last executing test programs: 642.708618ms ago: executing program 2 (id=3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='f2fs_sync_fs\x00', r3}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x7e, 0xa, 0xa, 0x0, 0x0, 0x61, 0x10, 0x3c}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) write$cgroup_type(r1, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000200), 0x4) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r4, &(0x7f00000001c0)="26c8de98fc3925360069ed8307069ad27593a9f424b68b0dcd0247", &(0x7f0000000280)=""/154, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0f0000040000000800000008e10000000000000000d6799c7733923a491a3a88084718", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) 422.898795ms ago: executing program 3 (id=4): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000200000004f1000000000000063000000000000009500059e00020000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3a) 375.330979ms ago: executing program 0 (id=1): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000040), &(0x7f0000000080)='%pi6 \x00'}, 0x20) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 291.521556ms ago: executing program 4 (id=5): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000359ad5c2dd90d8dfc8af9bb9848d6a1f35cd73e204d1955f4887cf372a85f9097397653ea2f39e3962ce967014ac59770d5b02e6c5e9dd92c8c9991822e6a29e2302ca62176de5ea58dffbbd7c1dbaf505514892f81519201254f94551384f4f6bebf76de68adf3f69801f1c9e10c8e527e9054fa89a7f2f77d97ab001da81fd9b5604fccef5811cae6c94130c8790cd067842579051e0ff97"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES64=r3, @ANYBLOB="2000000000000000b7080076d60000007b8af8ff00000000b704000000000000850000000800000095fc00f457a7412dd36ed8954a60271a143bf12f75c46f65c23582d493a4323b4e67aa95746f562923d5c233ce4c80181e346a93ba5e7d811689d58c5a2a363eba3d1e49703cff9a2db0def91dca695b5054c9d3de7e4e8eb46421a025fca9bbfa477fee1257b711ef81b19275fd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYBLOB="0100"/20, @ANYRES8=r3, @ANYRES32, @ANYRESDEC=r1], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80891, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) r6 = syz_clone(0x10000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c56923e051251f71eefebe02d822d2c0d9349613bfa55cc", 0x2a, 0x0, &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a937") syz_open_procfs$namespace(r6, &(0x7f0000000380)='ns/user\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb6", 0x0, 0x5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0xfffffffffffffffd, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x105080, 0x0) mkdir(0x0, 0x180) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r10, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0xdd, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYRES64=r5], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r12, 0xffff0000, 0xe, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 264.951168ms ago: executing program 1 (id=2): r0 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) close(r0) (rerun: 32) 1.267499ms ago: executing program 0 (id=6): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010b00"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000004c0), 0x1000, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x38) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000006c0)='syzkaller\x00') ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000001c0)="09197ce259ce0c3bd6fda7af155b336dff3300"/34, &(0x7f0000000000), 0x2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/146}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 0s ago: executing program 3 (id=7): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair(0x15, 0xa, 0x3, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40001) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r6}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2ca8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80006, 0x0, @perf_config_ext, 0x0, 0x10003, 0x80000000, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.1' (ED25519) to the list of known hosts. [ 25.697564][ T30] audit: type=1400 audit(1755458977.508:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.699942][ T273] cgroup: Unknown subsys name 'net' [ 25.723769][ T30] audit: type=1400 audit(1755458977.508:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.766101][ T30] audit: type=1400 audit(1755458977.548:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.766393][ T273] cgroup: Unknown subsys name 'devices' [ 25.947776][ T273] cgroup: Unknown subsys name 'hugetlb' [ 25.955495][ T273] cgroup: Unknown subsys name 'rlimit' [ 26.165807][ T30] audit: type=1400 audit(1755458977.978:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.198390][ T30] audit: type=1400 audit(1755458977.978:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.205387][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.228548][ T30] audit: type=1400 audit(1755458977.978:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.271335][ T30] audit: type=1400 audit(1755458978.048:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.294785][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.308443][ T30] audit: type=1400 audit(1755458978.048:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.360389][ T30] audit: type=1400 audit(1755458978.098:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.391953][ T30] audit: type=1400 audit(1755458978.098:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.500538][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.512949][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.523533][ T281] device bridge_slave_0 entered promiscuous mode [ 27.546799][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.555879][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.565251][ T281] device bridge_slave_1 entered promiscuous mode [ 27.584832][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.593904][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.604120][ T282] device bridge_slave_0 entered promiscuous mode [ 27.625900][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.634562][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.644124][ T282] device bridge_slave_1 entered promiscuous mode [ 27.657449][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.668701][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.678640][ T283] device bridge_slave_0 entered promiscuous mode [ 27.690373][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.703793][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.718572][ T283] device bridge_slave_1 entered promiscuous mode [ 27.811169][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.820631][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.830842][ T285] device bridge_slave_0 entered promiscuous mode [ 27.856874][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.866545][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.878736][ T285] device bridge_slave_1 entered promiscuous mode [ 27.925517][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.935389][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.943649][ T284] device bridge_slave_0 entered promiscuous mode [ 27.954786][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.965704][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.978981][ T284] device bridge_slave_1 entered promiscuous mode [ 28.154253][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.165385][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.177873][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.188234][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.213729][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.223132][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.236291][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.246355][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.274039][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.285698][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.298087][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.310056][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.352772][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.362165][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.372313][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.381024][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.420784][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.430794][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.440479][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.448800][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.470903][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.482771][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.497911][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.508870][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.522295][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.535295][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.546033][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.559019][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.572651][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.588417][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.605449][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.619080][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.632221][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.646204][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.668440][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.679672][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.691416][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.702134][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.712374][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.727484][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.741585][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.757925][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.788744][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.799179][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.812249][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.825199][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.838661][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.850798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.862697][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.872615][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.882798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.893389][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.905152][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.915245][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.926482][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.941793][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.956139][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.967220][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.980289][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.992678][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.005896][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.018020][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.030605][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.043000][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.055448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.066800][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.083524][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.092838][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.106953][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.118982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.140672][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.152821][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.164057][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.174430][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.186940][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.196401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.213811][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.223238][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.255145][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.266381][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.275981][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.288115][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.307599][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.322226][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.338061][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.352084][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.362965][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.377420][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.391399][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.404288][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.421510][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.437462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.451502][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.462509][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.473498][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.482812][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.498962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.510537][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.528350][ T283] device veth0_vlan entered promiscuous mode [ 29.543203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.553941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.566449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.578820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.590440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.600668][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.622126][ T285] device veth0_vlan entered promiscuous mode [ 29.633893][ T283] device veth1_macvtap entered promiscuous mode [ 29.641990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.652932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.664624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.677813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.689701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.703747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.716767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.728455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.741046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.753144][ T281] device veth0_vlan entered promiscuous mode [ 29.763885][ T282] device veth0_vlan entered promiscuous mode [ 29.773648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.782358][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.796391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.806562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.819024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.829807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.841945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.851894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.876068][ T285] device veth1_macvtap entered promiscuous mode [ 29.885526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.896365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.909312][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.923054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.937143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.952222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.963175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.976649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.986824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.999573][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.009998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.036743][ T282] device veth1_macvtap entered promiscuous mode [ 30.045982][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 30.052711][ T281] device veth1_macvtap entered promiscuous mode [ 30.062957][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.074787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.085826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.096443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.109649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.120041][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.135819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.147448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.162502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.173294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.211038][ T284] device veth0_vlan entered promiscuous mode [ 30.220437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.230028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.239377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.250991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.262878][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.272606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.283567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.293982][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.305512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.319262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.332452][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.342554][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.365519][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.384212][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.402311][ T284] device veth1_macvtap entered promiscuous mode [ 30.425961][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.441548][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.451938][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.474069][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.496520][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.522886][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.537500][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.734241][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 30.734257][ T30] audit: type=1400 audit(1755458982.538:109): avc: denied { prog_run } for pid=334 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.819319][ T30] audit: type=1400 audit(1755458982.618:110): avc: denied { create } for pid=377 comm="syz.3.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 30.834902][ C1] hrtimer: interrupt took 30069 ns [ 30.859001][ T378] device pim6reg1 entered promiscuous mode [ 30.874203][ T30] audit: type=1400 audit(1755458982.668:111): avc: denied { setopt } for pid=334 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.899699][ T335] device veth1_macvtap left promiscuous mode [ 30.937050][ T30] audit: type=1400 audit(1755458982.668:112): avc: denied { create } for pid=334 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.999116][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.007703][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.022636][ T348] general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN [ 31.039493][ T348] KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] [ 31.051530][ T348] CPU: 0 PID: 348 Comm: syz.1.2 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 31.063428][ T348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 31.076035][ T348] RIP: 0010:inherit_task_group+0x689/0x770 [ 31.084581][ T348] Code: c6 8c 00 00 00 4c 89 f0 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 8d 00 00 00 41 8b 1e 49 81 c4 8c 00 00 00 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 8d 00 00 00 41 89 1c 24 e9 ce fa ff ff [ 31.110323][ T348] RSP: 0018:ffffc90007adf9e0 EFLAGS: 00010207 [ 31.119208][ T348] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff88810d324f00 [ 31.128991][ T348] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88812a229760 [ 31.140016][ T348] RBP: ffffc90007adfa50 R08: dffffc0000000000 R09: ffffed103ee07182 [ 31.149820][ T348] R10: ffffed103ee07182 R11: 1ffff1103ee07181 R12: 000000000000008c [ 31.159722][ T348] R13: dffffc0000000000 R14: ffff88812a22975c R15: ffffc90007adfabc [ 31.168465][ T348] FS: 00007fc21b6976c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 31.180471][ T348] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.187859][ T348] CR2: 00007fc21b696ff8 CR3: 0000000129dcb000 CR4: 00000000003506b0 [ 31.198947][ T348] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.208702][ T348] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 31.218402][ T348] Call Trace: [ 31.222174][ T348] [ 31.225681][ T348] perf_event_init_task+0x185/0x4c0 [ 31.232226][ T348] ? sched_fork+0x168/0x7c0 [ 31.238553][ T348] copy_process+0x1022/0x3210 [ 31.244225][ T348] ? __pidfd_prepare+0x150/0x150 [ 31.249752][ T348] kernel_clone+0x23f/0x940 [ 31.255805][ T348] ? do_user_addr_fault+0xa64/0x1180 [ 31.261973][ T348] ? create_io_thread+0x130/0x130 [ 31.270493][ T348] __x64_sys_clone+0x176/0x1d0 [ 31.275956][ T348] ? __ia32_sys_vfork+0xf0/0xf0 [ 31.283097][ T348] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 31.292052][ T348] x64_sys_call+0x41f/0x9a0 [ 31.297423][ T348] do_syscall_64+0x4c/0xa0 [ 31.302810][ T348] ? clear_bhb_loop+0x50/0xa0 [ 31.308403][ T348] ? clear_bhb_loop+0x50/0xa0 [ 31.314068][ T348] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.322100][ T348] RIP: 0033:0x7fc21cc2ebe9 [ 31.328125][ T348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.352838][ T348] RSP: 002b:00007fc21b696fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 31.365381][ T348] RAX: ffffffffffffffda RBX: 00007fc21ce55fa0 RCX: 00007fc21cc2ebe9 [ 31.375408][ T348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 31.384657][ T348] RBP: 00007fc21ccb1e19 R08: 0000000000000000 R09: 0000000000000000 [ 31.394020][ T348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 31.405257][ T348] R13: 00007fc21ce56038 R14: 00007fc21ce55fa0 R15: 00007fffef48b298 [ 31.416312][ T348] [ 31.420066][ T348] Modules linked in: [ 31.424658][ T348] ---[ end trace 79715d6c366c3e68 ]--- [ 31.426841][ T337] device veth1_macvtap entered promiscuous mode [ 31.442439][ T348] RIP: 0010:inherit_task_group+0x689/0x770 [ 31.444744][ T30] audit: type=1400 audit(1755458983.248:113): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 31.449740][ T348] Code: c6 8c 00 00 00 4c 89 f0 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 8d 00 00 00 41 8b 1e 49 81 c4 8c 00 00 00 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 8d 00 00 00 41 89 1c 24 e9 ce fa ff ff [ 31.449766][ T348] RSP: 0018:ffffc90007adf9e0 EFLAGS: 00010207 [ 31.449787][ T348] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff88810d324f00 [ 31.449801][ T348] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88812a229760 [ 31.498385][ T337] device macsec0 entered promiscuous mode [ 31.537789][ T381] device bridge_slave_1 left promiscuous mode [ 31.544373][ T30] audit: type=1400 audit(1755458983.248:114): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.545697][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.580362][ T381] device bridge_slave_0 left promiscuous mode [ 31.583902][ T30] audit: type=1400 audit(1755458983.248:115): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.588050][ T348] RBP: ffffc90007adfa50 R08: dffffc0000000000 R09: ffffed103ee07182 [ 31.613497][ T30] audit: type=1400 audit(1755458983.248:116): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.622284][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.647607][ T30] audit: type=1400 audit(1755458983.248:117): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.657826][ T348] R10: ffffed103ee07182 R11: 1ffff1103ee07181 R12: 000000000000008c [ 31.685056][ T30] audit: type=1400 audit(1755458983.248:118): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.691155][ T348] R13: dffffc0000000000 R14: ffff88812a22975c R15: ffffc90007adfabc [ 31.726343][ T348] FS: 00007fc21b6976c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 31.740273][ T348] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.749415][ T348] CR2: 00007fc21b676990 CR3: 0000000129dcb000 CR4: 00000000003506b0 [ 31.762744][ T348] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.773322][ T348] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 31.783491][ T348] Kernel panic - not syncing: Fatal exception [ 31.792496][ T348] Kernel Offset: disabled [ 31.798301][ T348] Rebooting in 86400 seconds..