last executing test programs: 21.256824236s ago: executing program 0 (id=147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980111, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="b9fe130768045c8c989a14ee88a8657986ddd510e921ff2e03d235c95a9ed6fcd93f99fa4e71a5ba", 0x0, 0xf5d, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 21.088416388s ago: executing program 4 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000009400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/0\x16\xff\x00\x00\xfd\x03\xaa\xec\xbe\xc2\xd4\xb6\xd7\x00\x00\x00]l\x14\x02M\f\xd6\xca\v'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}]}}, 0x0, 0x2a}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 17.208976671s ago: executing program 0 (id=147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980111, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="b9fe130768045c8c989a14ee88a8657986ddd510e921ff2e03d235c95a9ed6fcd93f99fa4e71a5ba", 0x0, 0xf5d, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 16.105243316s ago: executing program 4 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000009400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/0\x16\xff\x00\x00\xfd\x03\xaa\xec\xbe\xc2\xd4\xb6\xd7\x00\x00\x00]l\x14\x02M\f\xd6\xca\v'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}]}}, 0x0, 0x2a}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 14.358952705s ago: executing program 0 (id=147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980111, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="b9fe130768045c8c989a14ee88a8657986ddd510e921ff2e03d235c95a9ed6fcd93f99fa4e71a5ba", 0x0, 0xf5d, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 10.564392293s ago: executing program 4 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000009400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/0\x16\xff\x00\x00\xfd\x03\xaa\xec\xbe\xc2\xd4\xb6\xd7\x00\x00\x00]l\x14\x02M\f\xd6\xca\v'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}]}}, 0x0, 0x2a}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 9.944711025s ago: executing program 0 (id=147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980111, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="b9fe130768045c8c989a14ee88a8657986ddd510e921ff2e03d235c95a9ed6fcd93f99fa4e71a5ba", 0x0, 0xf5d, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.202412255s ago: executing program 2 (id=188): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x301142, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) write$cgroup_devices(r0, 0x0, 0xffdd) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0, 0x5}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 8.882249876s ago: executing program 2 (id=189): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r0}, 0x4) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="02"], 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b70000008113b0ffbfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105c00000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) (async) mkdir(&(0x7f0000000000)='./cgroup/file0\x00', 0xd0939199c36b4d28) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x1a, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x25}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xd2, &(0x7f0000000040)=""/210}, 0x21) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000040000000600000003"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x200df000, r4, 0xfff2, 0x800000000}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r4}, 0x4) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r0}, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r5, 0x4) (async) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000600)=ANY=[@ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="0200000002"], 0x10) 8.800987783s ago: executing program 2 (id=190): openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) write$cgroup_int(r1, &(0x7f00000001c0)=0x810, 0xfffffdef) 8.800744672s ago: executing program 4 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000009400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/0\x16\xff\x00\x00\xfd\x03\xaa\xec\xbe\xc2\xd4\xb6\xd7\x00\x00\x00]l\x14\x02M\f\xd6\xca\v'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}]}}, 0x0, 0x2a}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 8.566084349s ago: executing program 2 (id=191): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r4, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="633268f83ca3000000a2029e3815bb2fa117d8326687688b2c969fd7267d546214af00d1ca2524d00f9e4d9555f3ab381b5d44fd6bda8c509e66101d296f10c805252e7c5d48d9814f46db8f07441878734b13270fe47fba418b7358984b9a61c2bbf964a520459fd0d90590b46cf1677d580a26933b6e35aee75996b73a15a25aa8ae2f1f9bc9699a505c0dc4050ab2255fc35f508ccc52f10ac12febf28652fe36f725714868675ca2a7042ab4b26904b2f000589694f69ab0b22a5aec72c5036ce1c8974690045e4ab412a70336b4c65b2dfc8121af4143c2e10a0e5632bcd44e0b000029da424d86f298656822dae2c002e289fbfa6fe0dfb2fd57713a7684dc166c628dc45027ac174c5db54f22e409eb4e94263dbc9919f90f1af3290918b9824c3e0268b300bf69cc2eb3fc58f655439bdbe2b905", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x22) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2309e}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdd) 6.884860222s ago: executing program 0 (id=147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980111, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="b9fe130768045c8c989a14ee88a8657986ddd510e921ff2e03d235c95a9ed6fcd93f99fa4e71a5ba", 0x0, 0xf5d, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.244481616s ago: executing program 4 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000009400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/0\x16\xff\x00\x00\xfd\x03\xaa\xec\xbe\xc2\xd4\xb6\xd7\x00\x00\x00]l\x14\x02M\f\xd6\xca\v'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}]}}, 0x0, 0x2a}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 5.966122805s ago: executing program 2 (id=191): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r4, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x22) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2309e}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdd) 2.601230393s ago: executing program 1 (id=221): perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x12, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) recvmsg(r1, &(0x7f00000001c0)={0x0, 0xfffffffffffffe0f, &(0x7f00000001c0), 0x2}, 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x3fffff, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) 2.600829863s ago: executing program 0 (id=147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980111, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="b9fe130768045c8c989a14ee88a8657986ddd510e921ff2e03d235c95a9ed6fcd93f99fa4e71a5ba", 0x0, 0xf5d, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.772192589s ago: executing program 3 (id=223): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xd, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000006000000850000004f00004a1a0e7700", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb0100d8ace95f42ec7de5f4152f321800000000000000240000002400000002000000000000000000676de2f68b2b8615d8000000000604000000000000000000002d020000000081"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x3fffff, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) 1.687259985s ago: executing program 1 (id=224): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000ffffff7f"], 0x48) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000080000000000000009000000731105000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r10, @ANYRES32=r9, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r10}, &(0x7f0000000000), &(0x7f00000002c0)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r11, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001440), &(0x7f0000001480), 0x0, 0xb0, &(0x7f00000014c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x4b, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r12, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000580)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{0x1}, &(0x7f0000000840), &(0x7f0000000880)=r8}, 0x20) 1.593239422s ago: executing program 1 (id=225): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r4, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="633268f83ca3000000a2029e3815bb2fa117d8326687688b2c969fd7267d546214af00d1ca2524d00f9e4d9555f3ab381b5d44fd6bda8c509e66101d296f10c805252e7c5d48d9814f46db8f07441878734b13270fe47fba418b7358984b9a61c2bbf964a520459fd0d90590b46cf1677d580a26933b6e35aee75996b73a15a25aa8ae2f1f9bc9699a505c0dc4050ab2255fc35f508ccc52f10ac12febf28652fe36f725714868675ca2a7042ab4b26904b2f000589694f69ab0b22a5aec72c5036ce1c8974690045e4ab412a70336b4c65b2dfc8121af4143c2e10a0e5632bcd44e0b000029da424d86f298656822dae2c002e289fbfa6fe0dfb2fd57713a7684dc166c628dc45027ac174c5db54f22e409eb4e94263dbc9919f90f1af3290918b9824c3e0268b300bf69cc2eb3fc58f655439bdbe2b905", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x22) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2309e}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdd) 1.104617465s ago: executing program 1 (id=226): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x1002, 0x1, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, 0x0) write$cgroup_devices(r2, &(0x7f00000005c0)=ANY=[], 0xfffffeff) 1.038754679s ago: executing program 3 (id=227): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x2, 0x1, &(0x7f0000000100)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0af8ff75257075bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000006000000b7000000000000009500000000000000b2595285faa6ead0169191d54f8196217fc560e2fc91f6da4dad4fdc2eb1b257183fa3bcd48666d1ddd73f3047d248df061222193165274bc7f2382f6cda4bfdd45be583823c0f09601f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000000db453620ce7243d1aebd00000000000000005839c77edf2d34b12cd48a0c20fb7dd843267e0331759f4ec6b5b0af58e604f4942eb6"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc8}, 0x100) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 977.215114ms ago: executing program 3 (id=228): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 932.449257ms ago: executing program 3 (id=229): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)="86317a33435ed81ef8f350e2ba3cf1a6b753c1bdd47179887bd19f838dcb2b06a97853997ba3ca6129817c69d6efd2d6136cea78a2f011408cab8121e05cdd34dc8b8e5bc98b4b9a61ff193400af5cf880981e07c70684e88035050df99ce1e3a8887d6b522acac15c9e9753e420079ab807e99a9a123d0d8c79dd48e4373df73063b4155f6a9d71ba44857b1f3689f3e14327", &(0x7f0000000380)=""/46}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000b80)=ANY=[@ANYRES16=r1, @ANYRES32=r1, @ANYBLOB="000d1e48a116c89f1841f69f830000000000007d80cce55df87eca8fb85bd14c00b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b7040000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0}, 0x94) close(r0) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r2}, 0xc) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x16, 0x5, 0x2, 0x7, 0x11180, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x1a, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f0000000940), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r3, @ANYBLOB='\t\x00'/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="050000000500000001009ef7b55d00000d0000000080000000000000"], 0x50) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r5, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYRESHEX=r5], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x12, '\x00', r4, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) 932.160377ms ago: executing program 4 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000009400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/0\x16\xff\x00\x00\xfd\x03\xaa\xec\xbe\xc2\xd4\xb6\xd7\x00\x00\x00]l\x14\x02M\f\xd6\xca\v'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}]}}, 0x0, 0x2a}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 704.429542ms ago: executing program 2 (id=191): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r4, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x22) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2309e}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdd) 661.364435ms ago: executing program 3 (id=230): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r3, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x1ff, 0x3, 0x526, 0x21800, 0x1, 0x101, '\x00', r4, r3, 0x2, 0x2, 0x5, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a0000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff01000000", @ANYBLOB="0080000000000000"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) 38.388597ms ago: executing program 1 (id=231): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000010000000000000000000000850000009e000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, r0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 0s ago: executing program 1 (id=232): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) (fail_nth: 1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.43' (ED25519) to the list of known hosts. [ 22.002720][ T28] audit: type=1400 audit(1775610778.200:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.006950][ T275] cgroup: Unknown subsys name 'net' [ 22.025591][ T28] audit: type=1400 audit(1775610778.200:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.052907][ T28] audit: type=1400 audit(1775610778.230:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.053468][ T275] cgroup: Unknown subsys name 'devices' [ 22.165340][ T275] cgroup: Unknown subsys name 'hugetlb' [ 22.171228][ T275] cgroup: Unknown subsys name 'rlimit' [ 22.277418][ T28] audit: type=1400 audit(1775610778.470:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.300847][ T28] audit: type=1400 audit(1775610778.470:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.325992][ T28] audit: type=1400 audit(1775610778.470:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.351074][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.360248][ T28] audit: type=1400 audit(1775610778.550:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.385715][ T28] audit: type=1400 audit(1775610778.550:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.442725][ T28] audit: type=1400 audit(1775610778.640:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.444060][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.468723][ T28] audit: type=1400 audit(1775610778.640:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.299735][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.306953][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.314702][ T283] device bridge_slave_0 entered promiscuous mode [ 23.333133][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.340294][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.347977][ T283] device bridge_slave_1 entered promiscuous mode [ 23.396469][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.403572][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.411128][ T287] device bridge_slave_0 entered promiscuous mode [ 23.421205][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.428355][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.435966][ T287] device bridge_slave_1 entered promiscuous mode [ 23.553683][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.560858][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.568464][ T284] device bridge_slave_0 entered promiscuous mode [ 23.578473][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.585755][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.593574][ T284] device bridge_slave_1 entered promiscuous mode [ 23.604807][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.611870][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.619382][ T285] device bridge_slave_0 entered promiscuous mode [ 23.629625][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.637310][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.644811][ T285] device bridge_slave_1 entered promiscuous mode [ 23.666426][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.673606][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.681180][ T286] device bridge_slave_0 entered promiscuous mode [ 23.710129][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.717469][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.725007][ T286] device bridge_slave_1 entered promiscuous mode [ 23.817572][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.824708][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.832121][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.839280][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.850507][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.857619][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.864980][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.872399][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.885248][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.892342][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.899725][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.906795][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.988051][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.995173][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.002761][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.009813][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.033275][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.040444][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.047789][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.054971][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.064101][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.071458][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.079430][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.086891][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.094335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.102447][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.109754][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.117148][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.124686][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.131876][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.139425][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.173693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.182972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.191245][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.198773][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.206582][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.215500][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.222579][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.229972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.238672][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.245762][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.253358][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.261569][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.268710][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.298207][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.305817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.314309][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.321469][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.329062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.337888][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.344998][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.353304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.360812][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.368636][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.377354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.385823][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.392938][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.400641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.409098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.445676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.453218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.460733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.469152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.477809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.486334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.495147][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.503683][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.510745][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.518315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.526543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.534873][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.543192][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.551264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.559665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.567759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.576046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.584450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.592974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.601401][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.608527][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.616127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.625162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.634016][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.641067][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.648687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.656766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.665105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.680463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.689117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.708060][ T284] device veth0_vlan entered promiscuous mode [ 24.718628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.727249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.736124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.744544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.753593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.762051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.770523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.778225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.790823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.803326][ T287] device veth0_vlan entered promiscuous mode [ 24.811511][ T283] device veth0_vlan entered promiscuous mode [ 24.819738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.827991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.836686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.845006][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.853461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.860977][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.868867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.876640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.889727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.898154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.906230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.919767][ T285] device veth0_vlan entered promiscuous mode [ 24.930587][ T287] device veth1_macvtap entered promiscuous mode [ 24.937952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.947271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.955706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.964221][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.973186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.984389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.992203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.999697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.008249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.023899][ T286] device veth0_vlan entered promiscuous mode [ 25.031340][ T285] device veth1_macvtap entered promiscuous mode [ 25.038683][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.047237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.056330][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.072671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.081256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.090157][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.098850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.109377][ T283] device veth1_macvtap entered promiscuous mode [ 25.116915][ T284] device veth1_macvtap entered promiscuous mode [ 25.137517][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 25.147002][ T286] device veth1_macvtap entered promiscuous mode [ 25.158015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.167397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.175519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.184832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.193633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.204055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.217376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.248322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.262856][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.271365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.280586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.289230][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.297813][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.306411][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.315052][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.323576][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.347468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.497178][ C0] hrtimer: interrupt took 30248 ns [ 25.540686][ T321] Driver unsupported XDP return value 0 on prog (id 7) dev N/A, expect packet loss! [ 27.129885][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 27.129903][ T28] audit: type=1400 audit(1775610783.320:107): avc: denied { cpu } for pid=351 comm="syz.3.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.237752][ T384] FAULT_INJECTION: forcing a failure. [ 28.237752][ T384] name failslab, interval 1, probability 0, space 0, times 1 [ 28.310948][ T384] CPU: 1 PID: 384 Comm: syz.3.31 Not tainted syzkaller #0 [ 28.318184][ T384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 28.328462][ T384] Call Trace: [ 28.331772][ T384] [ 28.334732][ T384] __dump_stack+0x21/0x24 [ 28.339135][ T384] dump_stack_lvl+0x110/0x170 [ 28.343867][ T384] ? __cfi_dump_stack_lvl+0x8/0x8 [ 28.349443][ T384] ? do_syscall_64+0x4c/0xa0 [ 28.354082][ T384] dump_stack+0x15/0x24 [ 28.358476][ T384] should_fail_ex+0x3d4/0x520 [ 28.363364][ T384] __should_failslab+0xac/0xf0 [ 28.368169][ T384] ? sk_prot_alloc+0xed/0x320 [ 28.372909][ T384] should_failslab+0x9/0x20 [ 28.377440][ T384] __kmem_cache_alloc_node+0x3d/0x2c0 [ 28.382856][ T384] ? sk_prot_alloc+0xed/0x320 [ 28.387553][ T384] __kmalloc+0xa1/0x1e0 [ 28.391813][ T384] sk_prot_alloc+0xed/0x320 [ 28.396360][ T384] sk_alloc+0x3b/0x460 [ 28.400478][ T384] ? __kasan_check_write+0x14/0x20 [ 28.405621][ T384] bpf_prog_test_run_skb+0x375/0x12c0 [ 28.411102][ T384] ? __fget_files+0x2d5/0x330 [ 28.415860][ T384] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 28.421737][ T384] bpf_prog_test_run+0x3e3/0x640 [ 28.426710][ T384] ? bpf_prog_query+0x270/0x270 [ 28.431608][ T384] ? selinux_bpf+0xce/0xf0 [ 28.436105][ T384] ? security_bpf+0x93/0xb0 [ 28.440635][ T384] __sys_bpf+0x5ee/0x850 [ 28.444897][ T384] ? bpf_link_show_fdinfo+0x330/0x330 [ 28.450396][ T384] ? __cfi_ksys_write+0x10/0x10 [ 28.455410][ T384] ? debug_smp_processor_id+0x17/0x20 [ 28.460852][ T384] __x64_sys_bpf+0x7c/0x90 [ 28.465312][ T384] x64_sys_call+0x488/0x9a0 [ 28.469842][ T384] do_syscall_64+0x4c/0xa0 [ 28.474289][ T384] ? clear_bhb_loop+0x30/0x80 [ 28.478981][ T384] ? clear_bhb_loop+0x30/0x80 [ 28.483675][ T384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 28.489612][ T384] RIP: 0033:0x7f940759c819 [ 28.494076][ T384] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 28.513704][ T384] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 28.522251][ T384] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 28.530346][ T384] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 28.538344][ T384] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 28.546348][ T384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 28.554356][ T384] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 28.562378][ T384] [ 28.631172][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.639584][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.655735][ T375] device bridge_slave_0 entered promiscuous mode [ 28.680593][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.693075][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.741801][ T375] device bridge_slave_1 entered promiscuous mode [ 28.753095][ T28] audit: type=1400 audit(1775610784.950:108): avc: denied { read } for pid=396 comm="syz.3.36" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.834742][ T28] audit: type=1400 audit(1775610784.980:109): avc: denied { open } for pid=396 comm="syz.3.36" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.835320][ T398] device veth0_vlan left promiscuous mode [ 28.877373][ T398] device veth0_vlan entered promiscuous mode [ 28.944437][ T400] FAULT_INJECTION: forcing a failure. [ 28.944437][ T400] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 28.978743][ T400] CPU: 1 PID: 400 Comm: syz.1.37 Not tainted syzkaller #0 [ 28.985939][ T400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 28.996032][ T400] Call Trace: [ 28.999369][ T400] [ 29.002335][ T400] __dump_stack+0x21/0x24 [ 29.006728][ T400] dump_stack_lvl+0x110/0x170 [ 29.011548][ T400] ? __cfi_dump_stack_lvl+0x8/0x8 [ 29.016846][ T400] dump_stack+0x15/0x24 [ 29.021047][ T400] should_fail_ex+0x3d4/0x520 [ 29.025769][ T400] should_fail+0xb/0x10 [ 29.029968][ T400] should_fail_usercopy+0x1a/0x20 [ 29.035039][ T400] _copy_to_user+0x1e/0x90 [ 29.039593][ T400] simple_read_from_buffer+0xe9/0x160 [ 29.045021][ T400] proc_fail_nth_read+0x1a6/0x220 [ 29.050516][ T400] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 29.056094][ T400] ? security_file_permission+0x94/0xb0 [ 29.061691][ T400] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 29.067721][ T400] vfs_read+0x27a/0x910 [ 29.071938][ T400] ? __cfi_vfs_read+0x10/0x10 [ 29.076695][ T400] ? __kasan_check_write+0x14/0x20 [ 29.081849][ T400] ? mutex_lock+0x93/0x1b0 [ 29.086316][ T400] ? __cfi_mutex_lock+0x10/0x10 [ 29.091215][ T400] ? __fdget_pos+0x2cd/0x380 [ 29.095844][ T400] ? ksys_read+0x71/0x250 [ 29.100221][ T400] ksys_read+0x149/0x250 [ 29.104501][ T400] ? __cfi_ksys_read+0x10/0x10 [ 29.109299][ T400] __x64_sys_read+0x7b/0x90 [ 29.113839][ T400] x64_sys_call+0x2f/0x9a0 [ 29.118295][ T400] do_syscall_64+0x4c/0xa0 [ 29.122761][ T400] ? clear_bhb_loop+0x30/0x80 [ 29.127477][ T400] ? clear_bhb_loop+0x30/0x80 [ 29.132198][ T400] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.138129][ T400] RIP: 0033:0x7f2007b5d04e [ 29.142745][ T400] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 29.162463][ T400] RSP: 002b:00007f2008975fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 29.170908][ T400] RAX: ffffffffffffffda RBX: 00007f20089766c0 RCX: 00007f2007b5d04e [ 29.178911][ T400] RDX: 000000000000000f RSI: 00007f20089760a0 RDI: 0000000000000033 [ 29.186896][ T400] RBP: 00007f2008976090 R08: 0000000000000000 R09: 0000000000000000 [ 29.194884][ T400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.202868][ T400] R13: 00007f2007e16038 R14: 00007f2007e15fa0 R15: 00007ffd04d83c48 [ 29.210952][ T400] [ 29.411581][ T28] audit: type=1400 audit(1775610785.600:110): avc: denied { create } for pid=375 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.448580][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.455836][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.463204][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.470270][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.486542][ T28] audit: type=1400 audit(1775610785.630:111): avc: denied { read } for pid=411 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.590743][ T422] FAULT_INJECTION: forcing a failure. [ 29.590743][ T422] name failslab, interval 1, probability 0, space 0, times 0 [ 29.592951][ T28] audit: type=1400 audit(1775610785.630:112): avc: denied { write } for pid=375 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.639327][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.647154][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.654399][ T422] CPU: 0 PID: 422 Comm: syz.2.45 Not tainted syzkaller #0 [ 29.661555][ T422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 29.671779][ T422] Call Trace: [ 29.675094][ T422] [ 29.678144][ T422] __dump_stack+0x21/0x24 [ 29.682616][ T422] dump_stack_lvl+0x110/0x170 [ 29.687356][ T422] ? __cfi_dump_stack_lvl+0x8/0x8 [ 29.692436][ T422] dump_stack+0x15/0x24 [ 29.696729][ T422] should_fail_ex+0x3d4/0x520 [ 29.701459][ T422] ? security_file_alloc+0x33/0x130 [ 29.706962][ T422] __should_failslab+0xac/0xf0 [ 29.711854][ T422] should_failslab+0x9/0x20 [ 29.716572][ T422] kmem_cache_alloc+0x3b/0x330 [ 29.721644][ T422] ? __alloc_file+0x28/0x2a0 [ 29.726274][ T422] security_file_alloc+0x33/0x130 [ 29.731516][ T422] __alloc_file+0xb5/0x2a0 [ 29.735985][ T422] alloc_empty_file+0x97/0x180 [ 29.740791][ T422] path_openat+0xf5/0x2f80 [ 29.745257][ T422] ? kasan_set_track+0x60/0x70 [ 29.750065][ T422] ? kasan_save_alloc_info+0x25/0x30 [ 29.755496][ T422] ? __kasan_slab_alloc+0x72/0x80 [ 29.760567][ T422] ? slab_post_alloc_hook+0x4f/0x2d0 [ 29.765914][ T422] ? kmem_cache_alloc+0x16e/0x330 [ 29.771036][ T422] ? getname_flags+0xb9/0x500 [ 29.775840][ T422] ? getname+0x19/0x20 [ 29.779973][ T422] ? do_sys_openat2+0xeb/0x810 [ 29.784778][ T422] ? __x64_sys_openat+0x136/0x160 [ 29.789841][ T422] ? do_syscall_64+0x4c/0xa0 [ 29.794480][ T422] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.800600][ T422] ? do_filp_open+0x430/0x430 [ 29.805329][ T422] do_filp_open+0x1f1/0x430 [ 29.809877][ T422] ? __cfi_do_filp_open+0x10/0x10 [ 29.815144][ T422] ? alloc_fd+0x4e6/0x590 [ 29.819828][ T422] do_sys_openat2+0x15e/0x810 [ 29.824864][ T422] ? __kasan_check_write+0x14/0x20 [ 29.830036][ T422] ? do_sys_open+0xe0/0xe0 [ 29.834853][ T422] ? ksys_write+0x1f4/0x250 [ 29.839419][ T422] ? __cfi_ksys_write+0x10/0x10 [ 29.844320][ T422] __x64_sys_openat+0x136/0x160 [ 29.849221][ T422] x64_sys_call+0x783/0x9a0 [ 29.853865][ T422] do_syscall_64+0x4c/0xa0 [ 29.858345][ T422] ? clear_bhb_loop+0x30/0x80 [ 29.863068][ T422] ? clear_bhb_loop+0x30/0x80 [ 29.867787][ T422] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.873745][ T422] RIP: 0033:0x7fc60e19c819 [ 29.878193][ T422] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 29.898185][ T422] RSP: 002b:00007fc60f027028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 29.906648][ T422] RAX: ffffffffffffffda RBX: 00007fc60e415fa0 RCX: 00007fc60e19c819 [ 29.914662][ T422] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 29.922756][ T422] RBP: 00007fc60f027090 R08: 0000000000000000 R09: 0000000000000000 [ 29.930768][ T422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.938970][ T422] R13: 00007fc60e416038 R14: 00007fc60e415fa0 R15: 00007ffe685dcd48 [ 29.947098][ T422] [ 29.964103][ T28] audit: type=1400 audit(1775610785.630:113): avc: denied { read } for pid=375 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.018284][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.027000][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.046791][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.055564][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.064505][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.071572][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.110170][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.142425][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.187939][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.195202][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.327817][ T43] device bridge_slave_1 left promiscuous mode [ 30.358998][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.398841][ T43] device bridge_slave_0 left promiscuous mode [ 30.437256][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.488866][ T43] device veth1_macvtap left promiscuous mode [ 30.530166][ T43] device veth0_vlan left promiscuous mode [ 31.015445][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.026517][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.048060][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.060836][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.088405][ T450] device syzkaller0 entered promiscuous mode [ 31.095627][ T28] audit: type=1400 audit(1775610787.290:114): avc: denied { relabelfrom } for pid=446 comm="syz.3.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.115833][ T28] audit: type=1400 audit(1775610787.290:115): avc: denied { relabelto } for pid=446 comm="syz.3.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.140377][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.150925][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.191427][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.207580][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.217135][ T375] device veth0_vlan entered promiscuous mode [ 31.225802][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.233692][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.251836][ T375] device veth1_macvtap entered promiscuous mode [ 31.281186][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.291108][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.300252][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.332702][ T28] audit: type=1400 audit(1775610787.530:116): avc: denied { create } for pid=469 comm="syz.3.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 31.355174][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.372717][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.383618][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.423464][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.572225][ T375] syz-executor (375) used greatest stack depth: 22240 bytes left [ 31.602666][ T479] device bridge0 entered promiscuous mode [ 32.000823][ T482] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.008210][ T482] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.016998][ T482] device bridge_slave_0 entered promiscuous mode [ 32.028207][ T482] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.035973][ T482] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.054249][ T482] device bridge_slave_1 entered promiscuous mode [ 32.206648][ T489] device veth0_vlan left promiscuous mode [ 32.248931][ T489] device veth0_vlan entered promiscuous mode [ 32.279271][ T28] audit: type=1400 audit(1775610788.470:117): avc: denied { tracepoint } for pid=499 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.386057][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.396842][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.425666][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.443158][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.451843][ T510] FAULT_INJECTION: forcing a failure. [ 32.451843][ T510] name failslab, interval 1, probability 0, space 0, times 0 [ 32.480081][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.487756][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.512519][ T510] CPU: 0 PID: 510 Comm: syz.2.71 Not tainted syzkaller #0 [ 32.519721][ T510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 32.529835][ T510] Call Trace: [ 32.533154][ T510] [ 32.536122][ T510] __dump_stack+0x21/0x24 [ 32.540524][ T510] dump_stack_lvl+0x110/0x170 [ 32.545509][ T510] ? __cfi_dump_stack_lvl+0x8/0x8 [ 32.550581][ T510] ? do_syscall_64+0x4c/0xa0 [ 32.555217][ T510] dump_stack+0x15/0x24 [ 32.559425][ T510] should_fail_ex+0x3d4/0x520 [ 32.564154][ T510] __should_failslab+0xac/0xf0 [ 32.568955][ T510] ? sk_prot_alloc+0xed/0x320 [ 32.573763][ T510] should_failslab+0x9/0x20 [ 32.578305][ T510] __kmem_cache_alloc_node+0x3d/0x2c0 [ 32.583813][ T510] ? sk_prot_alloc+0xed/0x320 [ 32.588533][ T510] __kmalloc+0xa1/0x1e0 [ 32.592722][ T510] sk_prot_alloc+0xed/0x320 [ 32.597272][ T510] sk_alloc+0x3b/0x460 [ 32.601464][ T510] ? __kasan_check_write+0x14/0x20 [ 32.606609][ T510] bpf_prog_test_run_skb+0x375/0x12c0 [ 32.612023][ T510] ? __fget_files+0x2d5/0x330 [ 32.616945][ T510] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 32.622916][ T510] bpf_prog_test_run+0x3e3/0x640 [ 32.628013][ T510] ? bpf_prog_query+0x270/0x270 [ 32.632951][ T510] ? selinux_bpf+0xce/0xf0 [ 32.637418][ T510] ? security_bpf+0x93/0xb0 [ 32.641963][ T510] __sys_bpf+0x5ee/0x850 [ 32.646332][ T510] ? bpf_link_show_fdinfo+0x330/0x330 [ 32.651744][ T510] ? __cfi_ksys_write+0x10/0x10 [ 32.656744][ T510] ? debug_smp_processor_id+0x17/0x20 [ 32.662352][ T510] __x64_sys_bpf+0x7c/0x90 [ 32.666826][ T510] x64_sys_call+0x488/0x9a0 [ 32.671393][ T510] do_syscall_64+0x4c/0xa0 [ 32.675876][ T510] ? clear_bhb_loop+0x30/0x80 [ 32.680677][ T510] ? clear_bhb_loop+0x30/0x80 [ 32.685389][ T510] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 32.691331][ T510] RIP: 0033:0x7fc60e19c819 [ 32.695777][ T510] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 32.715686][ T510] RSP: 002b:00007fc60f027028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.724141][ T510] RAX: ffffffffffffffda RBX: 00007fc60e415fa0 RCX: 00007fc60e19c819 [ 32.732160][ T510] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 32.740250][ T510] RBP: 00007fc60f027090 R08: 0000000000000000 R09: 0000000000000000 [ 32.748302][ T510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.756485][ T510] R13: 00007fc60e416038 R14: 00007fc60e415fa0 R15: 00007ffe685dcd48 [ 32.764601][ T510] [ 32.788308][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.807446][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.820085][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.827242][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.861868][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 32.870573][ T516] FAULT_INJECTION: forcing a failure. [ 32.870573][ T516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 32.890412][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.898850][ T516] CPU: 0 PID: 516 Comm: syz.0.73 Not tainted syzkaller #0 [ 32.906002][ T516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 32.916096][ T516] Call Trace: [ 32.919410][ T516] [ 32.922378][ T516] __dump_stack+0x21/0x24 [ 32.926754][ T516] dump_stack_lvl+0x110/0x170 [ 32.931474][ T516] ? __cfi_dump_stack_lvl+0x8/0x8 [ 32.936543][ T516] dump_stack+0x15/0x24 [ 32.940850][ T516] should_fail_ex+0x3d4/0x520 [ 32.945754][ T516] should_fail+0xb/0x10 [ 32.949959][ T516] should_fail_usercopy+0x1a/0x20 [ 32.955034][ T516] _copy_from_user+0x1e/0xc0 [ 32.959676][ T516] bpf_prog_test_run_skb+0x282/0x12c0 [ 32.965099][ T516] ? __fget_files+0x2d5/0x330 [ 32.969828][ T516] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 32.975676][ T516] bpf_prog_test_run+0x3e3/0x640 [ 32.980637][ T516] ? bpf_prog_query+0x270/0x270 [ 32.985513][ T516] ? selinux_bpf+0xce/0xf0 [ 32.989977][ T516] ? security_bpf+0x93/0xb0 [ 32.994609][ T516] __sys_bpf+0x5ee/0x850 [ 32.998872][ T516] ? bpf_link_show_fdinfo+0x330/0x330 [ 33.004378][ T516] ? __cfi_ksys_write+0x10/0x10 [ 33.009265][ T516] ? debug_smp_processor_id+0x17/0x20 [ 33.014681][ T516] __x64_sys_bpf+0x7c/0x90 [ 33.019137][ T516] x64_sys_call+0x488/0x9a0 [ 33.023753][ T516] do_syscall_64+0x4c/0xa0 [ 33.028312][ T516] ? clear_bhb_loop+0x30/0x80 [ 33.033019][ T516] ? clear_bhb_loop+0x30/0x80 [ 33.037767][ T516] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 33.043854][ T516] RIP: 0033:0x7fbf59f9c819 [ 33.048315][ T516] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 33.068196][ T516] RSP: 002b:00007fbf5add5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.076914][ T516] RAX: ffffffffffffffda RBX: 00007fbf5a215fa0 RCX: 00007fbf59f9c819 [ 33.084990][ T516] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 33.092976][ T516] RBP: 00007fbf5add5090 R08: 0000000000000000 R09: 0000000000000000 [ 33.100973][ T516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.108968][ T516] R13: 00007fbf5a216038 R14: 00007fbf5a215fa0 R15: 00007ffd720ef068 [ 33.116995][ T516] [ 33.125043][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.156112][ T28] audit: type=1400 audit(1775610789.350:118): avc: denied { setopt } for pid=522 comm="syz.2.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.197816][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.206713][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.234585][ T482] device veth0_vlan entered promiscuous mode [ 33.243024][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.251667][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.269833][ T482] device veth1_macvtap entered promiscuous mode [ 33.277437][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.286485][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.314553][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.342649][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.363999][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.378792][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.418219][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.436899][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.479329][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.793277][ T43] device bridge_slave_1 left promiscuous mode [ 34.802280][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.828434][ T43] device bridge_slave_0 left promiscuous mode [ 34.849699][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.884847][ T43] device veth1_macvtap left promiscuous mode [ 34.905969][ T43] device veth0_vlan left promiscuous mode [ 35.636059][ T554] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.656629][ T554] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.668773][ T28] audit: type=1400 audit(1775610791.860:119): avc: denied { ioctl } for pid=571 comm="syz.3.93" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.699870][ T554] device bridge_slave_0 entered promiscuous mode [ 35.722028][ T554] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.742310][ T554] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.753385][ T554] device bridge_slave_1 entered promiscuous mode [ 35.876416][ T581] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 35.882713][ T581] syzkaller0: linktype set to 768 [ 36.600810][ T585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.608975][ T585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.635318][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.648721][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.658146][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.665276][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.708891][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.727506][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.872452][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.891246][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.898636][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.986941][ T584] device bridge0 entered promiscuous mode [ 37.052034][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.060349][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.083472][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.112839][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.139774][ T554] device veth0_vlan entered promiscuous mode [ 37.157231][ T592] pimreg: tun_chr_ioctl cmd 1074025677 [ 37.166693][ T592] pimreg: linktype set to 776 [ 37.202642][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.234294][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.265821][ T600] FAULT_INJECTION: forcing a failure. [ 37.265821][ T600] name failslab, interval 1, probability 0, space 0, times 0 [ 37.292817][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.317229][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.328953][ T600] CPU: 1 PID: 600 Comm: syz.3.101 Not tainted syzkaller #0 [ 37.336216][ T600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 37.346488][ T600] Call Trace: [ 37.349904][ T600] [ 37.352962][ T600] __dump_stack+0x21/0x24 [ 37.357354][ T600] dump_stack_lvl+0x110/0x170 [ 37.362254][ T600] ? __cfi_dump_stack_lvl+0x8/0x8 [ 37.367394][ T600] dump_stack+0x15/0x24 [ 37.371684][ T600] should_fail_ex+0x3d4/0x520 [ 37.376420][ T600] __should_failslab+0xac/0xf0 [ 37.381321][ T600] should_failslab+0x9/0x20 [ 37.385873][ T600] kmem_cache_alloc_node+0x42/0x340 [ 37.391671][ T600] ? alloc_vmap_area+0x184/0x18b0 [ 37.396742][ T600] alloc_vmap_area+0x184/0x18b0 [ 37.401730][ T600] ? vm_map_ram+0x930/0x930 [ 37.406618][ T600] ? __kasan_kmalloc+0x95/0xb0 [ 37.411443][ T600] ? kmalloc_node_trace+0x3d/0xb0 [ 37.416646][ T600] __get_vm_area_node+0x160/0x360 [ 37.421897][ T600] ? kasan_check_range+0x89/0x2a0 [ 37.426976][ T600] __vmalloc_node_range+0x326/0x1430 [ 37.432313][ T600] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 37.437908][ T600] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 37.443784][ T600] ? __cfi___vmalloc_node_range+0x10/0x10 [ 37.449634][ T600] ? __cfi_selinux_capable+0x10/0x10 [ 37.455060][ T600] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 37.460668][ T600] __vmalloc+0x79/0x90 [ 37.464873][ T600] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 37.470565][ T600] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 37.476004][ T600] bpf_prog_alloc+0x22/0x1c0 [ 37.480655][ T600] bpf_prog_load+0x825/0x16a0 [ 37.485477][ T600] ? map_freeze+0x390/0x390 [ 37.490062][ T600] ? selinux_bpf+0xc7/0xf0 [ 37.494615][ T600] ? security_bpf+0x93/0xb0 [ 37.499171][ T600] __sys_bpf+0x57b/0x850 [ 37.503459][ T600] ? bpf_link_show_fdinfo+0x330/0x330 [ 37.508955][ T600] ? __cfi_ksys_write+0x10/0x10 [ 37.513940][ T600] ? debug_smp_processor_id+0x17/0x20 [ 37.519463][ T600] __x64_sys_bpf+0x7c/0x90 [ 37.523951][ T600] x64_sys_call+0x488/0x9a0 [ 37.528630][ T600] do_syscall_64+0x4c/0xa0 [ 37.533197][ T600] ? clear_bhb_loop+0x30/0x80 [ 37.537938][ T600] ? clear_bhb_loop+0x30/0x80 [ 37.542703][ T600] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 37.548756][ T600] RIP: 0033:0x7f940759c819 [ 37.553229][ T600] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 37.573486][ T600] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.582154][ T600] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 37.590290][ T600] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 37.598574][ T600] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 37.606683][ T600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.614710][ T600] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 37.623152][ T600] [ 37.672203][ T554] device veth1_macvtap entered promiscuous mode [ 37.699627][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.742376][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.750145][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.802400][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.811360][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.848437][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.868062][ T600] syz.3.101: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 37.874133][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.902541][ T600] CPU: 0 PID: 600 Comm: syz.3.101 Not tainted syzkaller #0 [ 37.909909][ T600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 37.920093][ T600] Call Trace: [ 37.923435][ T600] [ 37.926418][ T600] __dump_stack+0x21/0x24 [ 37.930812][ T600] dump_stack_lvl+0x110/0x170 [ 37.935610][ T600] ? __cfi_dump_stack_lvl+0x8/0x8 [ 37.940723][ T600] ? pr_cont_kernfs_name+0x133/0x160 [ 37.946246][ T600] dump_stack+0x15/0x24 [ 37.950557][ T600] warn_alloc+0x1dc/0x200 [ 37.955025][ T600] ? __cfi_warn_alloc+0x10/0x10 [ 37.960018][ T600] ? __get_vm_area_node+0x175/0x360 [ 37.965283][ T600] ? kasan_check_range+0x89/0x2a0 [ 37.970634][ T600] __vmalloc_node_range+0x34b/0x1430 [ 37.976155][ T600] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 37.981957][ T600] ? __cfi___vmalloc_node_range+0x10/0x10 [ 37.987809][ T600] ? __cfi_selinux_capable+0x10/0x10 [ 37.993255][ T600] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 37.998865][ T600] __vmalloc+0x79/0x90 [ 38.002993][ T600] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 38.008641][ T600] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 38.014100][ T600] bpf_prog_alloc+0x22/0x1c0 [ 38.018733][ T600] bpf_prog_load+0x825/0x16a0 [ 38.023842][ T600] ? map_freeze+0x390/0x390 [ 38.028875][ T600] ? selinux_bpf+0xc7/0xf0 [ 38.033343][ T600] ? security_bpf+0x93/0xb0 [ 38.038114][ T600] __sys_bpf+0x57b/0x850 [ 38.042578][ T600] ? bpf_link_show_fdinfo+0x330/0x330 [ 38.047995][ T600] ? __cfi_ksys_write+0x10/0x10 [ 38.053072][ T600] ? debug_smp_processor_id+0x17/0x20 [ 38.058504][ T600] __x64_sys_bpf+0x7c/0x90 [ 38.062981][ T600] x64_sys_call+0x488/0x9a0 [ 38.067878][ T600] do_syscall_64+0x4c/0xa0 [ 38.072350][ T600] ? clear_bhb_loop+0x30/0x80 [ 38.077086][ T600] ? clear_bhb_loop+0x30/0x80 [ 38.081785][ T600] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 38.087702][ T600] RIP: 0033:0x7f940759c819 [ 38.092402][ T600] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 38.112843][ T600] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 38.121304][ T600] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 38.129408][ T600] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 38.137497][ T600] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 38.145511][ T600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.153606][ T600] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 38.161741][ T600] [ 38.188704][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.213804][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.235538][ T43] device bridge_slave_1 left promiscuous mode [ 38.243601][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.262912][ T43] device bridge_slave_0 left promiscuous mode [ 38.271108][ T610] FAULT_INJECTION: forcing a failure. [ 38.271108][ T610] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 38.273312][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.309842][ T610] CPU: 0 PID: 610 Comm: syz.1.104 Not tainted syzkaller #0 [ 38.317141][ T610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 38.327237][ T610] Call Trace: [ 38.330547][ T610] [ 38.333500][ T610] __dump_stack+0x21/0x24 [ 38.337878][ T610] dump_stack_lvl+0x110/0x170 [ 38.342675][ T610] ? __cfi_dump_stack_lvl+0x8/0x8 [ 38.347738][ T610] ? migrate_enable+0x1af/0x2a0 [ 38.352623][ T610] ? __cfi_migrate_enable+0x10/0x10 [ 38.358037][ T610] dump_stack+0x15/0x24 [ 38.362241][ T610] should_fail_ex+0x3d4/0x520 [ 38.366966][ T610] should_fail+0xb/0x10 [ 38.371299][ T610] should_fail_usercopy+0x1a/0x20 [ 38.376374][ T610] _copy_to_user+0x1e/0x90 [ 38.380944][ T610] bpf_test_finish+0x1b2/0x6c0 [ 38.385747][ T610] ? convert_skb_to___skb+0x430/0x430 [ 38.391166][ T610] ? __kasan_check_write+0x14/0x20 [ 38.396510][ T610] ? _copy_from_user+0x8f/0xc0 [ 38.401323][ T610] bpf_prog_test_run_xdp+0x80a/0xf10 [ 38.406792][ T610] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 38.412815][ T610] ? __kasan_check_write+0x14/0x20 [ 38.418044][ T610] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 38.423889][ T610] bpf_prog_test_run+0x3e3/0x640 [ 38.428946][ T610] ? bpf_prog_query+0x270/0x270 [ 38.434003][ T610] ? selinux_bpf+0xce/0xf0 [ 38.438571][ T610] ? security_bpf+0x93/0xb0 [ 38.442349][ T600] Mem-Info: [ 38.443165][ T610] __sys_bpf+0x5ee/0x850 [ 38.443194][ T610] ? bpf_link_show_fdinfo+0x330/0x330 [ 38.443220][ T610] ? __cfi_ksys_write+0x10/0x10 [ 38.443242][ T610] ? debug_smp_processor_id+0x17/0x20 [ 38.466426][ T610] __x64_sys_bpf+0x7c/0x90 [ 38.470895][ T610] x64_sys_call+0x488/0x9a0 [ 38.475478][ T610] do_syscall_64+0x4c/0xa0 [ 38.480043][ T610] ? clear_bhb_loop+0x30/0x80 [ 38.482384][ T600] active_anon:13388 inactive_anon:0 isolated_anon:0 [ 38.482384][ T600] active_file:14025 inactive_file:2288 isolated_file:0 [ 38.482384][ T600] unevictable:0 dirty:335 writeback:0 [ 38.482384][ T600] slab_reclaimable:7280 slab_unreclaimable:74662 [ 38.482384][ T600] mapped:37047 shmem:8385 pagetables:593 [ 38.482384][ T600] sec_pagetables:0 bounce:0 [ 38.482384][ T600] kernel_misc_reclaimable:0 [ 38.482384][ T600] free:1521119 free_pcp:7725 free_cma:0 [ 38.484754][ T610] ? clear_bhb_loop+0x30/0x80 [ 38.484784][ T610] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 38.484814][ T610] RIP: 0033:0x7f2007b9c819 [ 38.484833][ T610] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 38.484850][ T610] RSP: 002b:00007f2008976028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 38.484872][ T610] RAX: ffffffffffffffda RBX: 00007f2007e15fa0 RCX: 00007f2007b9c819 [ 38.581116][ T610] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 38.589133][ T610] RBP: 00007f2008976090 R08: 0000000000000000 R09: 0000000000000000 [ 38.597323][ T610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.605415][ T610] R13: 00007f2007e16038 R14: 00007f2007e15fa0 R15: 00007ffd04d83c48 [ 38.606141][ T600] Node 0 active_anon:53552kB inactive_anon:0kB active_file:56100kB inactive_file:9152kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:148188kB dirty:1340kB writeback:0kB shmem:33540kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4284kB pagetables:2372kB sec_pagetables:0kB all_unreclaimable? no [ 38.613516][ T610] [ 38.653479][ T43] device veth1_macvtap left promiscuous mode [ 38.664191][ T43] device veth0_vlan left promiscuous mode [ 38.792129][ T600] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971912kB mlocked:0kB bounce:0kB free_pcp:5428kB local_pcp:56kB free_cma:0kB [ 38.852082][ T600] lowmem_reserve[]: 0 3932 3932 3932 [ 38.869140][ T600] Normal free:3088680kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:69952kB inactive_anon:0kB active_file:64300kB inactive_file:9152kB unevictable:0kB writepending:1340kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:34756kB local_pcp:9380kB free_cma:0kB [ 38.932596][ T600] lowmem_reserve[]: 0 0 0 0 [ 38.937674][ T600] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 38.986124][ T600] Normal: 26*4kB (E) 3*8kB (E) 2*16kB (ME) 1*32kB (E) 1*64kB (U) 1*128kB (E) 1*256kB (M) 8*512kB (ME) 3*1024kB (M) 3*2048kB (UE) 751*4096kB (M) = 3090048kB [ 39.008213][ T600] 30248 total pagecache pages [ 39.013100][ T28] audit: type=1400 audit(1775610795.200:120): avc: denied { write } for pid=621 comm="syz.2.110" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.036522][ T600] 0 pages in swap cache [ 39.040726][ T600] Free swap = 124996kB [ 39.045200][ T600] Total swap = 124996kB [ 39.055265][ T600] 2097051 pages RAM [ 39.059305][ T600] 0 pages HighMem/MovableOnly [ 39.064636][ T600] 347473 pages reserved [ 39.068831][ T600] 0 pages cma reserved [ 39.772529][ T43] device bridge_slave_1 left promiscuous mode [ 39.778821][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.816471][ T43] device bridge_slave_0 left promiscuous mode [ 39.834304][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.870259][ T43] device veth1_macvtap left promiscuous mode [ 39.892033][ T43] device veth0_vlan left promiscuous mode [ 40.213243][ T659] pimreg: tun_chr_ioctl cmd 1074025677 [ 40.245115][ T659] pimreg: linktype set to 776 [ 40.471672][ T654] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.497309][ T654] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.512724][ T654] device bridge_slave_0 entered promiscuous mode [ 40.534873][ T654] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.549840][ T654] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.558652][ T654] device bridge_slave_1 entered promiscuous mode [ 40.688753][ T681] FAULT_INJECTION: forcing a failure. [ 40.688753][ T681] name failslab, interval 1, probability 0, space 0, times 0 [ 40.704135][ T683] FAULT_INJECTION: forcing a failure. [ 40.704135][ T683] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 40.730699][ T683] CPU: 0 PID: 683 Comm: syz.3.127 Not tainted syzkaller #0 [ 40.737976][ T683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 40.738755][ T682] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 40.748067][ T683] Call Trace: [ 40.748079][ T683] [ 40.748087][ T683] __dump_stack+0x21/0x24 [ 40.748122][ T683] dump_stack_lvl+0x110/0x170 [ 40.772731][ T683] ? __cfi_dump_stack_lvl+0x8/0x8 [ 40.777856][ T683] ? unwind_get_return_address+0x4d/0x90 [ 40.783617][ T683] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 40.790004][ T683] dump_stack+0x15/0x24 [ 40.794218][ T683] should_fail_ex+0x3d4/0x520 [ 40.798968][ T683] should_fail_alloc_page+0x61/0x90 [ 40.804321][ T683] prepare_alloc_pages+0x148/0x600 [ 40.809529][ T683] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 40.814771][ T683] ? kasan_set_track+0x60/0x70 [ 40.819670][ T683] ? kasan_set_track+0x4b/0x70 [ 40.824584][ T683] ? kasan_save_alloc_info+0x25/0x30 [ 40.829918][ T683] ? __kasan_slab_alloc+0x72/0x80 [ 40.835136][ T683] ? slab_post_alloc_hook+0x4f/0x2d0 [ 40.840559][ T683] __alloc_pages+0x15b/0x610 [ 40.845204][ T683] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 40.851323][ T683] ? __cfi___alloc_pages+0x10/0x10 [ 40.856582][ T683] __get_free_pages+0xe/0x30 [ 40.861362][ T683] kasan_populate_vmalloc_pte+0x29/0x120 [ 40.867090][ T683] __apply_to_page_range+0x8de/0xc80 [ 40.872507][ T683] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 40.878962][ T683] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 40.885235][ T683] apply_to_page_range+0x3b/0x50 [ 40.890202][ T683] kasan_populate_vmalloc+0x60/0x70 [ 40.895422][ T683] alloc_vmap_area+0x1779/0x18b0 [ 40.900474][ T683] ? vm_map_ram+0x930/0x930 [ 40.905036][ T683] ? __kasan_kmalloc+0x95/0xb0 [ 40.909913][ T683] ? kmalloc_node_trace+0x3d/0xb0 [ 40.915059][ T683] __get_vm_area_node+0x160/0x360 [ 40.920231][ T683] __vmalloc_node_range+0x326/0x1430 [ 40.925581][ T683] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 40.931368][ T683] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 40.937171][ T683] ? __stack_depot_save+0x36/0x480 [ 40.942322][ T683] ? __cfi___vmalloc_node_range+0x10/0x10 [ 40.948181][ T683] ? __cfi_selinux_capable+0x10/0x10 [ 40.953562][ T683] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 40.959313][ T683] __vmalloc+0x79/0x90 [ 40.963402][ T683] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 40.969095][ T683] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 40.974702][ T683] bpf_prog_alloc+0x22/0x1c0 [ 40.979761][ T683] bpf_prog_load+0x825/0x16a0 [ 40.984475][ T683] ? map_freeze+0x390/0x390 [ 40.989014][ T683] ? selinux_bpf+0xc7/0xf0 [ 40.993586][ T683] ? security_bpf+0x93/0xb0 [ 40.998136][ T683] __sys_bpf+0x57b/0x850 [ 41.002405][ T683] ? bpf_link_show_fdinfo+0x330/0x330 [ 41.007825][ T683] ? __cfi_ksys_write+0x10/0x10 [ 41.012696][ T683] ? do_user_addr_fault+0x9ac/0x1050 [ 41.018008][ T683] ? debug_smp_processor_id+0x17/0x20 [ 41.023401][ T683] __x64_sys_bpf+0x7c/0x90 [ 41.027842][ T683] x64_sys_call+0x488/0x9a0 [ 41.032362][ T683] do_syscall_64+0x4c/0xa0 [ 41.036815][ T683] ? clear_bhb_loop+0x30/0x80 [ 41.041509][ T683] ? clear_bhb_loop+0x30/0x80 [ 41.046214][ T683] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 41.052125][ T683] RIP: 0033:0x7f940759c819 [ 41.056561][ T683] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 41.076381][ T683] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.085082][ T683] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 41.093181][ T683] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 41.101464][ T683] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 41.109539][ T683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.117741][ T683] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 41.126047][ T683] [ 41.138626][ T681] CPU: 0 PID: 681 Comm: syz.1.128 Not tainted syzkaller #0 [ 41.146027][ T681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 41.156402][ T681] Call Trace: [ 41.159902][ T681] [ 41.163319][ T681] __dump_stack+0x21/0x24 [ 41.167798][ T681] dump_stack_lvl+0x110/0x170 [ 41.172531][ T681] ? __cfi_dump_stack_lvl+0x8/0x8 [ 41.177778][ T681] ? _raw_spin_unlock+0x4c/0x70 [ 41.182945][ T681] dump_stack+0x15/0x24 [ 41.187240][ T681] should_fail_ex+0x3d4/0x520 [ 41.192672][ T681] __should_failslab+0xac/0xf0 [ 41.197474][ T681] ? selinux_bpf_map_alloc+0x51/0x140 [ 41.202881][ T681] should_failslab+0x9/0x20 [ 41.207504][ T681] __kmem_cache_alloc_node+0x3d/0x2c0 [ 41.213101][ T681] ? selinux_bpf_map_alloc+0x51/0x140 [ 41.218697][ T681] kmalloc_trace+0x29/0xb0 [ 41.223238][ T681] selinux_bpf_map_alloc+0x51/0x140 [ 41.228464][ T681] security_bpf_map_alloc+0x73/0xa0 [ 41.233695][ T681] map_create+0x91b/0xd80 [ 41.238219][ T681] __sys_bpf+0x34e/0x850 [ 41.242498][ T681] ? bpf_link_show_fdinfo+0x330/0x330 [ 41.247933][ T681] ? __cfi_ksys_write+0x10/0x10 [ 41.252811][ T681] ? do_user_addr_fault+0x9ac/0x1050 [ 41.258134][ T681] ? debug_smp_processor_id+0x17/0x20 [ 41.263806][ T681] __x64_sys_bpf+0x7c/0x90 [ 41.268269][ T681] x64_sys_call+0x488/0x9a0 [ 41.272816][ T681] do_syscall_64+0x4c/0xa0 [ 41.277262][ T681] ? clear_bhb_loop+0x30/0x80 [ 41.281969][ T681] ? clear_bhb_loop+0x30/0x80 [ 41.286728][ T681] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 41.292710][ T681] RIP: 0033:0x7f2007b9c819 [ 41.297172][ T681] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 41.317268][ T681] RSP: 002b:00007f2008976028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.325884][ T681] RAX: ffffffffffffffda RBX: 00007f2007e15fa0 RCX: 00007f2007b9c819 [ 41.333946][ T681] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 41.342041][ T681] RBP: 00007f2008976090 R08: 0000000000000000 R09: 0000000000000000 [ 41.350050][ T681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.358320][ T681] R13: 00007f2007e16038 R14: 00007f2007e15fa0 R15: 00007ffd04d83c48 [ 41.366336][ T681] [ 41.507250][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.515715][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.535441][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.570838][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.593667][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.601141][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.624032][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.638785][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.654315][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.661795][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.716940][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.776169][ T701] FAULT_INJECTION: forcing a failure. [ 41.776169][ T701] name failslab, interval 1, probability 0, space 0, times 0 [ 41.790409][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.799683][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.834216][ T701] CPU: 0 PID: 701 Comm: syz.3.135 Not tainted syzkaller #0 [ 41.841510][ T701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 41.851615][ T701] Call Trace: [ 41.854927][ T701] [ 41.857889][ T701] __dump_stack+0x21/0x24 [ 41.862281][ T701] dump_stack_lvl+0x110/0x170 [ 41.867009][ T701] ? __cfi_dump_stack_lvl+0x8/0x8 [ 41.872089][ T701] dump_stack+0x15/0x24 [ 41.876289][ T701] should_fail_ex+0x3d4/0x520 [ 41.881017][ T701] __should_failslab+0xac/0xf0 [ 41.885832][ T701] ? __vmalloc_node_range+0x55f/0x1430 [ 41.891338][ T701] should_failslab+0x9/0x20 [ 41.895966][ T701] __kmem_cache_alloc_node+0x3d/0x2c0 [ 41.901385][ T701] ? _raw_spin_unlock+0x4c/0x70 [ 41.906302][ T701] ? __vmalloc_node_range+0x55f/0x1430 [ 41.911809][ T701] __kmalloc_node+0xa1/0x1e0 [ 41.916450][ T701] __vmalloc_node_range+0x55f/0x1430 [ 41.921771][ T701] ? __stack_depot_save+0x36/0x480 [ 41.926906][ T701] ? __cfi___vmalloc_node_range+0x10/0x10 [ 41.932654][ T701] ? __cfi_selinux_capable+0x10/0x10 [ 41.938057][ T701] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 41.943725][ T701] __vmalloc+0x79/0x90 [ 41.947825][ T701] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 41.953483][ T701] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 41.958922][ T701] bpf_prog_alloc+0x22/0x1c0 [ 41.963739][ T701] bpf_prog_load+0x825/0x16a0 [ 41.968451][ T701] ? map_freeze+0x390/0x390 [ 41.973065][ T701] ? selinux_bpf+0xc7/0xf0 [ 41.977564][ T701] ? security_bpf+0x93/0xb0 [ 41.982358][ T701] __sys_bpf+0x57b/0x850 [ 41.986630][ T701] ? bpf_link_show_fdinfo+0x330/0x330 [ 41.992056][ T701] ? __cfi_ksys_write+0x10/0x10 [ 41.997187][ T701] ? do_user_addr_fault+0x9ac/0x1050 [ 42.002529][ T701] ? debug_smp_processor_id+0x17/0x20 [ 42.008025][ T701] __x64_sys_bpf+0x7c/0x90 [ 42.012477][ T701] x64_sys_call+0x488/0x9a0 [ 42.017005][ T701] do_syscall_64+0x4c/0xa0 [ 42.021457][ T701] ? clear_bhb_loop+0x30/0x80 [ 42.026165][ T701] ? clear_bhb_loop+0x30/0x80 [ 42.030869][ T701] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 42.036786][ T701] RIP: 0033:0x7f940759c819 [ 42.041224][ T701] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 42.061126][ T701] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.069588][ T701] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 42.077587][ T701] RDX: 0000000000000080 RSI: 00002000000001c0 RDI: 0000000000000005 [ 42.085589][ T701] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 42.093693][ T701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.101701][ T701] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 42.109925][ T701] [ 42.123555][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 42.169357][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.205114][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.252699][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.261270][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.269416][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.324170][ T654] device veth0_vlan entered promiscuous mode [ 42.361864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.373562][ T725] FAULT_INJECTION: forcing a failure. [ 42.373562][ T725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 42.394279][ T725] CPU: 0 PID: 725 Comm: syz.0.143 Not tainted syzkaller #0 [ 42.401636][ T725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 42.411912][ T725] Call Trace: [ 42.415231][ T725] [ 42.418187][ T725] __dump_stack+0x21/0x24 [ 42.422561][ T725] dump_stack_lvl+0x110/0x170 [ 42.427281][ T725] ? __cfi_dump_stack_lvl+0x8/0x8 [ 42.432353][ T725] dump_stack+0x15/0x24 [ 42.436573][ T725] should_fail_ex+0x3d4/0x520 [ 42.441297][ T725] should_fail+0xb/0x10 [ 42.445618][ T725] should_fail_usercopy+0x1a/0x20 [ 42.450854][ T725] _copy_to_user+0x1e/0x90 [ 42.455599][ T725] simple_read_from_buffer+0xe9/0x160 [ 42.461321][ T725] proc_fail_nth_read+0x1a6/0x220 [ 42.466876][ T725] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 42.472449][ T725] ? security_file_permission+0x94/0xb0 [ 42.478114][ T725] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 42.483689][ T725] vfs_read+0x27a/0x910 [ 42.487875][ T725] ? __cfi_vfs_read+0x10/0x10 [ 42.492578][ T725] ? __kasan_check_write+0x14/0x20 [ 42.497740][ T725] ? mutex_lock+0x93/0x1b0 [ 42.502181][ T725] ? __cfi_mutex_lock+0x10/0x10 [ 42.507098][ T725] ? __fdget_pos+0x2cd/0x380 [ 42.511890][ T725] ? ksys_read+0x71/0x250 [ 42.516243][ T725] ksys_read+0x149/0x250 [ 42.520512][ T725] ? __cfi_ksys_read+0x10/0x10 [ 42.525297][ T725] ? debug_smp_processor_id+0x17/0x20 [ 42.530809][ T725] __x64_sys_read+0x7b/0x90 [ 42.535334][ T725] x64_sys_call+0x2f/0x9a0 [ 42.539777][ T725] do_syscall_64+0x4c/0xa0 [ 42.544249][ T725] ? clear_bhb_loop+0x30/0x80 [ 42.548949][ T725] ? clear_bhb_loop+0x30/0x80 [ 42.553731][ T725] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 42.559728][ T725] RIP: 0033:0x7fbf59f5d04e [ 42.564183][ T725] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 42.584250][ T725] RSP: 002b:00007fbf5add4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 42.592869][ T725] RAX: ffffffffffffffda RBX: 00007fbf5add56c0 RCX: 00007fbf59f5d04e [ 42.600861][ T725] RDX: 000000000000000f RSI: 00007fbf5add50a0 RDI: 0000000000000005 [ 42.609048][ T725] RBP: 00007fbf5add5090 R08: 0000000000000000 R09: 0000000000000000 [ 42.617311][ T725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.625294][ T725] R13: 00007fbf5a216038 R14: 00007fbf5a215fa0 R15: 00007ffd720ef068 [ 42.633287][ T725] [ 42.645443][ T654] device veth1_macvtap entered promiscuous mode [ 42.675888][ T585] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.703718][ T585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.758726][ T585] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.809229][ T585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.610471][ T742] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.617962][ T742] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.626915][ T742] device bridge_slave_0 entered promiscuous mode [ 43.634561][ T742] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.650024][ T742] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.672628][ T742] device bridge_slave_1 entered promiscuous mode [ 44.354997][ T742] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.362787][ T742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.370643][ T742] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.378206][ T742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.589320][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.597719][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.865525][ T753] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.902135][ T753] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.950574][ T753] device bridge_slave_0 entered promiscuous mode [ 45.036053][ T753] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.049979][ T753] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.066834][ T753] device bridge_slave_1 entered promiscuous mode [ 45.083622][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.093373][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.131569][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.151842][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.242806][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.250015][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.320918][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.372743][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.421682][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.428833][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.452019][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.469121][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.703950][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.715566][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.773840][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 45.789963][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.857128][ T43] device bridge_slave_1 left promiscuous mode [ 45.864814][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.882532][ T43] device bridge_slave_0 left promiscuous mode [ 45.889725][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.904199][ T43] device bridge_slave_1 left promiscuous mode [ 45.916396][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.933383][ T43] device bridge_slave_0 left promiscuous mode [ 45.944315][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.965865][ T43] device veth1_macvtap left promiscuous mode [ 45.975412][ T43] device veth0_vlan left promiscuous mode [ 45.992326][ T43] device veth1_macvtap left promiscuous mode [ 45.998676][ T43] device veth0_vlan left promiscuous mode [ 46.652734][ T777] device bridge0 entered promiscuous mode [ 46.694377][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.707508][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.723478][ T742] device veth0_vlan entered promiscuous mode [ 46.749259][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.757395][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.781368][ T742] device veth1_macvtap entered promiscuous mode [ 46.796565][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.808847][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.827541][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.862975][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.872256][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.880859][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.890669][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.971455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.980301][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.993241][ T742] syz-executor (742) used greatest stack depth: 21984 bytes left [ 47.000836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.024763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.051368][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.058958][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.092139][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.122651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.163568][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.170846][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.193032][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.227202][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.238885][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.259143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.276835][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.306569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.345072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.435233][ T753] device veth0_vlan entered promiscuous mode [ 47.443218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.480507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.480989][ T28] audit: type=1400 audit(1775610803.670:121): avc: denied { create } for pid=800 comm="syz.3.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 47.530095][ T753] device veth1_macvtap entered promiscuous mode [ 47.560804][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.580785][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.598489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.814182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.827807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.837423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.883350][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.702204][ T809] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.719635][ T809] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.738317][ T809] device bridge_slave_0 entered promiscuous mode [ 48.763890][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.781177][ T809] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.799292][ T809] device bridge_slave_1 entered promiscuous mode [ 49.059573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.067440][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.082079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.097063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.108327][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.115537][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.123484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.132237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.140520][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.147655][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.167994][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.175920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.184443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.234228][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.248153][ T809] device veth0_vlan entered promiscuous mode [ 49.254778][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.264070][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.271683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.288243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.296956][ T809] device veth1_macvtap entered promiscuous mode [ 49.314189][ T43] device bridge_slave_1 left promiscuous mode [ 49.320467][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.346068][ T43] device bridge_slave_0 left promiscuous mode [ 49.352413][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.361040][ T43] device veth1_macvtap left promiscuous mode [ 49.367697][ T43] device veth0_vlan left promiscuous mode [ 49.555579][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.587590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.782723][ T824] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.789853][ T824] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.882611][ T824] device bridge_slave_0 entered promiscuous mode [ 50.023879][ T824] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.031047][ T824] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.079604][ T824] device bridge_slave_1 entered promiscuous mode [ 50.845718][ T854] device bridge0 left promiscuous mode [ 50.937083][ T845] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.955020][ T845] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.982455][ T845] device bridge_slave_0 entered promiscuous mode [ 51.031306][ T845] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.040539][ T845] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.061363][ T845] device bridge_slave_1 entered promiscuous mode [ 51.084477][ T854] device bridge0 entered promiscuous mode [ 51.337036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.349134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.371866][ T43] device bridge_slave_1 left promiscuous mode [ 51.378354][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.400423][ T43] device bridge_slave_0 left promiscuous mode [ 51.419166][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.442059][ T43] device bridge_slave_1 left promiscuous mode [ 51.476047][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.494835][ T43] device bridge_slave_0 left promiscuous mode [ 51.507416][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.529840][ T43] device veth1_macvtap left promiscuous mode [ 51.540488][ T43] device veth0_vlan left promiscuous mode [ 51.556876][ T43] device veth1_macvtap left promiscuous mode [ 51.609151][ T43] device veth0_vlan left promiscuous mode [ 51.862774][ T28] audit: type=1400 audit(1775610808.060:122): avc: denied { create } for pid=864 comm="syz.3.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 52.282414][ T28] audit: type=1400 audit(1775610808.430:123): avc: denied { create } for pid=862 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 52.326243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.344019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.369583][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.376818][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.427704][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.438745][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.449100][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.464495][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.471613][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.592596][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.606845][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.717177][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.731817][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.840666][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 52.850304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.897904][ T824] device veth0_vlan entered promiscuous mode [ 52.905575][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 52.914194][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.955642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.964487][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.972528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.980939][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.010588][ T824] device veth1_macvtap entered promiscuous mode [ 53.091307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.112592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.132226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.195688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.211147][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.233845][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.241268][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.273315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.296853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.318445][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.325623][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.350504][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 53.359164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.367926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 53.376536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 53.385477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.440999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.450724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.459510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.468862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.566323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.576375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.608998][ T845] device veth0_vlan entered promiscuous mode [ 53.644098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.654338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.670391][ T845] device veth1_macvtap entered promiscuous mode [ 53.705800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.716773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.732516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 53.751168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.769749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.853083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 53.862571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.881767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 53.890515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.413376][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.420704][ T881] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.428518][ T881] device bridge_slave_0 entered promiscuous mode [ 54.443609][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.450961][ T881] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.458970][ T881] device bridge_slave_1 entered promiscuous mode [ 54.508262][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.515390][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.522736][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.530075][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.551108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.559483][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.567318][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.575571][ T43] device bridge_slave_1 left promiscuous mode [ 54.582726][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.590456][ T43] device bridge_slave_0 left promiscuous mode [ 54.596758][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.604889][ T43] device veth1_macvtap left promiscuous mode [ 54.610947][ T43] device veth0_vlan left promiscuous mode [ 54.712407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.736138][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.743460][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.787523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.806053][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.813192][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.881655][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.908697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.970109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.986778][ T881] device veth0_vlan entered promiscuous mode [ 54.999677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.024620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.033470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.046704][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.056047][ T881] device veth1_macvtap entered promiscuous mode [ 55.096274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.137819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.160487][ T899] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.182132][ T899] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.215719][ T899] device bridge_slave_0 entered promiscuous mode [ 55.246700][ T899] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.273149][ T899] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.280843][ T899] device bridge_slave_1 entered promiscuous mode [ 55.581170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.599099][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.609505][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.626812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.635605][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.642786][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.672506][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.689939][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.702927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.721356][ T917] FAULT_INJECTION: forcing a failure. [ 55.721356][ T917] name failslab, interval 1, probability 0, space 0, times 0 [ 55.734568][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.741641][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.779072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.787869][ T917] CPU: 0 PID: 917 Comm: syz.3.192 Not tainted syzkaller #0 [ 55.795113][ T917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 55.805214][ T917] Call Trace: [ 55.808536][ T917] [ 55.811523][ T917] __dump_stack+0x21/0x24 [ 55.815942][ T917] dump_stack_lvl+0x110/0x170 [ 55.820667][ T917] ? __cfi_dump_stack_lvl+0x8/0x8 [ 55.825739][ T917] dump_stack+0x15/0x24 [ 55.829928][ T917] should_fail_ex+0x3d4/0x520 [ 55.834649][ T917] __should_failslab+0xac/0xf0 [ 55.839522][ T917] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 55.845273][ T917] should_failslab+0x9/0x20 [ 55.849992][ T917] __kmem_cache_alloc_node+0x3d/0x2c0 [ 55.855563][ T917] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 55.861510][ T917] kmalloc_trace+0x29/0xb0 [ 55.865949][ T917] selinux_sk_alloc_security+0x7e/0x1a0 [ 55.871644][ T917] security_sk_alloc+0x83/0xb0 [ 55.876436][ T917] sk_prot_alloc+0x108/0x320 [ 55.881048][ T917] sk_alloc+0x3b/0x460 [ 55.885143][ T917] bpf_prog_test_run_skb+0x375/0x12c0 [ 55.890728][ T917] ? __fget_files+0x2d5/0x330 [ 55.895437][ T917] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 55.901352][ T917] bpf_prog_test_run+0x3e3/0x640 [ 55.906311][ T917] ? bpf_prog_query+0x270/0x270 [ 55.911174][ T917] ? selinux_bpf+0xce/0xf0 [ 55.915616][ T917] ? security_bpf+0x93/0xb0 [ 55.920143][ T917] __sys_bpf+0x5ee/0x850 [ 55.924507][ T917] ? bpf_link_show_fdinfo+0x330/0x330 [ 55.929910][ T917] ? __cfi_ksys_write+0x10/0x10 [ 55.934799][ T917] ? debug_smp_processor_id+0x17/0x20 [ 55.940195][ T917] __x64_sys_bpf+0x7c/0x90 [ 55.944639][ T917] x64_sys_call+0x488/0x9a0 [ 55.949189][ T917] do_syscall_64+0x4c/0xa0 [ 55.953637][ T917] ? clear_bhb_loop+0x30/0x80 [ 55.958335][ T917] ? clear_bhb_loop+0x30/0x80 [ 55.963044][ T917] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 55.969058][ T917] RIP: 0033:0x7f940759c819 [ 55.973511][ T917] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 55.993263][ T917] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 56.001792][ T917] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 56.009788][ T917] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 56.017781][ T917] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 56.025862][ T917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.033855][ T917] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 56.041852][ T917] [ 56.056376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.084612][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.101080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.153721][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.165808][ T899] device veth0_vlan entered promiscuous mode [ 56.184134][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.209303][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.216946][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.277357][ T899] device veth1_macvtap entered promiscuous mode [ 56.295920][ T43] device bridge_slave_1 left promiscuous mode [ 56.302644][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.310407][ T43] device bridge_slave_0 left promiscuous mode [ 56.317334][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.326028][ T43] device veth1_macvtap left promiscuous mode [ 56.332560][ T43] device veth0_vlan left promiscuous mode [ 56.407618][ T936] FAULT_INJECTION: forcing a failure. [ 56.407618][ T936] name failslab, interval 1, probability 0, space 0, times 0 [ 56.420463][ T936] CPU: 1 PID: 936 Comm: syz.3.197 Not tainted syzkaller #0 [ 56.427705][ T936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 56.438115][ T936] Call Trace: [ 56.441534][ T936] [ 56.444491][ T936] __dump_stack+0x21/0x24 [ 56.449120][ T936] dump_stack_lvl+0x110/0x170 [ 56.454284][ T936] ? __cfi_dump_stack_lvl+0x8/0x8 [ 56.459346][ T936] ? kasan_set_track+0x60/0x70 [ 56.464132][ T936] ? kasan_save_alloc_info+0x25/0x30 [ 56.469666][ T936] ? __kasan_slab_alloc+0x72/0x80 [ 56.474709][ T936] ? slab_post_alloc_hook+0x4f/0x2d0 [ 56.480103][ T936] ? kmem_cache_alloc+0x16e/0x330 [ 56.485256][ T936] dump_stack+0x15/0x24 [ 56.489546][ T936] should_fail_ex+0x3d4/0x520 [ 56.494241][ T936] __should_failslab+0xac/0xf0 [ 56.499159][ T936] ? ref_tracker_alloc+0x169/0x4a0 [ 56.504281][ T936] should_failslab+0x9/0x20 [ 56.508906][ T936] __kmem_cache_alloc_node+0x3d/0x2c0 [ 56.514381][ T936] ? ref_tracker_alloc+0x169/0x4a0 [ 56.519596][ T936] kmalloc_trace+0x29/0xb0 [ 56.524043][ T936] ref_tracker_alloc+0x169/0x4a0 [ 56.529011][ T936] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 56.534477][ T936] ? slab_post_alloc_hook+0x6d/0x2d0 [ 56.539892][ T936] ? dst_alloc+0x16a/0x1e0 [ 56.544450][ T936] dst_init+0xc4/0x3d0 [ 56.548893][ T936] ? __cfi_ip6_dst_gc+0x10/0x10 [ 56.553885][ T936] dst_alloc+0x191/0x1e0 [ 56.558213][ T936] ip6_pol_route+0x9e1/0x1130 [ 56.562918][ T936] ? ip6_pol_route+0x480/0x1130 [ 56.567798][ T936] ? __cfi_ip6_pol_route+0x10/0x10 [ 56.572925][ T936] ? get_page_from_freelist+0x2d12/0x2d80 [ 56.578761][ T936] ip6_pol_route_input+0x56/0x80 [ 56.583707][ T936] fib6_rule_lookup+0x21b/0x5f0 [ 56.588578][ T936] ? __cfi_ip6_pol_route_input+0x10/0x10 [ 56.594219][ T936] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 56.599712][ T936] ? ip6t_do_table+0x1342/0x14f0 [ 56.604668][ T936] ip6_route_input+0x612/0x8c0 [ 56.609443][ T936] ? __cfi_ip6_route_input+0x10/0x10 [ 56.614792][ T936] ? __cfi_ip6t_do_table+0x10/0x10 [ 56.619921][ T936] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 56.625744][ T936] ip6_rcv_finish+0x156/0x370 [ 56.630559][ T936] ipv6_rcv+0xed/0x230 [ 56.634661][ T936] ? __cfi_ipv6_rcv+0x10/0x10 [ 56.639424][ T936] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 56.644655][ T936] ? _copy_from_iter+0x191/0x1010 [ 56.649740][ T936] ? __cfi_ipv6_rcv+0x10/0x10 [ 56.654644][ T936] __netif_receive_skb+0xd7/0x2a0 [ 56.659687][ T936] ? tun_rx_batched+0x166/0x780 [ 56.664639][ T936] netif_receive_skb+0x98/0x3e0 [ 56.669626][ T936] ? __cfi_netif_receive_skb+0x10/0x10 [ 56.675202][ T936] ? __cfi__copy_from_iter+0x10/0x10 [ 56.680812][ T936] ? tun_rx_batched+0x166/0x780 [ 56.685965][ T936] tun_rx_batched+0x1c4/0x780 [ 56.690772][ T936] ? pskb_may_pull+0x100/0x100 [ 56.695555][ T936] ? tun_get_user+0x2054/0x3470 [ 56.700463][ T936] tun_get_user+0x2534/0x3470 [ 56.705243][ T936] ? _parse_integer+0x2a/0x40 [ 56.710035][ T936] ? tun_do_read+0x1cf0/0x1cf0 [ 56.714876][ T936] ? __kasan_check_write+0x14/0x20 [ 56.720007][ T936] ? ref_tracker_alloc+0x31d/0x4a0 [ 56.725159][ T936] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 56.730728][ T936] ? avc_policy_seqno+0x1b/0x70 [ 56.735651][ T936] ? selinux_file_permission+0x2a5/0x510 [ 56.741321][ T936] tun_chr_write_iter+0x1fb/0x300 [ 56.746387][ T936] vfs_write+0x603/0xce0 [ 56.750651][ T936] ? __cfi_vfs_write+0x10/0x10 [ 56.755428][ T936] ? __fget_files+0x2d5/0x330 [ 56.760112][ T936] ? __fdget_pos+0x1f2/0x380 [ 56.764840][ T936] ? ksys_write+0x71/0x250 [ 56.769267][ T936] ksys_write+0x149/0x250 [ 56.773608][ T936] ? __cfi_ksys_write+0x10/0x10 [ 56.778659][ T936] ? debug_smp_processor_id+0x17/0x20 [ 56.784057][ T936] __x64_sys_write+0x7b/0x90 [ 56.788692][ T936] x64_sys_call+0x27b/0x9a0 [ 56.793217][ T936] do_syscall_64+0x4c/0xa0 [ 56.797673][ T936] ? clear_bhb_loop+0x30/0x80 [ 56.802405][ T936] ? clear_bhb_loop+0x30/0x80 [ 56.807102][ T936] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 56.813127][ T936] RIP: 0033:0x7f940759c819 [ 56.817583][ T936] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 56.837555][ T936] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 56.846173][ T936] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 56.854156][ T936] RDX: 000000000000fdef RSI: 0000200000000200 RDI: 00000000000000c8 [ 56.862183][ T936] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 56.870448][ T936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.878593][ T936] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 56.886864][ T936] [ 56.889958][ T936] memory allocation failure, unreliable refcount tracker. [ 56.945296][ T918] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.952723][ T918] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.961094][ T918] device bridge_slave_0 entered promiscuous mode [ 56.968595][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.978243][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.987038][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.996360][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 57.005422][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.023478][ T918] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.030974][ T918] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.038805][ T918] device bridge_slave_1 entered promiscuous mode [ 57.046242][ T920] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.064438][ T920] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.082525][ T920] device bridge_slave_0 entered promiscuous mode [ 57.104508][ T920] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.111620][ T920] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.215221][ T920] device bridge_slave_1 entered promiscuous mode [ 57.423164][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.430908][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.440961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.449711][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.458441][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.465708][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.483300][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.504491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.513280][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.521536][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.528815][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.550318][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.577197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.584967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.592894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.600865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.609666][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.618744][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.626137][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.634298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.650563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.659175][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.666246][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.678085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.701286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.711865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.720206][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.728633][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.736486][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.745435][ T918] device veth0_vlan entered promiscuous mode [ 57.764439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.775751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.784946][ T918] device veth1_macvtap entered promiscuous mode [ 57.801363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.809789][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.817805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.827326][ T920] device veth0_vlan entered promiscuous mode [ 57.843556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.854272][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.867844][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.881143][ T920] device veth1_macvtap entered promiscuous mode [ 57.900948][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.953520][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.101461][ T951] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.109107][ T951] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.116784][ T951] device bridge_slave_0 entered promiscuous mode [ 58.124412][ T951] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.131478][ T951] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.139368][ T951] device bridge_slave_1 entered promiscuous mode [ 58.194629][ T43] device bridge_slave_1 left promiscuous mode [ 58.200808][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.209062][ T43] device bridge_slave_0 left promiscuous mode [ 58.215360][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.223631][ T43] device bridge_slave_1 left promiscuous mode [ 58.229878][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.237670][ T43] device bridge_slave_0 left promiscuous mode [ 58.244296][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.253810][ T43] device bridge_slave_1 left promiscuous mode [ 58.259990][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.320416][ T43] device bridge_slave_0 left promiscuous mode [ 58.330931][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.340947][ T43] device veth1_macvtap left promiscuous mode [ 58.357512][ T43] device veth0_vlan left promiscuous mode [ 58.372127][ T43] device veth1_macvtap left promiscuous mode [ 58.378227][ T43] device veth0_vlan left promiscuous mode [ 58.392328][ T43] device veth1_macvtap left promiscuous mode [ 58.398446][ T43] device veth0_vlan left promiscuous mode [ 58.561980][ T28] audit: type=1400 audit(1775610814.750:124): avc: denied { ioctl } for pid=970 comm="syz.3.208" path="socket:[21024]" dev="sockfs" ino=21024 ioctlcmd=0x2406 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.602525][ T973] FAULT_INJECTION: forcing a failure. [ 58.602525][ T973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 58.617500][ T973] CPU: 0 PID: 973 Comm: syz.3.209 Not tainted syzkaller #0 [ 58.624885][ T973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 58.634982][ T973] Call Trace: [ 58.638296][ T973] [ 58.641354][ T973] __dump_stack+0x21/0x24 [ 58.645875][ T973] dump_stack_lvl+0x110/0x170 [ 58.650685][ T973] ? __cfi_dump_stack_lvl+0x8/0x8 [ 58.655780][ T973] dump_stack+0x15/0x24 [ 58.659998][ T973] should_fail_ex+0x3d4/0x520 [ 58.664807][ T973] should_fail+0xb/0x10 [ 58.669089][ T973] should_fail_usercopy+0x1a/0x20 [ 58.674136][ T973] _copy_to_user+0x1e/0x90 [ 58.678585][ T973] simple_read_from_buffer+0xe9/0x160 [ 58.684150][ T973] proc_fail_nth_read+0x1a6/0x220 [ 58.689239][ T973] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 58.694799][ T973] ? security_file_permission+0x94/0xb0 [ 58.700460][ T973] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 58.706020][ T973] vfs_read+0x27a/0x910 [ 58.710210][ T973] ? __cfi_vfs_read+0x10/0x10 [ 58.714918][ T973] ? __kasan_check_write+0x14/0x20 [ 58.720159][ T973] ? mutex_lock+0x93/0x1b0 [ 58.724595][ T973] ? __cfi_mutex_lock+0x10/0x10 [ 58.729641][ T973] ? __fdget_pos+0x2cd/0x380 [ 58.734261][ T973] ? ksys_read+0x71/0x250 [ 58.738720][ T973] ksys_read+0x149/0x250 [ 58.742990][ T973] ? __cfi_ksys_read+0x10/0x10 [ 58.747806][ T973] ? debug_smp_processor_id+0x17/0x20 [ 58.753331][ T973] __x64_sys_read+0x7b/0x90 [ 58.757874][ T973] x64_sys_call+0x2f/0x9a0 [ 58.762500][ T973] do_syscall_64+0x4c/0xa0 [ 58.766948][ T973] ? clear_bhb_loop+0x30/0x80 [ 58.771740][ T973] ? clear_bhb_loop+0x30/0x80 [ 58.776445][ T973] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 58.782368][ T973] RIP: 0033:0x7f940755d04e [ 58.786871][ T973] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 58.806503][ T973] RSP: 002b:00007f9408448fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 58.814946][ T973] RAX: ffffffffffffffda RBX: 00007f94084496c0 RCX: 00007f940755d04e [ 58.823202][ T973] RDX: 000000000000000f RSI: 00007f94084490a0 RDI: 0000000000000007 [ 58.831196][ T973] RBP: 00007f9408449090 R08: 0000000000000000 R09: 0000000000000000 [ 58.839220][ T973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.847383][ T973] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 58.855491][ T973] [ 59.126090][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.135485][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.143445][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.153360][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.161705][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.169294][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.178209][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.187251][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.195919][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.203101][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.255960][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.265223][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.278973][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.287379][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.296407][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.324318][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 59.332865][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.355842][ T951] device veth0_vlan entered promiscuous mode [ 59.366468][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 59.376800][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.390700][ T967] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.398514][ T967] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.406774][ T967] device bridge_slave_0 entered promiscuous mode [ 59.420068][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.428174][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.456688][ T951] device veth1_macvtap entered promiscuous mode [ 59.464784][ T967] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.472630][ T967] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.480273][ T967] device bridge_slave_1 entered promiscuous mode [ 59.487533][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 59.526220][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.572653][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.148616][ T964] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.171967][ T964] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.179755][ T964] device bridge_slave_0 entered promiscuous mode [ 61.253578][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.282498][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.341122][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.382828][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 61.391572][ T964] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.399626][ T964] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.415098][ T964] device bridge_slave_1 entered promiscuous mode [ 61.655384][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.686568][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.735576][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.746924][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.755340][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.767049][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.776675][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.783778][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.847334][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.873300][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.901873][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.909009][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.952714][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.019024][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.037323][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.079901][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.110159][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.117282][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.165795][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.202499][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.228035][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.235168][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.262698][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.274154][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.282500][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.298101][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.324783][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.340166][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.364545][ T967] device veth0_vlan entered promiscuous mode [ 62.392389][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.414532][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.470935][ T964] device veth0_vlan entered promiscuous mode [ 62.492961][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.534313][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.543366][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.602438][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.636912][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.683976][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.718702][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.747676][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.786148][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.812391][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.847634][ T964] device veth1_macvtap entered promiscuous mode [ 62.893699][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.909978][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.941652][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 62.973445][ T967] device veth1_macvtap entered promiscuous mode [ 63.017522][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 63.027567][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.036413][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.045406][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.054287][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.103129][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.138966][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.149446][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.159149][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.187225][ T1027] device bridge0 left promiscuous mode [ 63.262385][ T1027] device bridge0 entered promiscuous mode [ 63.324467][ T43] device bridge_slave_1 left promiscuous mode [ 63.330700][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.345404][ T43] device bridge_slave_0 left promiscuous mode [ 63.383170][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.395371][ T43] device bridge_slave_1 left promiscuous mode [ 63.401580][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.413210][ T43] device bridge_slave_0 left promiscuous mode [ 63.419519][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.443756][ T43] device veth1_macvtap left promiscuous mode [ 63.449975][ T43] device veth0_vlan left promiscuous mode [ 63.472485][ T43] device veth1_macvtap left promiscuous mode [ 63.478637][ T43] device veth0_vlan left promiscuous mode [ 64.068845][ T1018] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.099139][ T1018] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.126265][ T1018] device bridge_slave_0 entered promiscuous mode [ 64.147025][ T1018] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.159985][ T1018] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.175389][ T1018] device bridge_slave_1 entered promiscuous mode [ 64.264365][ T1053] FAULT_INJECTION: forcing a failure. [ 64.264365][ T1053] name failslab, interval 1, probability 0, space 0, times 0 [ 64.318967][ T1053] CPU: 1 PID: 1053 Comm: syz.1.232 Not tainted syzkaller #0 [ 64.326704][ T1053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 64.337172][ T1053] Call Trace: [ 64.340500][ T1053] [ 64.343482][ T1053] __dump_stack+0x21/0x24 [ 64.347892][ T1053] dump_stack_lvl+0x110/0x170 [ 64.352623][ T1053] ? __cfi_dump_stack_lvl+0x8/0x8 [ 64.357751][ T1053] dump_stack+0x15/0x24 [ 64.362049][ T1053] should_fail_ex+0x3d4/0x520 [ 64.366783][ T1053] __should_failslab+0xac/0xf0 [ 64.371769][ T1053] ? tracepoint_probe_unregister+0x211/0x8e0 [ 64.377803][ T1053] should_failslab+0x9/0x20 [ 64.382437][ T1053] __kmem_cache_alloc_node+0x3d/0x2c0 [ 64.387999][ T1053] ? __cfi_mutex_lock+0x10/0x10 [ 64.392945][ T1053] ? tracepoint_probe_unregister+0x211/0x8e0 [ 64.399085][ T1053] __kmalloc+0xa1/0x1e0 [ 64.403475][ T1053] ? __kasan_check_write+0x14/0x20 [ 64.408648][ T1053] ? __cfi_perf_trace_sched_switch+0x10/0x10 [ 64.414711][ T1053] tracepoint_probe_unregister+0x211/0x8e0 [ 64.420669][ T1053] trace_event_reg+0x225/0x270 [ 64.425480][ T1053] perf_trace_event_unreg+0xcc/0x1c0 [ 64.430906][ T1053] perf_trace_destroy+0xbe/0x180 [ 64.435893][ T1053] tp_perf_event_destroy+0x15/0x20 [ 64.441135][ T1053] ? __cfi_tp_perf_event_destroy+0x10/0x10 [ 64.447156][ T1053] _free_event+0x9cd/0xce0 [ 64.451619][ T1053] perf_event_release_kernel+0x825/0x8c0 [ 64.457299][ T1053] ? __cfi_perf_event_release_kernel+0x10/0x10 [ 64.463496][ T1053] perf_release+0x3b/0x40 [ 64.467897][ T1053] ? __cfi_perf_release+0x10/0x10 [ 64.472963][ T1053] __fput+0x1fc/0x8f0 [ 64.476991][ T1053] ____fput+0x15/0x20 [ 64.481018][ T1053] task_work_run+0x1e1/0x250 [ 64.485923][ T1053] ? __cfi_task_work_run+0x10/0x10 [ 64.491079][ T1053] ? fput+0x15b/0x1a0 [ 64.495105][ T1053] exit_to_user_mode_loop+0x9b/0xb0 [ 64.500367][ T1053] exit_to_user_mode_prepare+0x87/0xd0 [ 64.506001][ T1053] syscall_exit_to_user_mode+0x1a/0x30 [ 64.511605][ T1053] do_syscall_64+0x58/0xa0 [ 64.516161][ T1053] ? clear_bhb_loop+0x30/0x80 [ 64.520884][ T1053] ? clear_bhb_loop+0x30/0x80 [ 64.525636][ T1053] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.531592][ T1053] RIP: 0033:0x7f2007b9c819 [ 64.536059][ T1053] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 64.556162][ T1053] RSP: 002b:00007f2008976028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 64.564891][ T1053] RAX: 0000000000000000 RBX: 00007f2007e15fa0 RCX: 00007f2007b9c819 [ 64.572907][ T1053] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 64.580930][ T1053] RBP: 00007f2008976090 R08: 0000000000000000 R09: 0000000000000000 [ 64.589041][ T1053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.597221][ T1053] R13: 00007f2007e16038 R14: 00007f2007e15fa0 R15: 00007ffd04d83c48 [ 64.605339][ T1053] [ 64.628531][ T1053] CFI failure at __traceiter_sched_switch+0x9b/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) [ 64.629892][ T1046] CFI failure at __traceiter_sched_switch+0x9b/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) [ 64.640684][ T1053] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 64.658412][ T1053] CPU: 1 PID: 1053 Comm: syz.1.232 Not tainted syzkaller #0 [ 64.665695][ T1053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 64.675756][ T1053] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 64.682008][ T1053] Code: 80 3c 30 00 74 05 e8 f4 bd 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 64.701714][ T1053] RSP: 0018:ffffc90000a77630 EFLAGS: 00010096 [ 64.707984][ T1053] RAX: 1ffff110239f58c6 RBX: ffff88811cfac628 RCX: ffff888118d23cc0 [ 64.716086][ T1053] RDX: ffff88811a3cbcc0 RSI: 0000000000000001 RDI: ffffffff87104680 [ 64.724418][ T1053] RBP: ffffc90000a77670 R08: 0000000000000000 R09: 1ffffffff0f2573d [ 64.732510][ T1053] R10: 00000000b720eca3 R11: fffffbfff0f2573e R12: 0000000000000001 [ 64.740486][ T1053] R13: ffff88811cfac628 R14: dffffc0000000000 R15: ffffffff81728f60 [ 64.748639][ T1053] FS: 00007f20089766c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 64.757672][ T1053] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 64.764269][ T1053] CR2: 0000000000000004 CR3: 000000013446d000 CR4: 00000000003506a0 [ 64.772330][ T1053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 64.780487][ T1053] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 64.788679][ T1053] Call Trace: [ 64.792229][ T1053] [ 64.795302][ T1053] __schedule+0x1270/0x1500 [ 64.799869][ T1053] ? release_firmware_map_entry+0x190/0x190 [ 64.805778][ T1053] ? preempt_schedule+0xbc/0xd0 [ 64.810648][ T1053] preempt_schedule_common+0x9b/0xf0 [ 64.815958][ T1053] preempt_schedule+0xbc/0xd0 [ 64.820651][ T1053] ? __cfi_preempt_schedule+0x10/0x10 [ 64.826116][ T1053] ? queue_delayed_work_on+0x106/0x160 [ 64.831612][ T1053] preempt_schedule_thunk+0x16/0x18 [ 64.836927][ T1053] _raw_spin_unlock_irqrestore+0x6f/0x80 [ 64.842670][ T1053] srcu_gp_start_if_needed+0xd09/0x1010 [ 64.848401][ T1053] ? start_poll_synchronize_srcu+0x20/0x20 [ 64.854224][ T1053] __synchronize_srcu+0x179/0x210 [ 64.859651][ T1053] ? synchronize_srcu_expedited+0x20/0x20 [ 64.865394][ T1053] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 64.870887][ T1053] ? __cfi_wakeme_after_rcu+0x10/0x10 [ 64.876367][ T1053] ? tracepoint_probe_unregister+0x878/0x8e0 [ 64.882412][ T1053] ? ktime_get_mono_fast_ns+0x1b3/0x1d0 [ 64.887980][ T1053] synchronize_srcu+0x1d9/0x1f0 [ 64.892869][ T1053] perf_trace_event_unreg+0xd8/0x1c0 [ 64.898168][ T1053] perf_trace_destroy+0xbe/0x180 [ 64.903283][ T1053] tp_perf_event_destroy+0x15/0x20 [ 64.908434][ T1053] ? __cfi_tp_perf_event_destroy+0x10/0x10 [ 64.914348][ T1053] _free_event+0x9cd/0xce0 [ 64.918843][ T1053] perf_event_release_kernel+0x825/0x8c0 [ 64.924519][ T1053] ? __cfi_perf_event_release_kernel+0x10/0x10 [ 64.930781][ T1053] perf_release+0x3b/0x40 [ 64.935165][ T1053] ? __cfi_perf_release+0x10/0x10 [ 64.940401][ T1053] __fput+0x1fc/0x8f0 [ 64.944414][ T1053] ____fput+0x15/0x20 [ 64.948408][ T1053] task_work_run+0x1e1/0x250 [ 64.953006][ T1053] ? __cfi_task_work_run+0x10/0x10 [ 64.958231][ T1053] ? fput+0x15b/0x1a0 [ 64.962238][ T1053] exit_to_user_mode_loop+0x9b/0xb0 [ 64.967443][ T1053] exit_to_user_mode_prepare+0x87/0xd0 [ 64.973016][ T1053] syscall_exit_to_user_mode+0x1a/0x30 [ 64.978631][ T1053] do_syscall_64+0x58/0xa0 [ 64.983071][ T1053] ? clear_bhb_loop+0x30/0x80 [ 64.987855][ T1053] ? clear_bhb_loop+0x30/0x80 [ 64.992629][ T1053] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.998529][ T1053] RIP: 0033:0x7f2007b9c819 [ 65.003042][ T1053] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 65.022851][ T1053] RSP: 002b:00007f2008976028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 65.031291][ T1053] RAX: 0000000000000000 RBX: 00007f2007e15fa0 RCX: 00007f2007b9c819 [ 65.039474][ T1053] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 65.047983][ T1053] RBP: 00007f2008976090 R08: 0000000000000000 R09: 0000000000000000 [ 65.055971][ T1053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.064060][ T1053] R13: 00007f2007e16038 R14: 00007f2007e15fa0 R15: 00007ffd04d83c48 [ 65.072094][ T1053] [ 65.075222][ T1053] Modules linked in: [ 65.079180][ T1046] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 65.079187][ T1053] ---[ end trace 0000000000000000 ]--- [ 65.079200][ T1053] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 65.085290][ T1046] CPU: 0 PID: 1046 Comm: syz.3.230 Tainted: G D syzkaller #0 [ 65.090760][ T1053] Code: 80 3c 30 00 74 05 e8 f4 bd 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 65.096927][ T1046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 65.105860][ T1053] RSP: 0018:ffffc90000a77630 EFLAGS: 00010096 [ 65.125677][ T1046] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 65.135758][ T1053] [ 65.135767][ T1053] RAX: 1ffff110239f58c6 RBX: ffff88811cfac628 RCX: ffff888118d23cc0 [ 65.141927][ T1046] Code: 80 3c 30 00 74 05 e8 f4 bd 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 65.148226][ T1053] RDX: ffff88811a3cbcc0 RSI: 0000000000000001 RDI: ffffffff87104680 [ 65.150743][ T1046] RSP: 0018:ffffc90000c46570 EFLAGS: 00010096 [ 65.158753][ T1053] RBP: ffffc90000a77670 R08: 0000000000000000 R09: 1ffffffff0f2573d [ 65.178641][ T1046] [ 65.178652][ T1046] RAX: 1ffff110239f58c6 RBX: ffff88811cfac628 RCX: ffff88810fe78000 [ 65.186893][ T1053] R10: 00000000b720eca3 R11: fffffbfff0f2573e R12: 0000000000000001 [ 65.193078][ T1046] RDX: ffff8881175b8000 RSI: 0000000000000001 RDI: ffffffff87104680 [ 65.201193][ T1053] R13: ffff88811cfac628 R14: dffffc0000000000 R15: ffffffff81728f60 [ 65.203543][ T1046] RBP: ffffc90000c465b0 R08: 0000000000000000 R09: 0000000000000004 [ 65.211608][ T1053] FS: 00007f20089766c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 65.219779][ T1046] R10: 00000000b720eca3 R11: fffff52000188c90 R12: 0000000000000001 [ 65.227847][ T1053] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.235998][ T1046] R13: ffff88811cfac628 R14: dffffc0000000000 R15: ffffffff81728f60 [ 65.244248][ T1053] CR2: 0000000000000004 CR3: 000000013446d000 CR4: 00000000003506a0 [ 65.253187][ T1046] FS: 00007f94084496c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 65.261213][ T1053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.267806][ T1046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.275796][ T1053] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 65.283874][ T1046] CR2: 00007f2007be9f00 CR3: 00000001333a1000 CR4: 00000000003506b0 [ 65.292811][ T1053] Kernel panic - not syncing: Fatal exception [ 65.300791][ T1046] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.300805][ T1046] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 65.300817][ T1046] Call Trace: [ 65.300823][ T1046] [ 65.300835][ T1046] __schedule+0x1270/0x1500 [ 65.300857][ T1046] ? __kernel_text_address+0xd/0x30 [ 65.300885][ T1046] ? release_firmware_map_entry+0x190/0x190 [ 65.300907][ T1046] preempt_schedule_irq+0xaa/0x120 [ 65.300925][ T1046] ? __cfi_preempt_schedule_irq+0x10/0x10 [ 65.300944][ T1046] ? kvm_sched_clock_read+0x18/0x40 [ 65.300974][ T1046] raw_irqentry_exit_cond_resched+0x29/0x30 [ 65.300995][ T1046] irqentry_exit+0x37/0x40 [ 65.301018][ T1046] sysvec_apic_timer_interrupt+0x64/0xc0 [ 65.301040][ T1046] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 65.301062][ T1046] RIP: 0010:kasan_check_range+0x11/0x2a0 [ 65.301090][ T1046] Code: ff c3 00 00 cc cc 00 00 cc 90 90 90 90 90 90 90 90 90 90 90 b8 bf f3 05 3b b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 41 57 <41> 56 41 55 41 54 53 49 89 f8 49 01 f0 0f 82 1d 02 00 00 49 89 f8 [ 65.301107][ T1046] RSP: 0018:ffffc90000c46868 EFLAGS: 00000202 [ 65.301124][ T1046] RAX: 0000000000000001 RBX: ffffea0004b94cd8 RCX: ffffffff81b1534b [ 65.301138][ T1046] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffea0004b94cd8 [ 65.301150][ T1046] RBP: ffffc90000c46870 R08: ffffea0004b94cd7 R09: 1ffffd400097299a [ 65.301164][ T1046] R10: dffffc0000000000 R11: fffff9400097299b R12: dffffc0000000000 [ 65.301178][ T1046] R13: 0000000000000040 R14: ffffea0004b94cd4 R15: ffffea0004b94cd1 [ 65.301195][ T1046] ? prep_compound_page+0x1cb/0x4a0 [ 65.301221][ T1046] __kasan_check_write+0x14/0x20 [ 65.301239][ T1046] prep_compound_page+0x1cb/0x4a0 [ 65.301264][ T1046] prep_new_page+0x3b/0x110 [ 65.301295][ T1046] get_page_from_freelist+0x2d12/0x2d80 [ 65.301328][ T1046] ? __cfi_gfp_zone+0x10/0x10 [ 65.301354][ T1046] ? __alloc_pages+0x610/0x610 [ 65.301378][ T1046] ? __cfi_gfp_zone+0x10/0x10 [ 65.301398][ T1046] ? unwind_get_return_address+0x4d/0x90 [ 65.301419][ T1046] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 65.301447][ T1046] __alloc_pages+0x1fa/0x610 [ 65.301472][ T1046] ? __cfi___alloc_pages+0x10/0x10 [ 65.301496][ T1046] ? stack_trace_save+0xa6/0xf0 [ 65.301523][ T1046] ? kasan_set_track+0x60/0x70 [ 65.301544][ T1046] ? kasan_set_track+0x4b/0x70 [ 65.301563][ T1046] ? kasan_save_alloc_info+0x25/0x30 [ 65.301590][ T1046] ? __kasan_kmalloc+0x95/0xb0 [ 65.301613][ T1046] alloc_slab_page+0x6e/0xf0 [ 65.301640][ T1046] ? __sys_bpf+0x57b/0x850 [ 65.301658][ T1046] new_slab+0x98/0x3d0 [ 65.301685][ T1046] ___slab_alloc+0x6bd/0xb20 [ 65.301709][ T1046] ? copy_verifier_state+0x6bb/0xab0 [ 65.301739][ T1046] __slab_alloc+0x5e/0xa0 [ 65.301763][ T1046] ? copy_verifier_state+0x6bb/0xab0 [ 65.301789][ T1046] ? copy_verifier_state+0x6bb/0xab0 [ 65.301815][ T1046] __kmem_cache_alloc_node+0x203/0x2c0 [ 65.301839][ T1046] ? copy_verifier_state+0x6bb/0xab0 [ 65.301865][ T1046] ? copy_verifier_state+0x6bb/0xab0 [ 65.301890][ T1046] __kmalloc_node_track_caller+0xa0/0x1e0 [ 65.301907][ T1046] ? kasan_save_alloc_info+0x25/0x30 [ 65.301936][ T1046] krealloc+0x6f/0x110 [ 65.301953][ T1046] copy_verifier_state+0x6bb/0xab0 [ 65.301981][ T1046] push_stack+0x19b/0x4f0 [ 65.302008][ T1046] do_check+0x963a/0xf070 [ 65.302048][ T1046] ? init_func_state+0x640/0x640 [ 65.302073][ T1046] ? kasan_save_alloc_info+0x25/0x30 [ 65.302100][ T1046] ? btf_check_subprog_arg_match+0x179/0x300 [ 65.302128][ T1046] do_check_common+0x11ae/0x1950 [ 65.302159][ T1046] bpf_check+0x3f98/0x10d10 [ 65.302189][ T1046] ? __cfi_gfp_zone+0x10/0x10 [ 65.302209][ T1046] ? __cfi_bpf_check+0x10/0x10 [ 65.302237][ T1046] ? 0xffffffffa00006a4 [ 65.302250][ T1046] ? is_bpf_text_address+0x177/0x190 [ 65.302276][ T1046] ? kernel_text_address+0xa0/0xd0 [ 65.302306][ T1046] ? __kernel_text_address+0xd/0x30 [ 65.302328][ T1046] ? unwind_get_return_address+0x4d/0x90 [ 65.302348][ T1046] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 65.302372][ T1046] ? arch_stack_walk+0xfc/0x150 [ 65.302404][ T1046] ? stack_trace_save+0xa6/0xf0 [ 65.302427][ T1046] ? __stack_depot_save+0x36/0x480 [ 65.302446][ T1046] ? pcpu_block_update+0x3ec/0x900 [ 65.302469][ T1046] ? kasan_set_track+0x60/0x70 [ 65.302488][ T1046] ? kasan_set_track+0x4b/0x70 [ 65.302511][ T1046] ? kasan_save_alloc_info+0x25/0x30 [ 65.302538][ T1046] ? __kasan_kmalloc+0x95/0xb0 [ 65.302560][ T1046] ? kmalloc_trace+0x40/0xb0 [ 65.302575][ T1046] ? selinux_bpf_prog_alloc+0x51/0x140 [ 65.302598][ T1046] ? security_bpf_prog_alloc+0x73/0xa0 [ 65.302622][ T1046] ? bpf_prog_load+0xa20/0x16a0 [ 65.302639][ T1046] ? __sys_bpf+0x57b/0x850 [ 65.302655][ T1046] ? __x64_sys_bpf+0x7c/0x90 [ 65.302681][ T1046] ? x64_sys_call+0x488/0x9a0 [ 65.302704][ T1046] ? do_syscall_64+0x4c/0xa0 [ 65.302730][ T1046] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 65.302760][ T1046] ? __kasan_check_write+0x14/0x20 [ 65.302777][ T1046] ? _raw_spin_lock+0x94/0xf0 [ 65.302803][ T1046] ? __cfi__raw_spin_lock+0x10/0x10 [ 65.302832][ T1046] ? _raw_spin_unlock+0x4c/0x70 [ 65.302860][ T1046] ? memset+0x35/0x40 [ 65.302876][ T1046] ? bpf_obj_name_cpy+0x193/0x1e0 [ 65.302901][ T1046] bpf_prog_load+0x10f0/0x16a0 [ 65.302923][ T1046] ? map_freeze+0x390/0x390 [ 65.302945][ T1046] ? selinux_bpf+0xc7/0xf0 [ 65.302964][ T1046] ? security_bpf+0x93/0xb0 [ 65.302987][ T1046] __sys_bpf+0x57b/0x850 [ 65.303004][ T1046] ? bpf_link_show_fdinfo+0x330/0x330 [ 65.303025][ T1046] ? irqentry_exit+0x37/0x40 [ 65.303047][ T1046] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 65.303069][ T1046] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 65.303093][ T1046] __x64_sys_bpf+0x7c/0x90 [ 65.303120][ T1046] x64_sys_call+0x488/0x9a0 [ 65.303141][ T1046] do_syscall_64+0x4c/0xa0 [ 65.303167][ T1046] ? clear_bhb_loop+0x30/0x80 [ 65.303187][ T1046] ? clear_bhb_loop+0x30/0x80 [ 65.303209][ T1046] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 65.303228][ T1046] RIP: 0033:0x7f940759c819 [ 65.303242][ T1046] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 65.303257][ T1046] RSP: 002b:00007f9408449028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 65.303274][ T1046] RAX: ffffffffffffffda RBX: 00007f9407815fa0 RCX: 00007f940759c819 [ 65.303294][ T1046] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 65.303305][ T1046] RBP: 00007f9407632c91 R08: 0000000000000000 R09: 0000000000000000 [ 65.303316][ T1046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 65.303327][ T1046] R13: 00007f9407816038 R14: 00007f9407815fa0 R15: 00007ffedb887178 [ 65.303344][ T1046] [ 65.303349][ T1046] Modules linked in: [ 65.310042][ T1046] ---[ end trace 0000000000000000 ]--- [ 65.310051][ T1046] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 65.310076][ T1046] Code: 80 3c 30 00 74 05 e8 f4 bd 6a 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 65.310091][ T1046] RSP: 0018:ffffc90000a77630 EFLAGS: 00010096 [ 65.310106][ T1046] RAX: 1ffff110239f58c6 RBX: ffff88811cfac628 RCX: ffff888118d23cc0 [ 65.310120][ T1046] RDX: ffff88811a3cbcc0 RSI: 0000000000000001 RDI: ffffffff87104680 [ 65.310132][ T1046] RBP: ffffc90000a77670 R08: 0000000000000000 R09: 1ffffffff0f2573d [ 65.310145][ T1046] R10: 00000000b720eca3 R11: fffffbfff0f2573e R12: 0000000000000001 [ 65.310157][ T1046] R13: ffff88811cfac628 R14: dffffc0000000000 R15: ffffffff81728f60 [ 65.310171][ T1046] FS: 00007f94084496c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 65.310187][ T1046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.310200][ T1046] CR2: 00007f2007be9f00 CR3: 00000001333a1000 CR4: 00000000003506b0 [ 65.310215][ T1046] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.310225][ T1046] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 66.496958][ T1053] Shutting down cpus with NMI [ 67.296319][ T1053] Kernel Offset: disabled [ 67.300655][ T1053] Rebooting in 86400 seconds..