last executing test programs: 35.526613748s ago: executing program 0 (id=1860): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x69, 0x0, &(0x7f0000000140)="c1dfb082cd21d308098ee68886ddd78af51c381b4b8df6cc4686c8686664acb0a4fd1b87f3c27b967b88c7fe3e02094c81f9722608c8e5d2c88c1d3022cb143918ad6c17e8b6ce9b96b66186638151ec44aa5bdc04db64fd72946448be518a628c1e039a66b68ac3b8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 24.973245675s ago: executing program 0 (id=1860): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x69, 0x0, &(0x7f0000000140)="c1dfb082cd21d308098ee68886ddd78af51c381b4b8df6cc4686c8686664acb0a4fd1b87f3c27b967b88c7fe3e02094c81f9722608c8e5d2c88c1d3022cb143918ad6c17e8b6ce9b96b66186638151ec44aa5bdc04db64fd72946448be518a628c1e039a66b68ac3b8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21.427657489s ago: executing program 0 (id=1860): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x69, 0x0, &(0x7f0000000140)="c1dfb082cd21d308098ee68886ddd78af51c381b4b8df6cc4686c8686664acb0a4fd1b87f3c27b967b88c7fe3e02094c81f9722608c8e5d2c88c1d3022cb143918ad6c17e8b6ce9b96b66186638151ec44aa5bdc04db64fd72946448be518a628c1e039a66b68ac3b8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 14.901802467s ago: executing program 0 (id=1860): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x69, 0x0, &(0x7f0000000140)="c1dfb082cd21d308098ee68886ddd78af51c381b4b8df6cc4686c8686664acb0a4fd1b87f3c27b967b88c7fe3e02094c81f9722608c8e5d2c88c1d3022cb143918ad6c17e8b6ce9b96b66186638151ec44aa5bdc04db64fd72946448be518a628c1e039a66b68ac3b8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10.80108235s ago: executing program 0 (id=1860): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x69, 0x0, &(0x7f0000000140)="c1dfb082cd21d308098ee68886ddd78af51c381b4b8df6cc4686c8686664acb0a4fd1b87f3c27b967b88c7fe3e02094c81f9722608c8e5d2c88c1d3022cb143918ad6c17e8b6ce9b96b66186638151ec44aa5bdc04db64fd72946448be518a628c1e039a66b68ac3b8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8.69492527s ago: executing program 2 (id=2397): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8100000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x10}, 0x94) 8.653687691s ago: executing program 2 (id=2400): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007a000000180000000000000000000000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583eccafdb033f6"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x10001) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6f0e}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000500)='\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000b0efb12b680000000000000000000000c600feff000000351433b0"], 0x0, 0x5}, 0x94) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000005c0)="a75f04ebffffff6f2f3534fdb86736", 0x0, 0x400000ff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) write$cgroup_devices(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000071adc112690c8a29"], 0xffe7) 6.594721548s ago: executing program 1 (id=2401): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xaac, 0xffffffff, 0x2, 0x1, 0xffffffffffffffff, 0x4, '\x00', r0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x9}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0xc2ba, 0x0, 0x64317119, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4220, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4000090c5a65a667b526127374a025e7726000000000079105200000000006347b597e70aebdabcfe78de7562e741e6d38f60ef3c7ee0f5d797ac24f3bacd7b8dd92fefd7395a350c2aab0224dbb2945ca8d5f2c2662c0cb3f4149ab73e893cfd82264160fc03cf740f6b2163447c86223d2562bfdfbd818cd3772bbb4fd3df7378248c09991ad9e6851aea938fcd6dcbcabd07c223091c5e21fb05d4b1e93c6a53f7971c01d4fa7b6e089e673d13f6cd335195072d4aff5e2ba0120e79f6cba3c3e74c55786d23e5e02879e2b5fa0cb9232b5902a3419612"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r0, @flow_dissector}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 5.519436834s ago: executing program 2 (id=2403): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c25"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r0}, 0xc) 5.40045988s ago: executing program 2 (id=2406): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x4, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd5, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x4f, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r1, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa1, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x51, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)) 5.39992966s ago: executing program 1 (id=2407): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mkdir(0x0, 0x8b) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r2}, 0xc) 5.329419794s ago: executing program 4 (id=2408): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[], 0x0, 0x40, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(0x0, 0x0) 5.328541914s ago: executing program 1 (id=2418): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000380)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80048000000000", @ANYRESDEC], 0xffdd) 5.186580952s ago: executing program 4 (id=2409): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYRESHEX=r1], 0xffdd) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000003, 0x8800, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x4}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001000000400000002000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)="cc586ea72b0962cb85542afcb4fdc87394d1b13b3f20ac2c29b048d772fd7c5909fbd54da8a32b2f952c7ec2bafa37cdbde746638538aba21dff145a0e945f358fb19e0ee37e437bd6d72583c43068e2eb2b1eb90a14fbc8633a07ca9ad7288a5af2e3ad0825830c7581df65080b4f83405b5b778a2fda4151e61717d9f58ba6407e0e02c25aff3de875", &(0x7f0000000080), 0x1003, r5}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0), 0xfffffffffffffffc, 0x6, r5}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01d605000000c3faec017d00a4e2000001c00000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x81142, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) 4.063356289s ago: executing program 4 (id=2411): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ff0700000000000000000007850000002a"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) 4.06244291s ago: executing program 3 (id=2412): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000005c0)="b9fb03076003007cb89e11f588a8", 0x0, 0x402f, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 9) 3.999636933s ago: executing program 1 (id=2413): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000, 0x95, '\x00', 0x0, @fallback=0x28}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r2, 0x400454ce, 0x1a) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000c80)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x50) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x13, 0x10, 0x1}, 0x48) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 3.699069589s ago: executing program 3 (id=2414): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081140000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105e00000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007a000000180000000000000000000000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583eccafdb033f6"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x10001) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6f0e}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000500)='\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000b0efb12b680000000000000000000000c600feff000000351433b0"], 0x0, 0x5}, 0x94) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000005c0)="a75f04ebffffff6f2f3534fdb86736", 0x0, 0x400000ff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) write$cgroup_devices(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000071adc112690c8a29"], 0xffe7) 3.698104689s ago: executing program 2 (id=2415): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRESDEC=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x6, 0x0, 0x2, 0x8048, 0x1, 0xd2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x4}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x6, 0x6, 0xffffffff, 0x1, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x17, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x0, 0x7, 0x6, 0x0, 0x100, 0x8}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x200d}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}], &(0x7f0000000480)='syzkaller\x00', 0x6, 0x24, &(0x7f0000000540)=""/36, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x3, 0xd7ba, 0xfffffe00}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000600)=[{0x0, 0x3, 0x2, 0xa}, {0x0, 0x5, 0xf, 0x2}, {0x0, 0x4, 0xb, 0x4}], 0x10, 0xe2c4}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x200, 0x90530, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x8000}, 0x0, 0x400000, 0xfffffff4, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x205, r5, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000ef7d1800"/31], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000b40)=ANY=[@ANYRES32=r11, @ANYRES32=r10, @ANYBLOB='&\x00\x00\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r8}, 0x20) sendmsg$inet(r9, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 1.607992087s ago: executing program 4 (id=2416): bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000040)=@generic={0x0}, 0x18) r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000380), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0600000004000000080000000f"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x4, &(0x7f0000000800)=ANY=[@ANYRES64, @ANYBLOB="12d57b042021c6ea2201c4fc518bf76b7a893a53f59a9dab4e2d7580a01d", @ANYRES8=r0], &(0x7f00000007c0)='GPL\x00', 0x100002, 0x97, &(0x7f0000000900)=""/151, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES16=r3, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300), 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x40012141) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) 576.64512ms ago: executing program 1 (id=2417): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x20}, 0x3) 558.342921ms ago: executing program 3 (id=2419): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) 436.507527ms ago: executing program 3 (id=2420): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x5dcf70ef8daa5d0e}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 408.662019ms ago: executing program 1 (id=2421): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0xdd, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xc256, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffed0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 379.73478ms ago: executing program 4 (id=2422): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x37}, 0x24) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair(0x1a, 0xa, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r4, &(0x7f0000000300), 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r1, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0x11, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffa}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000008c0)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x40, '\x00', r5, 0x0, r2, 0x8, &(0x7f00000009c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0x6, 0x4, 0xffffffda}, 0x10, 0x1530e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x400}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) recvmsg(r4, &(0x7f0000002380)={&(0x7f0000000180)=@phonet, 0x80, &(0x7f0000002280)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, &(0x7f00000022c0)=""/187, 0xbb}, 0x40000023) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="282000000000000071114f00000000008510000002000000850000000000000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000", @ANYRES32=0x0, @ANYBLOB="00000000c051df624eeb2e5f"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 327.291813ms ago: executing program 2 (id=2423): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0xdd, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xc256, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffed0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 281.332576ms ago: executing program 3 (id=2424): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x4010744d, &(0x7f0000001200)) 47.809188ms ago: executing program 3 (id=2425): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x440000, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x1943}, 0x3a, 0x8, 0x1000, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x2, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x700}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x98}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {0x7, 0x0, 0x0, 0x9}, {0x7, 0x0, 0xc}, {0x18, 0x9, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff1, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xfffffffffffffffa}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRES32=r7, @ANYBLOB="1200000000000000", @ANYRES32=0x0, @ANYBLOB="7191f3ec705c619c8af557803d25a4ce15c37abe805642c92b296b3a5965e0f08c2101670659a7957240957c31d593f3f6c6be1f1c7791ded32d2fe781bec5e9dfe0ef5b7d15d52e8969430e3cb706b408cc7c070000008333858bbeb5023a84b4388f959378c727909041fc591fc70c893f4c81", @ANYRES32=0x0, @ANYBLOB, @ANYRES64=0x0], 0x20) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 5.15305ms ago: executing program 4 (id=2426): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="12000000040000000400000008"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000697b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 0 (id=1860): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x69, 0x0, &(0x7f0000000140)="c1dfb082cd21d308098ee68886ddd78af51c381b4b8df6cc4686c8686664acb0a4fd1b87f3c27b967b88c7fe3e02094c81f9722608c8e5d2c88c1d3022cb143918ad6c17e8b6ce9b96b66186638151ec44aa5bdc04db64fd72946448be518a628c1e039a66b68ac3b8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): 8966][ T3877] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.905069][ T3877] RIP: 0033:0x7fc5da263819 [ 161.909525][ T3877] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 161.929514][ T3877] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.938219][ T3877] RAX: ffffffffffffffda RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 161.946219][ T3877] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 161.954308][ T3877] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 161.962481][ T3877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.970656][ T3877] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 161.979093][ T3877] [ 162.113286][ T3883] device syzkaller0 entered promiscuous mode [ 162.184499][ T3886] device syzkaller0 entered promiscuous mode [ 162.202833][ T3888] device syzkaller0 entered promiscuous mode [ 162.342422][ T3892] device syzkaller0 entered promiscuous mode [ 162.778829][ T3899] device syzkaller0 entered promiscuous mode [ 165.714219][ T3950] FAULT_INJECTION: forcing a failure. [ 165.714219][ T3950] name failslab, interval 1, probability 0, space 0, times 0 [ 165.747320][ T3950] CPU: 0 PID: 3950 Comm: syz.3.1265 Tainted: G W syzkaller #0 [ 165.756268][ T3950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 165.766447][ T3950] Call Trace: [ 165.769752][ T3950] [ 165.772710][ T3950] __dump_stack+0x21/0x30 [ 165.777083][ T3950] dump_stack_lvl+0x110/0x170 [ 165.781792][ T3950] ? show_regs_print_info+0x20/0x20 [ 165.787017][ T3950] ? kasan_set_track+0x5b/0x70 [ 165.791802][ T3950] ? kasan_set_free_info+0x23/0x40 [ 165.796936][ T3950] ? ____kasan_slab_free+0x125/0x160 [ 165.802333][ T3950] ? __kasan_slab_free+0x11/0x20 [ 165.807314][ T3950] ? kmem_cache_free+0x100/0x320 [ 165.812283][ T3950] ? putname+0x111/0x160 [ 165.816553][ T3950] ? do_sys_openat2+0x6df/0x7f0 [ 165.821436][ T3950] ? __x64_sys_openat+0x136/0x160 [ 165.826492][ T3950] dump_stack+0x15/0x20 [ 165.830791][ T3950] should_fail+0x3c1/0x510 [ 165.835281][ T3950] __should_failslab+0xa4/0xe0 [ 165.840093][ T3950] should_failslab+0x9/0x20 [ 165.844754][ T3950] slab_pre_alloc_hook+0x3b/0xe0 [ 165.849749][ T3950] __kmalloc+0x6d/0x2c0 [ 165.854030][ T3950] ? bpf_test_init+0x100/0x1c0 [ 165.858831][ T3950] bpf_test_init+0x100/0x1c0 [ 165.863452][ T3950] bpf_prog_test_run_skb+0x193/0x1150 [ 165.868861][ T3950] ? __kasan_check_write+0x14/0x20 [ 165.874005][ T3950] ? fput_many+0x15a/0x1a0 [ 165.878456][ T3950] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 165.884518][ T3950] bpf_prog_test_run+0x3d5/0x630 [ 165.889486][ T3950] ? bpf_prog_query+0x230/0x230 [ 165.894369][ T3950] ? selinux_bpf+0xce/0xf0 [ 165.898820][ T3950] ? security_bpf+0x82/0xa0 [ 165.903355][ T3950] __sys_bpf+0x590/0x7d0 [ 165.907629][ T3950] ? bpf_link_show_fdinfo+0x330/0x330 [ 165.913123][ T3950] ? debug_smp_processor_id+0x17/0x20 [ 165.918527][ T3950] __x64_sys_bpf+0x7c/0x90 [ 165.923086][ T3950] x64_sys_call+0x4b9/0x9a0 [ 165.927618][ T3950] do_syscall_64+0x4c/0xa0 [ 165.932068][ T3950] ? clear_bhb_loop+0x50/0xa0 [ 165.936769][ T3950] ? clear_bhb_loop+0x50/0xa0 [ 165.941479][ T3950] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.947405][ T3950] RIP: 0033:0x7fc5da263819 [ 165.951936][ T3950] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 165.971585][ T3950] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.980034][ T3950] RAX: ffffffffffffffda RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 165.988130][ T3950] RDX: 0000000000000050 RSI: 0000200000001200 RDI: 000000000000000a [ 165.996268][ T3950] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 166.004361][ T3950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.012362][ T3950] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 166.020379][ T3950] [ 171.248625][ T3996] FAULT_INJECTION: forcing a failure. [ 171.248625][ T3996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.263766][ T30] audit: type=1400 audit(1776441471.200:142): avc: denied { setattr } for pid=3994 comm="syz.4.1279" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 171.374211][ T3996] CPU: 0 PID: 3996 Comm: syz.2.1280 Tainted: G W syzkaller #0 [ 171.383239][ T3996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 171.393420][ T3996] Call Trace: [ 171.396746][ T3996] [ 171.399728][ T3996] __dump_stack+0x21/0x30 [ 171.404289][ T3996] dump_stack_lvl+0x110/0x170 [ 171.409015][ T3996] ? show_regs_print_info+0x20/0x20 [ 171.414540][ T3996] ? vfs_write+0xc72/0xfd0 [ 171.419257][ T3996] dump_stack+0x15/0x20 [ 171.423461][ T3996] should_fail+0x3c1/0x510 [ 171.427915][ T3996] should_fail_usercopy+0x1a/0x20 [ 171.432991][ T3996] _copy_from_user+0x20/0xd0 [ 171.437613][ T3996] __sys_bpf+0x258/0x7d0 [ 171.441887][ T3996] ? bpf_link_show_fdinfo+0x330/0x330 [ 171.447305][ T3996] ? debug_smp_processor_id+0x17/0x20 [ 171.452721][ T3996] __x64_sys_bpf+0x7c/0x90 [ 171.457161][ T3996] x64_sys_call+0x4b9/0x9a0 [ 171.461683][ T3996] do_syscall_64+0x4c/0xa0 [ 171.466119][ T3996] ? clear_bhb_loop+0x50/0xa0 [ 171.470813][ T3996] ? clear_bhb_loop+0x50/0xa0 [ 171.475513][ T3996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.481421][ T3996] RIP: 0033:0x7f646a170819 [ 171.485855][ T3996] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 171.505650][ T3996] RSP: 002b:00007f6468bcb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 171.514210][ T3996] RAX: ffffffffffffffda RBX: 00007f646a3e9fa0 RCX: 00007f646a170819 [ 171.522297][ T3996] RDX: 000000000000000c RSI: 0000200000000000 RDI: 000000000000000a [ 171.530291][ T3996] RBP: 00007f6468bcb090 R08: 0000000000000000 R09: 0000000000000000 [ 171.538284][ T3996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.546276][ T3996] R13: 00007f646a3ea038 R14: 00007f646a3e9fa0 R15: 00007ffdb9e07be8 [ 171.554477][ T3996] [ 175.506682][ T4036] device syzkaller0 entered promiscuous mode [ 176.772993][ T4074] device syzkaller0 entered promiscuous mode [ 178.203103][ T30] audit: type=1400 audit(1776441478.140:143): avc: denied { create } for pid=4122 comm="syz.2.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 178.618033][ T4135] device syzkaller0 entered promiscuous mode [ 179.485594][ T4155] device syzkaller0 entered promiscuous mode [ 179.543870][ T287] syzkaller0: tun_net_xmit 48 [ 179.846291][ T4168] FAULT_INJECTION: forcing a failure. [ 179.846291][ T4168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.926329][ T4168] CPU: 1 PID: 4168 Comm: syz.0.1339 Tainted: G W syzkaller #0 [ 179.935169][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 179.945429][ T4168] Call Trace: [ 179.948737][ T4168] [ 179.951700][ T4168] __dump_stack+0x21/0x30 [ 179.956067][ T4168] dump_stack_lvl+0x110/0x170 [ 179.960894][ T4168] ? show_regs_print_info+0x20/0x20 [ 179.966397][ T4168] dump_stack+0x15/0x20 [ 179.970574][ T4168] should_fail+0x3c1/0x510 [ 179.975030][ T4168] should_fail_usercopy+0x1a/0x20 [ 179.980081][ T4168] _copy_from_user+0x20/0xd0 [ 179.984697][ T4168] bpf_test_init+0x13d/0x1c0 [ 179.989313][ T4168] bpf_prog_test_run_skb+0x193/0x1150 [ 179.994714][ T4168] ? __kasan_check_write+0x14/0x20 [ 179.999844][ T4168] ? fput_many+0x15a/0x1a0 [ 180.004309][ T4168] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 180.010228][ T4168] bpf_prog_test_run+0x3d5/0x630 [ 180.015193][ T4168] ? bpf_prog_query+0x230/0x230 [ 180.020065][ T4168] ? selinux_bpf+0xce/0xf0 [ 180.024494][ T4168] ? security_bpf+0x82/0xa0 [ 180.029097][ T4168] __sys_bpf+0x590/0x7d0 [ 180.033352][ T4168] ? bpf_link_show_fdinfo+0x330/0x330 [ 180.038745][ T4168] ? debug_smp_processor_id+0x17/0x20 [ 180.044141][ T4168] __x64_sys_bpf+0x7c/0x90 [ 180.048581][ T4168] x64_sys_call+0x4b9/0x9a0 [ 180.053115][ T4168] do_syscall_64+0x4c/0xa0 [ 180.057553][ T4168] ? clear_bhb_loop+0x50/0xa0 [ 180.062256][ T4168] ? clear_bhb_loop+0x50/0xa0 [ 180.066980][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 180.072907][ T4168] RIP: 0033:0x7fc9e5661819 [ 180.077349][ T4168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 180.096985][ T4168] RSP: 002b:00007fc9e40bc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 180.105427][ T4168] RAX: ffffffffffffffda RBX: 00007fc9e58dafa0 RCX: 00007fc9e5661819 [ 180.113417][ T4168] RDX: 0000000000000050 RSI: 0000200000000800 RDI: 000000000000000a [ 180.121411][ T4168] RBP: 00007fc9e40bc090 R08: 0000000000000000 R09: 0000000000000000 [ 180.129509][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.137512][ T4168] R13: 00007fc9e58db038 R14: 00007fc9e58dafa0 R15: 00007ffc538e09b8 [ 180.145513][ T4168] [ 182.362666][ T4244] device syzkaller0 entered promiscuous mode [ 182.579075][ T4242] device syzkaller0 entered promiscuous mode [ 184.855222][ T4290] device syzkaller0 entered promiscuous mode [ 185.287146][ T4302] device syzkaller0 entered promiscuous mode [ 185.350435][ T4302] FAULT_INJECTION: forcing a failure. [ 185.350435][ T4302] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.428688][ T4302] CPU: 0 PID: 4302 Comm: syz.1.1384 Tainted: G W syzkaller #0 [ 185.437582][ T4302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 185.447806][ T4302] Call Trace: [ 185.451122][ T4302] [ 185.454164][ T4302] __dump_stack+0x21/0x30 [ 185.458527][ T4302] dump_stack_lvl+0x110/0x170 [ 185.463245][ T4302] ? show_regs_print_info+0x20/0x20 [ 185.468476][ T4302] ? __alloc_skb+0x21a/0x740 [ 185.473097][ T4302] ? tun_get_user+0xb41/0x3400 [ 185.477891][ T4302] ? tun_chr_write_iter+0x1eb/0x2e0 [ 185.483123][ T4302] dump_stack+0x15/0x20 [ 185.487304][ T4302] should_fail+0x3c1/0x510 [ 185.491748][ T4302] should_fail_alloc_page+0x55/0x80 [ 185.496981][ T4302] prepare_alloc_pages+0x156/0x610 [ 185.502124][ T4302] ? __alloc_pages_bulk+0xad0/0xad0 [ 185.507359][ T4302] __alloc_pages+0x11d/0x460 [ 185.511980][ T4302] ? prep_new_page+0x110/0x110 [ 185.516775][ T4302] ? __alloc_skb+0x463/0x740 [ 185.521430][ T4302] alloc_skb_with_frags+0x20c/0x620 [ 185.526665][ T4302] sock_alloc_send_pskb+0x87f/0x9a0 [ 185.531906][ T4302] ? sock_kzfree_s+0x60/0x60 [ 185.536632][ T4302] ? iov_iter_advance+0x1f9/0x360 [ 185.541832][ T4302] tun_get_user+0xb41/0x3400 [ 185.546472][ T4302] ? kmem_cache_free+0xa0/0x320 [ 185.551352][ T4302] ? putname+0x111/0x160 [ 185.555724][ T4302] ? do_syscall_64+0x4c/0xa0 [ 185.560454][ T4302] ? tun_do_read+0x1d30/0x1d30 [ 185.565249][ T4302] ? kstrtouint_from_user+0x1c4/0x220 [ 185.570651][ T4302] ? kstrtol_from_user+0x2a0/0x2a0 [ 185.575903][ T4302] ? avc_policy_seqno+0x1b/0x70 [ 185.580790][ T4302] ? selinux_file_permission+0x2aa/0x510 [ 185.586483][ T4302] tun_chr_write_iter+0x1eb/0x2e0 [ 185.591547][ T4302] vfs_write+0x835/0xfd0 [ 185.595820][ T4302] ? file_end_write+0x1b0/0x1b0 [ 185.600716][ T4302] ? __fget_files+0x2c4/0x320 [ 185.605431][ T4302] ? __fdget_pos+0x1f7/0x380 [ 185.610048][ T4302] ? ksys_write+0x71/0x250 [ 185.614619][ T4302] ksys_write+0x149/0x250 [ 185.619130][ T4302] ? __ia32_sys_read+0x90/0x90 [ 185.624016][ T4302] ? debug_smp_processor_id+0x17/0x20 [ 185.629535][ T4302] __x64_sys_write+0x7b/0x90 [ 185.634161][ T4302] x64_sys_call+0x8ef/0x9a0 [ 185.638805][ T4302] do_syscall_64+0x4c/0xa0 [ 185.643291][ T4302] ? clear_bhb_loop+0x50/0xa0 [ 185.647996][ T4302] ? clear_bhb_loop+0x50/0xa0 [ 185.652713][ T4302] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.658656][ T4302] RIP: 0033:0x7ff9b61ac819 [ 185.663185][ T4302] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 185.682910][ T4302] RSP: 002b:00007ff9b4c07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 185.691365][ T4302] RAX: ffffffffffffffda RBX: 00007ff9b6425fa0 RCX: 00007ff9b61ac819 [ 185.699382][ T4302] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 185.707484][ T4302] RBP: 00007ff9b4c07090 R08: 0000000000000000 R09: 0000000000000000 [ 185.715487][ T4302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.723491][ T4302] R13: 00007ff9b6426038 R14: 00007ff9b6425fa0 R15: 00007fff2bd72dd8 [ 185.731482][ T4302] [ 185.934033][ T4318] FAULT_INJECTION: forcing a failure. [ 185.934033][ T4318] name failslab, interval 1, probability 0, space 0, times 0 [ 186.002909][ T4318] CPU: 1 PID: 4318 Comm: syz.4.1390 Tainted: G W syzkaller #0 [ 186.011751][ T4318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 186.021934][ T4318] Call Trace: [ 186.025243][ T4318] [ 186.028274][ T4318] __dump_stack+0x21/0x30 [ 186.032796][ T4318] dump_stack_lvl+0x110/0x170 [ 186.037577][ T4318] ? show_regs_print_info+0x20/0x20 [ 186.042793][ T4318] dump_stack+0x15/0x20 [ 186.047056][ T4318] should_fail+0x3c1/0x510 [ 186.051578][ T4318] __should_failslab+0xa4/0xe0 [ 186.056362][ T4318] should_failslab+0x9/0x20 [ 186.061024][ T4318] slab_pre_alloc_hook+0x3b/0xe0 [ 186.065977][ T4318] ? getname_flags+0xb9/0x500 [ 186.070840][ T4318] kmem_cache_alloc+0x44/0x260 [ 186.075723][ T4318] getname_flags+0xb9/0x500 [ 186.080239][ T4318] __x64_sys_mkdir+0x5f/0x80 [ 186.084840][ T4318] x64_sys_call+0x124/0x9a0 [ 186.089362][ T4318] do_syscall_64+0x4c/0xa0 [ 186.093803][ T4318] ? clear_bhb_loop+0x50/0xa0 [ 186.098837][ T4318] ? clear_bhb_loop+0x50/0xa0 [ 186.103527][ T4318] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 186.109458][ T4318] RIP: 0033:0x7f8e57180819 [ 186.113890][ T4318] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 186.133515][ T4318] RSP: 002b:00007f8e55bdb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 186.142148][ T4318] RAX: ffffffffffffffda RBX: 00007f8e573f9fa0 RCX: 00007f8e57180819 [ 186.150220][ T4318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 186.158199][ T4318] RBP: 00007f8e55bdb090 R08: 0000000000000000 R09: 0000000000000000 [ 186.166273][ T4318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.174341][ T4318] R13: 00007f8e573fa038 R14: 00007f8e573f9fa0 R15: 00007fffdca59588 [ 186.182335][ T4318] [ 186.283700][ T4328] device syzkaller0 entered promiscuous mode [ 186.802617][ T4341] device syzkaller0 entered promiscuous mode [ 189.567308][ T4389] device syzkaller0 entered promiscuous mode [ 191.602719][ T4438] device syzkaller0 entered promiscuous mode [ 191.624603][ T30] audit: type=1400 audit(1776441491.560:144): avc: denied { attach_queue } for pid=4439 comm="syz.3.1433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 197.391704][ T4519] device syzkaller0 entered promiscuous mode [ 199.736911][ T4557] FAULT_INJECTION: forcing a failure. [ 199.736911][ T4557] name failslab, interval 1, probability 0, space 0, times 0 [ 199.893623][ T4557] CPU: 0 PID: 4557 Comm: syz.1.1467 Tainted: G W syzkaller #0 [ 199.902634][ T4557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 199.912717][ T4557] Call Trace: [ 199.916262][ T4557] [ 199.919287][ T4557] __dump_stack+0x21/0x30 [ 199.923658][ T4557] dump_stack_lvl+0x110/0x170 [ 199.928487][ T4557] ? show_regs_print_info+0x20/0x20 [ 199.933734][ T4557] dump_stack+0x15/0x20 [ 199.937926][ T4557] should_fail+0x3c1/0x510 [ 199.942384][ T4557] ? trace_event_raw_event_sched_switch+0x4c0/0x4c0 [ 199.949008][ T4557] __should_failslab+0xa4/0xe0 [ 199.953818][ T4557] should_failslab+0x9/0x20 [ 199.958356][ T4557] slab_pre_alloc_hook+0x3b/0xe0 [ 199.963420][ T4557] ? trace_event_raw_event_sched_switch+0x4c0/0x4c0 [ 199.970040][ T4557] __kmalloc+0x6d/0x2c0 [ 199.974266][ T4557] ? tracepoint_probe_unregister+0x211/0x8d0 [ 199.980277][ T4557] ? __kasan_check_write+0x14/0x20 [ 199.985418][ T4557] ? trace_event_raw_event_sched_switch+0x4c0/0x4c0 [ 199.992128][ T4557] tracepoint_probe_unregister+0x211/0x8d0 [ 199.997993][ T4557] trace_event_reg+0x225/0x270 [ 200.002798][ T4557] perf_trace_event_unreg+0xbb/0x1b0 [ 200.008112][ T4557] perf_trace_destroy+0xad/0x170 [ 200.013081][ T4557] tp_perf_event_destroy+0x15/0x20 [ 200.018229][ T4557] ? perf_swevent_read+0x10/0x10 [ 200.023202][ T4557] _free_event+0x9bf/0xcd0 [ 200.027691][ T4557] perf_event_release_kernel+0x825/0x8c0 [ 200.033358][ T4557] ? perf_event_read_local+0x730/0x730 [ 200.038852][ T4557] ? selinux_bpf+0xce/0xf0 [ 200.043299][ T4557] ? security_bpf+0x82/0xa0 [ 200.047826][ T4557] perf_release+0x3b/0x40 [ 200.052180][ T4557] ? perf_mmap+0x1290/0x1290 [ 200.056787][ T4557] __fput+0x20b/0x8b0 [ 200.060794][ T4557] ____fput+0x15/0x20 [ 200.064795][ T4557] task_work_run+0x127/0x190 [ 200.069401][ T4557] exit_to_user_mode_loop+0xd0/0xe0 [ 200.074621][ T4557] exit_to_user_mode_prepare+0x87/0xd0 [ 200.080097][ T4557] syscall_exit_to_user_mode+0x1a/0x30 [ 200.085582][ T4557] do_syscall_64+0x58/0xa0 [ 200.090019][ T4557] ? clear_bhb_loop+0x50/0xa0 [ 200.094716][ T4557] ? clear_bhb_loop+0x50/0xa0 [ 200.099415][ T4557] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 200.105344][ T4557] RIP: 0033:0x7ff9b61ac819 [ 200.109792][ T4557] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 200.129501][ T4557] RSP: 002b:00007ff9b4c07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.137935][ T4557] RAX: 0000000000000000 RBX: 00007ff9b6425fa0 RCX: 00007ff9b61ac819 [ 200.145922][ T4557] RDX: 000000000000000c RSI: 0000200000000000 RDI: 000000000000000a [ 200.153913][ T4557] RBP: 00007ff9b4c07090 R08: 0000000000000000 R09: 0000000000000000 [ 200.162014][ T4557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.170014][ T4557] R13: 00007ff9b6426038 R14: 00007ff9b6425fa0 R15: 00007fff2bd72dd8 [ 200.178020][ T4557] [ 200.410940][ T4587] device syzkaller0 entered promiscuous mode [ 200.533388][ T4596] device sit0 left promiscuous mode [ 200.685287][ T4599] device sit0 entered promiscuous mode [ 201.191916][ T4616] device syzkaller0 entered promiscuous mode [ 201.585534][ T4625] FAULT_INJECTION: forcing a failure. [ 201.585534][ T4625] name failslab, interval 1, probability 0, space 0, times 0 [ 201.648935][ T4625] CPU: 1 PID: 4625 Comm: syz.4.1493 Tainted: G W syzkaller #0 [ 201.657766][ T4625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 201.667852][ T4625] Call Trace: [ 201.671152][ T4625] [ 201.674129][ T4625] __dump_stack+0x21/0x30 [ 201.678497][ T4625] dump_stack_lvl+0x110/0x170 [ 201.683207][ T4625] ? show_regs_print_info+0x20/0x20 [ 201.688539][ T4625] dump_stack+0x15/0x20 [ 201.692730][ T4625] should_fail+0x3c1/0x510 [ 201.697175][ T4625] __should_failslab+0xa4/0xe0 [ 201.701971][ T4625] should_failslab+0x9/0x20 [ 201.706500][ T4625] slab_pre_alloc_hook+0x3b/0xe0 [ 201.711471][ T4625] kmem_cache_alloc_trace+0x48/0x270 [ 201.716792][ T4625] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 201.722541][ T4625] selinux_sk_alloc_security+0x7e/0x1a0 [ 201.728122][ T4625] security_sk_alloc+0x72/0xa0 [ 201.732922][ T4625] sk_prot_alloc+0x108/0x320 [ 201.737540][ T4625] sk_alloc+0x38/0x430 [ 201.741632][ T4625] bpf_prog_test_run_skb+0x24b/0x1150 [ 201.747047][ T4625] ? __kasan_check_write+0x14/0x20 [ 201.752191][ T4625] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 201.758124][ T4625] bpf_prog_test_run+0x3d5/0x630 [ 201.763095][ T4625] ? bpf_prog_query+0x230/0x230 [ 201.767970][ T4625] ? selinux_bpf+0xce/0xf0 [ 201.772442][ T4625] ? security_bpf+0x82/0xa0 [ 201.776969][ T4625] __sys_bpf+0x590/0x7d0 [ 201.781354][ T4625] ? bpf_link_show_fdinfo+0x330/0x330 [ 201.786759][ T4625] ? debug_smp_processor_id+0x17/0x20 [ 201.792160][ T4625] __x64_sys_bpf+0x7c/0x90 [ 201.796602][ T4625] x64_sys_call+0x4b9/0x9a0 [ 201.801135][ T4625] do_syscall_64+0x4c/0xa0 [ 201.805589][ T4625] ? clear_bhb_loop+0x50/0xa0 [ 201.810384][ T4625] ? clear_bhb_loop+0x50/0xa0 [ 201.815117][ T4625] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.821048][ T4625] RIP: 0033:0x7f8e57180819 [ 201.825585][ T4625] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 201.845309][ T4625] RSP: 002b:00007f8e55bdb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.853757][ T4625] RAX: ffffffffffffffda RBX: 00007f8e573f9fa0 RCX: 00007f8e57180819 [ 201.861761][ T4625] RDX: 0000000000000050 RSI: 0000200000000800 RDI: 000000000000000a [ 201.869789][ T4625] RBP: 00007f8e55bdb090 R08: 0000000000000000 R09: 0000000000000000 [ 201.877872][ T4625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.885872][ T4625] R13: 00007f8e573fa038 R14: 00007f8e573f9fa0 R15: 00007fffdca59588 [ 201.893878][ T4625] [ 202.402699][ T4639] device syzkaller0 entered promiscuous mode [ 203.809369][ T4665] device syzkaller0 entered promiscuous mode [ 204.610812][ T4705] device syzkaller0 entered promiscuous mode [ 204.888343][ T4727] bridge0: port 3(veth1_macvtap) entered blocking state [ 204.914519][ T4727] bridge0: port 3(veth1_macvtap) entered disabled state [ 205.257137][ T4755] device syzkaller0 entered promiscuous mode [ 205.555105][ T4758] device syzkaller0 entered promiscuous mode [ 206.532096][ T4795] FAULT_INJECTION: forcing a failure. [ 206.532096][ T4795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.581221][ T4797] device syzkaller0 entered promiscuous mode [ 206.597797][ T4795] CPU: 1 PID: 4795 Comm: syz.0.1549 Tainted: G W syzkaller #0 [ 206.606804][ T4795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 206.616888][ T4795] Call Trace: [ 206.620187][ T4795] [ 206.623149][ T4795] __dump_stack+0x21/0x30 [ 206.627764][ T4795] dump_stack_lvl+0x110/0x170 [ 206.632557][ T4795] ? show_regs_print_info+0x20/0x20 [ 206.637919][ T4795] dump_stack+0x15/0x20 [ 206.642235][ T4795] should_fail+0x3c1/0x510 [ 206.646762][ T4795] should_fail_usercopy+0x1a/0x20 [ 206.651798][ T4795] _copy_to_user+0x20/0x90 [ 206.656228][ T4795] simple_read_from_buffer+0xe9/0x160 [ 206.661630][ T4795] proc_fail_nth_read+0x1a6/0x220 [ 206.666689][ T4795] ? proc_fault_inject_write+0x310/0x310 [ 206.672425][ T4795] ? security_file_permission+0x83/0xa0 [ 206.677990][ T4795] ? proc_fault_inject_write+0x310/0x310 [ 206.683726][ T4795] vfs_read+0x28d/0xc40 [ 206.687904][ T4795] ? kernel_read+0x1f0/0x1f0 [ 206.692730][ T4795] ? __kasan_check_write+0x14/0x20 [ 206.697970][ T4795] ? mutex_lock+0x9b/0x1c0 [ 206.702459][ T4795] ? wait_for_completion_killable_timeout+0x10/0x10 [ 206.709206][ T4795] ? __fget_files+0x2c4/0x320 [ 206.713919][ T4795] ? __fdget_pos+0x2d2/0x380 [ 206.718547][ T4795] ? ksys_read+0x71/0x250 [ 206.723185][ T4795] ksys_read+0x149/0x250 [ 206.727451][ T4795] ? vfs_write+0xfd0/0xfd0 [ 206.731888][ T4795] __x64_sys_read+0x7b/0x90 [ 206.736412][ T4795] x64_sys_call+0x96d/0x9a0 [ 206.740944][ T4795] do_syscall_64+0x4c/0xa0 [ 206.745693][ T4795] ? clear_bhb_loop+0x50/0xa0 [ 206.750397][ T4795] ? clear_bhb_loop+0x50/0xa0 [ 206.755100][ T4795] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 206.761312][ T4795] RIP: 0033:0x7fc9e562204e [ 206.765752][ T4795] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 206.785553][ T4795] RSP: 002b:00007fc9e40bbfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 206.793981][ T4795] RAX: ffffffffffffffda RBX: 00007fc9e40bc6c0 RCX: 00007fc9e562204e [ 206.801989][ T4795] RDX: 000000000000000f RSI: 00007fc9e40bc0a0 RDI: 0000000000000005 [ 206.809993][ T4795] RBP: 00007fc9e40bc090 R08: 0000000000000000 R09: 0000000000000000 [ 206.817986][ T4795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.826054][ T4795] R13: 00007fc9e58db038 R14: 00007fc9e58dafa0 R15: 00007ffc538e09b8 [ 206.834046][ T4795] [ 208.005006][ T4854] FAULT_INJECTION: forcing a failure. [ 208.005006][ T4854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 208.026431][ T4854] CPU: 1 PID: 4854 Comm: syz.1.1568 Tainted: G W syzkaller #0 [ 208.035270][ T4854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 208.045362][ T4854] Call Trace: [ 208.048678][ T4854] [ 208.051637][ T4854] __dump_stack+0x21/0x30 [ 208.056012][ T4854] dump_stack_lvl+0x110/0x170 [ 208.060725][ T4854] ? show_regs_print_info+0x20/0x20 [ 208.065970][ T4854] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 208.071492][ T4854] dump_stack+0x15/0x20 [ 208.075688][ T4854] should_fail+0x3c1/0x510 [ 208.080143][ T4854] should_fail_usercopy+0x1a/0x20 [ 208.085184][ T4854] _copy_to_user+0x20/0x90 [ 208.089622][ T4854] bpf_test_finish+0x1b9/0x3c0 [ 208.094409][ T4854] ? convert_skb_to___skb+0x360/0x360 [ 208.099808][ T4854] ? convert_skb_to___skb+0x203/0x360 [ 208.105291][ T4854] bpf_prog_test_run_skb+0xbba/0x1150 [ 208.110864][ T4854] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 208.116863][ T4854] bpf_prog_test_run+0x3d5/0x630 [ 208.121813][ T4854] ? bpf_prog_query+0x230/0x230 [ 208.126677][ T4854] ? selinux_bpf+0xce/0xf0 [ 208.131191][ T4854] ? security_bpf+0x82/0xa0 [ 208.135705][ T4854] __sys_bpf+0x590/0x7d0 [ 208.139961][ T4854] ? bpf_link_show_fdinfo+0x330/0x330 [ 208.145358][ T4854] ? debug_smp_processor_id+0x17/0x20 [ 208.150745][ T4854] __x64_sys_bpf+0x7c/0x90 [ 208.155191][ T4854] x64_sys_call+0x4b9/0x9a0 [ 208.159704][ T4854] do_syscall_64+0x4c/0xa0 [ 208.164130][ T4854] ? clear_bhb_loop+0x50/0xa0 [ 208.169087][ T4854] ? clear_bhb_loop+0x50/0xa0 [ 208.173887][ T4854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.179800][ T4854] RIP: 0033:0x7ff9b61ac819 [ 208.184235][ T4854] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 208.203936][ T4854] RSP: 002b:00007ff9b4c07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.212626][ T4854] RAX: ffffffffffffffda RBX: 00007ff9b6425fa0 RCX: 00007ff9b61ac819 [ 208.220753][ T4854] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 208.228897][ T4854] RBP: 00007ff9b4c07090 R08: 0000000000000000 R09: 0000000000000000 [ 208.236897][ T4854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.244889][ T4854] R13: 00007ff9b6426038 R14: 00007ff9b6425fa0 R15: 00007fff2bd72dd8 [ 208.253246][ T4854] [ 208.263364][ T30] audit: type=1400 audit(1776441508.200:145): avc: denied { create } for pid=4858 comm="syz.0.1569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 213.003183][ T4913] device syzkaller0 entered promiscuous mode [ 213.584704][ T4932] device syzkaller0 entered promiscuous mode [ 218.173311][ T30] audit: type=1400 audit(1776441518.110:146): avc: denied { create } for pid=4964 comm="syz.1.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 218.464881][ T4969] device syzkaller0 entered promiscuous mode [ 218.540455][ T4969] FAULT_INJECTION: forcing a failure. [ 218.540455][ T4969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 218.631055][ T4969] CPU: 0 PID: 4969 Comm: syz.2.1606 Tainted: G W syzkaller #0 [ 218.639958][ T4969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 218.650136][ T4969] Call Trace: [ 218.653441][ T4969] [ 218.656393][ T4969] __dump_stack+0x21/0x30 [ 218.660754][ T4969] dump_stack_lvl+0x110/0x170 [ 218.665455][ T4969] ? show_regs_print_info+0x20/0x20 [ 218.670771][ T4969] ? __alloc_skb+0x21a/0x740 [ 218.675393][ T4969] ? tun_get_user+0xb41/0x3400 [ 218.680184][ T4969] ? tun_chr_write_iter+0x1eb/0x2e0 [ 218.685407][ T4969] dump_stack+0x15/0x20 [ 218.689593][ T4969] should_fail+0x3c1/0x510 [ 218.694041][ T4969] should_fail_alloc_page+0x55/0x80 [ 218.699275][ T4969] prepare_alloc_pages+0x156/0x610 [ 218.704428][ T4969] ? __alloc_pages_bulk+0xad0/0xad0 [ 218.709665][ T4969] __alloc_pages+0x11d/0x460 [ 218.714296][ T4969] ? prep_new_page+0x110/0x110 [ 218.719094][ T4969] ? __alloc_skb+0x463/0x740 [ 218.723710][ T4969] alloc_skb_with_frags+0x20c/0x620 [ 218.728943][ T4969] sock_alloc_send_pskb+0x87f/0x9a0 [ 218.734180][ T4969] ? sock_kzfree_s+0x60/0x60 [ 218.738797][ T4969] ? iov_iter_advance+0x1f9/0x360 [ 218.743864][ T4969] tun_get_user+0xb41/0x3400 [ 218.748606][ T4969] ? kmem_cache_free+0xa0/0x320 [ 218.753484][ T4969] ? putname+0x111/0x160 [ 218.757762][ T4969] ? do_syscall_64+0x4c/0xa0 [ 218.762687][ T4969] ? tun_do_read+0x1d30/0x1d30 [ 218.767484][ T4969] ? kstrtouint_from_user+0x1c4/0x220 [ 218.772951][ T4969] ? kstrtol_from_user+0x2a0/0x2a0 [ 218.778095][ T4969] ? avc_policy_seqno+0x1b/0x70 [ 218.782973][ T4969] ? selinux_file_permission+0x2aa/0x510 [ 218.788719][ T4969] tun_chr_write_iter+0x1eb/0x2e0 [ 218.793777][ T4969] vfs_write+0x835/0xfd0 [ 218.798051][ T4969] ? file_end_write+0x1b0/0x1b0 [ 218.802931][ T4969] ? __fget_files+0x2c4/0x320 [ 218.807752][ T4969] ? __fdget_pos+0x1f7/0x380 [ 218.812390][ T4969] ? ksys_write+0x71/0x250 [ 218.816862][ T4969] ksys_write+0x149/0x250 [ 218.821225][ T4969] ? __ia32_sys_read+0x90/0x90 [ 218.826032][ T4969] ? debug_smp_processor_id+0x17/0x20 [ 218.831440][ T4969] __x64_sys_write+0x7b/0x90 [ 218.836158][ T4969] x64_sys_call+0x8ef/0x9a0 [ 218.840711][ T4969] do_syscall_64+0x4c/0xa0 [ 218.845167][ T4969] ? clear_bhb_loop+0x50/0xa0 [ 218.849876][ T4969] ? clear_bhb_loop+0x50/0xa0 [ 218.854681][ T4969] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.860670][ T4969] RIP: 0033:0x7f646a170819 [ 218.865295][ T4969] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 218.885719][ T4969] RSP: 002b:00007f6468bcb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.894251][ T4969] RAX: ffffffffffffffda RBX: 00007f646a3e9fa0 RCX: 00007f646a170819 [ 218.902362][ T4969] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 218.910373][ T4969] RBP: 00007f6468bcb090 R08: 0000000000000000 R09: 0000000000000000 [ 218.918552][ T4969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.926565][ T4969] R13: 00007f646a3ea038 R14: 00007f646a3e9fa0 R15: 00007ffdb9e07be8 [ 218.934573][ T4969] [ 220.408911][ T30] audit: type=1400 audit(1776441520.350:147): avc: denied { read } for pid=5029 comm="syz.1.1625" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 220.526969][ T30] audit: type=1400 audit(1776441520.380:148): avc: denied { open } for pid=5029 comm="syz.1.1625" path="pid:[4026532286]" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 220.725286][ T30] audit: type=1400 audit(1776441520.380:149): avc: denied { ioctl } for pid=5029 comm="syz.1.1625" path="pid:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 220.900220][ T5052] device syzkaller0 entered promiscuous mode [ 221.862772][ T30] audit: type=1400 audit(1776441521.800:150): avc: denied { create } for pid=5088 comm="syz.0.1644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 224.444701][ T30] audit: type=1400 audit(1776441524.380:151): avc: denied { associate } for pid=5201 comm="syz.1.1683" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 224.583403][ T5210] device syzkaller0 entered promiscuous mode [ 225.185970][ T5240] device syzkaller0 entered promiscuous mode [ 230.110594][ T5310] device syzkaller0 entered promiscuous mode [ 231.618904][ T30] audit: type=1400 audit(1776441531.560:152): avc: denied { create } for pid=5356 comm="syz.4.1735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 242.944228][ T5453] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.951547][ T5453] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.070220][ T5442] device bridge_slave_1 left promiscuous mode [ 243.092863][ T5442] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.108310][ T5442] device bridge_slave_0 left promiscuous mode [ 243.121001][ T5442] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.057140][ T5474] FAULT_INJECTION: forcing a failure. [ 246.057140][ T5474] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 246.070713][ T5474] CPU: 1 PID: 5474 Comm: syz.3.1772 Tainted: G W syzkaller #0 [ 246.079523][ T5474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 246.089706][ T5474] Call Trace: [ 246.093148][ T5474] [ 246.096109][ T5474] __dump_stack+0x21/0x30 [ 246.100463][ T5474] dump_stack_lvl+0x110/0x170 [ 246.105176][ T5474] ? show_regs_print_info+0x20/0x20 [ 246.110395][ T5474] dump_stack+0x15/0x20 [ 246.114568][ T5474] should_fail+0x3c1/0x510 [ 246.119005][ T5474] should_fail_alloc_page+0x55/0x80 [ 246.124218][ T5474] prepare_alloc_pages+0x156/0x610 [ 246.129347][ T5474] ? __alloc_pages_bulk+0xad0/0xad0 [ 246.134568][ T5474] __alloc_pages+0x11d/0x460 [ 246.139264][ T5474] ? unlock_page_memcg+0x115/0x130 [ 246.144389][ T5474] ? prep_new_page+0x110/0x110 [ 246.149261][ T5474] ? page_remove_rmap+0xc6d/0xf40 [ 246.154296][ T5474] ? page_add_file_rmap+0x700/0x700 [ 246.159673][ T5474] ? __kasan_check_write+0x14/0x20 [ 246.164804][ T5474] ? _raw_spin_lock+0x94/0xf0 [ 246.169501][ T5474] __get_free_pages+0x10/0x30 [ 246.174282][ T5474] __tlb_remove_page_size+0x17b/0x300 [ 246.179685][ T5474] unmap_page_range+0x100b/0x1d80 [ 246.184840][ T5474] ? mmu_notifier_invalidate_range_end+0xe0/0xe0 [ 246.191208][ T5474] unmap_vmas+0x26d/0x380 [ 246.195594][ T5474] ? unmap_page_range+0x1d80/0x1d80 [ 246.200897][ T5474] ? __kasan_check_write+0x14/0x20 [ 246.206585][ T5474] ? tlb_gather_mmu_fullmm+0x144/0x1c0 [ 246.212057][ T5474] exit_mmap+0x412/0x8b0 [ 246.216312][ T5474] ? vm_brk+0x30/0x30 [ 246.220431][ T5474] ? mutex_unlock+0x8f/0x230 [ 246.225037][ T5474] ? uprobe_clear_state+0x2c1/0x320 [ 246.230249][ T5474] __mmput+0x93/0x320 [ 246.234347][ T5474] ? mmput+0x48/0x150 [ 246.238371][ T5474] mmput+0x50/0x150 [ 246.242231][ T5474] do_exit+0x9f2/0x27e0 [ 246.246515][ T5474] ? put_task_struct+0x90/0x90 [ 246.251326][ T5474] ? call_rcu+0xb96/0xf80 [ 246.255847][ T5474] ? __kasan_check_write+0x14/0x20 [ 246.261144][ T5474] ? __kasan_check_write+0x14/0x20 [ 246.266306][ T5474] ? _raw_spin_lock_irq+0x95/0xf0 [ 246.271538][ T5474] do_group_exit+0x141/0x310 [ 246.276154][ T5474] ? __kasan_check_write+0x14/0x20 [ 246.281319][ T5474] get_signal+0x66a/0x1480 [ 246.286196][ T5474] arch_do_signal_or_restart+0xdf/0x11c0 [ 246.291847][ T5474] ? bpf_prog_test_run+0x5cf/0x630 [ 246.297083][ T5474] ? bpf_prog_query+0x230/0x230 [ 246.301964][ T5474] ? selinux_bpf+0xce/0xf0 [ 246.306403][ T5474] ? security_bpf+0x82/0xa0 [ 246.310930][ T5474] ? get_sigframe_size+0x10/0x10 [ 246.315882][ T5474] ? __sys_bpf+0x590/0x7d0 [ 246.320313][ T5474] ? bpf_link_show_fdinfo+0x330/0x330 [ 246.325706][ T5474] exit_to_user_mode_loop+0xa7/0xe0 [ 246.330943][ T5474] exit_to_user_mode_prepare+0x87/0xd0 [ 246.336432][ T5474] syscall_exit_to_user_mode+0x1a/0x30 [ 246.341903][ T5474] do_syscall_64+0x58/0xa0 [ 246.346423][ T5474] ? clear_bhb_loop+0x50/0xa0 [ 246.351133][ T5474] ? clear_bhb_loop+0x50/0xa0 [ 246.355935][ T5474] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.361855][ T5474] RIP: 0033:0x7fc5da263819 [ 246.366285][ T5474] Code: Unable to access opcode bytes at RIP 0x7fc5da2637ef. [ 246.373655][ T5474] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 246.382149][ T5474] RAX: fffffffffffffffc RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 246.390155][ T5474] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 246.398241][ T5474] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 246.406236][ T5474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 246.414220][ T5474] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 246.422215][ T5474] [ 248.217239][ T5478] device syzkaller0 entered promiscuous mode [ 248.227419][ T5478] FAULT_INJECTION: forcing a failure. [ 248.227419][ T5478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 248.247732][ T5478] CPU: 1 PID: 5478 Comm: syz.3.1774 Tainted: G W syzkaller #0 [ 248.256709][ T5478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 248.266793][ T5478] Call Trace: [ 248.270099][ T5478] [ 248.273049][ T5478] __dump_stack+0x21/0x30 [ 248.277406][ T5478] dump_stack_lvl+0x110/0x170 [ 248.282240][ T5478] ? show_regs_print_info+0x20/0x20 [ 248.287467][ T5478] ? __alloc_skb+0x21a/0x740 [ 248.292089][ T5478] ? tun_get_user+0xb41/0x3400 [ 248.296874][ T5478] ? tun_chr_write_iter+0x1eb/0x2e0 [ 248.302101][ T5478] dump_stack+0x15/0x20 [ 248.306277][ T5478] should_fail+0x3c1/0x510 [ 248.310721][ T5478] should_fail_alloc_page+0x55/0x80 [ 248.316051][ T5478] prepare_alloc_pages+0x156/0x610 [ 248.321207][ T5478] ? __alloc_pages_bulk+0xad0/0xad0 [ 248.326442][ T5478] __alloc_pages+0x11d/0x460 [ 248.331063][ T5478] ? prep_new_page+0x110/0x110 [ 248.335856][ T5478] ? __alloc_skb+0x463/0x740 [ 248.340503][ T5478] alloc_skb_with_frags+0x20c/0x620 [ 248.345822][ T5478] sock_alloc_send_pskb+0x87f/0x9a0 [ 248.351054][ T5478] ? sock_kzfree_s+0x60/0x60 [ 248.355668][ T5478] ? iov_iter_advance+0x1f9/0x360 [ 248.360724][ T5478] tun_get_user+0xb41/0x3400 [ 248.365345][ T5478] ? kmem_cache_free+0xa0/0x320 [ 248.370417][ T5478] ? putname+0x111/0x160 [ 248.374682][ T5478] ? do_syscall_64+0x4c/0xa0 [ 248.379387][ T5478] ? tun_do_read+0x1d30/0x1d30 [ 248.384176][ T5478] ? kstrtouint_from_user+0x1c4/0x220 [ 248.389574][ T5478] ? kstrtol_from_user+0x2a0/0x2a0 [ 248.394710][ T5478] ? avc_policy_seqno+0x1b/0x70 [ 248.399592][ T5478] ? selinux_file_permission+0x2aa/0x510 [ 248.405257][ T5478] tun_chr_write_iter+0x1eb/0x2e0 [ 248.410327][ T5478] vfs_write+0x835/0xfd0 [ 248.414591][ T5478] ? putname+0x111/0x160 [ 248.418868][ T5478] ? file_end_write+0x1b0/0x1b0 [ 248.423749][ T5478] ? __fget_files+0x2c4/0x320 [ 248.428494][ T5478] ? __fdget_pos+0x1f7/0x380 [ 248.433113][ T5478] ? ksys_write+0x71/0x250 [ 248.437650][ T5478] ksys_write+0x149/0x250 [ 248.442006][ T5478] ? __ia32_sys_read+0x90/0x90 [ 248.446791][ T5478] ? debug_smp_processor_id+0x17/0x20 [ 248.452310][ T5478] __x64_sys_write+0x7b/0x90 [ 248.456937][ T5478] x64_sys_call+0x8ef/0x9a0 [ 248.461550][ T5478] do_syscall_64+0x4c/0xa0 [ 248.466000][ T5478] ? clear_bhb_loop+0x50/0xa0 [ 248.470707][ T5478] ? clear_bhb_loop+0x50/0xa0 [ 248.475413][ T5478] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.481444][ T5478] RIP: 0033:0x7fc5da263819 [ 248.485882][ T5478] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 248.505517][ T5478] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 248.514057][ T5478] RAX: ffffffffffffffda RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 248.522488][ T5478] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 248.530488][ T5478] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 248.538652][ T5478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 248.546649][ T5478] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 248.554850][ T5478] [ 251.210746][ T5571] device syzkaller0 entered promiscuous mode [ 251.527542][ T5577] FAULT_INJECTION: forcing a failure. [ 251.527542][ T5577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 251.581345][ T5577] CPU: 1 PID: 5577 Comm: syz.3.1808 Tainted: G W syzkaller #0 [ 251.590187][ T5577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 251.600583][ T5577] Call Trace: [ 251.603910][ T5577] [ 251.607005][ T5577] __dump_stack+0x21/0x30 [ 251.611371][ T5577] dump_stack_lvl+0x110/0x170 [ 251.616089][ T5577] ? show_regs_print_info+0x20/0x20 [ 251.621326][ T5577] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 251.626816][ T5577] dump_stack+0x15/0x20 [ 251.631012][ T5577] should_fail+0x3c1/0x510 [ 251.635579][ T5577] should_fail_usercopy+0x1a/0x20 [ 251.640838][ T5577] _copy_to_user+0x20/0x90 [ 251.645591][ T5577] bpf_test_finish+0x217/0x3c0 [ 251.650400][ T5577] ? convert_skb_to___skb+0x360/0x360 [ 251.655814][ T5577] ? convert_skb_to___skb+0x203/0x360 [ 251.661226][ T5577] bpf_prog_test_run_skb+0xbba/0x1150 [ 251.666654][ T5577] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 251.672584][ T5577] bpf_prog_test_run+0x3d5/0x630 [ 251.677567][ T5577] ? bpf_prog_query+0x230/0x230 [ 251.682450][ T5577] ? selinux_bpf+0xce/0xf0 [ 251.686899][ T5577] ? security_bpf+0x82/0xa0 [ 251.691433][ T5577] __sys_bpf+0x590/0x7d0 [ 251.695938][ T5577] ? bpf_link_show_fdinfo+0x330/0x330 [ 251.701461][ T5577] ? debug_smp_processor_id+0x17/0x20 [ 251.706955][ T5577] __x64_sys_bpf+0x7c/0x90 [ 251.711520][ T5577] x64_sys_call+0x4b9/0x9a0 [ 251.716375][ T5577] do_syscall_64+0x4c/0xa0 [ 251.720929][ T5577] ? clear_bhb_loop+0x50/0xa0 [ 251.725656][ T5577] ? clear_bhb_loop+0x50/0xa0 [ 251.730515][ T5577] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 251.736467][ T5577] RIP: 0033:0x7fc5da263819 [ 251.741042][ T5577] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 251.761004][ T5577] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 251.769440][ T5577] RAX: ffffffffffffffda RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 251.777428][ T5577] RDX: 0000000000000050 RSI: 0000200000000800 RDI: 000000000000000a [ 251.785498][ T5577] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 251.793480][ T5577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 251.801471][ T5577] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 251.809580][ T5577] [ 251.819451][ T5586] device syzkaller0 entered promiscuous mode [ 251.908370][ T5597] FAULT_INJECTION: forcing a failure. [ 251.908370][ T5597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 251.975289][ T5597] CPU: 0 PID: 5597 Comm: syz.1.1815 Tainted: G W syzkaller #0 [ 251.984134][ T5597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 251.994575][ T5597] Call Trace: [ 251.997877][ T5597] [ 252.000829][ T5597] __dump_stack+0x21/0x30 [ 252.005198][ T5597] dump_stack_lvl+0x110/0x170 [ 252.009911][ T5597] ? show_regs_print_info+0x20/0x20 [ 252.015149][ T5597] dump_stack+0x15/0x20 [ 252.019339][ T5597] should_fail+0x3c1/0x510 [ 252.023792][ T5597] should_fail_usercopy+0x1a/0x20 [ 252.029115][ T5597] _copy_to_user+0x20/0x90 [ 252.033564][ T5597] bpf_prog_test_run_raw_tp+0x500/0x680 [ 252.039141][ T5597] ? bpf_prog_test_run_tracing+0x500/0x500 [ 252.044989][ T5597] ? fput_many+0x15a/0x1a0 [ 252.049445][ T5597] ? bpf_prog_test_run_tracing+0x500/0x500 [ 252.055287][ T5597] bpf_prog_test_run+0x3d5/0x630 [ 252.060253][ T5597] ? bpf_prog_query+0x230/0x230 [ 252.065137][ T5597] ? selinux_bpf+0xce/0xf0 [ 252.069583][ T5597] ? security_bpf+0x82/0xa0 [ 252.074256][ T5597] __sys_bpf+0x590/0x7d0 [ 252.078536][ T5597] ? bpf_link_show_fdinfo+0x330/0x330 [ 252.083953][ T5597] ? debug_smp_processor_id+0x17/0x20 [ 252.089439][ T5597] __x64_sys_bpf+0x7c/0x90 [ 252.094075][ T5597] x64_sys_call+0x4b9/0x9a0 [ 252.098613][ T5597] do_syscall_64+0x4c/0xa0 [ 252.103062][ T5597] ? clear_bhb_loop+0x50/0xa0 [ 252.107768][ T5597] ? clear_bhb_loop+0x50/0xa0 [ 252.112470][ T5597] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 252.118390][ T5597] RIP: 0033:0x7ff9b61ac819 [ 252.122827][ T5597] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 252.142663][ T5597] RSP: 002b:00007ff9b4c07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 252.151125][ T5597] RAX: ffffffffffffffda RBX: 00007ff9b6425fa0 RCX: 00007ff9b61ac819 [ 252.159239][ T5597] RDX: 000000000000000c RSI: 0000200000000300 RDI: 000000000000000a [ 252.167413][ T5597] RBP: 00007ff9b4c07090 R08: 0000000000000000 R09: 0000000000000000 [ 252.175409][ T5597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.183413][ T5597] R13: 00007ff9b6426038 R14: 00007ff9b6425fa0 R15: 00007fff2bd72dd8 [ 252.191544][ T5597] [ 252.410030][ T5617] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 252.419265][ T5617] device syzkaller0 entered promiscuous mode [ 253.008030][ T5647] device syzkaller0 entered promiscuous mode [ 253.956961][ T5698] device syzkaller0 entered promiscuous mode [ 254.093536][ T281] syz-executor (281) used greatest stack depth: 21760 bytes left [ 254.545204][ T5721] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.581855][ T5721] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.595169][ T5721] device bridge_slave_0 entered promiscuous mode [ 254.637331][ T5721] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.686968][ T5721] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.698145][ T5721] device bridge_slave_1 entered promiscuous mode [ 254.773323][ T30] audit: type=1400 audit(1776441554.710:153): avc: denied { create } for pid=5721 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.794239][ T5721] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.801347][ T5721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.808886][ T5721] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.816028][ T5721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.880086][ T30] audit: type=1400 audit(1776441554.710:154): avc: denied { write } for pid=5721 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.948663][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.966966][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.976670][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.979638][ T30] audit: type=1400 audit(1776441554.710:155): avc: denied { read } for pid=5721 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 255.040629][ T45] device veth1_macvtap left promiscuous mode [ 255.049154][ T45] device veth0_vlan left promiscuous mode [ 255.336600][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.350504][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.357634][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.396289][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.406686][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.413755][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.457446][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.496205][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.504949][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.536664][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.557429][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.579120][ T5721] device veth0_vlan entered promiscuous mode [ 255.593862][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.606537][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.638738][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.649096][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.660895][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.669688][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.678637][ T5721] device veth1_macvtap entered promiscuous mode [ 255.731147][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.770185][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.787742][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.809372][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.820315][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.870549][ T5772] device syzkaller0 entered promiscuous mode [ 256.276621][ T5791] @ÿ: renamed from bond_slave_0 [ 256.563494][ T5799] device syzkaller0 entered promiscuous mode [ 256.622511][ T5799] FAULT_INJECTION: forcing a failure. [ 256.622511][ T5799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.661343][ T5799] CPU: 0 PID: 5799 Comm: syz.1.1889 Tainted: G W syzkaller #0 [ 256.670263][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 256.680521][ T5799] Call Trace: [ 256.684015][ T5799] [ 256.686987][ T5799] __dump_stack+0x21/0x30 [ 256.691347][ T5799] dump_stack_lvl+0x110/0x170 [ 256.696058][ T5799] ? show_regs_print_info+0x20/0x20 [ 256.701289][ T5799] ? __alloc_skb+0x21a/0x740 [ 256.705907][ T5799] ? tun_get_user+0xb41/0x3400 [ 256.711367][ T5799] ? tun_chr_write_iter+0x1eb/0x2e0 [ 256.716691][ T5799] dump_stack+0x15/0x20 [ 256.720882][ T5799] should_fail+0x3c1/0x510 [ 256.725343][ T5799] should_fail_alloc_page+0x55/0x80 [ 256.730783][ T5799] prepare_alloc_pages+0x156/0x610 [ 256.735939][ T5799] ? __alloc_pages_bulk+0xad0/0xad0 [ 256.741432][ T5799] __alloc_pages+0x11d/0x460 [ 256.746345][ T5799] ? prep_new_page+0x110/0x110 [ 256.751145][ T5799] ? __alloc_skb+0x463/0x740 [ 256.755770][ T5799] alloc_skb_with_frags+0x20c/0x620 [ 256.761012][ T5799] sock_alloc_send_pskb+0x87f/0x9a0 [ 256.766349][ T5799] ? sock_kzfree_s+0x60/0x60 [ 256.770968][ T5799] ? iov_iter_advance+0x1f9/0x360 [ 256.776153][ T5799] tun_get_user+0xb41/0x3400 [ 256.780777][ T5799] ? kmem_cache_free+0xa0/0x320 [ 256.785768][ T5799] ? putname+0x111/0x160 [ 256.790056][ T5799] ? do_syscall_64+0x4c/0xa0 [ 256.794679][ T5799] ? tun_do_read+0x1d30/0x1d30 [ 256.799481][ T5799] ? kstrtouint_from_user+0x1c4/0x220 [ 256.804882][ T5799] ? kstrtol_from_user+0x2a0/0x2a0 [ 256.810025][ T5799] ? avc_policy_seqno+0x1b/0x70 [ 256.814998][ T5799] ? selinux_file_permission+0x2aa/0x510 [ 256.820683][ T5799] tun_chr_write_iter+0x1eb/0x2e0 [ 256.825757][ T5799] vfs_write+0x835/0xfd0 [ 256.830044][ T5799] ? file_end_write+0x1b0/0x1b0 [ 256.834921][ T5799] ? __fget_files+0x2c4/0x320 [ 256.839783][ T5799] ? __fdget_pos+0x1f7/0x380 [ 256.844694][ T5799] ? ksys_write+0x71/0x250 [ 256.849167][ T5799] ksys_write+0x149/0x250 [ 256.853528][ T5799] ? __ia32_sys_read+0x90/0x90 [ 256.858327][ T5799] ? debug_smp_processor_id+0x17/0x20 [ 256.863740][ T5799] __x64_sys_write+0x7b/0x90 [ 256.868475][ T5799] x64_sys_call+0x8ef/0x9a0 [ 256.873006][ T5799] do_syscall_64+0x4c/0xa0 [ 256.877545][ T5799] ? clear_bhb_loop+0x50/0xa0 [ 256.882347][ T5799] ? clear_bhb_loop+0x50/0xa0 [ 256.887056][ T5799] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.893072][ T5799] RIP: 0033:0x7ff9b61ac819 [ 256.897519][ T5799] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 256.917270][ T5799] RSP: 002b:00007ff9b4be6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 256.925727][ T5799] RAX: ffffffffffffffda RBX: 00007ff9b6426090 RCX: 00007ff9b61ac819 [ 256.933738][ T5799] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 256.941734][ T5799] RBP: 00007ff9b4be6090 R08: 0000000000000000 R09: 0000000000000000 [ 256.949758][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 256.957853][ T5799] R13: 00007ff9b6426128 R14: 00007ff9b6426090 R15: 00007fff2bd72dd8 [ 256.965855][ T5799] [ 257.197847][ T5801] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.205435][ T5801] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.213126][ T5801] device bridge_slave_0 entered promiscuous mode [ 257.354400][ T5801] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.361634][ T5801] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.369152][ T5801] device bridge_slave_1 entered promiscuous mode [ 263.492034][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.501615][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.606595][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.646674][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.684447][ T669] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.691581][ T669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.704326][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.713139][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.721807][ T669] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.728915][ T669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.737076][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.745198][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.785898][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.875390][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 263.926608][ T5801] device veth0_vlan entered promiscuous mode [ 263.933557][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.967116][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.017246][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.123955][ T5801] device veth1_macvtap entered promiscuous mode [ 264.238640][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.343073][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.351781][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.416727][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.425227][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.959135][ T5853] device syzkaller0 entered promiscuous mode [ 265.208545][ T45] device bridge_slave_1 left promiscuous mode [ 265.214831][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.258833][ T45] device bridge_slave_0 left promiscuous mode [ 265.273458][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.364139][ T45] device veth1_macvtap left promiscuous mode [ 265.407647][ T45] device veth0_vlan left promiscuous mode [ 265.642356][ T5866] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.654071][ T5866] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.666819][ T5866] device bridge_slave_0 entered promiscuous mode [ 265.682551][ T5866] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.695471][ T5866] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.705737][ T5866] device bridge_slave_1 entered promiscuous mode [ 265.729010][ T5884] device syzkaller0 entered promiscuous mode [ 266.242677][ T5866] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.249979][ T5866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.257546][ T5866] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.264671][ T5866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.582878][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.616615][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.672680][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.771705][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.836380][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.898831][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.905925][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.940431][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.957056][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.966773][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.973850][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.011221][ T5915] device syzkaller0 entered promiscuous mode [ 267.088193][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.100032][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.147263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.166384][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.180400][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 267.189027][ T5915] FAULT_INJECTION: forcing a failure. [ 267.189027][ T5915] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 267.212794][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 267.222504][ T5915] CPU: 1 PID: 5915 Comm: syz.3.1928 Tainted: G W syzkaller #0 [ 267.231314][ T5915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 267.241426][ T5915] Call Trace: [ 267.244730][ T5915] [ 267.247707][ T5915] __dump_stack+0x21/0x30 [ 267.252059][ T5915] dump_stack_lvl+0x110/0x170 [ 267.256757][ T5915] ? show_regs_print_info+0x20/0x20 [ 267.262143][ T5915] ? __alloc_skb+0x21a/0x740 [ 267.266750][ T5915] ? tun_get_user+0xb41/0x3400 [ 267.271525][ T5915] ? tun_chr_write_iter+0x1eb/0x2e0 [ 267.276740][ T5915] dump_stack+0x15/0x20 [ 267.280913][ T5915] should_fail+0x3c1/0x510 [ 267.285375][ T5915] should_fail_alloc_page+0x55/0x80 [ 267.290710][ T5915] prepare_alloc_pages+0x156/0x610 [ 267.295847][ T5915] ? __alloc_pages_bulk+0xad0/0xad0 [ 267.301068][ T5915] __alloc_pages+0x11d/0x460 [ 267.305680][ T5915] ? prep_new_page+0x110/0x110 [ 267.310555][ T5915] ? __alloc_skb+0x463/0x740 [ 267.315163][ T5915] alloc_skb_with_frags+0x20c/0x620 [ 267.320406][ T5915] sock_alloc_send_pskb+0x87f/0x9a0 [ 267.325799][ T5915] ? sock_kzfree_s+0x60/0x60 [ 267.330426][ T5915] ? iov_iter_advance+0x1f9/0x360 [ 267.335468][ T5915] tun_get_user+0xb41/0x3400 [ 267.340301][ T5915] ? kmem_cache_free+0xa0/0x320 [ 267.345171][ T5915] ? putname+0x111/0x160 [ 267.349448][ T5915] ? do_syscall_64+0x4c/0xa0 [ 267.354181][ T5915] ? tun_do_read+0x1d30/0x1d30 [ 267.359068][ T5915] ? kstrtouint_from_user+0x1c4/0x220 [ 267.364560][ T5915] ? kstrtol_from_user+0x2a0/0x2a0 [ 267.369729][ T5915] ? avc_policy_seqno+0x1b/0x70 [ 267.374604][ T5915] ? selinux_file_permission+0x2aa/0x510 [ 267.380284][ T5915] tun_chr_write_iter+0x1eb/0x2e0 [ 267.385345][ T5915] vfs_write+0x835/0xfd0 [ 267.389637][ T5915] ? file_end_write+0x1b0/0x1b0 [ 267.394513][ T5915] ? __fget_files+0x2c4/0x320 [ 267.399215][ T5915] ? __fdget_pos+0x1f7/0x380 [ 267.403929][ T5915] ? ksys_write+0x71/0x250 [ 267.408365][ T5915] ksys_write+0x149/0x250 [ 267.412732][ T5915] ? __ia32_sys_read+0x90/0x90 [ 267.417523][ T5915] ? debug_smp_processor_id+0x17/0x20 [ 267.422910][ T5915] __x64_sys_write+0x7b/0x90 [ 267.427519][ T5915] x64_sys_call+0x8ef/0x9a0 [ 267.432043][ T5915] do_syscall_64+0x4c/0xa0 [ 267.436482][ T5915] ? clear_bhb_loop+0x50/0xa0 [ 267.441344][ T5915] ? clear_bhb_loop+0x50/0xa0 [ 267.446035][ T5915] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 267.452027][ T5915] RIP: 0033:0x7fc5da263819 [ 267.456449][ T5915] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 267.476181][ T5915] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 267.484617][ T5915] RAX: ffffffffffffffda RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 267.492604][ T5915] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 267.500589][ T5915] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 267.508587][ T5915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 267.516667][ T5915] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 267.524756][ T5915] [ 267.555457][ T45] device bridge_slave_1 left promiscuous mode [ 267.569186][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.667376][ T45] device bridge_slave_0 left promiscuous mode [ 267.673589][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.712459][ T45] device veth1_macvtap left promiscuous mode [ 267.725020][ T45] device veth0_vlan left promiscuous mode [ 268.094453][ T5866] device veth0_vlan entered promiscuous mode [ 268.111042][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.125445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.183035][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.194958][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.225154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.265061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.277860][ T5866] device veth1_macvtap entered promiscuous mode [ 268.308993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.326657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.336850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.352051][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.366950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.453678][ T5938] device syzkaller0 entered promiscuous mode [ 269.524937][ T45] device bridge_slave_1 left promiscuous mode [ 269.577457][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.627150][ T45] device bridge_slave_0 left promiscuous mode [ 269.653476][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.693733][ T45] device veth1_macvtap left promiscuous mode [ 269.726442][ T45] device veth0_vlan left promiscuous mode [ 270.316005][ T5965] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.333264][ T5965] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.369657][ T5965] device bridge_slave_0 entered promiscuous mode [ 270.391078][ T5984] device syzkaller0 entered promiscuous mode [ 270.408707][ T5965] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.415876][ T5965] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.425314][ T5965] device bridge_slave_1 entered promiscuous mode [ 270.588725][ T5965] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.595839][ T5965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.603242][ T5965] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.610592][ T5965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.620949][ T6000] lo: mtu less than device minimum [ 274.088914][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.103622][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.127698][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.136618][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.152062][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.182077][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.197621][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.204749][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.227702][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.241086][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.249773][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.256860][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.383793][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.392173][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.402792][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.423637][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.440553][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.449229][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.481692][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.493445][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.521696][ T5965] device veth0_vlan entered promiscuous mode [ 274.542435][ T6045] device sit0 entered promiscuous mode [ 274.693125][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.730352][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.942570][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.951861][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.983338][ T5965] device veth1_macvtap entered promiscuous mode [ 275.035309][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.062761][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.123270][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.189651][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.206924][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.068196][ T5965] syz-executor (5965) used greatest stack depth: 21728 bytes left [ 281.618599][ T3588] device bridge_slave_1 left promiscuous mode [ 281.624800][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.632982][ T3588] device bridge_slave_0 left promiscuous mode [ 281.639315][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.648040][ T3588] device veth1_macvtap left promiscuous mode [ 281.654199][ T3588] device veth0_vlan left promiscuous mode [ 282.928090][ T6103] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.970444][ T6103] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.045318][ T6103] device bridge_slave_0 entered promiscuous mode [ 283.108551][ T6103] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.182314][ T6103] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.257892][ T6103] device bridge_slave_1 entered promiscuous mode [ 283.559863][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.601666][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.723754][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.766601][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.822824][ T6008] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.830065][ T6008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.997062][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.034205][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.043067][ T6008] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.050447][ T6008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.066859][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.088006][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.099705][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.161887][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.201232][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.225749][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.234384][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.243124][ T6103] device veth0_vlan entered promiscuous mode [ 284.297277][ T6138] device syzkaller0 entered promiscuous mode [ 284.362647][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.394466][ T30] audit: type=1400 audit(1776441584.330:156): avc: denied { read } for pid=6132 comm="syz.3.1999" name="cgroup.controllers" dev="cgroup2" ino=494 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 284.423205][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.587175][ T30] audit: type=1400 audit(1776441584.360:157): avc: denied { open } for pid=6132 comm="syz.3.1999" path="" dev="cgroup2" ino=494 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 284.647472][ T6103] device veth1_macvtap entered promiscuous mode [ 284.667787][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.684446][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.727423][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.813795][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.868329][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.334740][ T6155] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.347981][ T6155] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.390289][ T6155] device bridge_slave_0 entered promiscuous mode [ 286.397849][ T6155] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.405012][ T6155] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.412795][ T6155] device bridge_slave_1 entered promiscuous mode [ 286.750491][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.758300][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.798582][ T6155] device veth0_vlan entered promiscuous mode [ 286.813889][ T6155] device veth1_macvtap entered promiscuous mode [ 286.841219][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.851306][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.860576][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.870632][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.879544][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.887963][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.895914][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.905041][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.914462][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.923362][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.930490][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.938866][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.947455][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.955913][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.963015][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.970915][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.979718][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.024081][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.092207][ T6008] device bridge_slave_1 left promiscuous mode [ 287.101900][ T6008] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.110522][ T6008] device bridge_slave_0 left promiscuous mode [ 287.116891][ T6008] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.125777][ T6008] device veth1_macvtap left promiscuous mode [ 287.133077][ T6008] device veth0_vlan left promiscuous mode [ 288.849222][ T6184] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.873648][ T6184] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.971746][ T6184] device bridge_slave_0 entered promiscuous mode [ 289.064142][ T6184] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.086976][ T6184] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.095738][ T6184] device bridge_slave_1 entered promiscuous mode [ 289.402379][ T6008] device bridge_slave_1 left promiscuous mode [ 289.408798][ T6008] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.457456][ T6008] device bridge_slave_0 left promiscuous mode [ 289.494134][ T6008] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.554920][ T6008] device veth1_macvtap left promiscuous mode [ 289.575148][ T6008] device veth0_vlan left promiscuous mode [ 290.120210][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.127951][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.198021][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.209664][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.230216][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.237489][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.356511][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.365015][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.373743][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.382329][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.389499][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.446650][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.462023][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.470799][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.479337][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.547715][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.556459][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.588175][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.600101][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.614904][ T6184] device veth0_vlan entered promiscuous mode [ 290.629515][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.637080][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.718668][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.767655][ T6184] device veth1_macvtap entered promiscuous mode [ 290.795448][ T6237] device syzkaller0 entered promiscuous mode [ 290.842636][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.862889][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.892970][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.923372][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.007298][ T6254] syz.2.2031 uses obsolete (PF_INET,SOCK_PACKET) [ 293.338993][ T6275] device syzkaller0 entered promiscuous mode [ 293.360763][ T6264] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.368180][ T6264] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.375861][ T6264] device bridge_slave_0 entered promiscuous mode [ 293.403472][ T6264] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.410998][ T6264] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.418970][ T6264] device bridge_slave_1 entered promiscuous mode [ 293.980610][ T6288] device syzkaller0 entered promiscuous mode [ 294.401716][ T6008] device bridge_slave_1 left promiscuous mode [ 294.421310][ T6008] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.462758][ T6008] device bridge_slave_0 left promiscuous mode [ 294.470525][ T6008] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.480155][ T6008] device veth1_macvtap left promiscuous mode [ 294.486366][ T6008] device veth0_vlan left promiscuous mode [ 295.284519][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.304742][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.396439][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.427816][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.486586][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.493735][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.524390][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.533254][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.541810][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.548999][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.556963][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.565231][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.573673][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.582364][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.722983][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.820130][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.836616][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.849460][ T6264] device veth0_vlan entered promiscuous mode [ 295.918039][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.926478][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.934877][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.952871][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.979075][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.988130][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.999589][ T6264] device veth1_macvtap entered promiscuous mode [ 296.041124][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.052401][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.071014][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.107435][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.122337][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.137720][ T404] device bridge_slave_1 left promiscuous mode [ 297.143902][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.151815][ T404] device bridge_slave_0 left promiscuous mode [ 297.158161][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.166486][ T404] device veth1_macvtap left promiscuous mode [ 297.172585][ T404] device veth0_vlan left promiscuous mode [ 297.629547][ T6323] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.676227][ T6323] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.683963][ T6323] device bridge_slave_0 entered promiscuous mode [ 297.703052][ T6323] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.714639][ T6323] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.736843][ T6323] device bridge_slave_1 entered promiscuous mode [ 298.179851][ T6323] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.187193][ T6323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.194563][ T6323] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.202217][ T6323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.508364][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.516505][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.565551][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.625042][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.666978][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.705977][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.763035][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.770170][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.832718][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.845194][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.856964][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.864113][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.884598][ T6351] device syzkaller0 entered promiscuous mode [ 298.916484][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.925210][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.943901][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.955921][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.997147][ T6364] device syzkaller0 entered promiscuous mode [ 299.031704][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 299.049027][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.084925][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 299.104380][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.124170][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.131892][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.140575][ T6323] device veth0_vlan entered promiscuous mode [ 299.191787][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.232337][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.275302][ T6323] device veth1_macvtap entered promiscuous mode [ 299.332173][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.342256][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.382611][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.433689][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.463781][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.874556][ T6401] tap0: tun_chr_ioctl cmd 1074025675 [ 300.915522][ T6401] tap0: persist enabled [ 301.750151][ T6413] tap0: tun_chr_ioctl cmd 1074025675 [ 301.761186][ T6413] tap0: persist enabled [ 301.973352][ T6412] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.038786][ T6412] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.078176][ T6412] device bridge_slave_0 entered promiscuous mode [ 302.139050][ T404] device bridge_slave_1 left promiscuous mode [ 302.145432][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.219115][ T404] device bridge_slave_0 left promiscuous mode [ 302.225664][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.233982][ T404] device veth1_macvtap left promiscuous mode [ 302.240158][ T404] device veth0_vlan left promiscuous mode [ 302.399792][ T6412] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.427882][ T6412] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.468666][ T6412] device bridge_slave_1 entered promiscuous mode [ 303.093573][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.115837][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.139034][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.167359][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.217758][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.224974][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.257469][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.277758][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.309989][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.317159][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.346411][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.367452][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.436391][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.447203][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 303.484933][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.534236][ T6412] device veth0_vlan entered promiscuous mode [ 303.558886][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 303.573735][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 303.604710][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 303.624027][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.660396][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.672255][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.709385][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 303.723062][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 303.750873][ T6412] device veth1_macvtap entered promiscuous mode [ 303.776360][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 303.794921][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 303.825432][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 303.844609][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 303.985430][ T6475] device syzkaller0 entered promiscuous mode [ 305.342402][ T404] device bridge_slave_1 left promiscuous mode [ 305.366739][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.385795][ T404] device bridge_slave_0 left promiscuous mode [ 305.407823][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.601544][ T404] device veth1_macvtap left promiscuous mode [ 306.619500][ T404] device veth0_vlan left promiscuous mode [ 306.995414][ T6497] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.008067][ T6497] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.022343][ T6497] device bridge_slave_0 entered promiscuous mode [ 307.046566][ T6497] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.085945][ T6497] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.176975][ T6497] device bridge_slave_1 entered promiscuous mode [ 307.428955][ T6497] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.436083][ T6497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.443473][ T6497] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.450656][ T6497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.616965][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.629743][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.735189][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.742533][ T6552] FAULT_INJECTION: forcing a failure. [ 307.742533][ T6552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 307.756403][ T6552] CPU: 0 PID: 6552 Comm: syz.4.2131 Tainted: G W syzkaller #0 [ 307.765404][ T6552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 307.775583][ T6552] Call Trace: [ 307.778892][ T6552] [ 307.781850][ T6552] __dump_stack+0x21/0x30 [ 307.786216][ T6552] dump_stack_lvl+0x110/0x170 [ 307.791027][ T6552] ? show_regs_print_info+0x20/0x20 [ 307.796272][ T6552] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 307.801953][ T6552] dump_stack+0x15/0x20 [ 307.806151][ T6552] should_fail+0x3c1/0x510 [ 307.810601][ T6552] should_fail_usercopy+0x1a/0x20 [ 307.815714][ T6552] _copy_to_user+0x20/0x90 [ 307.820169][ T6552] bpf_test_finish+0x1b9/0x3c0 [ 307.824975][ T6552] ? convert_skb_to___skb+0x360/0x360 [ 307.830394][ T6552] ? convert_skb_to___skb+0x203/0x360 [ 307.835817][ T6552] bpf_prog_test_run_skb+0xbba/0x1150 [ 307.841327][ T6552] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 307.847259][ T6552] bpf_prog_test_run+0x3d5/0x630 [ 307.852235][ T6552] ? bpf_prog_query+0x230/0x230 [ 307.857140][ T6552] ? selinux_bpf+0xce/0xf0 [ 307.861588][ T6552] ? security_bpf+0x82/0xa0 [ 307.866130][ T6552] __sys_bpf+0x590/0x7d0 [ 307.870456][ T6552] ? bpf_link_show_fdinfo+0x330/0x330 [ 307.875863][ T6552] ? debug_smp_processor_id+0x17/0x20 [ 307.881267][ T6552] __x64_sys_bpf+0x7c/0x90 [ 307.885716][ T6552] x64_sys_call+0x4b9/0x9a0 [ 307.890355][ T6552] do_syscall_64+0x4c/0xa0 [ 307.895072][ T6552] ? clear_bhb_loop+0x50/0xa0 [ 307.899786][ T6552] ? clear_bhb_loop+0x50/0xa0 [ 307.904496][ T6552] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 307.910431][ T6552] RIP: 0033:0x7f8e57180819 [ 307.914875][ T6552] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 307.934779][ T6552] RSP: 002b:00007f8e55bdb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 307.943533][ T6552] RAX: ffffffffffffffda RBX: 00007f8e573f9fa0 RCX: 00007f8e57180819 [ 307.951722][ T6552] RDX: 0000000000000050 RSI: 0000200000000800 RDI: 000000000000000a [ 307.959902][ T6552] RBP: 00007f8e55bdb090 R08: 0000000000000000 R09: 0000000000000000 [ 307.967914][ T6552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.975988][ T6552] R13: 00007f8e573fa038 R14: 00007f8e573f9fa0 R15: 00007fffdca59588 [ 307.983987][ T6552] [ 307.998284][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.009058][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.035546][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.042720][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.060624][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.080146][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.087280][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.115055][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.134166][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.185860][ T6497] device veth0_vlan entered promiscuous mode [ 308.205641][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.224099][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.252197][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.276861][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.346022][ T6576] device syzkaller0 entered promiscuous mode [ 308.404594][ T6497] device veth1_macvtap entered promiscuous mode [ 308.426004][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 308.441960][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 308.465598][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 308.495764][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 308.516819][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 308.544850][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 308.568913][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 309.897194][ T404] device bridge_slave_1 left promiscuous mode [ 309.903346][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.911055][ T404] device bridge_slave_0 left promiscuous mode [ 309.917564][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.925805][ T404] device veth1_macvtap left promiscuous mode [ 309.931895][ T404] device veth0_vlan left promiscuous mode [ 310.279004][ T6595] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.339966][ T6595] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.368338][ T6595] device bridge_slave_0 entered promiscuous mode [ 310.471333][ T6595] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.478725][ T6595] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.486696][ T6595] device bridge_slave_1 entered promiscuous mode [ 311.059553][ T6619] device syzkaller0 entered promiscuous mode [ 311.226272][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 311.236345][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.270560][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.285665][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.309045][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.316358][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.356345][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.389953][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.416694][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.423796][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.452700][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.460733][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.471514][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.480155][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.499133][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.522758][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.534539][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.542467][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.551635][ T6595] device veth0_vlan entered promiscuous mode [ 311.563428][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.573661][ T6595] device veth1_macvtap entered promiscuous mode [ 311.584901][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.593867][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.651427][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.666675][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.467705][ T404] device bridge_slave_1 left promiscuous mode [ 312.473988][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.481983][ T404] device bridge_slave_0 left promiscuous mode [ 312.488519][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.497357][ T404] device veth1_macvtap left promiscuous mode [ 312.503421][ T404] device veth0_vlan left promiscuous mode [ 313.282792][ T6677] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.324906][ T6677] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.373012][ T6677] device bridge_slave_0 entered promiscuous mode [ 313.397800][ T6677] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.446209][ T6677] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.453911][ T6677] device bridge_slave_1 entered promiscuous mode [ 313.610786][ T6677] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.617915][ T6677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.625246][ T6677] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.632486][ T6677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.716582][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.724932][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.744249][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.767116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.785770][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.792890][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.811586][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.831943][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.839150][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.874317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.900526][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.933913][ T6677] device veth0_vlan entered promiscuous mode [ 313.966684][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 313.981984][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.010783][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.026663][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.046983][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.067042][ T6677] device veth1_macvtap entered promiscuous mode [ 314.100390][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.125589][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.154649][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.897409][ T302] device bridge_slave_1 left promiscuous mode [ 314.903729][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.911973][ T302] device bridge_slave_0 left promiscuous mode [ 314.925167][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.935775][ T302] device veth1_macvtap left promiscuous mode [ 314.942094][ T302] device veth0_vlan left promiscuous mode [ 315.970797][ T6761] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.981245][ T6761] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.989164][ T6761] device bridge_slave_0 entered promiscuous mode [ 315.996650][ T6761] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.005011][ T6761] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.012805][ T6761] device bridge_slave_1 entered promiscuous mode [ 316.142099][ T6761] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.149224][ T6761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.156563][ T6761] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.163636][ T6761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.191481][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.216737][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.224625][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.258379][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.271401][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.278531][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.286818][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.295182][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.302293][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.317426][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.326811][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.334965][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.343750][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.359716][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 316.368421][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.380990][ T6761] device veth0_vlan entered promiscuous mode [ 316.388029][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.406860][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.422445][ T6761] device veth1_macvtap entered promiscuous mode [ 316.429824][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.438823][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.446607][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 316.455025][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.463747][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 316.482130][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 316.490870][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 316.500137][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 316.515445][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.987099][ T404] device bridge_slave_1 left promiscuous mode [ 316.993254][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.000855][ T404] device bridge_slave_0 left promiscuous mode [ 317.007153][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.015078][ T404] device veth1_macvtap left promiscuous mode [ 317.021247][ T404] device veth0_vlan left promiscuous mode [ 318.352775][ T6827] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.364557][ T6827] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.379892][ T6827] device bridge_slave_0 entered promiscuous mode [ 318.393586][ T6827] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.403150][ T6827] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.411514][ T6827] device bridge_slave_1 entered promiscuous mode [ 320.145522][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.167726][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.191056][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.207140][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.215502][ T6008] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.222613][ T6008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.230992][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.239907][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.249225][ T6008] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.256502][ T6008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.283411][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.308160][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.318104][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.327078][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.353835][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.378878][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 320.387885][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.413769][ T6827] device veth0_vlan entered promiscuous mode [ 320.420367][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 320.429102][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.459797][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.467822][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.475423][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.491822][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.509668][ T6827] device veth1_macvtap entered promiscuous mode [ 320.541591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.553346][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.603192][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 320.614069][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 326.115077][ T30] audit: type=1400 audit(1776441626.050:158): avc: denied { create } for pid=6924 comm="syz.4.2291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 327.296940][ T404] device bridge_slave_1 left promiscuous mode [ 327.303245][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.311077][ T404] device bridge_slave_0 left promiscuous mode [ 327.317307][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.325312][ T404] device veth1_macvtap left promiscuous mode [ 327.331460][ T404] device veth0_vlan left promiscuous mode [ 331.131223][ T6954] device syzkaller0 entered promiscuous mode [ 331.217566][ T6967] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 331.255494][ T6947] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.288242][ T6947] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.303459][ T6947] device bridge_slave_0 entered promiscuous mode [ 331.335020][ T6947] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.350977][ T6947] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.365906][ T6947] device bridge_slave_1 entered promiscuous mode [ 331.504872][ T6947] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.512015][ T6947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.519456][ T6947] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.526532][ T6947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.572957][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.592606][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.086396][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.113722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.132192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.140870][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.147990][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.159752][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.168755][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.177076][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.184106][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.241283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.254078][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.287140][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.295479][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.304285][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.312800][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.326892][ T6947] device veth0_vlan entered promiscuous mode [ 336.348158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 336.367353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.435839][ T6947] device veth1_macvtap entered promiscuous mode [ 336.452897][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.461763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.469816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 336.482055][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 336.490918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 336.542576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.551523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.561518][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.577306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.537208][ T45] device bridge_slave_1 left promiscuous mode [ 337.543373][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.551073][ T45] device bridge_slave_0 left promiscuous mode [ 337.557405][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.565385][ T45] device veth1_macvtap left promiscuous mode [ 337.571482][ T45] device veth0_vlan left promiscuous mode [ 338.498779][ T7042] device syzkaller0 entered promiscuous mode [ 338.858639][ T7048] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.865771][ T7048] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.874174][ T7048] device bridge_slave_0 entered promiscuous mode [ 338.881555][ T7048] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.888954][ T7048] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.896949][ T7048] device bridge_slave_1 entered promiscuous mode [ 338.975735][ T7061] device syzkaller0 entered promiscuous mode [ 339.031667][ T7070] device syzkaller0 entered promiscuous mode [ 339.097058][ T7048] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.104158][ T7048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.111528][ T7048] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.118727][ T7048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.127092][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.134502][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.230186][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.248537][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.309059][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.363082][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.421784][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.428952][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.442502][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.451079][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.461194][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.468337][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.493117][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.501462][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.542650][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.586086][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.664495][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.690563][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.778839][ T7048] device veth0_vlan entered promiscuous mode [ 339.834526][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.842826][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.853541][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.861780][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.916961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 339.932990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 339.965819][ T7048] device veth1_macvtap entered promiscuous mode [ 340.012830][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.067076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.075967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.091466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.100938][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.257212][ T45] device bridge_slave_1 left promiscuous mode [ 341.263464][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.271149][ T45] device bridge_slave_0 left promiscuous mode [ 341.277363][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.285249][ T45] device veth1_macvtap left promiscuous mode [ 341.291505][ T45] device veth0_vlan left promiscuous mode [ 346.184746][ T7150] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.191983][ T7150] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.199688][ T7150] device bridge_slave_0 entered promiscuous mode [ 346.207067][ T7150] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.214114][ T7150] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.221660][ T7150] device bridge_slave_1 entered promiscuous mode [ 346.331505][ T7150] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.338911][ T7150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.346267][ T7150] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.353403][ T7150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.380759][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.391189][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.425963][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.449492][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.457990][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.465164][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.474895][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.483322][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.490420][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.511002][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.519207][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.558834][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.595403][ T7150] device veth0_vlan entered promiscuous mode [ 346.614601][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.623546][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.631619][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.652437][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.666974][ T7150] device veth1_macvtap entered promiscuous mode [ 346.678996][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.698395][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.337225][ T45] device bridge_slave_1 left promiscuous mode [ 348.343653][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.351406][ T45] device bridge_slave_0 left promiscuous mode [ 348.357645][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.365777][ T45] device veth1_macvtap left promiscuous mode [ 348.372045][ T45] device veth0_vlan left promiscuous mode [ 349.423864][ T7193] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.497698][ T7193] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.542279][ T7193] device bridge_slave_0 entered promiscuous mode [ 349.594177][ T7193] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.640266][ T7193] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.660136][ T7193] device bridge_slave_1 entered promiscuous mode [ 350.014546][ T7193] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.022206][ T7193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.029563][ T7193] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.036730][ T7193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.117408][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.129972][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.145786][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.208710][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.222735][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.229889][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.253414][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.269661][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.276788][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.358233][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.368783][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.433968][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 350.442723][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.451495][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 350.460253][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.469891][ T7193] device veth0_vlan entered promiscuous mode [ 350.491929][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.500080][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.534269][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 350.549787][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.622659][ T7193] device veth1_macvtap entered promiscuous mode [ 350.656268][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.666555][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.675296][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.685380][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.694458][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.736980][ T45] device bridge_slave_1 left promiscuous mode [ 352.743146][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.750884][ T45] device bridge_slave_0 left promiscuous mode [ 352.757146][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.765007][ T45] device veth1_macvtap left promiscuous mode [ 352.771256][ T45] device veth0_vlan left promiscuous mode [ 356.461684][ T7272] device syzkaller0 entered promiscuous mode [ 356.610588][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.642776][ T7256] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.650837][ T7256] device bridge_slave_0 entered promiscuous mode [ 357.500830][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.521033][ T7256] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.528950][ T7256] device bridge_slave_1 entered promiscuous mode [ 357.653497][ T7286] FAULT_INJECTION: forcing a failure. [ 357.653497][ T7286] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.704222][ T7286] CPU: 1 PID: 7286 Comm: syz.3.2412 Tainted: G W syzkaller #0 [ 357.713091][ T7286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 357.723280][ T7286] Call Trace: [ 357.726585][ T7286] [ 357.729544][ T7286] __dump_stack+0x21/0x30 [ 357.734014][ T7286] dump_stack_lvl+0x110/0x170 [ 357.738725][ T7286] ? show_regs_print_info+0x20/0x20 [ 357.743960][ T7286] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 357.749459][ T7286] dump_stack+0x15/0x20 [ 357.753683][ T7286] should_fail+0x3c1/0x510 [ 357.758159][ T7286] should_fail_usercopy+0x1a/0x20 [ 357.763219][ T7286] _copy_to_user+0x20/0x90 [ 357.767760][ T7286] bpf_test_finish+0x217/0x3c0 [ 357.772567][ T7286] ? convert_skb_to___skb+0x360/0x360 [ 357.777978][ T7286] ? convert_skb_to___skb+0x203/0x360 [ 357.783383][ T7286] bpf_prog_test_run_skb+0xbba/0x1150 [ 357.788795][ T7286] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 357.794728][ T7286] bpf_prog_test_run+0x3d5/0x630 [ 357.799704][ T7286] ? bpf_prog_query+0x230/0x230 [ 357.804582][ T7286] ? selinux_bpf+0xce/0xf0 [ 357.809032][ T7286] ? security_bpf+0x82/0xa0 [ 357.813568][ T7286] __sys_bpf+0x590/0x7d0 [ 357.817856][ T7286] ? bpf_link_show_fdinfo+0x330/0x330 [ 357.823278][ T7286] ? debug_smp_processor_id+0x17/0x20 [ 357.828689][ T7286] __x64_sys_bpf+0x7c/0x90 [ 357.833147][ T7286] x64_sys_call+0x4b9/0x9a0 [ 357.837702][ T7286] do_syscall_64+0x4c/0xa0 [ 357.842152][ T7286] ? clear_bhb_loop+0x50/0xa0 [ 357.846872][ T7286] ? clear_bhb_loop+0x50/0xa0 [ 357.851581][ T7286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 357.857509][ T7286] RIP: 0033:0x7fc5da263819 [ 357.862123][ T7286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.882399][ T7286] RSP: 002b:00007fc5d8cbe028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 357.890987][ T7286] RAX: ffffffffffffffda RBX: 00007fc5da4dcfa0 RCX: 00007fc5da263819 [ 357.899001][ T7286] RDX: 0000000000000050 RSI: 0000200000000800 RDI: 000000000000000a [ 357.907195][ T7286] RBP: 00007fc5d8cbe090 R08: 0000000000000000 R09: 0000000000000000 [ 357.915325][ T7286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.923331][ T7286] R13: 00007fc5da4dd038 R14: 00007fc5da4dcfa0 R15: 00007fff16931648 [ 357.931346][ T7286] [ 358.010008][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.020866][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.043842][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.056558][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.076398][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.083480][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.054920][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.083926][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.066821][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.075502][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.082640][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.110206][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.118984][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.142009][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.155391][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.156473][ T30] audit: type=1400 audit(1776441661.090:159): avc: denied { read } for pid=7299 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 361.195480][ T7256] device veth0_vlan entered promiscuous mode [ 361.205418][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.215380][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.242732][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.255125][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.272444][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.287044][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.322526][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.345543][ T6008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.364300][ T7256] device veth1_macvtap entered promiscuous mode Stopping sshd: stopped /usr/sbin/sshd (pid 192) OK [ 361.411464][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.430874][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready Stopping crond: [ 361.458553][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready stopped /usr/sbin/crond (pid 185) OK [ 361.500008][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.531218][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 361.564711][ T30] audit: type=1400 audit(1776441661.500:160): avc: denied { mount } for pid=7256 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 361.640473][ T30] audit: type=1400 audit(1776441661.530:161): avc: denied { mounton } for pid=7256 comm="syz-executor" path="/root/syzkaller.fV3AOy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 Stopping network: [ 361.708903][ T30] audit: type=1400 audit(1776441661.530:162): avc: denied { unmount } for pid=7256 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=1860 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 361.769090][ T30] audit: type=1400 audit(1776441661.610:163): avc: denied { search } for pid=7332 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 361.882233][ T30] audit: type=1400 audit(1776441661.740:164): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[345]" dev="pipefs" ino=345 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 OK Stopping iptables: [ 362.061690][ T30] audit: type=1400 audit(1776441662.000:165): avc: denied { search } for pid=7350 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 362.236427][ T30] audit: type=1400 audit(1776441662.000:166): avc: denied { write } for pid=7350 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping system message bus: [ 362.268642][ T285] syz-executor (285) used greatest stack depth: 21120 bytes left [ 362.326195][ T30] audit: type=1400 audit(1776441662.000:167): avc: denied { add_name } for pid=7350 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done [ 362.406457][ T30] audit: type=1400 audit(1776441662.000:168): avc: denied { create } for pid=7350 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 362.495801][ T7324] device syz_tun left promiscuous mode [ 362.517569][ T7324] : port 1(syz_tun) entered disabled state Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: devtmpfs busy - remounted read-only [ 363.849423][ T7372] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 363.861513][ T45] device bridge_slave_1 left promiscuous mode [ 363.867856][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.875763][ T45] device bridge_slave_0 left promiscuous mode [ 363.882065][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.890502][ T45] device bridge_slave_1 left promiscuous mode [ 363.896699][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.904129][ T45] device bridge_slave_0 left promiscuous mode [ 363.910544][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.920383][ T45] device veth1_macvtap left promiscuous mode [ 363.926868][ T45] device veth0_vlan left promiscuous mode [ 363.934909][ T45] device veth1_macvtap left promiscuous mode [ 363.941107][ T45] device veth0_vlan left promiscuous mode The system is going down NOW! Sent SIGKILL to all processes Requesting system poweroff [ 365.954441][ T7373] kvm: exiting hardware virtualization [ 365.962358][ T7373] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 365.969180][ T7373] ACPI: PM: Preparing to enter system sleep state S5 [ 365.976316][ T7373] reboot: Power down serialport: VM disconnected.