probe_unregister+0x211/0x8e0 [ 165.187743][ T3373] should_failslab+0x9/0x20 [ 165.192257][ T3373] __kmem_cache_alloc_node+0x3d/0x2c0 [ 165.197635][ T3373] ? __cfi_mutex_lock+0x10/0x10 [ 165.202584][ T3373] ? tracepoint_probe_unregister+0x211/0x8e0 [ 165.208568][ T3373] __kmalloc+0xa1/0x1e0 [ 165.212719][ T3373] ? __kasan_check_write+0x14/0x20 [ 165.217830][ T3373] ? __cfi_perf_trace_sched_switch+0x10/0x10 [ 165.223824][ T3373] tracepoint_probe_unregister+0x211/0x8e0 [ 165.229633][ T3373] trace_event_reg+0x225/0x270 [ 165.234395][ T3373] perf_trace_event_unreg+0xcc/0x1c0 [ 165.239691][ T3373] perf_trace_destroy+0xbe/0x180 [ 165.241998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.244625][ T3373] tp_perf_event_destroy+0x15/0x20 [ 165.244646][ T3373] ? __cfi_tp_perf_event_destroy+0x10/0x10 [ 165.244662][ T3373] _free_event+0x9cd/0xce0 [ 165.267661][ T3373] perf_event_release_kernel+0x825/0x8c0 [ 165.273388][ T3373] ? __cfi_perf_event_release_kernel+0x10/0x10 [ 165.274534][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.279549][ T3373] perf_release+0x3b/0x40 [ 165.291289][ T3373] ? __cfi_perf_release+0x10/0x10 [ 165.296329][ T3373] __fput+0x1fc/0x8f0 [ 165.300414][ T3373] ____fput+0x15/0x20 [ 165.304410][ T3373] task_work_run+0x1e1/0x250 [ 165.309022][ T3373] ? __cfi_task_work_run+0x10/0x10 [ 165.314144][ T3373] ? fput+0x15b/0x1a0 [ 165.318135][ T3373] exit_to_user_mode_loop+0x9b/0xb0 [ 165.323346][ T3373] exit_to_user_mode_prepare+0x87/0xd0 [ 165.329000][ T3373] syscall_exit_to_user_mode+0x1a/0x30 [ 165.334484][ T3373] do_syscall_64+0x58/0xa0 [ 165.339006][ T3373] ? clear_bhb_loop+0x30/0x80 [ 165.343765][ T3373] ? clear_bhb_loop+0x30/0x80 [ 165.348443][ T3373] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 165.354327][ T3373] RIP: 0033:0x7ffa7319c819 [ 165.358723][ T3373] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 165.378398][ T3373] RSP: 002b:00007ffa74107028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 165.386797][ T3373] RAX: 0000000000000000 RBX: 00007ffa73415fa0 RCX: 00007ffa7319c819 [ 165.394746][ T3373] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 165.402782][ T3373] RBP: 00007ffa74107090 R08: 0000000000000000 R09: 0000000000000000 [ 165.410744][ T3373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.418694][ T3373] R13: 00007ffa73416038 R14: 00007ffa73415fa0 R15: 00007ffc3cb16628 [ 165.426651][ T3373] [ 165.439569][ T3373] CFI failure at __traceiter_sched_switch+0x9b/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) [ 165.439568][ T3367] CFI failure at __traceiter_sched_switch+0x9b/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) [ 165.439645][ T3367] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 165.469676][ T3367] CPU: 1 PID: 3367 Comm: syz.2.1088 Not tainted syzkaller #0 [ 165.477023][ T3367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 165.487053][ T3367] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 165.493186][ T3367] Code: 80 3c 30 00 74 05 e8 34 b9 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 165.513045][ T3367] RSP: 0018:ffffc90000a87830 EFLAGS: 00010096 [ 165.519111][ T3367] RAX: 1ffff110267e3246 RBX: ffff888133f19228 RCX: ffff88811fb4d100 [ 165.527223][ T3367] RDX: ffff8881158f1440 RSI: 0000000000000001 RDI: ffffffff87104680 [ 165.535209][ T3367] RBP: ffffc90000a87870 R08: 0000000000000000 R09: 1ffffffff0f25705 [ 165.543170][ T3367] R10: 00000000b720eca3 R11: fffffbfff0f25706 R12: 0000000000000001 [ 165.551141][ T3367] R13: ffff888133f19228 R14: dffffc0000000000 R15: ffffffff81728f30 [ 165.559098][ T3367] FS: 00007f44974006c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 165.568353][ T3367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.574998][ T3367] CR2: 0000001b2ec18ff8 CR3: 0000000108e45000 CR4: 00000000003506a0 [ 165.582945][ T3367] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 165.590892][ T3367] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 165.598924][ T3367] Call Trace: [ 165.602178][ T3367] [ 165.605108][ T3367] __schedule+0x1270/0x1500 [ 165.609689][ T3367] ? release_firmware_map_entry+0x190/0x190 [ 165.615653][ T3367] ? check_preempt_wakeup+0x5ca/0xbe0 [ 165.621088][ T3367] ? preempt_schedule+0xbc/0xd0 [ 165.625915][ T3367] preempt_schedule_common+0x9b/0xf0 [ 165.631204][ T3367] preempt_schedule+0xbc/0xd0 [ 165.635855][ T3367] ? __cfi_preempt_schedule+0x10/0x10 [ 165.641196][ T3367] ? probe_sched_wakeup+0x71/0x90 [ 165.646281][ T3367] ? ttwu_do_wakeup+0x468/0x490 [ 165.651134][ T3367] preempt_schedule_thunk+0x16/0x18 [ 165.656394][ T3367] try_to_wake_up+0x6b8/0x1220 [ 165.661134][ T3367] wake_up_q+0xdc/0x1b0 [ 165.665349][ T3367] futex_wake+0x5e9/0x8e0 [ 165.669736][ T3367] ? slab_free_freelist_hook+0xc2/0x190 [ 165.675346][ T3367] ? __cfi_futex_wake+0x10/0x10 [ 165.680164][ T3367] ? kfree+0x6f/0xf0 [ 165.684029][ T3367] ? __cfi_cgroup_file_write+0x10/0x10 [ 165.689501][ T3367] ? vfs_write+0xa2c/0xce0 [ 165.693989][ T3367] do_futex+0x2bf/0x430 [ 165.698148][ T3367] ? __cfi_do_futex+0x10/0x10 [ 165.703110][ T3367] ? __kasan_check_write+0x14/0x20 [ 165.708220][ T3367] ? mutex_unlock+0x8f/0x230 [ 165.712890][ T3367] __se_sys_futex+0x136/0x310 [ 165.717565][ T3367] ? __x64_sys_futex+0x100/0x100 [ 165.722503][ T3367] ? ksys_write+0x1f4/0x250 [ 165.727078][ T3367] ? __cfi_ksys_write+0x10/0x10 [ 165.731985][ T3367] __x64_sys_futex+0xe5/0x100 [ 165.736659][ T3367] x64_sys_call+0x7ec/0x9a0 [ 165.741172][ T3367] do_syscall_64+0x4c/0xa0 [ 165.745597][ T3367] ? clear_bhb_loop+0x30/0x80 [ 165.750297][ T3367] ? clear_bhb_loop+0x30/0x80 [ 165.755072][ T3367] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 165.760951][ T3367] RIP: 0033:0x7f449659c819 [ 165.765439][ T3367] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 165.785123][ T3367] RSP: 002b:00007f44974000e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 165.793610][ T3367] RAX: ffffffffffffffda RBX: 00007f4496815fa8 RCX: 00007f449659c819 [ 165.801558][ T3367] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f4496815fac [ 165.809509][ T3367] RBP: 00007f4496815fa0 R08: 0017efd1cafc37dc R09: 0000000000000000 [ 165.817457][ T3367] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000000 [ 165.825399][ T3367] R13: 00007f4496816038 R14: 00007ffe988e1f10 R15: 00007ffe988e1ff8 [ 165.833437][ T3367] [ 165.836435][ T3367] Modules linked in: [ 165.840323][ T3367] ---[ end trace 0000000000000000 ]--- [ 165.840379][ T3373] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 165.845776][ T3367] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 165.851821][ T3373] CPU: 0 PID: 3373 Comm: syz.0.1090 Tainted: G D syzkaller #0 [ 165.858069][ T3367] Code: 80 3c 30 00 74 05 e8 34 b9 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 165.866890][ T3373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 165.886572][ T3367] RSP: 0018:ffffc90000a87830 EFLAGS: 00010096 [ 165.896865][ T3373] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 165.902915][ T3367] RAX: 1ffff110267e3246 RBX: ffff888133f19228 RCX: ffff88811fb4d100 [ 165.909047][ T3373] Code: 80 3c 30 00 74 05 e8 34 b9 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 165.917019][ T3367] RDX: ffff8881158f1440 RSI: 0000000000000001 RDI: ffffffff87104680 [ 165.936628][ T3373] RSP: 0018:ffffc90000e07630 EFLAGS: 00010096 [ 165.944675][ T3367] RBP: ffffc90000a87870 R08: 0000000000000000 R09: 1ffffffff0f25705 [ 165.950718][ T3373] RAX: 1ffff110267e3246 RBX: ffff888133f19228 RCX: ffff88810f358000 [ 165.958665][ T3367] R10: 00000000b720eca3 R11: fffffbfff0f25706 R12: 0000000000000001 [ 165.966618][ T3373] RDX: ffff888133a8a880 RSI: 0000000000000000 RDI: ffffffff87104680 [ 165.974601][ T3367] R13: ffff888133f19228 R14: dffffc0000000000 R15: ffffffff81728f30 [ 165.982548][ T3373] RBP: ffffc90000e07670 R08: 0000000000000002 R09: 1ffffffff0f25705 [ 165.990494][ T3367] FS: 00007f44974006c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 165.998439][ T3373] R10: 00000000b720eca3 R11: fffffbfff0f25706 R12: 0000000000000000 [ 166.007342][ T3367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.015291][ T3373] R13: ffff888133f19228 R14: dffffc0000000000 R15: ffffffff81728f30 [ 166.021852][ T3367] CR2: 0000001b2ec18ff8 CR3: 0000000108e45000 CR4: 00000000003506a0 [ 166.029882][ T3373] FS: 00007ffa741076c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 166.037829][ T3367] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 166.046733][ T3373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.054678][ T3367] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 166.061234][ T3373] CR2: 00007f4496557930 CR3: 0000000130e65000 CR4: 00000000003506b0 [ 166.069364][ T3367] Kernel panic - not syncing: Fatal exception [ 166.077310][ T3373] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.077322][ T3373] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 166.077332][ T3373] Call Trace: [ 166.077338][ T3373] [ 166.077348][ T3373] __schedule+0x1270/0x1500 [ 166.077377][ T3373] ? release_firmware_map_entry+0x190/0x190 [ 166.077400][ T3373] schedule+0xbd/0x170 [ 166.077412][ T3373] schedule_timeout+0xba/0x340 [ 166.077430][ T3373] ? __cfi_schedule_timeout+0x10/0x10 [ 166.077449][ T3373] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 166.077470][ T3373] ? _raw_spin_unlock+0x4c/0x70 [ 166.077489][ T3373] wait_for_common+0x365/0x640 [ 166.077506][ T3373] ? wait_for_completion+0x20/0x20 [ 166.077523][ T3373] wait_for_completion+0x18/0x20 [ 166.077536][ T3373] __synchronize_srcu+0x181/0x210 [ 166.077553][ T3373] ? synchronize_srcu_expedited+0x20/0x20 [ 166.077569][ T3373] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 166.077588][ T3373] ? __cfi_wakeme_after_rcu+0x10/0x10 [ 166.077609][ T3373] ? tracepoint_probe_unregister+0x878/0x8e0 [ 166.077628][ T3373] ? ktime_get_mono_fast_ns+0x1b3/0x1d0 [ 166.077651][ T3373] synchronize_srcu+0x1d9/0x1f0 [ 166.077666][ T3373] perf_trace_event_unreg+0xd8/0x1c0 [ 166.077684][ T3373] perf_trace_destroy+0xbe/0x180 [ 166.077703][ T3373] tp_perf_event_destroy+0x15/0x20 [ 166.077718][ T3373] ? __cfi_tp_perf_event_destroy+0x10/0x10 [ 166.077733][ T3373] _free_event+0x9cd/0xce0 [ 166.077749][ T3373] perf_event_release_kernel+0x825/0x8c0 [ 166.077766][ T3373] ? __cfi_perf_event_release_kernel+0x10/0x10 [ 166.077784][ T3373] perf_release+0x3b/0x40 [ 166.077800][ T3373] ? __cfi_perf_release+0x10/0x10 [ 166.077816][ T3373] __fput+0x1fc/0x8f0 [ 166.077835][ T3373] ____fput+0x15/0x20 [ 166.077851][ T3373] task_work_run+0x1e1/0x250 [ 166.077868][ T3373] ? __cfi_task_work_run+0x10/0x10 [ 166.077885][ T3373] ? fput+0x15b/0x1a0 [ 166.077902][ T3373] exit_to_user_mode_loop+0x9b/0xb0 [ 166.077917][ T3373] exit_to_user_mode_prepare+0x87/0xd0 [ 166.077933][ T3373] syscall_exit_to_user_mode+0x1a/0x30 [ 166.077950][ T3373] do_syscall_64+0x58/0xa0 [ 166.077969][ T3373] ? clear_bhb_loop+0x30/0x80 [ 166.077984][ T3373] ? clear_bhb_loop+0x30/0x80 [ 166.078000][ T3373] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 166.078016][ T3373] RIP: 0033:0x7ffa7319c819 [ 166.078029][ T3373] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 166.078048][ T3373] RSP: 002b:00007ffa74107028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 166.078064][ T3373] RAX: 0000000000000000 RBX: 00007ffa73415fa0 RCX: 00007ffa7319c819 [ 166.078074][ T3373] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 166.078083][ T3373] RBP: 00007ffa74107090 R08: 0000000000000000 R09: 0000000000000000 [ 166.078093][ T3373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.078102][ T3373] R13: 00007ffa73416038 R14: 00007ffa73415fa0 R15: 00007ffc3cb16628 [ 166.078116][ T3373] [ 166.078121][ T3373] Modules linked in: [ 166.084167][ T3373] ---[ end trace 0000000000000000 ]--- [ 166.084174][ T3373] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 166.084193][ T3373] Code: 80 3c 30 00 74 05 e8 34 b9 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 166.084204][ T3373] RSP: 0018:ffffc90000a87830 EFLAGS: 00010096 [ 166.084217][ T3373] RAX: 1ffff110267e3246 RBX: ffff888133f19228 RCX: ffff88811fb4d100 [ 166.084228][ T3373] RDX: ffff8881158f1440 RSI: 0000000000000001 RDI: ffffffff87104680 [ 166.084239][ T3373] RBP: ffffc90000a87870 R08: 0000000000000000 R09: 1ffffffff0f25705 [ 166.084249][ T3373] R10: 00000000b720eca3 R11: fffffbfff0f25706 R12: 0000000000000001 [ 166.084259][ T3373] R13: ffff888133f19228 R14: dffffc0000000000 R15: ffffffff81728f30 [ 166.084271][ T3373] FS: 00007ffa741076c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 166.084284][ T3373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.084295][ T3373] CR2: 00007f4496557930 CR3: 0000000130e65000 CR4: 00000000003506b0 [ 166.084308][ T3373] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.084317][ T3373] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 167.171273][ T3367] Shutting down cpus with NMI [ 167.588838][ T3367] Kernel Offset: disabled [ 167.593162][ T3367] Rebooting in 86400 seconds..