last executing test programs: 19.15351681s ago: executing program 2 (id=1887): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r5) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 15.607459114s ago: executing program 2 (id=1887): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r5) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 12.459295054s ago: executing program 2 (id=1887): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r5) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 9.180592665s ago: executing program 4 (id=2342): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x4000000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x40000, 0x0, r0, 0x7}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'macsec0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x94) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0], 0x48) close(r6) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r6, 0xffffffffffffffff, 0x4, r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xfff9, 0x6}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 9.099017302s ago: executing program 2 (id=1887): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r5) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 7.056587383s ago: executing program 4 (id=2346): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x116) r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) syz_open_procfs$namespace(r0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0)=r0, 0x12) 6.393079912s ago: executing program 4 (id=2354): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa1"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000592000009500000000000000a3028cb5af6c8f5d76781dcb7729f01726a067818b990b13bfddb7e78270010720596bb3b4d821d976f5843061cc2e3afbae82d7932d192321fa3b3042f100"/187], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xa002a0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711228000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0)=r6, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000200)=0x1, 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.479154113s ago: executing program 0 (id=2359): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb9, 0x5, 0x0, 0x0, 0x0, 0x7, 0x80420, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x300, 0x103, 0x200000, 0x7, 0x29a}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x2e, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) sendmsg$tipc(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 5.1758717s ago: executing program 1 (id=2362): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000592000009500000000000000a3028cb5af6c8f5d76781dcb7729f01726a067818b990b13bfddb7e78270010720596bb3b4d821d976f5843061cc2e3afbae82d7932d192321fa3b3042f100"/187], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xa002a0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711228000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0)=r6, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000200)=0x1, 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.788574434s ago: executing program 1 (id=2364): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x116) r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) syz_open_procfs$namespace(r0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0)=r0, 0x12) 4.645213917s ago: executing program 2 (id=1887): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r5) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 2.563020542s ago: executing program 0 (id=2368): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000002a70000007500000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x6000, 0x0}, 0x10) 2.562538892s ago: executing program 1 (id=2369): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xde0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc"], 0x0, 0xfc5f, 0xfffffffffffffda3}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x6, 0x1}, {0x6}, {0xf, 0x5}, {0x7, 0x1}, {0xe, 0x4}, {0xe, 0x5}, {0x10, 0x4}, {0x2, 0x5}, {0x5, 0x1}]}, @func={0x4, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x9a}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000007e4e9b970582704fd8a8852365fc08d9dabff9f7026fd4dc406934d3546659658278590546dd436dd78c182fbd2b1144efbd9fd3ad12160b245268ffc4c9eec0dd14f0f2d3d3f4554f08df70c60b8d268bbfaa999fe2b0384d3f4dfc099e17e9beb54abfc5d1e4c367132e0ba6bf31c5eea0", @ANYRES32=0x0, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x2d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000003000000420000003c"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001440)="7b95009d5dd7251d900e9d718dcf876a8ecbd593223f20513d409549252f7a52e778c68d4c33bd8b23d13998af94f44a205526f0f724cb07be0a00849bd0d0f6a87f849727a2871550ce714e4e56334fcb791021ce330fff33c940bda52f2071149b709908a1208d5641f684b8d4469f373445800c1463134cfb9e44081b6e278f0637b80a688bbdd6525713bfe876d504307f24568b2f3d4bbf2f5cbad16b9c416a518d1b50fb8abdb3e1c97600000000b40da9a8", &(0x7f0000001500)="0465a4775d6b7ba72a8c40bf67ff6da7e4e9aa2aa2d5c9e86a1fbde23a5515ffb63701a78805a73974099bd89beb31d620897cf1e7887b273f6dfc6e784e779ab7eb35812b86721980a85f1c71acf65706008a52f916ce2f19ae7f6d98c7b327d9c14e56b7429812bec7", 0x1, r6}, 0x38) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r7, &(0x7f0000000980), 0x20000992) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 2.562233372s ago: executing program 3 (id=2370): socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0100, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'\x00', 0x2}) ioctl$TUNSETDEBUG(r3, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000040)=r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r5}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r2, 0x4) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000180)=r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) 2.560785582s ago: executing program 4 (id=2371): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRESOCT], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x62, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020085000000d0000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095001100"/96], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="029e54893d788a08ec0052411971", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r3, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r4, r0, 0x0, r0}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r6}, &(0x7f00000001c0), &(0x7f0000000200)='%pI4 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x58, &(0x7f0000000800)}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000002000000b705000008000000850000006900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r9, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x3, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 2.425589774s ago: executing program 0 (id=2372): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4, 0x2}]}, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000002b80)=""/4074, 0x3e, 0xfea, 0x1}, 0x28) (fail_nth: 15) 2.420127965s ago: executing program 4 (id=2373): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000592000009500000000000000a3028cb5af6c8f5d76781dcb7729f01726a067818b990b13bfddb7e78270010720596bb3b4d821d976f5843061cc2e3afbae82d7932d192321fa3b3042f100"/187], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xa002a0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711228000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0)=r6, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000200)=0x1, 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.36093966s ago: executing program 3 (id=2374): bpf$ITER_CREATE(0xb, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000001}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='.//\x00\x00\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0xc0000000000000, 0x0, 0x0, 0x0, 0x800, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000500000001801000020206425000000000020217e60882c20824f0000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b00000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = gettid() perf_event_open(0x0, r3, 0xffffffffffffffff, r1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40100, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 2.005515031s ago: executing program 0 (id=2375): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0xffdd) 2.005119241s ago: executing program 3 (id=2376): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, 0x10000) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 1.881641672s ago: executing program 0 (id=2377): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001"], 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000300), 0x3, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000003000000000000000040000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000000600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000e40)=@o_path={&(0x7f0000000e00)='./file0/file0\x00', 0x0, 0xc018, r1}, 0x18) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2}, 0xc) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x13}]}}, 0x0, 0x26}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000400000003"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0xc2c, 0xfffffe63, 0x80, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x42, 0x0, 0x1}, 0x50) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r6}, 0xc) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000480)=[{&(0x7f00000000c0)="4e6ef8ce8c32", 0x6}, {&(0x7f0000000100)="fef67429bc332288b7f026d3f4bc862b302d59fb71e9e2b43be76abd73567893975b17dccb8518921664d21efad3618a106df1858ce90a0599eaa75a1a1ad99d80b934aad85201b37b2a1c5bd4e6bed5dc14bd3a2a86410128ff946aa886486f44ff80e01376f54ec3ecccec0dc317679876f152a017c368dbd2d303d5f43e228e4a748bcff488be0ebfeddcfc2125cb48f7b0914ec7d7be0341fcb0c8fa5d6686022cfc1b8aea0047ba62a4e5808858064cc0f2decc63473314852e207b052445f18b69177e63a09a4ac5a92273990e46a67eea7a7827e0c439c172501c0a", 0xdf}, {&(0x7f0000000200)="416f2058edeb08b84745527cd7b744941d5f5a2133f1bd04d30658f8e221c517dcdb266de44a9d45d1445c0f5cd20d1c0a0259c4cc3f58ae2271deae33f12c95e31bd4ad10de228613d831a57f1a00b4e836639f4e98dc74b79382d30a40058475c6fbe7cdd60039594b224b495463e863e39b1ecb5a6f14978206f8cc0addac8c4dabf7897c9ff3c569aa0c99685d40550c80133a3877505e4dd1e8fe2b38f483a912caa25ee1f6ea8260fa219387495eaebd1ed2e3d8207130594d54225add91657c7b987acbb3278258d39c112ff59123cab5777423543e945dd3654d497bc22f95dc0bc458fc", 0xe8}, {&(0x7f0000000300)="58343cb618ceb055a6190e53b9", 0xd}, {&(0x7f0000000340)="16900a4310512bcf6ef8bafc53b5ba874224f366fe1b5563bdc5feae65fc565b972164e4df13e36009d7574ba0385463a521a1fbab77218047c985de309001f5ef464208a48fc40b003e10e3c2f45b8cea849aa4f7f02f547c237eadebe12bc4a0360d8db2851b5d3648ec3abef4a9b5c13a93952ab7a8bd01363bcecfc58cafa22b474bd8111f16bda7824b95e88c3e8c24fd3837a8fe378dacc5630ab138c0239f30c3751c209198a551", 0xab}, {&(0x7f0000000400)="592133730e99297910931dd03b488850049c3997a14cbbf43701bfd24d0df57b4517172231361817bbebbd7dc0795f1ecf09a142e011afd5a59ac0033b61f0404c58743afdc43bce63475944e7962b003a4f4b7bc3872ba39da4de6427ce40968f66d1e1d901f3a2a0f3a72dfcfb", 0x6e}], 0x6}, 0x4004004) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x2, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000006b00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x10, 0x0, 0x0, 0x1, 0x0, 0xd, 0x0, 0x7a, 0x6}]}, {0x0, [0x30, 0x61, 0x0]}}, &(0x7f0000000cc0)=""/152, 0x2d, 0x98, 0x1, 0x10001, 0x10000, @value=r5}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r9 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r4, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000e80)=r5) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x50) sendmsg$unix(r8, &(0x7f0000000b80)={&(0x7f0000000580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000600)="e9868f093c32e1034aa534447796e83c83e567118841672c37f53133a89c577ba2ab11e03d912805f10dc44ca297e3ffab7106de15a24cd481a014229b0b75386456da6be4e2fdff316d07c73a727d50921b537cab476bce4b76e3e2de3f3da0e5abab80c0df3182c655ddf12c2c7379930ef075f760f3d175a2d37350e58efb89b09f8f55cc194162a47781", 0x8c}, {&(0x7f00000006c0)="ffddc365c3b375391db33fc8c9dba20aa02066bc56b8d5f97b8bc03e1135569f73f2", 0x22}, {&(0x7f0000000700)="2deab725de80ad603470df020ce6d961bc77c13d483f71f0dcbbf43cb693581e1b8b22f8b0227b5c5151f6d7a087b6c5ec57c2e160f7a567b53c3139a373d567cdbc88a907d12cddb103a6807e60376a35b9f23a1d62e986c80599419d3bb25f7835eddd560060bb869c894e3b9f3bcbce4e401692334b8dcac9013c5bb58f71e914e874a6296228f2c338deab23928626df272b0511a10912e24e7edcf31ae66c23f3e0c125c893b1bf0d2147824ba7f8cfc619ba2ca1a782154dca526ac708b708cc6b40bafe92b267c008a44ab6ad772e9cc2a03b2e82157c2ddad49bcfb54d", 0xe1}, {&(0x7f0000000880)="d74a30b60d62e15a3785c19d515f3a9c27647788ec7ad2cd153d874def5e2696c5f9196045a964399d6c5778fefe2500ae2f854a9acc112bbe001eda208fc4ce33c4858807feec2b54ce4f44dc994b9c57cff285fe94310787762c5186ef9224d2a143fd", 0x64}, {&(0x7f0000000800)="f67572d61dc011a41ed5070b7b282cc62eab22fedc489ae1c17bb4f14f57aade9b353fdba506a532e9d65a7e159f2f4780e236d51b198c5bf9", 0x39}], 0x5, &(0x7f0000000b40)=[@rights={{0x20, 0x1, 0x1, [r9, r4, r6, r7]}}, @rights={{0x20, 0x1, 0x1, [r10, r11, r7, r7]}}], 0x40, 0xc}, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 1.861725534s ago: executing program 4 (id=2378): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0xc8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000680)}, 0x81) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r7}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) 1.803995219s ago: executing program 3 (id=2379): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x4000000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x40000, 0x0, r0, 0x7}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'macsec0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x94) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0], 0x48) close(r6) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r6, 0xffffffffffffffff, 0x4, r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xfff9, 0x6}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 1.594338578s ago: executing program 1 (id=2380): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10103, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000008, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000000000000000000000100006b4b00000400000000feffffff0000"], &(0x7f0000000900)=""/145, 0x3e, 0x83, 0x1}, 0x3b) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='1-1,', @ANYRES64=r4], 0x31) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2000009f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x5, 0x51, 0x0, 0x40e00, 0x10, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffea5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r7, 0x0, 0x0}, 0x10) r8 = openat$cgroup_subtree(r4, &(0x7f0000000080), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000180)=ANY=[@ANYRES8=r0], 0x50) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00s '], 0x6) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000600000000000000", @ANYRES32=0x1, @ANYBLOB="00fcffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300000005000000000000000000000009000000000000007a4f81117d93f5e647d7152e6bc3c91c55925f3dc35361a520412b4f160ca822ee15fa161b635bfe7179d7c2832850036db642e0bbc8259a605b57cfd8a57144b367c6283cf6f100815f46840d8a66f7d45834482ae9ffddcc56bbad9169c83d0be00a2dc28f0f65109319666b323a517c037f000000000000003ef65a1ddd757d7ece635d7b75087c3ca731a705904c9741ab0c36325ad2e2"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000300000000000000f9ffffff18240000", @ANYRES32=r0, @ANYBLOB="00a51f2dc10000950000000000000089a00063f90ec003832a7222f9c40b194fc3a1bd5094cb62c9277cd124a1a81503f22ad30f145ea08f10e80bd607f1162f7b459ce0d6a8224600eaf521018a49439e269e96949b15878f0073dc7313395a8612ea9d9cd61d39c23a79c2803bd31d62cb0357296f415c4aa73d8d9342f831592f3bc154caaf78a2bb35c065d3de779ede26ce3ec001d65c017aa9c1842574705bbc7a07"], &(0x7f00000002c0)='syzkaller\x00', 0x4a1, 0x0, 0x0, 0x100, 0x20, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000380)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0xffffffce, 0x2}, 0x10, 0x0, 0x0, 0xfffffffa, &(0x7f0000000400)=[r1], 0x0, 0x10, 0x5}, 0x94) 1.425037903s ago: executing program 1 (id=2381): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x116) r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0)=r0, 0x12) 1.0116697s ago: executing program 1 (id=2382): mkdir(&(0x7f0000000000)='./cgroup/file0\x00', 0xd0939199c36b4d28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="010000004200000006000000081c52b6332feaf1b55d0db199000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r3}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="92", 0xfdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="85000000ae00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd296303406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c126ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a8f27e02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d988c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438a58c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c38680a377f8c26e6e382067f690089f34b13ee0633a171c7918401acd4575f1443815854f775308c083ff4f4046cfca8bca48e6db6b211113c06797722230af92290231a0f02e247cf96876257dac9ff0b8f07ff5916a8ccd3f15b389d34520f074c6f006e0383280bf0b9765c995ef1e696a1da41d9372a1c9d85f1a83b6213b5fb236fbeda8fb90dee70ca3cfc0833741a0e9341ab4dee09669b832840fef5a2bbebd5957503656c445a428efc5711d1c66093b360c63e63e91cb871f8dc43a915ec87be492daec18847de7032d5c97d0296a1fa97d17f8546290c1a325221f36f8d749d4a9aa1883a41d92228c93b60fe677f4f9d51fadbba6dd46222fd11f678d7e9a307024806cc28cba904f8d12870b4528b8d75fd29adacf0a52cdfaf4e43f00e532cfc15f394db7d521339aa980f81bd78a82d84dba575391bee41c95daf3b576feed54d448d36ad0000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 617.532715ms ago: executing program 0 (id=2383): close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/121, 0x79}, {&(0x7f0000000540)=""/23, 0x17}, {0x0}], 0x3}, 0x10000) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r5, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r6, r3, 0x4, r4}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r10, @ANYRES32=r9, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r10}, 0x0, &(0x7f0000000080)=r7}, 0x20) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 568.621019ms ago: executing program 3 (id=2384): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRESOCT], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x62, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020085000000d0000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095001100"/96], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="029e54893d788a08ec0052411971", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r3, 0x0) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r4, r0, 0x0, r0}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r6}, &(0x7f00000001c0), &(0x7f0000000200)='%pI4 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x58, &(0x7f0000000800)}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000002000000b705000008000000850000006900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x3, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 377.555476ms ago: executing program 3 (id=2385): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb9, 0x5, 0x0, 0x0, 0x0, 0x7, 0x80420, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x300, 0x103, 0x200000, 0x7, 0x29a}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x2e, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) sendmsg$tipc(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 0s ago: executing program 2 (id=1887): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r5) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) kernel console output (not intermixed with test programs): 449] ? __cfi_generic_perform_write+0x10/0x10 [ 195.544018][ T5449] ? __cfi_file_update_time+0x10/0x10 [ 195.549404][ T5449] ? generic_write_checks_count+0x3c6/0x4a0 [ 195.555309][ T5449] __generic_file_write_iter+0x17a/0x230 [ 195.560951][ T5449] generic_file_write_iter+0xae/0x310 [ 195.566332][ T5449] vfs_write+0x603/0xce0 [ 195.570577][ T5449] ? __cfi_vfs_write+0x10/0x10 [ 195.575340][ T5449] ? __cfi_mutex_lock+0x10/0x10 [ 195.580204][ T5449] ? __fdget_pos+0x2cd/0x380 [ 195.584809][ T5449] ? ksys_write+0x71/0x250 [ 195.589233][ T5449] ksys_write+0x149/0x250 [ 195.593655][ T5449] ? __cfi_ksys_write+0x10/0x10 [ 195.598507][ T5449] ? debug_smp_processor_id+0x17/0x20 [ 195.603866][ T5449] __x64_sys_write+0x7b/0x90 [ 195.608442][ T5449] x64_sys_call+0x27b/0x9a0 [ 195.612938][ T5449] do_syscall_64+0x4c/0xa0 [ 195.617342][ T5449] ? clear_bhb_loop+0x30/0x80 [ 195.622002][ T5449] ? clear_bhb_loop+0x30/0x80 [ 195.626659][ T5449] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 195.632624][ T5449] RIP: 0033:0x7f519979c629 [ 195.637030][ T5449] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 195.656615][ T5449] RSP: 002b:00007f519a706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 195.665010][ T5449] RAX: ffffffffffffffda RBX: 00007f5199a15fa0 RCX: 00007f519979c629 [ 195.672967][ T5449] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000006 [ 195.680930][ T5449] RBP: 00007f519a706090 R08: 0000000000000000 R09: 0000000000000000 [ 195.688893][ T5449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.696858][ T5449] R13: 00007f5199a16038 R14: 00007f5199a15fa0 R15: 00007ffd0a1536b8 [ 195.704820][ T5449] [ 197.663616][ T5455] device syzkaller0 entered promiscuous mode [ 197.700776][ T5462] device syzkaller0 entered promiscuous mode [ 197.886334][ T5481] device syzkaller0 entered promiscuous mode [ 198.059392][ T5490] FAULT_INJECTION: forcing a failure. [ 198.059392][ T5490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.098202][ T5490] CPU: 0 PID: 5490 Comm: syz.3.1807 Tainted: G W syzkaller #0 [ 198.107088][ T5490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 198.117148][ T5490] Call Trace: [ 198.120425][ T5490] [ 198.123357][ T5490] __dump_stack+0x21/0x24 [ 198.127691][ T5490] dump_stack_lvl+0x110/0x170 [ 198.132365][ T5490] ? __cfi_dump_stack_lvl+0x8/0x8 [ 198.137389][ T5490] ? irqentry_exit+0x37/0x40 [ 198.141974][ T5490] dump_stack+0x15/0x24 [ 198.146132][ T5490] should_fail_ex+0x3d4/0x520 [ 198.150818][ T5490] should_fail+0xb/0x10 [ 198.154988][ T5490] should_fail_usercopy+0x1a/0x20 [ 198.160011][ T5490] copyin+0x20/0xa0 [ 198.163824][ T5490] _copy_from_iter+0x3e2/0x1010 [ 198.168672][ T5490] ? copyin+0x82/0xa0 [ 198.172655][ T5490] ? _copy_from_iter+0x420/0x1010 [ 198.177692][ T5490] ? __cfi__copy_from_iter+0x10/0x10 [ 198.182983][ T5490] ? __cfi__copy_from_iter+0x10/0x10 [ 198.188269][ T5490] copy_page_from_iter+0x1d2/0x2b0 [ 198.193395][ T5490] skb_copy_datagram_from_iter+0x2cd/0x6b0 [ 198.199204][ T5490] unix_stream_sendmsg+0x4d5/0xa80 [ 198.204317][ T5490] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 198.210481][ T5490] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 198.216118][ T5490] ? stack_trace_save+0xa6/0xf0 [ 198.220972][ T5490] ? __stack_depot_save+0x36/0x480 [ 198.226085][ T5490] ? security_socket_sendmsg+0x93/0xb0 [ 198.231546][ T5490] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 198.237179][ T5490] ____sys_sendmsg+0x5cc/0x990 [ 198.241951][ T5490] ? __sys_sendmsg_sock+0x40/0x40 [ 198.246994][ T5490] ? import_iovec+0x7c/0xb0 [ 198.251513][ T5490] ___sys_sendmsg+0x2a2/0x360 [ 198.256193][ T5490] ? __sys_sendmsg+0x290/0x290 [ 198.260958][ T5490] ? __kasan_check_write+0x14/0x20 [ 198.266074][ T5490] ? proc_fail_nth_write+0x180/0x200 [ 198.271363][ T5490] ? vfs_write+0xa2c/0xce0 [ 198.275782][ T5490] ? __fdget+0x19c/0x220 [ 198.280027][ T5490] __x64_sys_sendmsg+0x205/0x2d0 [ 198.284975][ T5490] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 198.290437][ T5490] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.296505][ T5490] x64_sys_call+0x171/0x9a0 [ 198.301007][ T5490] do_syscall_64+0x4c/0xa0 [ 198.305464][ T5490] ? clear_bhb_loop+0x30/0x80 [ 198.310136][ T5490] ? clear_bhb_loop+0x30/0x80 [ 198.314820][ T5490] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 198.320715][ T5490] RIP: 0033:0x7f519979c629 [ 198.325127][ T5490] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 198.344727][ T5490] RSP: 002b:00007f519a706028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.353133][ T5490] RAX: ffffffffffffffda RBX: 00007f5199a15fa0 RCX: 00007f519979c629 [ 198.361090][ T5490] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000003 [ 198.369045][ T5490] RBP: 00007f519a706090 R08: 0000000000000000 R09: 0000000000000000 [ 198.377093][ T5490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.385044][ T5490] R13: 00007f5199a16038 R14: 00007f5199a15fa0 R15: 00007ffd0a1536b8 [ 198.393018][ T5490] [ 198.761266][ T5502] device syzkaller0 entered promiscuous mode [ 198.852161][ T5511] device syzkaller0 entered promiscuous mode [ 198.922672][ T5519] device syzkaller0 entered promiscuous mode [ 198.940096][ T5522] sock: sock_set_timeout: `syz.3.1816' (pid 5522) tries to set negative timeout [ 199.112074][ T5536] device syzkaller0 entered promiscuous mode [ 199.182026][ T5549] device syzkaller0 entered promiscuous mode [ 199.230831][ T5555] device syzkaller0 entered promiscuous mode [ 199.246728][ T5561] device syzkaller0 entered promiscuous mode [ 199.798755][ T5585] device syzkaller0 entered promiscuous mode [ 199.807677][ T5585] FAULT_INJECTION: forcing a failure. [ 199.807677][ T5585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.832221][ T5585] CPU: 0 PID: 5585 Comm: syz.2.1840 Tainted: G W syzkaller #0 [ 199.841105][ T5585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 199.851171][ T5585] Call Trace: [ 199.854459][ T5585] [ 199.857387][ T5585] __dump_stack+0x21/0x24 [ 199.861721][ T5585] dump_stack_lvl+0x110/0x170 [ 199.866397][ T5585] ? __cfi_dump_stack_lvl+0x8/0x8 [ 199.871435][ T5585] ? vfs_write+0x603/0xce0 [ 199.875863][ T5585] ? ksys_write+0x149/0x250 [ 199.880373][ T5585] dump_stack+0x15/0x24 [ 199.884703][ T5585] should_fail_ex+0x3d4/0x520 [ 199.889387][ T5585] should_fail_alloc_page+0x61/0x90 [ 199.894603][ T5585] prepare_alloc_pages+0x148/0x600 [ 199.899733][ T5585] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 199.904948][ T5585] __alloc_pages+0x13a/0x480 [ 199.909541][ T5585] ? alloc_skb_with_frags+0xa8/0x620 [ 199.914838][ T5585] ? __cfi___alloc_pages+0x10/0x10 [ 199.919960][ T5585] ? __alloc_skb+0x2df/0x4b0 [ 199.924564][ T5585] alloc_skb_with_frags+0x20c/0x620 [ 199.929766][ T5585] sock_alloc_send_pskb+0x87f/0x9a0 [ 199.934998][ T5585] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 199.940728][ T5585] ? stack_trace_save+0xa6/0xf0 [ 199.945588][ T5585] ? iov_iter_advance+0x98/0x1b0 [ 199.950527][ T5585] tun_get_user+0xa63/0x3470 [ 199.955182][ T5585] ? _parse_integer+0x2a/0x40 [ 199.959841][ T5585] ? tun_do_read+0x1cf0/0x1cf0 [ 199.964585][ T5585] ? __kasan_check_write+0x14/0x20 [ 199.969682][ T5585] ? ref_tracker_alloc+0x31d/0x4a0 [ 199.974785][ T5585] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 199.980225][ T5585] ? avc_policy_seqno+0x1b/0x70 [ 199.985072][ T5585] ? selinux_file_permission+0x2a5/0x510 [ 199.990735][ T5585] tun_chr_write_iter+0x1fb/0x300 [ 199.995771][ T5585] vfs_write+0x603/0xce0 [ 200.000038][ T5585] ? __cfi_vfs_write+0x10/0x10 [ 200.004811][ T5585] ? __fget_files+0x2d5/0x330 [ 200.009490][ T5585] ? __fdget_pos+0x1f2/0x380 [ 200.014076][ T5585] ? ksys_write+0x71/0x250 [ 200.018495][ T5585] ksys_write+0x149/0x250 [ 200.022824][ T5585] ? __cfi_ksys_write+0x10/0x10 [ 200.027680][ T5585] ? debug_smp_processor_id+0x17/0x20 [ 200.033065][ T5585] __x64_sys_write+0x7b/0x90 [ 200.037662][ T5585] x64_sys_call+0x27b/0x9a0 [ 200.042181][ T5585] do_syscall_64+0x4c/0xa0 [ 200.046655][ T5585] ? clear_bhb_loop+0x30/0x80 [ 200.051343][ T5585] ? clear_bhb_loop+0x30/0x80 [ 200.056024][ T5585] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 200.061934][ T5585] RIP: 0033:0x7f2655f9c629 [ 200.066362][ T5585] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 200.086062][ T5585] RSP: 002b:00007f2656dbb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 200.094481][ T5585] RAX: ffffffffffffffda RBX: 00007f2656215fa0 RCX: 00007f2655f9c629 [ 200.102442][ T5585] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 200.110403][ T5585] RBP: 00007f2656dbb090 R08: 0000000000000000 R09: 0000000000000000 [ 200.118379][ T5585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.126349][ T5585] R13: 00007f2656216038 R14: 00007f2656215fa0 R15: 00007ffc6dffd3d8 [ 200.134325][ T5585] [ 200.438868][ T5606] device syzkaller0 entered promiscuous mode [ 200.831589][ T5612] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 200.851472][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 201.027942][ T5619] device syzkaller0 entered promiscuous mode [ 202.057439][ T5638] device syzkaller0 entered promiscuous mode [ 202.070217][ T5640] tap0: tun_chr_ioctl cmd 1074025675 [ 202.081776][ T5640] tap0: persist enabled [ 202.157844][ T5640] tap0: tun_chr_ioctl cmd 1074025675 [ 202.179338][ T5640] tap0: persist enabled [ 202.186386][ T5643] tap0: tun_chr_ioctl cmd 2147767520 [ 202.202195][ T5646] device syzkaller0 entered promiscuous mode [ 202.299906][ T5640] tap0: tun_chr_ioctl cmd 2147767520 [ 202.408065][ T5657] device syzkaller0 entered promiscuous mode [ 202.973259][ T5679] device syzkaller0 entered promiscuous mode [ 203.168805][ T5681] device syzkaller0 entered promiscuous mode [ 203.431779][ T5692] device aaaaaaaaaaaaaaa entered promiscuous mode [ 203.537290][ T5700] device syzkaller0 entered promiscuous mode [ 203.573650][ T5702] device syzkaller0 entered promiscuous mode [ 203.603200][ T5709] device syzkaller0 entered promiscuous mode [ 203.915804][ T5720] device syzkaller0 entered promiscuous mode [ 203.960346][ T5727] syz.0.1892[5727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.960437][ T5727] syz.0.1892[5727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.036672][ T5724] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.093477][ T5724] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.114035][ T5724] device bridge_slave_0 entered promiscuous mode [ 204.146131][ T5724] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.153188][ T5724] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.172226][ T5724] device bridge_slave_1 entered promiscuous mode [ 204.195521][ T5742] device syzkaller0 entered promiscuous mode [ 204.213476][ T5742] FAULT_INJECTION: forcing a failure. [ 204.213476][ T5742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 204.262991][ T5742] CPU: 0 PID: 5742 Comm: syz.4.1898 Tainted: G W syzkaller #0 [ 204.271873][ T5742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 204.281932][ T5742] Call Trace: [ 204.285215][ T5742] [ 204.288142][ T5742] __dump_stack+0x21/0x24 [ 204.292479][ T5742] dump_stack_lvl+0x110/0x170 [ 204.297173][ T5742] ? __cfi_dump_stack_lvl+0x8/0x8 [ 204.302205][ T5742] ? vfs_write+0x603/0xce0 [ 204.306629][ T5742] ? ksys_write+0x149/0x250 [ 204.311132][ T5742] dump_stack+0x15/0x24 [ 204.315294][ T5742] should_fail_ex+0x3d4/0x520 [ 204.319982][ T5742] should_fail_alloc_page+0x61/0x90 [ 204.325188][ T5742] prepare_alloc_pages+0x148/0x600 [ 204.330304][ T5742] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 204.335510][ T5742] __alloc_pages+0x13a/0x480 [ 204.340114][ T5742] ? alloc_skb_with_frags+0xa8/0x620 [ 204.345404][ T5742] ? __cfi___alloc_pages+0x10/0x10 [ 204.350534][ T5742] ? __alloc_skb+0x2df/0x4b0 [ 204.355128][ T5742] alloc_skb_with_frags+0x20c/0x620 [ 204.360676][ T5742] sock_alloc_send_pskb+0x87f/0x9a0 [ 204.365892][ T5742] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 204.371614][ T5742] ? stack_trace_save+0xa6/0xf0 [ 204.376465][ T5742] ? iov_iter_advance+0x98/0x1b0 [ 204.381408][ T5742] tun_get_user+0xa63/0x3470 [ 204.386003][ T5742] ? _parse_integer+0x2a/0x40 [ 204.390695][ T5742] ? tun_do_read+0x1cf0/0x1cf0 [ 204.395461][ T5742] ? __kasan_check_write+0x14/0x20 [ 204.400576][ T5742] ? ref_tracker_alloc+0x31d/0x4a0 [ 204.405692][ T5742] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 204.411156][ T5742] ? avc_policy_seqno+0x1b/0x70 [ 204.416026][ T5742] ? selinux_file_permission+0x2a5/0x510 [ 204.421679][ T5742] tun_chr_write_iter+0x1fb/0x300 [ 204.426714][ T5742] vfs_write+0x603/0xce0 [ 204.430968][ T5742] ? __cfi_vfs_write+0x10/0x10 [ 204.435818][ T5742] ? __fget_files+0x2d5/0x330 [ 204.440499][ T5742] ? __fdget_pos+0x1f2/0x380 [ 204.445177][ T5742] ? ksys_write+0x71/0x250 [ 204.449601][ T5742] ksys_write+0x149/0x250 [ 204.453932][ T5742] ? __cfi_ksys_write+0x10/0x10 [ 204.458783][ T5742] ? debug_smp_processor_id+0x17/0x20 [ 204.464170][ T5742] __x64_sys_write+0x7b/0x90 [ 204.468762][ T5742] x64_sys_call+0x27b/0x9a0 [ 204.473272][ T5742] do_syscall_64+0x4c/0xa0 [ 204.477704][ T5742] ? clear_bhb_loop+0x30/0x80 [ 204.482382][ T5742] ? clear_bhb_loop+0x30/0x80 [ 204.487062][ T5742] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 204.493050][ T5742] RIP: 0033:0x7efe5bd9c629 [ 204.497495][ T5742] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 204.517108][ T5742] RSP: 002b:00007efe5cbe7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 204.525543][ T5742] RAX: ffffffffffffffda RBX: 00007efe5c015fa0 RCX: 00007efe5bd9c629 [ 204.533522][ T5742] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 204.541497][ T5742] RBP: 00007efe5cbe7090 R08: 0000000000000000 R09: 0000000000000000 [ 204.549476][ T5742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.557448][ T5742] R13: 00007efe5c016038 R14: 00007efe5c015fa0 R15: 00007fffde6b38b8 [ 204.565430][ T5742] [ 204.617675][ T28] audit: type=1400 audit(1771478448.312:141): avc: denied { create } for pid=5724 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 204.646053][ T28] audit: type=1400 audit(1771478448.312:142): avc: denied { write } for pid=5724 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 204.667408][ T28] audit: type=1400 audit(1771478448.312:143): avc: denied { read } for pid=5724 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 204.690861][ T347] À: port 1(macsec0) entered disabled state [ 204.698127][ T347] device bridge_slave_1 left promiscuous mode [ 204.704515][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.712171][ T347] device bridge_slave_0 left promiscuous mode [ 204.719046][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.727827][ T347] device veth0_vlan left promiscuous mode [ 204.854923][ T5749] device syzkaller0 entered promiscuous mode [ 204.878200][ T5724] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.885259][ T5724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.892505][ T5724] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.899536][ T5724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.915571][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.923141][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.961081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.969479][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.995332][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.011694][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.029441][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.036530][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.050795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.071688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.082900][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.089972][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.137517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.154303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.165184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.204555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.228386][ T5789] device syzkaller0 entered promiscuous mode [ 205.237095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.246106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.254620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.262673][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.271134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.279165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.288739][ T5724] device veth0_vlan entered promiscuous mode [ 205.317128][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.329808][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.340116][ T5724] device veth1_macvtap entered promiscuous mode [ 205.351406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.365417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.382218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.447958][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.520174][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.324285][ T28] audit: type=1400 audit(1771478450.022:144): avc: denied { read } for pid=5823 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 206.359558][ T28] audit: type=1400 audit(1771478450.022:145): avc: denied { open } for pid=5823 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 206.429281][ T5830] device syzkaller0 entered promiscuous mode [ 206.440841][ T5835] tap0: tun_chr_ioctl cmd 1074025675 [ 206.447720][ T5835] tap0: persist enabled [ 206.466513][ T5835] tap0: tun_chr_ioctl cmd 1074025675 [ 206.471987][ T5835] tap0: persist enabled [ 206.477467][ T5830] FAULT_INJECTION: forcing a failure. [ 206.477467][ T5830] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 206.490858][ T5823] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.498173][ T5823] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.505401][ T5830] CPU: 0 PID: 5830 Comm: syz.0.1930 Tainted: G W syzkaller #0 [ 206.514342][ T5830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 206.524397][ T5830] Call Trace: [ 206.527760][ T5830] [ 206.530680][ T5830] __dump_stack+0x21/0x24 [ 206.535012][ T5830] dump_stack_lvl+0x110/0x170 [ 206.539683][ T5830] ? __cfi_dump_stack_lvl+0x8/0x8 [ 206.544699][ T5830] ? vfs_write+0x603/0xce0 [ 206.549103][ T5830] ? ksys_write+0x149/0x250 [ 206.553599][ T5830] dump_stack+0x15/0x24 [ 206.557750][ T5830] should_fail_ex+0x3d4/0x520 [ 206.562429][ T5830] should_fail_alloc_page+0x61/0x90 [ 206.567624][ T5830] prepare_alloc_pages+0x148/0x600 [ 206.572734][ T5830] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 206.577931][ T5830] __alloc_pages+0x13a/0x480 [ 206.582521][ T5830] ? alloc_skb_with_frags+0xa8/0x620 [ 206.587804][ T5830] ? __cfi___alloc_pages+0x10/0x10 [ 206.592932][ T5830] ? __alloc_skb+0x2df/0x4b0 [ 206.597543][ T5830] alloc_skb_with_frags+0x20c/0x620 [ 206.602747][ T5830] sock_alloc_send_pskb+0x87f/0x9a0 [ 206.607962][ T5830] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 206.613683][ T5830] ? stack_trace_save+0xa6/0xf0 [ 206.618531][ T5830] ? iov_iter_advance+0x98/0x1b0 [ 206.623472][ T5830] tun_get_user+0xa63/0x3470 [ 206.628064][ T5830] ? _parse_integer+0x2a/0x40 [ 206.632743][ T5830] ? tun_do_read+0x1cf0/0x1cf0 [ 206.637501][ T5830] ? __kasan_check_write+0x14/0x20 [ 206.642606][ T5830] ? ref_tracker_alloc+0x31d/0x4a0 [ 206.647710][ T5830] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 206.653165][ T5830] ? avc_policy_seqno+0x1b/0x70 [ 206.658018][ T5830] ? selinux_file_permission+0x2a5/0x510 [ 206.663647][ T5830] tun_chr_write_iter+0x1fb/0x300 [ 206.668664][ T5830] vfs_write+0x603/0xce0 [ 206.672921][ T5830] ? __cfi_vfs_write+0x10/0x10 [ 206.677692][ T5830] ? __fget_files+0x2d5/0x330 [ 206.682371][ T5830] ? __fdget_pos+0x1f2/0x380 [ 206.687132][ T5830] ? ksys_write+0x71/0x250 [ 206.691559][ T5830] ksys_write+0x149/0x250 [ 206.695897][ T5830] ? __cfi_ksys_write+0x10/0x10 [ 206.700754][ T5830] ? debug_smp_processor_id+0x17/0x20 [ 206.706135][ T5830] __x64_sys_write+0x7b/0x90 [ 206.710724][ T5830] x64_sys_call+0x27b/0x9a0 [ 206.715231][ T5830] do_syscall_64+0x4c/0xa0 [ 206.719647][ T5830] ? clear_bhb_loop+0x30/0x80 [ 206.724321][ T5830] ? clear_bhb_loop+0x30/0x80 [ 206.728991][ T5830] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 206.734885][ T5830] RIP: 0033:0x7f326259c629 [ 206.739294][ T5830] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 206.758896][ T5830] RSP: 002b:00007f326350b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 206.767305][ T5830] RAX: ffffffffffffffda RBX: 00007f3262815fa0 RCX: 00007f326259c629 [ 206.775271][ T5830] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 206.783240][ T5830] RBP: 00007f326350b090 R08: 0000000000000000 R09: 0000000000000000 [ 206.791203][ T5830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.799166][ T5830] R13: 00007f3262816038 R14: 00007f3262815fa0 R15: 00007fff6444e6d8 [ 206.807137][ T5830] [ 206.810922][ T5823] device bridge_slave_0 entered promiscuous mode [ 206.818013][ T5835] tap0: tun_chr_ioctl cmd 2147767520 [ 206.847327][ T5823] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.864677][ T5823] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.895606][ T5823] device bridge_slave_1 entered promiscuous mode [ 207.233279][ T347] device bridge_slave_1 left promiscuous mode [ 207.243530][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.284072][ T347] device bridge_slave_0 left promiscuous mode [ 207.290232][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.315846][ T347] device veth1_macvtap left promiscuous mode [ 207.328878][ T347] device veth0_vlan left promiscuous mode [ 207.671764][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.689622][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.727205][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.761109][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.794003][ T5851] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.801078][ T5851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.938932][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.957258][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.998579][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.033012][ T5851] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.040105][ T5851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.078014][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.114748][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.175168][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.219848][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.319950][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.394858][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.465329][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.521120][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.538292][ T5823] device veth0_vlan entered promiscuous mode [ 208.583908][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.594102][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.629369][ T5823] device veth1_macvtap entered promiscuous mode [ 208.690133][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.707912][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.761070][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.825572][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.858413][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.444799][ T5927] device syzkaller0 entered promiscuous mode [ 209.644337][ T5930] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.659355][ T5930] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.678055][ T5930] device bridge_slave_0 entered promiscuous mode [ 209.696665][ T5930] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.707081][ T5930] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.722315][ T5930] device bridge_slave_1 entered promiscuous mode [ 210.040999][ T5930] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.048086][ T5930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.055402][ T5930] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.062429][ T5930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.157597][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.172119][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.192148][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.211654][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.255502][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.262577][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.297254][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.314159][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.332669][ T959] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.339764][ T959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.350377][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.358632][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.556212][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.565633][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.656507][ T5978] device syzkaller0 entered promiscuous mode [ 210.708561][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.729309][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.756420][ T5930] device veth0_vlan entered promiscuous mode [ 210.802235][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 210.816569][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.851211][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.938073][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.014500][ T347] device bridge_slave_1 left promiscuous mode [ 211.020671][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.082457][ T347] device bridge_slave_0 left promiscuous mode [ 211.110258][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.176244][ T347] device veth1_macvtap left promiscuous mode [ 211.182447][ T347] device veth0_vlan left promiscuous mode [ 211.398854][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 211.407182][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.417698][ T5930] device veth1_macvtap entered promiscuous mode [ 212.001285][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.011699][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.020421][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.031373][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.129179][ T6014] device syzkaller0 entered promiscuous mode [ 212.751577][ T6037] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.758755][ T6037] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.766802][ T6037] device bridge_slave_0 entered promiscuous mode [ 212.776729][ T6037] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.783876][ T6037] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.791515][ T6037] device bridge_slave_1 entered promiscuous mode [ 212.887901][ T6037] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.894984][ T6037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.902249][ T6037] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.909304][ T6037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.937833][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.945607][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.954306][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.986184][ T6037] device veth0_vlan entered promiscuous mode [ 212.995106][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.003552][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.012577][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.020235][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.048047][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.074781][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.092500][ T6037] device veth1_macvtap entered promiscuous mode [ 213.102402][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.124672][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.139891][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.150443][ T347] device bridge_slave_1 left promiscuous mode [ 213.156660][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.171129][ T347] device bridge_slave_0 left promiscuous mode [ 213.177516][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.185602][ T347] device veth1_macvtap left promiscuous mode [ 213.192879][ T347] device veth0_vlan left promiscuous mode [ 213.847748][ T6076] FAULT_INJECTION: forcing a failure. [ 213.847748][ T6076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.866964][ T6072] device syzkaller0 entered promiscuous mode [ 213.882448][ T6076] CPU: 1 PID: 6076 Comm: syz.3.2001 Tainted: G W syzkaller #0 [ 213.891331][ T6076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 213.901384][ T6076] Call Trace: [ 213.904665][ T6076] [ 213.907595][ T6076] __dump_stack+0x21/0x24 [ 213.911934][ T6076] dump_stack_lvl+0x110/0x170 [ 213.916617][ T6076] ? __cfi_dump_stack_lvl+0x8/0x8 [ 213.921734][ T6076] ? __cfi_gfp_zone+0x10/0x10 [ 213.926412][ T6076] dump_stack+0x15/0x24 [ 213.930672][ T6076] should_fail_ex+0x3d4/0x520 [ 213.935355][ T6076] should_fail+0xb/0x10 [ 213.939518][ T6076] should_fail_usercopy+0x1a/0x20 [ 213.944544][ T6076] _copy_from_iter+0x196/0x1010 [ 213.949402][ T6076] ? __cfi_gfp_zone+0x10/0x10 [ 213.954085][ T6076] ? __cfi__copy_from_iter+0x10/0x10 [ 213.959375][ T6076] ? __alloc_pages+0x1d9/0x480 [ 213.964148][ T6076] ? __cfi___alloc_pages+0x10/0x10 [ 213.969277][ T6076] ? __kasan_check_write+0x14/0x20 [ 213.974395][ T6076] ? _raw_spin_lock_irq+0x95/0xf0 [ 213.979424][ T6076] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 213.984975][ T6076] copy_page_from_iter+0x1d2/0x2b0 [ 213.990106][ T6076] pipe_write+0x7d8/0x1970 [ 213.994536][ T6076] ? __cfi_pipe_write+0x10/0x10 [ 213.999395][ T6076] ? selinux_file_permission+0x3ef/0x510 [ 214.005035][ T6076] ? fsnotify_perm+0x67/0x5b0 [ 214.009718][ T6076] ? security_file_permission+0x8a/0xb0 [ 214.015279][ T6076] vfs_write+0x603/0xce0 [ 214.019525][ T6076] ? __cfi_vfs_write+0x10/0x10 [ 214.024310][ T6076] ? __fget_files+0x2d5/0x330 [ 214.028994][ T6076] ? __fdget_pos+0x1f2/0x380 [ 214.033585][ T6076] ? ksys_write+0x71/0x250 [ 214.038005][ T6076] ksys_write+0x149/0x250 [ 214.042341][ T6076] ? __cfi_ksys_write+0x10/0x10 [ 214.047206][ T6076] ? debug_smp_processor_id+0x17/0x20 [ 214.052588][ T6076] __x64_sys_write+0x7b/0x90 [ 214.057182][ T6076] x64_sys_call+0x27b/0x9a0 [ 214.061693][ T6076] do_syscall_64+0x4c/0xa0 [ 214.066114][ T6076] ? clear_bhb_loop+0x30/0x80 [ 214.071227][ T6076] ? clear_bhb_loop+0x30/0x80 [ 214.075911][ T6076] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 214.081814][ T6076] RIP: 0033:0x7f519979c629 [ 214.086240][ T6076] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 214.105854][ T6076] RSP: 002b:00007f519a706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.114283][ T6076] RAX: ffffffffffffffda RBX: 00007f5199a15fa0 RCX: 00007f519979c629 [ 214.122267][ T6076] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 214.130245][ T6076] RBP: 00007f519a706090 R08: 0000000000000000 R09: 0000000000000000 [ 214.138228][ T6076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 214.146196][ T6076] R13: 00007f5199a16038 R14: 00007f5199a15fa0 R15: 00007ffd0a1536b8 [ 214.154165][ T6076] [ 214.693735][ T347] device bridge_slave_1 left promiscuous mode [ 214.703879][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.723912][ T347] device bridge_slave_0 left promiscuous mode [ 214.730099][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.744692][ T347] device veth1_macvtap left promiscuous mode [ 214.764933][ T347] device veth0_vlan left promiscuous mode [ 215.095286][ T6078] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.102315][ T6078] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.109938][ T6078] device bridge_slave_0 entered promiscuous mode [ 215.130007][ T6102] device syzkaller0 entered promiscuous mode [ 215.136798][ T6078] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.144227][ T6078] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.153351][ T6078] device bridge_slave_1 entered promiscuous mode [ 215.227923][ T6108] device syzkaller0 entered promiscuous mode [ 215.300223][ T6108] FAULT_INJECTION: forcing a failure. [ 215.300223][ T6108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.326346][ T6108] CPU: 1 PID: 6108 Comm: syz.0.2011 Tainted: G W syzkaller #0 [ 215.335226][ T6108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 215.345281][ T6108] Call Trace: [ 215.348561][ T6108] [ 215.351482][ T6108] __dump_stack+0x21/0x24 [ 215.355815][ T6108] dump_stack_lvl+0x110/0x170 [ 215.360490][ T6108] ? __cfi_dump_stack_lvl+0x8/0x8 [ 215.365516][ T6108] dump_stack+0x15/0x24 [ 215.369678][ T6108] should_fail_ex+0x3d4/0x520 [ 215.374362][ T6108] should_fail+0xb/0x10 [ 215.378517][ T6108] should_fail_usercopy+0x1a/0x20 [ 215.383536][ T6108] _copy_from_iter+0x196/0x1010 [ 215.388382][ T6108] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 215.394539][ T6108] ? __cfi__copy_from_iter+0x10/0x10 [ 215.399822][ T6108] ? stack_trace_save+0xa6/0xf0 [ 215.404672][ T6108] ? __stack_depot_save+0x36/0x480 [ 215.409778][ T6108] tun_get_user+0x424/0x3470 [ 215.414362][ T6108] ? _parse_integer+0x2a/0x40 [ 215.419046][ T6108] ? tun_do_read+0x1cf0/0x1cf0 [ 215.423822][ T6108] ? __kasan_check_write+0x14/0x20 [ 215.428940][ T6108] ? ref_tracker_alloc+0x31d/0x4a0 [ 215.434052][ T6108] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 215.439518][ T6108] ? avc_policy_seqno+0x1b/0x70 [ 215.444375][ T6108] ? selinux_file_permission+0x2a5/0x510 [ 215.450011][ T6108] tun_chr_write_iter+0x1fb/0x300 [ 215.455041][ T6108] vfs_write+0x603/0xce0 [ 215.459281][ T6108] ? __cfi_vfs_write+0x10/0x10 [ 215.464037][ T6108] ? __fget_files+0x2d5/0x330 [ 215.468712][ T6108] ? __fdget_pos+0x1f2/0x380 [ 215.473297][ T6108] ? ksys_write+0x71/0x250 [ 215.477707][ T6108] ksys_write+0x149/0x250 [ 215.482032][ T6108] ? __cfi_ksys_write+0x10/0x10 [ 215.486878][ T6108] ? debug_smp_processor_id+0x17/0x20 [ 215.492250][ T6108] __x64_sys_write+0x7b/0x90 [ 215.496830][ T6108] x64_sys_call+0x27b/0x9a0 [ 215.501416][ T6108] do_syscall_64+0x4c/0xa0 [ 215.505831][ T6108] ? clear_bhb_loop+0x30/0x80 [ 215.510503][ T6108] ? clear_bhb_loop+0x30/0x80 [ 215.515533][ T6108] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 215.521436][ T6108] RIP: 0033:0x7f326259c629 [ 215.525848][ T6108] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 215.545448][ T6108] RSP: 002b:00007f326350b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 215.553866][ T6108] RAX: ffffffffffffffda RBX: 00007f3262815fa0 RCX: 00007f326259c629 [ 215.561831][ T6108] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 215.569795][ T6108] RBP: 00007f326350b090 R08: 0000000000000000 R09: 0000000000000000 [ 215.577761][ T6108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.585728][ T6108] R13: 00007f3262816038 R14: 00007f3262815fa0 R15: 00007fff6444e6d8 [ 215.593712][ T6108] [ 215.783783][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.791375][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.802390][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.810951][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.820862][ T5842] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.827936][ T5842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.858169][ T6078] device veth0_vlan entered promiscuous mode [ 215.870761][ T6078] device veth1_macvtap entered promiscuous mode [ 215.885836][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.895361][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.904221][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.912407][ T5842] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.919462][ T5842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.928549][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.936936][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.945369][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.954115][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.962905][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.971610][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.980741][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.988863][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.997250][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.005711][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.014673][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.133229][ T6126] device syzkaller0 entered promiscuous mode [ 216.224301][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.239970][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.300287][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.360577][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.425620][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.520416][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.344231][ T959] device bridge_slave_1 left promiscuous mode [ 217.350342][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.357921][ T959] device bridge_slave_0 left promiscuous mode [ 217.364104][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.371823][ T959] device veth1_macvtap left promiscuous mode [ 217.377910][ T959] device veth0_vlan left promiscuous mode [ 217.510972][ T6148] device syzkaller0 entered promiscuous mode [ 217.592693][ T6163] device syzkaller0 entered promiscuous mode [ 217.991906][ T6166] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.999117][ T6166] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.007052][ T6166] device bridge_slave_0 entered promiscuous mode [ 218.014295][ T6166] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.021364][ T6166] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.029342][ T6166] device bridge_slave_1 entered promiscuous mode [ 218.360412][ T6193] device syzkaller0 entered promiscuous mode [ 218.566710][ T6166] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.573792][ T6166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.581061][ T6166] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.588105][ T6166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.946741][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.961654][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.994237][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.100775][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.194421][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.258331][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.267317][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.286023][ T6223] device syzkaller0 entered promiscuous mode [ 219.305535][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.325241][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.334560][ T6166] device veth0_vlan entered promiscuous mode [ 219.345828][ T6223] FAULT_INJECTION: forcing a failure. [ 219.345828][ T6223] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.364778][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.373042][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.380605][ T6223] CPU: 0 PID: 6223 Comm: syz.3.2045 Tainted: G W syzkaller #0 [ 219.389460][ T6223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 219.399515][ T6223] Call Trace: [ 219.402791][ T6223] [ 219.405711][ T6223] __dump_stack+0x21/0x24 [ 219.410047][ T6223] dump_stack_lvl+0x110/0x170 [ 219.414722][ T6223] ? __cfi_dump_stack_lvl+0x8/0x8 [ 219.419750][ T6223] ? vfs_write+0x603/0xce0 [ 219.424171][ T6223] ? ksys_write+0x149/0x250 [ 219.428680][ T6223] dump_stack+0x15/0x24 [ 219.432833][ T6223] should_fail_ex+0x3d4/0x520 [ 219.437515][ T6223] should_fail_alloc_page+0x61/0x90 [ 219.442712][ T6223] prepare_alloc_pages+0x148/0x600 [ 219.447824][ T6223] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 219.453020][ T6223] __alloc_pages+0x13a/0x480 [ 219.457608][ T6223] ? alloc_skb_with_frags+0xa8/0x620 [ 219.462884][ T6223] ? __cfi___alloc_pages+0x10/0x10 [ 219.467993][ T6223] ? __alloc_skb+0x2df/0x4b0 [ 219.472575][ T6223] alloc_skb_with_frags+0x20c/0x620 [ 219.477767][ T6223] sock_alloc_send_pskb+0x87f/0x9a0 [ 219.482963][ T6223] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 219.488675][ T6223] ? stack_trace_save+0xa6/0xf0 [ 219.493518][ T6223] ? iov_iter_advance+0x98/0x1b0 [ 219.498448][ T6223] tun_get_user+0xa63/0x3470 [ 219.503031][ T6223] ? _parse_integer+0x2a/0x40 [ 219.507703][ T6223] ? tun_do_read+0x1cf0/0x1cf0 [ 219.512459][ T6223] ? __kasan_check_write+0x14/0x20 [ 219.517557][ T6223] ? ref_tracker_alloc+0x31d/0x4a0 [ 219.522661][ T6223] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 219.528123][ T6223] ? avc_policy_seqno+0x1b/0x70 [ 219.532979][ T6223] ? selinux_file_permission+0x2a5/0x510 [ 219.538602][ T6223] tun_chr_write_iter+0x1fb/0x300 [ 219.543621][ T6223] vfs_write+0x603/0xce0 [ 219.547854][ T6223] ? __cfi_vfs_write+0x10/0x10 [ 219.552632][ T6223] ? __fget_files+0x2d5/0x330 [ 219.557301][ T6223] ? __fdget_pos+0x1f2/0x380 [ 219.561965][ T6223] ? ksys_write+0x71/0x250 [ 219.566373][ T6223] ksys_write+0x149/0x250 [ 219.570691][ T6223] ? __cfi_ksys_write+0x10/0x10 [ 219.575529][ T6223] ? debug_smp_processor_id+0x17/0x20 [ 219.580897][ T6223] __x64_sys_write+0x7b/0x90 [ 219.585475][ T6223] x64_sys_call+0x27b/0x9a0 [ 219.590230][ T6223] do_syscall_64+0x4c/0xa0 [ 219.594641][ T6223] ? clear_bhb_loop+0x30/0x80 [ 219.599308][ T6223] ? clear_bhb_loop+0x30/0x80 [ 219.603972][ T6223] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 219.609859][ T6223] RIP: 0033:0x7f519979c629 [ 219.614271][ T6223] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 219.633884][ T6223] RSP: 002b:00007f519a706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 219.642292][ T6223] RAX: ffffffffffffffda RBX: 00007f5199a15fa0 RCX: 00007f519979c629 [ 219.650256][ T6223] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 219.658217][ T6223] RBP: 00007f519a706090 R08: 0000000000000000 R09: 0000000000000000 [ 219.666176][ T6223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.674143][ T6223] R13: 00007f5199a16038 R14: 00007f5199a15fa0 R15: 00007ffd0a1536b8 [ 219.682109][ T6223] [ 219.731693][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.740094][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.749812][ T6166] device veth1_macvtap entered promiscuous mode [ 219.771339][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.785751][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.804105][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.824012][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.849601][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.882808][ T6247] device syzkaller0 entered promiscuous mode [ 220.686831][ T6254] device syzkaller0 entered promiscuous mode [ 220.743149][ T6259] device syzkaller0 entered promiscuous mode [ 220.788077][ T5842] device bridge_slave_1 left promiscuous mode [ 220.804459][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.847257][ T5842] device bridge_slave_0 left promiscuous mode [ 220.863563][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.878928][ T5842] device veth1_macvtap left promiscuous mode [ 220.945190][ T5842] device veth0_vlan left promiscuous mode [ 221.164082][ T6262] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.180160][ T6262] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.194585][ T6262] device bridge_slave_0 entered promiscuous mode [ 221.227503][ T28] audit: type=1400 audit(1771478464.922:146): avc: denied { ioctl } for pid=6281 comm="syz.1.2060" path="pid:[4026532288]" dev="nsfs" ino=4026532288 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 221.262677][ T6262] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.274719][ T6262] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.282404][ T6262] device bridge_slave_1 entered promiscuous mode [ 221.314402][ T6285] device syzkaller0 entered promiscuous mode [ 221.323504][ T6286] FAULT_INJECTION: forcing a failure. [ 221.323504][ T6286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 221.351806][ T6286] CPU: 1 PID: 6286 Comm: syz.4.2061 Tainted: G W syzkaller #0 [ 221.360685][ T6286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 221.370741][ T6286] Call Trace: [ 221.374016][ T6286] [ 221.376949][ T6286] __dump_stack+0x21/0x24 [ 221.381281][ T6286] dump_stack_lvl+0x110/0x170 [ 221.385962][ T6286] ? __cfi_dump_stack_lvl+0x8/0x8 [ 221.390981][ T6286] ? try_charge_memcg+0x269/0x1610 [ 221.396192][ T6286] dump_stack+0x15/0x24 [ 221.400356][ T6286] should_fail_ex+0x3d4/0x520 [ 221.405031][ T6286] should_fail_alloc_page+0x61/0x90 [ 221.410229][ T6286] prepare_alloc_pages+0x148/0x600 [ 221.415365][ T6286] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 221.420565][ T6286] __alloc_pages+0x13a/0x480 [ 221.425245][ T6286] ? __cfi___alloc_pages+0x10/0x10 [ 221.430442][ T6286] ? memcg_rstat_updated+0x56/0x110 [ 221.435654][ T6286] ? folio_add_lru+0x26a/0x480 [ 221.440527][ T6286] __folio_alloc+0x12/0x40 [ 221.444949][ T6286] wp_page_copy+0x27d/0x15a0 [ 221.449551][ T6286] ? fault_dirty_shared_page+0x310/0x310 [ 221.455194][ T6286] ? vm_normal_page+0x1eb/0x200 [ 221.460049][ T6286] do_wp_page+0x9f2/0xfc0 [ 221.464385][ T6286] handle_mm_fault+0x1124/0x26c0 [ 221.469370][ T6286] ? __cfi_handle_mm_fault+0x10/0x10 [ 221.474652][ T6286] ? down_read_trylock+0x27f/0x660 [ 221.479769][ T6286] ? lock_mm_and_find_vma+0x9e/0x320 [ 221.485059][ T6286] ? do_user_addr_fault+0x2ee/0x1050 [ 221.490348][ T6286] do_user_addr_fault+0x63b/0x1050 [ 221.495470][ T6286] exc_page_fault+0x51/0xb0 [ 221.499993][ T6286] asm_exc_page_fault+0x27/0x30 [ 221.504847][ T6286] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 221.511441][ T6286] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 221.531129][ T6286] RSP: 0018:ffffc900010af680 EFLAGS: 00050206 [ 221.537192][ T6286] RAX: ffffffff82663501 RBX: 00000000000101d0 RCX: 00000000000045d0 [ 221.545153][ T6286] RDX: 00000000000101d0 RSI: ffff88811142bcc8 RDI: 000020000000c000 [ 221.553116][ T6286] RBP: ffffc900010af6b0 R08: ffff888111430297 R09: 1ffff11022286052 [ 221.561081][ T6286] R10: dffffc0000000000 R11: ffffed1022286053 R12: 00007ffffffeee30 [ 221.569046][ T6286] R13: 0000000000010100 R14: 0000200000000400 R15: ffff8881114200c8 [ 221.577012][ T6286] ? copyout+0x51/0xa0 [ 221.581080][ T6286] ? copyout+0x82/0xa0 [ 221.585140][ T6286] _copy_to_iter+0x3e9/0xea0 [ 221.589730][ T6286] ? __kasan_check_write+0x14/0x20 [ 221.594835][ T6286] ? __cfi__copy_to_iter+0x10/0x10 [ 221.599944][ T6286] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 221.605747][ T6286] ? __kasan_check_read+0x11/0x20 [ 221.610763][ T6286] ? __check_object_size+0x45a/0x600 [ 221.616044][ T6286] simple_copy_to_iter+0x50/0x70 [ 221.620982][ T6286] __skb_datagram_iter+0xf1/0x730 [ 221.626006][ T6286] ? tsk_importance+0x150/0x150 [ 221.630876][ T6286] ? __cfi_simple_copy_to_iter+0x10/0x10 [ 221.636512][ T6286] skb_copy_datagram_iter+0x40/0x150 [ 221.641806][ T6286] tipc_recvstream+0x6fe/0xe80 [ 221.646587][ T6286] ? __cfi_tipc_recvstream+0x10/0x10 [ 221.651874][ T6286] ____sys_recvmsg+0x2d9/0x5f0 [ 221.656646][ T6286] ? __sys_recvmsg_sock+0x50/0x50 [ 221.661678][ T6286] ? import_iovec+0x7c/0xb0 [ 221.666182][ T6286] ___sys_recvmsg+0x212/0x590 [ 221.670866][ T6286] ? __sys_recvmsg+0x280/0x280 [ 221.675638][ T6286] ? __fget_files+0x2d5/0x330 [ 221.680321][ T6286] ? __fdget+0x19c/0x220 [ 221.684560][ T6286] __x64_sys_recvmsg+0x202/0x2d0 [ 221.689586][ T6286] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 221.695049][ T6286] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 221.701116][ T6286] x64_sys_call+0x75/0x9a0 [ 221.705527][ T6286] do_syscall_64+0x4c/0xa0 [ 221.709947][ T6286] ? clear_bhb_loop+0x30/0x80 [ 221.714624][ T6286] ? clear_bhb_loop+0x30/0x80 [ 221.719302][ T6286] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 221.725193][ T6286] RIP: 0033:0x7efe5bd9c629 [ 221.729612][ T6286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 221.749218][ T6286] RSP: 002b:00007efe5cbe7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 221.757633][ T6286] RAX: ffffffffffffffda RBX: 00007efe5c015fa0 RCX: 00007efe5bd9c629 [ 221.765599][ T6286] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000003 [ 221.773565][ T6286] RBP: 00007efe5cbe7090 R08: 0000000000000000 R09: 0000000000000000 [ 221.781532][ T6286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 221.789495][ T6286] R13: 00007efe5c016038 R14: 00007efe5c015fa0 R15: 00007fffde6b38b8 [ 221.797470][ T6286] [ 221.883640][ T6262] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.890736][ T6262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.898021][ T6262] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.905054][ T6262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.940441][ T6294] device syzkaller0 entered promiscuous mode [ 222.069765][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.098476][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.107059][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.168395][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.209664][ T5842] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.216763][ T5842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.253877][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.262138][ T5842] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.269212][ T5842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.279240][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.287464][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.295522][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.312673][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.360723][ T6320] device syzkaller0 entered promiscuous mode [ 222.388449][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.414241][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.490234][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.513153][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.555557][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.578338][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.651439][ T6262] device veth0_vlan entered promiscuous mode [ 222.690379][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.700713][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.710663][ T6262] device veth1_macvtap entered promiscuous mode [ 222.793906][ T6343] device syzkaller0 entered promiscuous mode [ 222.849425][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.859220][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.879467][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.942960][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.027522][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.270036][ T28] audit: type=1400 audit(1771478466.962:147): avc: denied { create } for pid=6357 comm="syz.3.2087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 224.087638][ T6363] device syzkaller0 entered promiscuous mode [ 224.247297][ T5841] device bridge_slave_1 left promiscuous mode [ 224.253538][ T5841] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.321192][ T5841] device bridge_slave_0 left promiscuous mode [ 224.369170][ T5841] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.433981][ T5841] device veth1_macvtap left promiscuous mode [ 224.482285][ T5841] device veth0_vlan left promiscuous mode [ 225.394481][ T6375] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.447045][ T6375] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.519638][ T6375] device bridge_slave_0 entered promiscuous mode [ 225.583606][ T6375] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.600918][ T6375] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.615996][ T6375] device bridge_slave_1 entered promiscuous mode [ 225.829414][ T6375] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.836500][ T6375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.843794][ T6375] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.850817][ T6375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.993256][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.002354][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.011084][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.020370][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.028529][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.095903][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 226.104846][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.204735][ T6427] device syzkaller0 entered promiscuous mode [ 226.236331][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.245331][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.263438][ T6375] device veth0_vlan entered promiscuous mode [ 226.290153][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.298136][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.375044][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.446171][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.501630][ T6375] device veth1_macvtap entered promiscuous mode [ 226.537741][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 226.564063][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.643645][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.725656][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.821327][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.864305][ T959] device bridge_slave_1 left promiscuous mode [ 227.870416][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.877897][ T959] device bridge_slave_0 left promiscuous mode [ 227.884105][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.891719][ T959] device veth1_macvtap left promiscuous mode [ 227.897771][ T959] device veth0_vlan left promiscuous mode [ 228.916865][ T6473] device syzkaller0 entered promiscuous mode [ 228.952219][ T6466] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.996978][ T6466] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.004509][ T6466] device bridge_slave_0 entered promiscuous mode [ 229.106668][ T6466] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.126328][ T6466] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.229038][ T6466] device bridge_slave_1 entered promiscuous mode [ 230.052770][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.069883][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.098786][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.124472][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.163965][ T5841] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.171054][ T5841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.178640][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.224417][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.253237][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.264179][ T5841] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.271246][ T5841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.357651][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.371149][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.379297][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.387486][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.397599][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.407109][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.423106][ T6466] device veth0_vlan entered promiscuous mode [ 230.439927][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.450383][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.473543][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.481079][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.563978][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.572243][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.596601][ T6466] device veth1_macvtap entered promiscuous mode [ 230.612677][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.621535][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.630933][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.639474][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.648244][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.666589][ T6536] device syzkaller0 entered promiscuous mode [ 231.214142][ T5841] device bridge_slave_1 left promiscuous mode [ 231.220310][ T5841] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.228743][ T5841] device bridge_slave_0 left promiscuous mode [ 231.234972][ T5841] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.242762][ T5841] device veth1_macvtap left promiscuous mode [ 231.248800][ T5841] device veth0_vlan left promiscuous mode [ 232.217999][ T6559] device syzkaller0 entered promiscuous mode [ 233.112135][ T6563] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.119246][ T6563] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.129829][ T6563] device bridge_slave_0 entered promiscuous mode [ 233.137420][ T6563] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.144535][ T6563] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.152037][ T6563] device bridge_slave_1 entered promiscuous mode [ 233.199021][ T6589] FAULT_INJECTION: forcing a failure. [ 233.199021][ T6589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.213096][ T6589] CPU: 1 PID: 6589 Comm: syz.0.2155 Tainted: G W syzkaller #0 [ 233.221960][ T6589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 233.232028][ T6589] Call Trace: [ 233.235312][ T6589] [ 233.238244][ T6589] __dump_stack+0x21/0x24 [ 233.238849][ T6587] device syzkaller0 entered promiscuous mode [ 233.242672][ T6589] dump_stack_lvl+0x110/0x170 [ 233.242697][ T6589] ? __cfi_dump_stack_lvl+0x8/0x8 [ 233.258332][ T6589] dump_stack+0x15/0x24 [ 233.262495][ T6589] should_fail_ex+0x3d4/0x520 [ 233.267180][ T6589] should_fail+0xb/0x10 [ 233.271353][ T6589] should_fail_usercopy+0x1a/0x20 [ 233.276403][ T6589] _copy_to_user+0x1e/0x90 [ 233.280844][ T6589] bpf_verifier_vlog+0x179/0x390 [ 233.285797][ T6589] btf_verifier_log+0x1f2/0x2b0 [ 233.290663][ T6589] ? __btf_verifier_log+0xdf/0x130 [ 233.295782][ T6589] ? btf_find_kptr+0xc70/0xc70 [ 233.300542][ T6589] btf_ref_type_log+0x41/0x60 [ 233.305212][ T6589] __btf_verifier_log_type+0x56b/0x7e0 [ 233.310661][ T6589] ? btf_int_show+0x2960/0x2960 [ 233.315558][ T6589] ? __cfi_btf_sec_info_cmp+0x10/0x10 [ 233.320920][ T6589] btf_ref_type_check_meta+0x7a/0x460 [ 233.326286][ T6589] btf_check_all_metas+0x38a/0xad0 [ 233.331382][ T6589] ? __btf_verifier_log+0xdf/0x130 [ 233.336560][ T6589] btf_parse_type_sec+0xf8/0x1920 [ 233.341583][ T6589] ? btf_verifier_log+0x2b0/0x2b0 [ 233.346613][ T6589] ? btf_parse_hdr+0x1f0/0x7f0 [ 233.351369][ T6589] ? memcpy+0x56/0x70 [ 233.355338][ T6589] ? btf_parse_hdr+0x60c/0x7f0 [ 233.360085][ T6589] ? btf_parse_str_sec+0x224/0x2c0 [ 233.365183][ T6589] btf_new_fd+0x43a/0x7d0 [ 233.369561][ T6589] bpf_btf_load+0x6f/0x90 [ 233.373872][ T6589] __sys_bpf+0x5d5/0x850 [ 233.378100][ T6589] ? bpf_link_show_fdinfo+0x330/0x330 [ 233.383457][ T6589] ? __cfi_ksys_write+0x10/0x10 [ 233.388310][ T6589] ? do_user_addr_fault+0x9ac/0x1050 [ 233.393581][ T6589] ? debug_smp_processor_id+0x17/0x20 [ 233.398934][ T6589] __x64_sys_bpf+0x7c/0x90 [ 233.403337][ T6589] x64_sys_call+0x488/0x9a0 [ 233.407826][ T6589] do_syscall_64+0x4c/0xa0 [ 233.412225][ T6589] ? clear_bhb_loop+0x30/0x80 [ 233.416881][ T6589] ? clear_bhb_loop+0x30/0x80 [ 233.421542][ T6589] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 233.427421][ T6589] RIP: 0033:0x7f326259c629 [ 233.431822][ T6589] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 233.451408][ T6589] RSP: 002b:00007f326350b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 233.459813][ T6589] RAX: ffffffffffffffda RBX: 00007f3262815fa0 RCX: 00007f326259c629 [ 233.467766][ T6589] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 233.475721][ T6589] RBP: 00007f326350b090 R08: 0000000000000000 R09: 0000000000000000 [ 233.483673][ T6589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.491625][ T6589] R13: 00007f3262816038 R14: 00007f3262815fa0 R15: 00007fff6444e6d8 [ 233.499592][ T6589] [ 233.810425][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.818421][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.947812][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.982898][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.056251][ T5851] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.063322][ T5851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.104368][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.145145][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.176481][ T5851] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.183577][ T5851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.227479][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.260753][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.289856][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.317414][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.375602][ T6620] device syzkaller0 entered promiscuous mode [ 234.404218][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.412552][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.421994][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.430787][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.440076][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.448519][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.466681][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.512441][ T6563] device veth0_vlan entered promiscuous mode [ 234.557197][ T6563] device veth1_macvtap entered promiscuous mode [ 234.585760][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 234.608567][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.639417][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 234.671897][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.680440][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.689421][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.699490][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.788305][ T6635] device syzkaller0 entered promiscuous mode [ 235.574189][ T959] device bridge_slave_1 left promiscuous mode [ 235.580295][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.587932][ T959] device bridge_slave_0 left promiscuous mode [ 235.594148][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.601900][ T959] device veth1_macvtap left promiscuous mode [ 235.608057][ T959] device veth0_vlan left promiscuous mode [ 235.999069][ T6649] device syzkaller0 entered promiscuous mode [ 236.235893][ T6657] device sit0 left promiscuous mode [ 236.278575][ T6655] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.322829][ T6655] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.391674][ T6655] device bridge_slave_0 entered promiscuous mode [ 236.475306][ T6655] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.482362][ T6655] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.489882][ T6655] device bridge_slave_1 entered promiscuous mode [ 236.504371][ T6657] device sit0 entered promiscuous mode [ 236.762568][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.771046][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.832367][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.867729][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.893649][ T5851] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.900763][ T5851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.910283][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.919850][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.928690][ T5851] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.935783][ T5851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.943404][ T5851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.072010][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.084940][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.093010][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.102329][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.110554][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.119390][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.131305][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.144082][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.162554][ T6655] device veth0_vlan entered promiscuous mode [ 237.176466][ T6655] device veth1_macvtap entered promiscuous mode [ 237.206833][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.234408][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.290549][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.351785][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.418342][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.478525][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.543523][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.605819][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.667180][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.702779][ T6688] device syzkaller0 entered promiscuous mode [ 237.721562][ T6697] FAULT_INJECTION: forcing a failure. [ 237.721562][ T6697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 237.738405][ T6697] CPU: 0 PID: 6697 Comm: syz.1.2182 Tainted: G W syzkaller #0 [ 237.747271][ T6697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 237.757338][ T6697] Call Trace: [ 237.760619][ T6697] [ 237.763544][ T6697] __dump_stack+0x21/0x24 [ 237.767883][ T6697] dump_stack_lvl+0x110/0x170 [ 237.772646][ T6697] ? __cfi_dump_stack_lvl+0x8/0x8 [ 237.777687][ T6697] dump_stack+0x15/0x24 [ 237.781846][ T6697] should_fail_ex+0x3d4/0x520 [ 237.786531][ T6697] should_fail+0xb/0x10 [ 237.790696][ T6697] should_fail_usercopy+0x1a/0x20 [ 237.795734][ T6697] copyin+0x20/0xa0 [ 237.799533][ T6697] _copy_from_iter+0x3e2/0x1010 [ 237.804366][ T6697] ? __kasan_check_write+0x14/0x20 [ 237.809462][ T6697] ? __cfi__copy_from_iter+0x10/0x10 [ 237.814732][ T6697] ? __check_object_size+0x45a/0x600 [ 237.820005][ T6697] skb_copy_datagram_from_iter+0xf7/0x6b0 [ 237.825708][ T6697] ? is_bpf_text_address+0x177/0x190 [ 237.830980][ T6697] ? skb_put+0x10e/0x1f0 [ 237.835207][ T6697] unix_stream_sendmsg+0x4d5/0xa80 [ 237.840310][ T6697] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 237.846455][ T6697] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 237.852074][ T6697] ? stack_trace_save+0xa6/0xf0 [ 237.856909][ T6697] ? __stack_depot_save+0x36/0x480 [ 237.862006][ T6697] ? security_socket_sendmsg+0x93/0xb0 [ 237.867450][ T6697] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 237.873074][ T6697] ____sys_sendmsg+0x5cc/0x990 [ 237.877825][ T6697] ? __sys_sendmsg_sock+0x40/0x40 [ 237.882837][ T6697] ? import_iovec+0x7c/0xb0 [ 237.887326][ T6697] ___sys_sendmsg+0x2a2/0x360 [ 237.891993][ T6697] ? __sys_sendmsg+0x290/0x290 [ 237.896742][ T6697] ? __kasan_check_write+0x14/0x20 [ 237.901838][ T6697] ? proc_fail_nth_write+0x180/0x200 [ 237.907110][ T6697] ? vfs_write+0xa2c/0xce0 [ 237.911509][ T6697] ? __fdget+0x19c/0x220 [ 237.915735][ T6697] __x64_sys_sendmsg+0x205/0x2d0 [ 237.920659][ T6697] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 237.926104][ T6697] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 237.932168][ T6697] x64_sys_call+0x171/0x9a0 [ 237.936660][ T6697] do_syscall_64+0x4c/0xa0 [ 237.941065][ T6697] ? clear_bhb_loop+0x30/0x80 [ 237.945723][ T6697] ? clear_bhb_loop+0x30/0x80 [ 237.950381][ T6697] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 237.956260][ T6697] RIP: 0033:0x7f61ff79c629 [ 237.960655][ T6697] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 237.980252][ T6697] RSP: 002b:00007f6200637028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 237.988647][ T6697] RAX: ffffffffffffffda RBX: 00007f61ffa15fa0 RCX: 00007f61ff79c629 [ 237.996687][ T6697] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000005 [ 238.004640][ T6697] RBP: 00007f6200637090 R08: 0000000000000000 R09: 0000000000000000 [ 238.012591][ T6697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.020549][ T6697] R13: 00007f61ffa16038 R14: 00007f61ffa15fa0 R15: 00007ffc76eb29b8 [ 238.028536][ T6697] [ 238.115151][ T6701] device syzkaller0 entered promiscuous mode [ 238.944186][ T959] device bridge_slave_1 left promiscuous mode [ 238.950289][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.957829][ T959] device bridge_slave_0 left promiscuous mode [ 238.963997][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.971879][ T959] device veth1_macvtap left promiscuous mode [ 238.977973][ T959] device veth0_vlan left promiscuous mode [ 239.459552][ T6717] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.466666][ T6717] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.474359][ T6717] device bridge_slave_0 entered promiscuous mode [ 239.504219][ T6717] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.511338][ T6717] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.518728][ T6717] device bridge_slave_1 entered promiscuous mode [ 239.763593][ T6717] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.770672][ T6717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.777956][ T6717] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.784992][ T6717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.013343][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.034895][ T5841] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.042342][ T5841] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.057950][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.075790][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.082883][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.092867][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.101221][ T959] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.108297][ T959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.129813][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.170613][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.270306][ T6754] device syzkaller0 entered promiscuous mode [ 240.286465][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.295344][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.303425][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.312256][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.349479][ T6717] device veth0_vlan entered promiscuous mode [ 240.398657][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.414656][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.444349][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.451850][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.469249][ T6717] device veth1_macvtap entered promiscuous mode [ 240.480051][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.488734][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.497049][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.510162][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.519498][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.538915][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.547287][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.784411][ T5851] device bridge_slave_1 left promiscuous mode [ 241.790518][ T5851] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.797942][ T5851] device bridge_slave_0 left promiscuous mode [ 241.804204][ T5851] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.811814][ T5851] device veth1_macvtap left promiscuous mode [ 241.817875][ T5851] device veth0_vlan left promiscuous mode [ 242.606365][ T6799] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.613426][ T6799] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.630106][ T6799] device bridge_slave_0 entered promiscuous mode [ 242.640890][ T6799] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.648056][ T6799] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.655987][ T6799] device bridge_slave_1 entered promiscuous mode [ 242.869796][ T6799] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.877330][ T6799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.884636][ T6799] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.891651][ T6799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.078054][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.113445][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.147811][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.175245][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.184121][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.191175][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.199730][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.212185][ T959] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.219254][ T959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.298344][ T6836] device syzkaller0 entered promiscuous mode [ 243.308800][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.317164][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.326329][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.334933][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.343611][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.361426][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.388265][ T6799] device veth0_vlan entered promiscuous mode [ 243.397192][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.405588][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.413905][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.421408][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.458062][ T6799] device veth1_macvtap entered promiscuous mode [ 243.473100][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.482410][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.492808][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 243.531368][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.542677][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.555130][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.564648][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.613834][ T6844] !6±ÿ: renamed from team_slave_1 [ 244.515016][ T5842] device bridge_slave_1 left promiscuous mode [ 244.521244][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.529171][ T5842] device bridge_slave_0 left promiscuous mode [ 244.535418][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.545864][ T5842] device veth1_macvtap left promiscuous mode [ 244.552052][ T5842] device veth0_vlan left promiscuous mode [ 245.747991][ T6876] device syzkaller0 entered promiscuous mode [ 245.975551][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.002514][ T6877] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.010487][ T6877] device bridge_slave_0 entered promiscuous mode [ 246.018734][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.027420][ T6877] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.035919][ T6877] device bridge_slave_1 entered promiscuous mode [ 246.173859][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.180953][ T6877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.188263][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.195308][ T6877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.312179][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.328767][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.355500][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.417804][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.467897][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.474996][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.523168][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.533949][ T959] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.541028][ T959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.548700][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.556975][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.590608][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.604047][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.632814][ T6877] device veth0_vlan entered promiscuous mode [ 246.672114][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.717315][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.741475][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.784156][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.860891][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.883328][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.992060][ T6877] device veth1_macvtap entered promiscuous mode [ 247.046387][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.103622][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.210279][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.290329][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.308548][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.342740][ T6928] device syzkaller0 entered promiscuous mode [ 247.393197][ T6930] device syzkaller0 entered promiscuous mode [ 247.520023][ T6934] device syzkaller0 entered promiscuous mode [ 248.174522][ T5842] device bridge_slave_1 left promiscuous mode [ 248.180694][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.188166][ T5842] device bridge_slave_0 left promiscuous mode [ 248.194402][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.202181][ T5842] device veth1_macvtap left promiscuous mode [ 248.208254][ T5842] device veth0_vlan left promiscuous mode [ 249.376707][ T28] audit: type=1400 audit(1771478493.062:148): avc: denied { create } for pid=6941 comm="syz.1.2250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 249.567127][ T6961] FAULT_INJECTION: forcing a failure. [ 249.567127][ T6961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 249.601360][ T6956] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.624600][ T6961] CPU: 1 PID: 6961 Comm: syz.1.2257 Tainted: G W syzkaller #0 [ 249.633484][ T6961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 249.643720][ T6961] Call Trace: [ 249.646997][ T6961] [ 249.649918][ T6961] __dump_stack+0x21/0x24 [ 249.654253][ T6961] dump_stack_lvl+0x110/0x170 [ 249.658930][ T6961] ? __cfi_dump_stack_lvl+0x8/0x8 [ 249.663954][ T6961] ? irqentry_exit+0x37/0x40 [ 249.668545][ T6961] dump_stack+0x15/0x24 [ 249.672795][ T6961] should_fail_ex+0x3d4/0x520 [ 249.677508][ T6961] should_fail+0xb/0x10 [ 249.681672][ T6961] should_fail_usercopy+0x1a/0x20 [ 249.686743][ T6961] copyin+0x20/0xa0 [ 249.690570][ T6961] _copy_from_iter+0x3e2/0x1010 [ 249.695434][ T6961] ? copyin+0x82/0xa0 [ 249.699429][ T6961] ? _copy_from_iter+0x420/0x1010 [ 249.704469][ T6961] ? __cfi__copy_from_iter+0x10/0x10 [ 249.709771][ T6961] ? __cfi__copy_from_iter+0x10/0x10 [ 249.715078][ T6961] copy_page_from_iter+0x1d2/0x2b0 [ 249.720211][ T6961] skb_copy_datagram_from_iter+0x2cd/0x6b0 [ 249.726038][ T6961] unix_stream_sendmsg+0x4d5/0xa80 [ 249.731172][ T6961] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 249.737340][ T6961] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 249.743068][ T6961] ? stack_trace_save+0xa6/0xf0 [ 249.747925][ T6961] ? __stack_depot_save+0x36/0x480 [ 249.753047][ T6961] ? security_socket_sendmsg+0x93/0xb0 [ 249.758504][ T6961] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 249.764139][ T6961] ____sys_sendmsg+0x5cc/0x990 [ 249.768913][ T6961] ? __sys_sendmsg_sock+0x40/0x40 [ 249.773952][ T6961] ? import_iovec+0x7c/0xb0 [ 249.778468][ T6961] ___sys_sendmsg+0x2a2/0x360 [ 249.783159][ T6961] ? __sys_sendmsg+0x290/0x290 [ 249.787929][ T6961] ? __kasan_check_write+0x14/0x20 [ 249.793046][ T6961] ? proc_fail_nth_write+0x180/0x200 [ 249.798330][ T6961] ? vfs_write+0xa2c/0xce0 [ 249.802750][ T6961] ? __fdget+0x19c/0x220 [ 249.806993][ T6961] __x64_sys_sendmsg+0x205/0x2d0 [ 249.811931][ T6961] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 249.817406][ T6961] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 249.823488][ T6961] x64_sys_call+0x171/0x9a0 [ 249.828520][ T6961] do_syscall_64+0x4c/0xa0 [ 249.832957][ T6961] ? clear_bhb_loop+0x30/0x80 [ 249.837641][ T6961] ? clear_bhb_loop+0x30/0x80 [ 249.842334][ T6961] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 249.848325][ T6961] RIP: 0033:0x7f61ff79c629 [ 249.852750][ T6961] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 249.872363][ T6961] RSP: 002b:00007f6200637028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 249.880791][ T6961] RAX: ffffffffffffffda RBX: 00007f61ffa15fa0 RCX: 00007f61ff79c629 [ 249.889205][ T6961] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000003 [ 249.897441][ T6961] RBP: 00007f6200637090 R08: 0000000000000000 R09: 0000000000000000 [ 249.905458][ T6961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 249.913431][ T6961] R13: 00007f61ffa16038 R14: 00007f61ffa15fa0 R15: 00007ffc76eb29b8 [ 249.921438][ T6961] [ 249.955877][ T6956] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.973396][ T6956] device bridge_slave_0 entered promiscuous mode [ 249.981430][ T6956] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.035057][ T6956] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.060582][ T6956] device bridge_slave_1 entered promiscuous mode [ 250.145960][ T6974] device syzkaller0 entered promiscuous mode [ 250.344817][ T6979] device lo entered promiscuous mode [ 250.449018][ T6956] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.456106][ T6956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.463384][ T6956] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.470449][ T6956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.863915][ T6967] device syzkaller0 entered promiscuous mode [ 250.912170][ T5841] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.919734][ T5841] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.034319][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.042353][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.050956][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.059931][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.068652][ T5841] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.075723][ T5841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.087346][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.103426][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.114178][ T5841] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.121327][ T5841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.227664][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.242588][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.391360][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.400919][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.472652][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.481801][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.547686][ T6956] device veth0_vlan entered promiscuous mode [ 251.555677][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.563806][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.572125][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.580773][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.628139][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.641302][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.651949][ T6956] device veth1_macvtap entered promiscuous mode [ 251.709574][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.718094][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 251.727538][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.737327][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.746902][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 251.875010][ T6956] syz-executor (6956) used greatest stack depth: 22000 bytes left [ 252.515603][ T5846] device bridge_slave_1 left promiscuous mode [ 252.522010][ T5846] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.529873][ T5846] device bridge_slave_0 left promiscuous mode [ 252.536130][ T5846] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.544891][ T5846] device veth1_macvtap left promiscuous mode [ 252.550937][ T5846] device veth0_vlan left promiscuous mode [ 253.531386][ T7008] device syzkaller0 entered promiscuous mode [ 253.565513][ T7016] device syzkaller0 entered promiscuous mode [ 253.575570][ T7014] FAULT_INJECTION: forcing a failure. [ 253.575570][ T7014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.593225][ T7014] CPU: 1 PID: 7014 Comm: syz.4.2274 Tainted: G W syzkaller #0 [ 253.602140][ T7014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 253.612197][ T7014] Call Trace: [ 253.615479][ T7014] [ 253.618408][ T7014] __dump_stack+0x21/0x24 [ 253.622749][ T7014] dump_stack_lvl+0x110/0x170 [ 253.627429][ T7014] ? __cfi_dump_stack_lvl+0x8/0x8 [ 253.632464][ T7014] dump_stack+0x15/0x24 [ 253.636618][ T7014] should_fail_ex+0x3d4/0x520 [ 253.641283][ T7014] should_fail_alloc_page+0x61/0x90 [ 253.646464][ T7014] prepare_alloc_pages+0x148/0x600 [ 253.651559][ T7014] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 253.656832][ T7014] __alloc_pages+0x13a/0x480 [ 253.661417][ T7014] ? __cfi___alloc_pages+0x10/0x10 [ 253.666525][ T7014] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 253.672260][ T7014] ? copy_page_from_iter+0x235/0x2b0 [ 253.677549][ T7014] pipe_write+0x590/0x1970 [ 253.681958][ T7014] ? __cfi_pipe_write+0x10/0x10 [ 253.686795][ T7014] ? selinux_file_permission+0x3ef/0x510 [ 253.692448][ T7014] ? fsnotify_perm+0x67/0x5b0 [ 253.697120][ T7014] ? security_file_permission+0x8a/0xb0 [ 253.702649][ T7014] vfs_write+0x603/0xce0 [ 253.706874][ T7014] ? __cfi_vfs_write+0x10/0x10 [ 253.711618][ T7014] ? __fget_files+0x2d5/0x330 [ 253.716275][ T7014] ? __fdget_pos+0x1f2/0x380 [ 253.720857][ T7014] ? ksys_write+0x71/0x250 [ 253.725263][ T7014] ksys_write+0x149/0x250 [ 253.729578][ T7014] ? __cfi_ksys_write+0x10/0x10 [ 253.734419][ T7014] ? debug_smp_processor_id+0x17/0x20 [ 253.739783][ T7014] __x64_sys_write+0x7b/0x90 [ 253.744361][ T7014] x64_sys_call+0x27b/0x9a0 [ 253.748857][ T7014] do_syscall_64+0x4c/0xa0 [ 253.753261][ T7014] ? clear_bhb_loop+0x30/0x80 [ 253.757922][ T7014] ? clear_bhb_loop+0x30/0x80 [ 253.762580][ T7014] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.768461][ T7014] RIP: 0033:0x7efe5bd9c629 [ 253.772858][ T7014] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.792446][ T7014] RSP: 002b:00007efe5cbe7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 253.800850][ T7014] RAX: ffffffffffffffda RBX: 00007efe5c015fa0 RCX: 00007efe5bd9c629 [ 253.808841][ T7014] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 253.816799][ T7014] RBP: 00007efe5cbe7090 R08: 0000000000000000 R09: 0000000000000000 [ 253.824775][ T7014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 253.832736][ T7014] R13: 00007efe5c016038 R14: 00007efe5c015fa0 R15: 00007fffde6b38b8 [ 253.840759][ T7014] [ 253.979895][ T7017] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.001074][ T7017] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.008596][ T7017] device bridge_slave_0 entered promiscuous mode [ 254.090972][ T7017] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.098077][ T7017] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.106591][ T7017] device bridge_slave_1 entered promiscuous mode [ 254.125012][ T7034] device syzkaller0 entered promiscuous mode [ 254.842444][ T7017] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.849525][ T7017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.856812][ T7017] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.863840][ T7017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.956545][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.003788][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.046562][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.056310][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.106951][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.164130][ T5842] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.171190][ T5842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.236845][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.273333][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.299385][ T5842] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.306476][ T5842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.349432][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.478455][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.517430][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.557080][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.619194][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.648761][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.713114][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.748155][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.757932][ T7017] device veth0_vlan entered promiscuous mode [ 255.803747][ T7068] device syzkaller0 entered promiscuous mode [ 255.824188][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.853915][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.881493][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.890502][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.909813][ T7017] device veth1_macvtap entered promiscuous mode [ 255.953093][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.968675][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.988151][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.035583][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.088235][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.954349][ T5841] device bridge_slave_1 left promiscuous mode [ 256.962037][ T5841] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.974068][ T5841] device bridge_slave_0 left promiscuous mode [ 256.981248][ T5841] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.001278][ T5841] device veth1_macvtap left promiscuous mode [ 257.023136][ T5841] device veth0_vlan left promiscuous mode [ 258.288956][ T7100] device syzkaller0 entered promiscuous mode [ 258.329601][ T7101] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.336897][ T7101] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.344636][ T7101] device bridge_slave_0 entered promiscuous mode [ 258.351543][ T7101] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.358851][ T7101] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.366428][ T7101] device bridge_slave_1 entered promiscuous mode [ 258.434731][ T7101] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.441898][ T7101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.449354][ T7101] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.456399][ T7101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.485528][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.495533][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.507192][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.514843][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.528508][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.621338][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.628578][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.769343][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.784257][ T959] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.791488][ T959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.886370][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.097097][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.153410][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.223555][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.255839][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.314306][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.410591][ T7101] device veth0_vlan entered promiscuous mode [ 259.480636][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.515532][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.536561][ T7101] device veth1_macvtap entered promiscuous mode [ 259.561673][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.570404][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.579618][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.629525][ T7136] tap0: tun_chr_ioctl cmd 1074025675 [ 259.647693][ T7136] tap0: persist enabled [ 259.661370][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.679328][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.711019][ T7136] tap0: tun_chr_ioctl cmd 1074025675 [ 259.716811][ T7136] tap0: persist enabled [ 259.744108][ T7136] tap0: tun_chr_ioctl cmd 2147767520 [ 259.774718][ T7136] tap0: tun_chr_ioctl cmd 2147767520 [ 260.316168][ T959] device bridge_slave_1 left promiscuous mode [ 260.322388][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.330115][ T959] device bridge_slave_0 left promiscuous mode [ 260.336464][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.348833][ T959] device veth1_macvtap left promiscuous mode [ 260.355405][ T959] device veth0_vlan left promiscuous mode [ 261.768287][ T7147] device syzkaller0 entered promiscuous mode [ 261.790231][ T7149] device syzkaller0 entered promiscuous mode [ 261.919513][ T7152] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.930337][ T7152] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.938713][ T7152] device bridge_slave_0 entered promiscuous mode [ 261.946869][ T7152] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.966632][ T7152] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.974304][ T7152] device bridge_slave_1 entered promiscuous mode [ 262.071098][ T7152] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.078236][ T7152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.085529][ T7152] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.092556][ T7152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.215982][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.224918][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.232313][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.276937][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.287523][ T5842] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.294607][ T5842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.311501][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.324274][ T5842] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.331358][ T5842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.354616][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.380232][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.402103][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.434769][ T7152] device veth0_vlan entered promiscuous mode [ 262.443890][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.467019][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.483614][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.505897][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.524842][ T7152] device veth1_macvtap entered promiscuous mode [ 262.636909][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.680052][ T5841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.544957][ T959] device bridge_slave_1 left promiscuous mode [ 263.551161][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.558820][ T959] device bridge_slave_0 left promiscuous mode [ 263.565063][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.573369][ T959] device veth1_macvtap left promiscuous mode [ 263.579456][ T959] device veth0_vlan left promiscuous mode [ 264.897800][ T7204] device syzkaller0 entered promiscuous mode [ 264.916623][ T7208] FAULT_INJECTION: forcing a failure. [ 264.916623][ T7208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.944905][ T7208] CPU: 1 PID: 7208 Comm: syz.1.2327 Tainted: G W syzkaller #0 [ 264.953790][ T7208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 264.963933][ T7208] Call Trace: [ 264.967216][ T7208] [ 264.970144][ T7208] __dump_stack+0x21/0x24 [ 264.974477][ T7208] dump_stack_lvl+0x110/0x170 [ 264.979153][ T7208] ? __cfi_dump_stack_lvl+0x8/0x8 [ 264.984181][ T7208] dump_stack+0x15/0x24 [ 264.988337][ T7208] should_fail_ex+0x3d4/0x520 [ 264.993019][ T7208] should_fail+0xb/0x10 [ 264.997177][ T7208] should_fail_usercopy+0x1a/0x20 [ 265.002200][ T7208] _copy_from_user+0x1e/0xc0 [ 265.006793][ T7208] __sys_bpf+0x2a0/0x850 [ 265.011034][ T7208] ? bpf_link_show_fdinfo+0x330/0x330 [ 265.016410][ T7208] ? __cfi_ksys_write+0x10/0x10 [ 265.021263][ T7208] ? debug_smp_processor_id+0x17/0x20 [ 265.026642][ T7208] __x64_sys_bpf+0x7c/0x90 [ 265.031065][ T7208] x64_sys_call+0x488/0x9a0 [ 265.035571][ T7208] do_syscall_64+0x4c/0xa0 [ 265.039994][ T7208] ? clear_bhb_loop+0x30/0x80 [ 265.044669][ T7208] ? clear_bhb_loop+0x30/0x80 [ 265.049396][ T7208] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 265.055295][ T7208] RIP: 0033:0x7f61ff79c629 [ 265.059711][ T7208] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 265.079329][ T7208] RSP: 002b:00007f6200637028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.087840][ T7208] RAX: ffffffffffffffda RBX: 00007f61ffa15fa0 RCX: 00007f61ff79c629 [ 265.095814][ T7208] RDX: 0000000000000010 RSI: 0000200000000740 RDI: 000000000000000a [ 265.103790][ T7208] RBP: 00007f6200637090 R08: 0000000000000000 R09: 0000000000000000 [ 265.111762][ T7208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.119737][ T7208] R13: 00007f61ffa16038 R14: 00007f61ffa15fa0 R15: 00007ffc76eb29b8 [ 265.127719][ T7208] [ 265.319599][ T7216] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.326881][ T7216] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.334958][ T7216] device bridge_slave_0 entered promiscuous mode [ 265.351640][ T7225] device syzkaller0 entered promiscuous mode [ 265.359032][ T7216] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.368197][ T7216] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.375810][ T7216] device bridge_slave_1 entered promiscuous mode [ 265.386562][ T7225] FAULT_INJECTION: forcing a failure. [ 265.386562][ T7225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.406909][ T7225] CPU: 0 PID: 7225 Comm: syz.4.2334 Tainted: G W syzkaller #0 [ 265.415789][ T7225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 265.425847][ T7225] Call Trace: [ 265.429124][ T7225] [ 265.432056][ T7225] __dump_stack+0x21/0x24 [ 265.436392][ T7225] dump_stack_lvl+0x110/0x170 [ 265.441069][ T7225] ? __cfi_dump_stack_lvl+0x8/0x8 [ 265.446093][ T7225] dump_stack+0x15/0x24 [ 265.450259][ T7225] should_fail_ex+0x3d4/0x520 [ 265.454937][ T7225] should_fail+0xb/0x10 [ 265.459091][ T7225] should_fail_usercopy+0x1a/0x20 [ 265.464115][ T7225] _copy_from_iter+0x196/0x1010 [ 265.469058][ T7225] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 265.475214][ T7225] ? __cfi__copy_from_iter+0x10/0x10 [ 265.480498][ T7225] ? stack_trace_save+0xa6/0xf0 [ 265.485345][ T7225] ? __stack_depot_save+0x36/0x480 [ 265.490456][ T7225] tun_get_user+0x424/0x3470 [ 265.495047][ T7225] ? _parse_integer+0x2a/0x40 [ 265.499722][ T7225] ? tun_do_read+0x1cf0/0x1cf0 [ 265.504488][ T7225] ? __kasan_check_write+0x14/0x20 [ 265.509593][ T7225] ? ref_tracker_alloc+0x31d/0x4a0 [ 265.514696][ T7225] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 265.520162][ T7225] ? avc_policy_seqno+0x1b/0x70 [ 265.525017][ T7225] ? selinux_file_permission+0x2a5/0x510 [ 265.530742][ T7225] tun_chr_write_iter+0x1fb/0x300 [ 265.535764][ T7225] vfs_write+0x603/0xce0 [ 265.540007][ T7225] ? __cfi_vfs_write+0x10/0x10 [ 265.544766][ T7225] ? __fget_files+0x2d5/0x330 [ 265.549444][ T7225] ? __fdget_pos+0x1f2/0x380 [ 265.554132][ T7225] ? ksys_write+0x71/0x250 [ 265.558631][ T7225] ksys_write+0x149/0x250 [ 265.563044][ T7225] ? __cfi_ksys_write+0x10/0x10 [ 265.567906][ T7225] ? debug_smp_processor_id+0x17/0x20 [ 265.573274][ T7225] __x64_sys_write+0x7b/0x90 [ 265.577865][ T7225] x64_sys_call+0x27b/0x9a0 [ 265.582367][ T7225] do_syscall_64+0x4c/0xa0 [ 265.586780][ T7225] ? clear_bhb_loop+0x30/0x80 [ 265.591460][ T7225] ? clear_bhb_loop+0x30/0x80 [ 265.596155][ T7225] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 265.602069][ T7225] RIP: 0033:0x7efe5bd9c629 [ 265.606488][ T7225] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 265.626094][ T7225] RSP: 002b:00007efe5cbe7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 265.634513][ T7225] RAX: ffffffffffffffda RBX: 00007efe5c015fa0 RCX: 00007efe5bd9c629 [ 265.642477][ T7225] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 265.650618][ T7225] RBP: 00007efe5cbe7090 R08: 0000000000000000 R09: 0000000000000000 [ 265.658584][ T7225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.666554][ T7225] R13: 00007efe5c016038 R14: 00007efe5c015fa0 R15: 00007fffde6b38b8 [ 265.674528][ T7225] [ 265.736059][ T7216] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.743134][ T7216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.750441][ T7216] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.757568][ T7216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.786757][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.794714][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.802212][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.840329][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.863322][ T5842] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.870433][ T5842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.908257][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.934785][ T5842] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.941864][ T5842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.962398][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.972682][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.995199][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.023086][ T7216] device veth0_vlan entered promiscuous mode [ 266.034277][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.042757][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.050962][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.071827][ T7247] tap1: tun_chr_ioctl cmd 1074025675 [ 266.077415][ T7247] tap1: persist enabled [ 266.082268][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.092788][ T7216] device veth1_macvtap entered promiscuous mode [ 266.105073][ T7247] tap1: tun_chr_ioctl cmd 1074025675 [ 266.111180][ T7247] tap1: persist enabled [ 266.119878][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.139365][ T7247] tap1: tun_chr_ioctl cmd 2147767520 [ 266.161090][ T5842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.774657][ T5842] device bridge_slave_1 left promiscuous mode [ 266.780829][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.788939][ T5842] device bridge_slave_0 left promiscuous mode [ 266.795214][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.803302][ T5842] device veth1_macvtap left promiscuous mode [ 266.809625][ T5842] device veth0_vlan left promiscuous mode [ 268.392182][ T7259] device syzkaller0 entered promiscuous mode [ 268.992627][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.048670][ T7267] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.087621][ T7267] device bridge_slave_0 entered promiscuous mode [ 269.169973][ T7267] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.237421][ T7267] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.294953][ T7267] device bridge_slave_1 entered promiscuous mode [ 269.977342][ T7309] device syzkaller0 entered promiscuous mode [ 270.032200][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.040011][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.047808][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.056440][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.065186][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.072250][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.080484][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.089234][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.098565][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.105631][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.114167][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.146161][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.154348][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.207578][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.216294][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.262435][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.272486][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.302642][ T7267] device veth0_vlan entered promiscuous mode [ 270.339596][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.348068][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.394033][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.401604][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.458330][ T7326] device syzkaller0 entered promiscuous mode [ 270.466005][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.474696][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.510296][ T7267] device veth1_macvtap entered promiscuous mode [ 270.589607][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.597566][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.606505][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.615024][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.623557][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.664306][ T347] device bridge_slave_1 left promiscuous mode [ 271.670499][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.677987][ T347] device bridge_slave_0 left promiscuous mode [ 271.684161][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.691944][ T347] device veth1_macvtap left promiscuous mode [ 271.698018][ T347] device veth0_vlan left promiscuous mode [ 272.966415][ T7351] tap1: tun_chr_ioctl cmd 1074025675 [ 272.972085][ T7351] tap1: persist enabled [ 272.983529][ T7350] FAULT_INJECTION: forcing a failure. [ 272.983529][ T7350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.997289][ T7347] tap1: tun_chr_ioctl cmd 1074025675 [ 273.002685][ T7347] tap1: persist enabled [ 273.008029][ T7347] tap1: tun_chr_ioctl cmd 2147767520 [ 273.019418][ T7347] tap1: tun_chr_ioctl cmd 2147767520 [ 273.043744][ T7350] CPU: 1 PID: 7350 Comm: syz.0.2372 Tainted: G W syzkaller #0 [ 273.052631][ T7350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 273.062805][ T7350] Call Trace: [ 273.066093][ T7350] [ 273.069024][ T7350] __dump_stack+0x21/0x24 [ 273.073361][ T7350] dump_stack_lvl+0x110/0x170 [ 273.078037][ T7350] ? __cfi_dump_stack_lvl+0x8/0x8 [ 273.083151][ T7350] ? vsnprintf+0x14e/0x1990 [ 273.087661][ T7350] ? memcpy+0x56/0x70 [ 273.091731][ T7350] dump_stack+0x15/0x24 [ 273.095888][ T7350] should_fail_ex+0x3d4/0x520 [ 273.100573][ T7350] should_fail+0xb/0x10 [ 273.104729][ T7350] should_fail_usercopy+0x1a/0x20 [ 273.109820][ T7350] _copy_to_user+0x1e/0x90 [ 273.114335][ T7350] bpf_verifier_vlog+0x179/0x390 [ 273.119280][ T7350] __btf_verifier_log+0xdf/0x130 [ 273.124215][ T7350] ? kasan_save_alloc_info+0x25/0x30 [ 273.129511][ T7350] ? __kasan_kmalloc+0x95/0xb0 [ 273.134294][ T7350] ? btf_check_sec_info+0x350/0x350 [ 273.139497][ T7350] ? btf_parse_hdr+0x1f0/0x7f0 [ 273.144257][ T7350] ? memcpy+0x56/0x70 [ 273.148238][ T7350] btf_parse_hdr+0x4ad/0x7f0 [ 273.152837][ T7350] btf_new_fd+0x38d/0x7d0 [ 273.157183][ T7350] bpf_btf_load+0x6f/0x90 [ 273.161511][ T7350] __sys_bpf+0x5d5/0x850 [ 273.165937][ T7350] ? bpf_link_show_fdinfo+0x330/0x330 [ 273.171307][ T7350] ? __cfi_ksys_write+0x10/0x10 [ 273.176154][ T7350] ? do_user_addr_fault+0x9ac/0x1050 [ 273.181445][ T7350] ? debug_smp_processor_id+0x17/0x20 [ 273.186821][ T7350] __x64_sys_bpf+0x7c/0x90 [ 273.191264][ T7350] x64_sys_call+0x488/0x9a0 [ 273.195777][ T7350] do_syscall_64+0x4c/0xa0 [ 273.200199][ T7350] ? clear_bhb_loop+0x30/0x80 [ 273.204884][ T7350] ? clear_bhb_loop+0x30/0x80 [ 273.209565][ T7350] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 273.215464][ T7350] RIP: 0033:0x7f326259c629 [ 273.219880][ T7350] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 273.239486][ T7350] RSP: 002b:00007f326350b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.247913][ T7350] RAX: ffffffffffffffda RBX: 00007f3262815fa0 RCX: 00007f326259c629 [ 273.255984][ T7350] RDX: 0000000000000028 RSI: 0000200000000000 RDI: 0000000000000012 [ 273.263962][ T7350] RBP: 00007f326350b090 R08: 0000000000000000 R09: 0000000000000000 [ 273.271939][ T7350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.279913][ T7350] R13: 00007f3262816038 R14: 00007f3262815fa0 R15: 00007fff6444e6d8 [ 273.287897][ T7350] [ 273.399155][ T7369] device syzkaller0 entered promiscuous mode [ 273.417035][ T7358] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.426692][ T7358] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.444094][ T7358] device bridge_slave_0 entered promiscuous mode [ 273.482124][ T7358] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.493544][ T7358] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.542780][ T7358] device bridge_slave_1 entered promiscuous mode [ 273.850635][ T7383] device veth1_macvtap left promiscuous mode [ 274.069666][ T7358] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.076751][ T7358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.084061][ T7358] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.091091][ T7358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.219122][ T959] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.236798][ T959] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.340761][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.352907][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.468685][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.483321][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.533824][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.540883][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.610661][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.656131][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.698025][ T959] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.705123][ T959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.775149][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.793461][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.840474][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.892093][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.920577][ T7358] device veth0_vlan entered promiscuous mode [ 274.934624][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.944378][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.954344][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.962499][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.981080][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.989176][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.999033][ T7358] device veth1_macvtap entered promiscuous mode [ 275.031293][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.040065][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.048394][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.112175][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.121218][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.130462][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.138892][ T5846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=1887 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 275.513719][ T28] audit: type=1400 audit(1771478519.202:149): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14102]" dev="pipefs" ino=14102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 276.386394][ T347] device bridge_slave_1 left promiscuous mode [ 276.392561][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.400197][ T347] device bridge_slave_0 left promiscuous mode [ 276.406454][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.414374][ T347] device veth1_macvtap left promiscuous mode [ 276.420376][ T347] device veth0_vlan left promiscuous mode [ 276.815591][ T283] syz-executor (283) used greatest stack depth: 21728 bytes left [ 277.177878][ T347] device erspan0 left promiscuous mode [ 277.183357][ T347] GPL: port 2(erspan0) entered disabled state [ 277.354851][ T347] device batadv_slave_0 left promiscuous mode [ 277.361094][ T347] GPL: port 1(batadv_slave_0) entered disabled state [ 277.368308][ T347] À: port 1(macsec0) entered disabled state [ 277.375025][ T347] device macsec0 left promiscuous mode [ 277.380553][ T347] À: port 1(macsec0) entered disabled state [ 277.387228][ T347] device bridge_slave_1 left promiscuous mode [ 277.393320][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.400764][ T347] device bridge_slave_0 left promiscuous mode [ 277.406953][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.414741][ T347] device batadv_slave_0 left promiscuous mode [ 277.420845][ T347] GPL: port 1(batadv_slave_0) entered disabled state [ 277.428309][ T347] device macsec0 left promiscuous mode [ 277.433870][ T347] À: port 1(macsec0) entered disabled state [ 277.440355][ T347] device bridge_slave_1 left promiscuous mode [ 277.446492][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.454023][ T347] device bridge_slave_0 left promiscuous mode [ 277.460111][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.467905][ T347] device macsec0 left promiscuous mode [ 277.473417][ T347] À: port 1(macsec0) entered disabled state [ 277.481188][ T347] device veth0_vlan left promiscuous mode [ 277.487313][ T347] device veth1_macvtap left promiscuous mode