last executing test programs: 26.147292687s ago: executing program 1 (id=3978): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000007300000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0}, 0x48) 21.968883585s ago: executing program 1 (id=3978): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000007300000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0}, 0x48) 17.757725605s ago: executing program 1 (id=3978): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000007300000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0}, 0x48) 13.414310241s ago: executing program 1 (id=3978): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000007300000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0}, 0x48) 7.700613719s ago: executing program 2 (id=4561): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x2c}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000063c0)={&(0x7f0000005cc0)=@abs={0x1}, 0x3, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1e, 0x0, 0x8, 0x20000005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000fffdffff00000000000000008500000041000000850000002a00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}, 0x8, 0xc8, 0x9, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1200000000}, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x96, 0x1, 0x0, 0x81, 0x0, 0x8000000000000005, 0x19188, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x2, @perf_bp={0x0, 0x9}, 0x115463, 0x1, 0x0, 0x0, 0x10, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20201}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$TUNSETLINK(r6, 0x400454cd, 0x18) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080"], 0xfdef) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x20a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_config_ext={0x0, 0xff}, 0x10185, 0x7fffffff, 0x2, 0x0, 0x0, 0xffff0000, 0x80, 0x0, 0x5ff}, 0x0, 0x0, r7, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 5.997830527s ago: executing program 1 (id=3978): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000007300000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0}, 0x48) 3.844454869s ago: executing program 2 (id=4571): r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x4, &(0x7f0000001900)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[], 0x5) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x19, 0xf, 0x0, &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x43, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbd, 0x5, 0x0, 0x0, 0x0, 0x5, 0x80420, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c97a160, 0x1, @perf_config_ext={0x100000000040, 0x9}, 0x300, 0x103, 0x200000, 0x7, 0x29a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0) mkdir(0x0, 0x0) 3.843525369s ago: executing program 3 (id=4572): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x7602, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xbdf55c5ca5705acd}, 0x18e04, 0x80000000, 0x0, 0x4, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 3.776668883s ago: executing program 2 (id=4575): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="09000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x1a, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @jmp={0x5, 0x1, 0x0, 0xb, 0x3, 0xfffffffffffffff8}, @ringbuf_query, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x101}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000200)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x1cb74, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, 0x1], 0x0, 0x10, 0x1000}, 0x94) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f0000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000100b0000850000000200000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r4}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x200, '\x00', r6, r4, 0x9, 0x5}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000800)={r4, &(0x7f00000006c0)="012eaa262d77e28f7b4a6ec7be502df13ad048c60bd07f256a1f7ae00f6e136d8eac6f30d3a36b3862191ab563526a8098a591b69820d523e1b6a8593a38c56b4157fab25b0af272d7a7e88c45b35c3e8f4840c6d7c31a896f76caa77952825cdfde78343dbb659a2a7e3911fb4522dca3d83194dbc8dd7dd0d35a6e0b3e38af9273", &(0x7f0000000780)=""/125}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000611889000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000380)=r3) 3.764151534s ago: executing program 3 (id=4576): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000200000000004000000850000002a0000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdfe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe55, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) syz_clone(0x40124180, 0x0, 0x0, 0x0, 0x0, 0x0) 3.702019206s ago: executing program 2 (id=4577): perf_event_open(&(0x7f0000000480)={0x1, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x80420, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x2}, 0x300, 0x103, 0x200000, 0x7, 0x29a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0, 0x1}, 0x2018, 0x0, 0x0, 0x0, 0x1000, 0x9, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000280)) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={0xffffffffffffffff, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x43, &(0x7f0000000040), 0x2a) 3.46148172s ago: executing program 4 (id=4579): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffff8}, [@call={0x85, 0x0, 0x0, 0x36}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="f7edad00"/14, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed5de7e91cd360a136ce6203c23c00fe82000000000400875a65969f7e750701810000000000000029"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="1700000000000000950000000000000045"], 0x0}, 0x94) socketpair(0x6, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000300)=r8) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 3.151496495s ago: executing program 2 (id=4580): bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1000, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x600003, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x15, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000fcffffff000000008000000018010000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.857040661s ago: executing program 4 (id=4581): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8991, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001800)={0x67}, 0x8) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @generic={0x79, 0x0, 0x0, 0x223}, @initr0, @exit={0x95, 0x0, 0x70}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="090000000b000000ff03000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r10, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%-010d \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000000)={r11, &(0x7f0000000380)}, 0x20) (async) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x10042) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000017c0)={0xf22}, 0x8) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1ad0fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x8, 0x10}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r12, &(0x7f0000000140)="9c6bbd4660132da89fbe218912924cd19defe1f11b21de942ad7161da7e217f509", &(0x7f0000000180)=""/15, 0x4}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x1e, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @jmp={0x5, 0x1, 0x4, 0x4, 0x0, 0x6, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x2, 0x2, 0x7, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1000, &(0x7f0000000500)=""/4096, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000001540)={0x4, 0xf, 0x1, 0x16d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001580)=[r12, r12], 0x0, 0x10, 0xa}, 0x94) 2.751784536s ago: executing program 2 (id=4582): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffd8f, 0x0, 0x0, 0x1, 0x9}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180, 0x0, @perf_bp={0x0, 0xe}, 0x4040, 0x3, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095", @ANYRESHEX=r0, @ANYRESDEC, @ANYRESDEC, @ANYRESDEC=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="e64d", 0x2}], 0x1}, 0x8000) recvmsg(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/233, 0xe9}], 0x1, &(0x7f0000002d00)=""/4080, 0xff0}, 0x0) close(r6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000212000000", &(0x7f0000000300)=""/8, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 2.549976716s ago: executing program 4 (id=4583): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRES16=r0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000fd3f1400e27f000001"], 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8983, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x1590, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 1.669256532s ago: executing program 0 (id=4585): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x6}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0x9, 0x8, 0x55, 0x0, 0x0, 0x3, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x101}, 0x11, 0x7, 0xa1, 0x0, 0x6, 0x5, 0x5, 0x0, 0x2, 0x0, 0xdc}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0xe43986f95b0e4309}) (async) ioctl$TUNGETSNDBUF(r1, 0x400454dc, &(0x7f0000001700)) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000300)={'wg0\x00', @multicast}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000140), 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000640)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x4501, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) (async) ioctl$TUNSETPERSIST(r4, 0x400454c9, 0x5) (async) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x200) (async) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r5) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{}, &(0x7f00000004c0), 0x0}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="b702000000000080bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e240000000000004504040001ffffff9404000001000a00b7040000000100006a0af2fe000000008500000078000000b70000000000000095000000000000009e17f199a68b061b93d83298a8cdda1ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97ce8df1bc9a0c4eeceb9171e43405d621ffbc9b0d8ca56b50f0c010d631f6dbc8486bc5d5bf2ca8285056892db03cf1c62dd7c08a90b189d190c341035de53a9a53608c10556e5734eb84049761451ce540c772e069f80cb201b2de17dfdb4b60939d5d6aed4062049b87e03e2cd18568136207304e26f7fcc059c062234d5595f6fbaa187b81d1106000000000f0000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8000000000000000b91c61bd99dc89f12907af7dccd106cb937b450f859ce8292a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231a2d73148be428ba953df4aece69311687f4122073a236c3a32efa04137d46f0247d2638da3261c8162bb7c7824be6195a66d2e17e122040e11001131ce319045e5b3334e68475ac3f46aa2837f9004600daded9b19b35eebe52613c346e255421b23a278fd00004270b1cd5fc9aa2286ccca37db965d9dd366598f5ec993cb0cf127e2a46cfbdf63eea190d86a4d1b75ae98480100d33128954a7d093a54f7e75b3753508ca3c41685d1e407315e59d626c23b3f89a926e9382966853774e7dd1f1a2177cdf2802237c177d543e8da47a01f05e117e53518270239b69c117e2637c31085f4d8a596b6edab26afaf6605b231199f38a6fc7eb83714387450ea18eafbace8eec18a4b2c442e7b88a7611c1283bec84e1715fb9f4fcaf52c08058fc4f21c0ad71adabdd850aed3feec6eaab347bdf474e17b9aa345d1e6e3bb83f90230bdf53e7d0e5c3f914d905422b83f30936674ba8f0bffaf2305c0972df71fe5f4e01506471e897bced7798509e64df360d95f9a4099f864b0ba45efbdbd1d9db21a1d5c065567fd70aae68096827fa5c2d9bd20292344c7dcf6241447cfbb05b5d0fdb4e08afbac5397b64aa369922ed7ed8918f97294b6854210d2b93aaf92159dbaa2f186d4a420c68d6baf1c31de4f0bf478bfd51bb1e96ea849a80ae5a89be7e38474c7aade344d68324f9e12a6b9770e6bd12ae69efffaee58040753701af84c2924c1b5aea1650f42c9ae9820a33095f062fb88313d035ea405515a61a4be64f9fa0985c5be592090cc48291004609fdac2ab6100000000000000a84570c7c00d647daf8af334050b61e9b2d3f0adad1d1ff47be19b8da2799e9ecef8efabe73f92dbd0760f8bbd9c710bd1371e2b5d9a2ea2190f5e4f5cd641cdfe5d89f84a368ef7e6ff1eacdc0ec9e97b8f9c9e314661ea0aa8a104008d188b66b3a4aedeed9df4238a08fc2fb1007233cc2c87fcaa0cccd8ec03444471c1dd660c73acc17bff740d199a7c0c52c63c0408b5158e0000000c275eedb02f141113cf2c55b2c08c2c68cc99d2bb5840fba332e1c82862ec9b90104c48e41d32a47ac94ddee815dba8aeb5d3121cf247a81aef7805b020e9eec44cbe3055be69fe066824ba2292b9cdce41635fc00df96fb10a3a8cc60c4a76c65ebbb0640e0a29de94edf5cbefac1c5fa96e7080af804b22cabce10ea52f1018527f4aa39cdafa3eff63de2a7f50d042667820f6f86f276afb2b81da301e031351ee13013137e9d5cec0c84d7e3f82c6fd12eb98f9ea654bcb9ce59a2015183c6e65bb0537e611b830d74c30fb8207fca0990acdbb51e4e234026e00000000b3ebae3eb52c140953a350fcf0124b1a30b1afc29ea56f8413686d912eb8118d73ef9c6d3843ebcb555301c0205dd3040000002e334319c8979c322e92fbc2c400009f2404b941553843de114fdb03c19d606bd760c40f7f28360820b82d548198041562bcbd9edce223b54cf3c35823f3c446f0a20160ac181c96606dbc967673aca98d6f5637b20fd2809a29ea5e40139a19415f7fc5d852209bdfed74008651752b5e052412d3e00a44417b7caf91a173925a66ee6e30723e73f3b7d66d2a5d09ff40c0bc6e7a5cfef7f327018578892a23014c3629f2e41af619f0d9f0ec8d551415051ff94391c03f3501c928ed7818af61729278f84d4730ef28af4c202e0f175e2a5cbddc8b973e2701b33f1b963025220c04817010b6fb70"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3}, 0x10}, 0x94) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/5, 0x5}], 0x2}, 0x10062) (async) r7 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf4143, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000000}, 0x1cad, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1.609524586s ago: executing program 0 (id=4586): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x7602, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xbdf55c5ca5705acd}, 0x18e04, 0x80000000, 0x0, 0x4, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.608537716s ago: executing program 4 (id=4587): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x4b, 0x69, 0x1, 0x0, 0x4, 0x0, 0x200000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000000}, 0x404, 0x0, 0x0, 0x0, 0x800000000, 0x6ca, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x7602, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xbdf55c5ca5705acd}, 0x18e04, 0x80000000, 0x0, 0x4, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0x1}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={0x1, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000003f00)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000003e80)=[{&(0x7f0000000880)=""/214, 0xd6}, {&(0x7f0000000980)=""/11, 0xb}, {&(0x7f00000009c0)}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/75, 0x4b}, {&(0x7f0000002dc0)=""/172, 0xac}, {&(0x7f0000002e80)=""/4096, 0x1000}], 0x7}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000b00875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x11, 0x7, 0x765, 0x0, 0x10101, r6, 0x0, '\x00', r4, r6, 0x4, 0x5, 0x0, 0x0, @void, @value, @value=r0}, 0x50) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000f0cd00000000000004000000850000002a00000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$tun(0xffffffffffffff9c, 0x0, 0x20702, 0x0) r9 = perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_int(r11, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_subtree(r12, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r11], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) sendmsg$unix(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="e687", 0x2}], 0x1, 0x0, 0x0, 0x44190}, 0x2004c001) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xffffffff}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x82, &(0x7f0000000240)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 1.437934774s ago: executing program 0 (id=4588): close(0x3) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), 0x0, 0x75}, 0x38) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xec, 0x5, 0x40, 0x5, 0x0, 0x7ffffffd, 0x7a5d4, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdbffbfff, 0x2, @perf_bp={0x0, 0x5}, 0x18, 0x1, 0x7, 0x8, 0x81, 0x4, 0x9, 0x0, 0x800, 0x0, 0xffffffffffffffff}, 0x0, 0x8000000a, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x20, 0x2, &(0x7f0000000140)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xb8}, @exit], &(0x7f0000000200)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000024c0), 0x0, 0x2}, 0x38) close(0x3) close(0x4) 858.114995ms ago: executing program 3 (id=4589): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x4800) 857.512845ms ago: executing program 3 (id=4590): perf_event_open(&(0x7f0000000480)={0x1, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x80420, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x2}, 0x300, 0x103, 0x200000, 0x7, 0x29a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0, 0x1}, 0x2018, 0x0, 0x0, 0x0, 0x1000, 0x9, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000280)) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={0xffffffffffffffff, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x43, &(0x7f0000000040), 0x2a) 840.952976ms ago: executing program 0 (id=4591): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xb, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x700, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 777.472099ms ago: executing program 0 (id=4592): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000b80), 0xb}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffef}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc0, &(0x7f000000cf3d)=""/192, 0x0, 0x28}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000080000000000000d0000000000005f002af012a4caa679"], 0x0, 0x34}, 0x28) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f2dcc6d0e5bfb6ecc27477a80d1fcf4b137d054bd61743b079bac97f2141d9f3fc65776a653c4ec621d3c20287f5605901decf24849b329a36c04e4b9ed84e68605ca797889c2552b819a920c3ea749c4760aa70f09c9c56b6a43f7c5b6d22e5b85ad8359b1ca3ce6562fb42785fa4a7fee635efcaa4ba6fab659971224383e4bf1cf7f3e03373a9750690"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r3, 0x0, 0x0}, 0x10) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xf, 0x0, 0x7}, 0x0, 0x5, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b00000000000000000000000800000000000000", @ANYRES32, @ANYBLOB="420000000000000000000000000000000000000041879930edadbde953bce7b6710ec2e154778fdba76e3c9fe4ec65136a2c71d529047a23288fac819445b6aa2e3dc7b0e4067cb47b57022304736bd892520153a25460bfe80744ef2fed3e2e54feaa27957b1f7c4c0a0d17a47e77bdc5d20f6b4a2a3f2541e639", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000100"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b40), 0x4) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000bc0), 0x9}, 0x0, 0x0, 0x102, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xce68}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x9, 0x2, 0x7, 0xc7, 0x0, 0x0, 0x10100, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0x80}, 0x800, 0xfffffffffffff000, 0x80000001, 0x4, 0x6c2, 0x10000, 0x80, 0x0, 0x3}, 0xffffffffffffffff, 0x8, r0, 0xbe1d3127a16933c4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000001880)='cpu&\t\t\x8ap\'\xe2+\xdb]\x84\xc1\x95C\xac\x16\xbd\x83\xf8L\xee\xb3G\x14?\xab\x193i\xf4^\x01\x00\x00\x00\xdaq\x14\xdf\xe1X)+\xdaa\xf2\xc1\x1f]\xc6=e\xba\xa8\xed\xad\xdb}\xd749^a=s\xa9\bi\x88\x05\x00\x00\x00\x00\x00\x00\x00,8\x16\x16e\xf3k\x8c>\x13\xa98,\x00\x10\x00\x00\xff\xe7\x04_\x00\x00\x00\x00\x00\x00\x00=Y\xd3\xbe\xf2\x84\xbe\xb9z2\x03\xbd\x8bP\x12\x19\xbf\t\xbd]kC\xeb\xc2\x9b\xae\xeb\x81\v\x04\x06!9\x118\xe6\x8f\x12\x9dA9\xddv\v\xffl\x8b2\xff\x00\x00\x00\x00\x00\x00\x00\xa8\xa5=f\x11\x00\xd6\x83\xd2|\xa5\xa5\x91\\r\x9c\xe2\x10\fh\x9eM\xf5\x135\x9dM\x9a\xca\xac\xf4\x04~\xffR\x1db\xa7T\x0e\x012\xe1\xab*\x99s]I\x19\x1e0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 730.215551ms ago: executing program 4 (id=4593): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x7602, 0x20, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xbdf55c5ca5705acd}, 0x18e04, 0x80000000, 0x0, 0x4, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 671.178714ms ago: executing program 0 (id=4594): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0a003d7b5146116726", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) write$cgroup_devices(r1, &(0x7f00000005c0)=ANY=[], 0xfffffeff) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x28, 0x2, 0x93, 0x0) write$cgroup_int(r1, &(0x7f0000000300)=0x6, 0x12) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100), 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) sendmsg$tipc(r5, &(0x7f0000000580)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000480)="e1ac321bf86976548b560ea317cbad3da8ebaa637b556b7c9cb79f71e1717bab86497f6885fdc79aa9cbe7f0d7db3d6c8aa30eb4add497f49f1476054dad8a8fb6632407a3a5e9cab0a08d350faf5fb1e9becd03a8eae601541961c7753079b85f098b3e350bcc0411d91c08a61e4615b0453c84550b33af0970ff46a025ae2c00aa7c461c5b3b50fd1db471e9e8c04fca121b8d48193b4dfea8b376469461c39a3a8057780732845614ca7561af09adccc8eb96a250f8d89438a22f2a77c5f50fb629dbf12dea3042", 0xc9, 0x10000000}, 0x40000000) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x6) 609.017518ms ago: executing program 4 (id=4595): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80043}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x100000001}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) socketpair(0xf, 0x3, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000006c0)='GPL\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000085000000a0000000180100002025642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000089cdc832850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000400)="b9ff03318944268cb89904f086dd", 0x0, 0x2005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000008500040061000000180100002020732500000000002020207b1af8ff00000000ffa100000000000007010000f8ffffffb702000008000000b70300000007a4ae8618078011"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffff53) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pimreg\x00', 0x2}) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB="f0ff00000000fe38c7e448d09fd543d799dca300"/33, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 194.72023ms ago: executing program 3 (id=4596): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001940)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x8, [@enum64={0xf, 0x5, 0x0, 0x13, 0x1, 0xd, [{0x4, 0x2, 0x3e}, {0xf, 0x7fffffff, 0x3}, {0xa, 0x8, 0x4}, {0xf, 0x80000001, 0x3}, {0x7, 0x1, 0x8000}]}]}, {0x0, [0x2e, 0x61, 0x61, 0x61, 0x61, 0x61]}}, &(0x7f0000000940)=""/4096, 0x68, 0x1000, 0x1, 0xfffffffc, 0x10000}, 0x28) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x11}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000100007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x1002, &(0x7f0000002500)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000000000000000000000000180100000400000000000000002020207b1af8ff00000000bfa100000000000007010000f8fff8ffb702000008000000b70300000000000085000000ca00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) 142.186552ms ago: executing program 3 (id=4597): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRES16=r0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000fd3f1400e27f000001"], 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8983, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x1590, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 0s ago: executing program 1 (id=3978): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000007300000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0}, 0x48) kernel console output (not intermixed with test programs): 333.348247][ T9731] x64_sys_call+0x488/0x9a0 [ 333.352781][ T9731] do_syscall_64+0x4c/0xa0 [ 333.357220][ T9731] ? clear_bhb_loop+0x30/0x80 [ 333.361918][ T9731] ? clear_bhb_loop+0x30/0x80 [ 333.366795][ T9731] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 333.372698][ T9731] RIP: 0033:0x7fd56fb9c819 [ 333.377375][ T9731] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 333.396990][ T9731] RSP: 002b:00007fd570b2c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.405408][ T9731] RAX: ffffffffffffffda RBX: 00007fd56fe15fa0 RCX: 00007fd56fb9c819 [ 333.413468][ T9731] RDX: 0000000000000094 RSI: 0000200000002c40 RDI: 0000000000000005 [ 333.421437][ T9731] RBP: 00007fd570b2c090 R08: 0000000000000000 R09: 0000000000000000 [ 333.429405][ T9731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.437384][ T9731] R13: 00007fd56fe16038 R14: 00007fd56fe15fa0 R15: 00007ffcbca808e8 [ 333.445363][ T9731] [ 333.487556][ T9731] syz.3.3080: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 333.652951][ T9731] CPU: 0 PID: 9731 Comm: syz.3.3080 Not tainted syzkaller #0 [ 333.660396][ T9731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 333.670458][ T9731] Call Trace: [ 333.673734][ T9731] [ 333.676666][ T9731] __dump_stack+0x21/0x24 [ 333.681003][ T9731] dump_stack_lvl+0x110/0x170 [ 333.685686][ T9731] ? __cfi_dump_stack_lvl+0x8/0x8 [ 333.690800][ T9731] dump_stack+0x15/0x24 [ 333.694954][ T9731] warn_alloc+0x1dc/0x200 [ 333.699294][ T9731] ? should_failslab+0x9/0x20 [ 333.703974][ T9731] ? __cfi_warn_alloc+0x10/0x10 [ 333.708829][ T9731] ? kmalloc_node_trace+0x3d/0xb0 [ 333.713873][ T9731] ? __get_vm_area_node+0x353/0x360 [ 333.719091][ T9731] __vmalloc_node_range+0x34b/0x1430 [ 333.724388][ T9731] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 333.730118][ T9731] ? __cfi___vmalloc_node_range+0x10/0x10 [ 333.735854][ T9731] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 333.742021][ T9731] ? __vmalloc+0x13/0x90 [ 333.746269][ T9731] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 333.751911][ T9731] __vmalloc+0x79/0x90 [ 333.755982][ T9731] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 333.761534][ T9731] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 333.766918][ T9731] bpf_prog_alloc+0x22/0x1c0 [ 333.771507][ T9731] bpf_prog_load+0x825/0x16a0 [ 333.776190][ T9731] ? map_freeze+0x390/0x390 [ 333.780698][ T9731] ? __sys_bpf+0x324/0x850 [ 333.785110][ T9731] ? __sanitizer_cov_trace_switch+0x5f/0xe0 [ 333.791009][ T9731] __sys_bpf+0x57b/0x850 [ 333.795251][ T9731] ? bpf_link_show_fdinfo+0x330/0x330 [ 333.800625][ T9731] __x64_sys_bpf+0x7c/0x90 [ 333.805090][ T9731] x64_sys_call+0x488/0x9a0 [ 333.809605][ T9731] do_syscall_64+0x4c/0xa0 [ 333.814019][ T9731] ? clear_bhb_loop+0x30/0x80 [ 333.818697][ T9731] ? clear_bhb_loop+0x30/0x80 [ 333.823377][ T9731] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 333.829270][ T9731] RIP: 0033:0x7fd56fb9c819 [ 333.833688][ T9731] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 333.853289][ T9731] RSP: 002b:00007fd570b2c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.861790][ T9731] RAX: ffffffffffffffda RBX: 00007fd56fe15fa0 RCX: 00007fd56fb9c819 [ 333.869762][ T9731] RDX: 0000000000000094 RSI: 0000200000002c40 RDI: 0000000000000005 [ 333.877739][ T9731] RBP: 00007fd570b2c090 R08: 0000000000000000 R09: 0000000000000000 [ 333.885795][ T9731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.893762][ T9731] R13: 00007fd56fe16038 R14: 00007fd56fe15fa0 R15: 00007ffcbca808e8 [ 333.901762][ T9731] [ 333.928665][ T9731] Mem-Info: [ 333.938665][ T9731] active_anon:42747 inactive_anon:0 isolated_anon:0 [ 333.938665][ T9731] active_file:26786 inactive_file:2413 isolated_file:0 [ 333.938665][ T9731] unevictable:0 dirty:19 writeback:175 [ 333.938665][ T9731] slab_reclaimable:7933 slab_unreclaimable:77930 [ 333.938665][ T9731] mapped:40942 shmem:28399 pagetables:829 [ 333.938665][ T9731] sec_pagetables:0 bounce:0 [ 333.938665][ T9731] kernel_misc_reclaimable:0 [ 333.938665][ T9731] free:1477103 free_pcp:4766 free_cma:0 [ 334.102174][ T9731] Node 0 active_anon:175100kB inactive_anon:0kB active_file:107144kB inactive_file:9652kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:167732kB dirty:32kB writeback:0kB shmem:117184kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5348kB pagetables:3472kB sec_pagetables:0kB all_unreclaimable? no [ 334.197138][ T9744] device syzkaller0 entered promiscuous mode [ 334.205797][ T9731] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971892kB mlocked:0kB bounce:0kB free_pcp:5408kB local_pcp:56kB free_cma:0kB [ 334.256876][ T9731] lowmem_reserve[]: 0 3932 3932 3932 [ 334.268387][ T9731] Normal free:2921856kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:186800kB inactive_anon:0kB active_file:107144kB inactive_file:9652kB unevictable:0kB writepending:32kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:5204kB local_pcp:3840kB free_cma:0kB [ 334.299166][ T9731] lowmem_reserve[]: 0 0 0 0 [ 334.323399][ T9731] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 334.351815][ T9731] Normal: 51*4kB (UME) 2*8kB (E) 62*16kB (UME) 13*32kB (UME) 137*64kB (UME) 676*128kB (UME) 287*256kB (UME) 155*512kB (UM) 50*1024kB (UME) 7*2048kB (ME) 632*4096kB (UM) = 2903964kB [ 334.400870][ T9731] 67445 total pagecache pages [ 334.411566][ T9731] 0 pages in swap cache [ 334.425929][ T9731] Free swap = 124996kB [ 334.446120][ T9731] Total swap = 124996kB [ 334.450489][ T9731] 2097051 pages RAM [ 334.454300][ T9731] 0 pages HighMem/MovableOnly [ 334.471778][ T9731] 347478 pages reserved [ 334.493807][ T9731] 0 pages cma reserved [ 334.633750][ T9759] device veth1_macvtap left promiscuous mode [ 334.649550][ T9759] device macsec0 left promiscuous mode [ 336.000415][ T9800] device syzkaller0 entered promiscuous mode [ 337.320120][ T9836] device syzkaller0 entered promiscuous mode [ 338.587640][ T9881] device syzkaller0 entered promiscuous mode [ 338.703959][ T318] syzkaller0: tun_net_xmit 48 [ 338.710264][ T9881] syzkaller0: tun_net_xmit 1280 [ 338.999260][ T9886] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.038813][ T9886] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.066783][ T9886] device bridge_slave_0 entered promiscuous mode [ 339.107929][ T9886] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.138642][ T9886] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.157074][ T9886] device bridge_slave_1 entered promiscuous mode [ 339.334615][ T9892] device syzkaller0 entered promiscuous mode [ 341.409731][ T9936] device syzkaller0 entered promiscuous mode [ 342.485239][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.493914][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.594282][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.602851][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.611554][ T2353] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.618663][ T2353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.653122][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 342.731570][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.740434][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.749364][ T2353] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.756423][ T2353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.763975][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 342.772218][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.780874][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 342.789238][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.797202][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 342.806672][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.818227][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 342.826311][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.067035][ T9886] device veth0_vlan entered promiscuous mode [ 343.080985][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.089039][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.203397][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 343.212194][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.224452][ T9886] device veth1_macvtap entered promiscuous mode [ 343.268378][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 343.277040][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 343.286010][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 343.295291][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 343.303764][ T2353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.851094][ T9970] device syzkaller0 entered promiscuous mode [ 344.513153][ T9997] device syzkaller0 entered promiscuous mode [ 346.963905][T10070] device syzkaller0 entered promiscuous mode [ 347.456815][T10089] @: port 1(vlan0) entered blocking state [ 347.482325][T10089] @: port 1(vlan0) entered disabled state [ 347.527789][T10089] device vlan0 entered promiscuous mode [ 348.321625][T10117] device syzkaller0 entered promiscuous mode [ 349.220982][T10154] FAULT_INJECTION: forcing a failure. [ 349.220982][T10154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.386228][T10154] CPU: 1 PID: 10154 Comm: syz.3.3199 Not tainted syzkaller #0 [ 349.393752][T10154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 349.403834][T10154] Call Trace: [ 349.407139][T10154] [ 349.410085][T10154] __dump_stack+0x21/0x24 [ 349.414455][T10154] dump_stack_lvl+0x110/0x170 [ 349.419146][T10154] ? __cfi_dump_stack_lvl+0x8/0x8 [ 349.424204][T10154] ? is_bpf_text_address+0xa2/0x190 [ 349.429425][T10154] dump_stack+0x15/0x24 [ 349.433595][T10154] should_fail_ex+0x3d4/0x520 [ 349.438307][T10154] should_fail+0xb/0x10 [ 349.442576][T10154] should_fail_usercopy+0x1a/0x20 [ 349.447757][T10154] _copy_from_iter+0x196/0x1010 [ 349.452632][T10154] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 349.458816][T10154] ? __cfi__copy_from_iter+0x10/0x10 [ 349.464223][T10154] ? stack_trace_save+0xa6/0xf0 [ 349.469199][T10154] ? __stack_depot_save+0x36/0x480 [ 349.474435][T10154] tun_get_user+0x201/0x3470 [ 349.479058][T10154] ? _parse_integer+0x2a/0x40 [ 349.483763][T10154] ? tun_do_read+0x1cf0/0x1cf0 [ 349.488551][T10154] ? __kasan_check_write+0x14/0x20 [ 349.493776][T10154] ? ref_tracker_alloc+0x31d/0x4a0 [ 349.498911][T10154] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 349.504394][T10154] ? avc_policy_seqno+0x1b/0x70 [ 349.509258][T10154] ? selinux_file_permission+0x2a5/0x510 [ 349.515002][T10154] tun_chr_write_iter+0x1fb/0x300 [ 349.520148][T10154] vfs_write+0x603/0xce0 [ 349.524410][T10154] ? __cfi_vfs_write+0x10/0x10 [ 349.529197][T10154] ? __fget_files+0x2d5/0x330 [ 349.533893][T10154] ? __fdget_pos+0x1f2/0x380 [ 349.538493][T10154] ? ksys_write+0x71/0x250 [ 349.542926][T10154] ksys_write+0x149/0x250 [ 349.547283][T10154] ? __cfi_ksys_write+0x10/0x10 [ 349.552245][T10154] ? debug_smp_processor_id+0x17/0x20 [ 349.557662][T10154] __x64_sys_write+0x7b/0x90 [ 349.562301][T10154] x64_sys_call+0x27b/0x9a0 [ 349.566838][T10154] do_syscall_64+0x4c/0xa0 [ 349.571354][T10154] ? clear_bhb_loop+0x30/0x80 [ 349.576043][T10154] ? clear_bhb_loop+0x30/0x80 [ 349.580731][T10154] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 349.586653][T10154] RIP: 0033:0x7fd56fb9c819 [ 349.591164][T10154] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 349.610964][T10154] RSP: 002b:00007fd570b2c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 349.619396][T10154] RAX: ffffffffffffffda RBX: 00007fd56fe15fa0 RCX: 00007fd56fb9c819 [ 349.627386][T10154] RDX: 0000000000000012 RSI: 0000200000000240 RDI: 0000000000000003 [ 349.635463][T10154] RBP: 00007fd570b2c090 R08: 0000000000000000 R09: 0000000000000000 [ 349.643476][T10154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.651465][T10154] R13: 00007fd56fe16038 R14: 00007fd56fe15fa0 R15: 00007ffcbca808e8 [ 349.659559][T10154] [ 353.221957][T10231] device syzkaller0 entered promiscuous mode [ 355.923764][T10318] device syzkaller0 entered promiscuous mode [ 356.482456][T10353] device sit0 left promiscuous mode [ 356.728803][T10359] device sit0 entered promiscuous mode [ 357.758213][T10395] device syzkaller0 entered promiscuous mode [ 360.450676][T10437] device syzkaller0 entered promiscuous mode [ 360.911364][ T28] audit: type=1400 audit(1776954512.818:157): avc: denied { create } for pid=10457 comm="syz.4.3291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 362.155204][T10486] device syzkaller0 entered promiscuous mode [ 362.625618][T10516] device wg2 left promiscuous mode [ 362.691904][T10516] device team_slave_1 entered promiscuous mode [ 362.734790][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.754119][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 363.156948][T10541] device veth1_macvtap left promiscuous mode [ 366.201092][T10641] pimreg: tun_chr_ioctl cmd 1074025677 [ 366.206986][T10641] pimreg: linktype set to 1 [ 366.250916][T10641] pimreg: tun_chr_ioctl cmd 1074025688 [ 371.105088][T10752] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 371.172539][T10757] device syzkaller0 entered promiscuous mode [ 371.388488][T10773] device syzkaller0 entered promiscuous mode [ 371.467949][T10775] device syzkaller0 entered promiscuous mode [ 371.680840][T10796] device syzkaller0 entered promiscuous mode [ 372.392943][T10823] device syzkaller0 entered promiscuous mode [ 374.222522][ T28] audit: type=1400 audit(1776954526.128:158): avc: denied { create } for pid=10955 comm="syz.1.3466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 374.916740][T10987] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.924236][T10987] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.173195][T10993] device syzkaller0 entered promiscuous mode [ 376.467820][T11106] syzkaller1: tun_chr_ioctl cmd 1074025678 [ 376.498154][T11106] syzkaller1: group set to 1 [ 376.542259][T11109] device syzkaller0 entered promiscuous mode [ 377.151234][T11153] syz.3.3533[11153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.152112][T11153] syz.3.3533[11153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.218216][ T28] audit: type=1400 audit(1776954529.118:159): avc: denied { create } for pid=11156 comm="syz.0.3534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 377.540228][T11185] device sit0 left promiscuous mode [ 377.726074][T11189] device sit0 entered promiscuous mode [ 377.893311][T11205] device syzkaller0 entered promiscuous mode [ 377.930352][T11205] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 378.120552][T11229] device syzkaller0 entered promiscuous mode [ 378.344586][T11237] device syzkaller0 entered promiscuous mode [ 379.036385][T11281] device syzkaller0 entered promiscuous mode [ 379.446203][T11304] device syzkaller0 entered promiscuous mode [ 380.219153][T11389] device syzkaller0 entered promiscuous mode [ 380.997995][T11430] device syzkaller0 entered promiscuous mode [ 381.707189][ T28] audit: type=1400 audit(1776954533.608:160): avc: denied { attach_queue } for pid=11461 comm="syz.2.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 383.081366][T11526] sock: sock_set_timeout: `syz.4.3663' (pid 11526) tries to set negative timeout [ 383.580694][T11605] device syzkaller0 entered promiscuous mode [ 384.159196][T11630] syz.1.3690 (11630) used obsolete PPPIOCDETACH ioctl [ 384.958986][T11747] device syzkaller0 entered promiscuous mode [ 387.345440][T11830] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.628003][T11887] device syzkaller0 entered promiscuous mode [ 389.677373][T11927] bridge0: port 3(ip6gretap0) entered blocking state [ 389.701986][T11927] bridge0: port 3(ip6gretap0) entered disabled state [ 389.714882][T11927] device ip6gretap0 entered promiscuous mode [ 389.721266][T11927] bridge0: port 3(ip6gretap0) entered blocking state [ 389.727975][T11927] bridge0: port 3(ip6gretap0) entered forwarding state [ 390.731475][T11985] device syzkaller0 entered promiscuous mode [ 391.437048][T12042] device syzkaller0 entered promiscuous mode [ 392.001652][T12077] tap0: tun_chr_ioctl cmd 1074025677 [ 392.012611][T12077] tap0: linktype set to 778 [ 394.551044][T12172] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 395.128357][T12193] tun0: tun_chr_ioctl cmd 35108 [ 396.553444][T12248] device syzkaller0 entered promiscuous mode [ 397.123562][T12266] device syzkaller0 entered promiscuous mode [ 397.148951][T12266] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 398.068440][T12312] device veth0_vlan left promiscuous mode [ 398.089472][T12312] device veth0_vlan entered promiscuous mode [ 398.137823][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.149316][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.197430][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.896700][T12367] device bridge_slave_1 left promiscuous mode [ 398.942836][T12367] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.534696][T12409] bridge0: port 2(veth1_to_team) entered blocking state [ 400.571519][T12409] bridge0: port 2(veth1_to_team) entered disabled state [ 400.630147][T12409] device veth1_to_team entered promiscuous mode [ 401.799460][T12460] @ÿ: renamed from bond_slave_0 [ 401.844357][T12443] ------------[ cut here ]------------ [ 401.849994][T12443] WARNING: CPU: 0 PID: 12443 at kernel/events/core.c:6564 perf_pending_task+0x3cd/0x4e0 [ 401.859787][T12443] Modules linked in: [ 401.863707][T12443] CPU: 0 PID: 12443 Comm: syz.0.3970 Not tainted syzkaller #0 [ 401.871216][T12443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 401.881411][T12443] RIP: 0010:perf_pending_task+0x3cd/0x4e0 [ 401.887247][T12443] Code: 41 5f 5d c3 e8 64 ab d7 ff 43 80 3c 2f 00 0f 85 d0 fe ff ff e9 d3 fe ff ff e8 4f ab d7 ff e8 b6 b1 66 ff eb 83 e8 43 ab d7 ff <0f> 0b e9 a2 fe ff ff e8 37 ab d7 ff 48 c7 c7 a0 42 23 87 4c 89 f6 [ 401.907002][T12443] RSP: 0018:ffffc90005aff8f8 EFLAGS: 00010293 [ 401.913122][T12443] RAX: ffffffff8199cb3d RBX: ffff88814ffb8360 RCX: ffff88811767a880 [ 401.921151][T12443] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 401.929157][T12443] RBP: ffffc90005aff930 R08: 0000000000000003 R09: 0000000000000004 [ 401.937157][T12443] R10: 0000000000000000 R11: ffffffff8199c770 R12: ffff88811767a880 [ 401.945207][T12443] R13: ffff88811014b4c8 R14: ffff88814ffb8220 R15: 1ffff11029ff7044 [ 401.953221][T12443] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 401.962193][T12443] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.968832][T12443] CR2: 0000000100000001 CR3: 000000000700f000 CR4: 00000000003506b0 [ 401.976830][T12443] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.984846][T12443] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 401.992858][T12443] Call Trace: [ 401.996155][T12443] [ 401.999250][T12443] task_work_run+0x1e1/0x250 [ 402.003877][T12443] ? __cfi_task_work_run+0x10/0x10 [ 402.009278][T12443] ? __kasan_check_write+0x14/0x20 [ 402.014413][T12443] do_exit+0xa35/0x2660 [ 402.018661][T12443] ? _raw_spin_lock_irq+0x95/0xf0 [ 402.023716][T12443] ? __cfi_do_exit+0x10/0x10 [ 402.028336][T12443] ? irqentry_exit+0x37/0x40 [ 402.033024][T12443] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 402.038869][T12443] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 402.045052][T12443] ? cgroup_freezing+0x86/0xb0 [ 402.049851][T12443] do_group_exit+0x210/0x2d0 [ 402.054484][T12443] ? __kasan_check_write+0x14/0x20 [ 402.059663][T12443] get_signal+0x13b5/0x1520 [ 402.064197][T12443] arch_do_signal_or_restart+0xd1/0x1140 [ 402.069881][T12443] ? do_futex+0x2e2/0x430 [ 402.074237][T12443] ? __cfi_do_futex+0x10/0x10 [ 402.079180][T12443] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 402.085360][T12443] ? __se_sys_futex+0x136/0x310 [ 402.090333][T12443] exit_to_user_mode_loop+0x7a/0xb0 [ 402.095565][T12443] exit_to_user_mode_prepare+0x87/0xd0 [ 402.101158][T12443] syscall_exit_to_user_mode+0x1a/0x30 [ 402.106653][T12443] do_syscall_64+0x58/0xa0 [ 402.111113][T12443] ? clear_bhb_loop+0x30/0x80 [ 402.115824][T12443] ? clear_bhb_loop+0x30/0x80 [ 402.120555][T12443] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 402.126476][T12443] RIP: 0033:0x7f370059c819 [ 402.130933][T12443] Code: Unable to access opcode bytes at 0x7f370059c7ef. [ 402.137970][T12443] RSP: 002b:00007f37013d20e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 402.146531][T12443] RAX: fffffffffffffe00 RBX: 00007f3700816098 RCX: 00007f370059c819 [ 402.154572][T12443] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f3700816098 [ 402.162594][T12443] RBP: 00007f3700816090 R08: 0000000000000000 R09: 0000000000000000 [ 402.170694][T12443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 402.178722][T12443] R13: 00007f3700816128 R14: 00007ffd8d9f37d0 R15: 00007ffd8d9f38b8 [ 402.186724][T12443] [ 402.189784][T12443] ---[ end trace 0000000000000000 ]--- [ 402.270507][ T28] audit: type=1400 audit(1776954554.178:161): avc: denied { mounton } for pid=12471 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 402.391161][T12471] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.419020][T12471] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.426579][T12471] device bridge_slave_0 entered promiscuous mode [ 402.474481][T12471] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.504333][T12471] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.529401][T12471] device bridge_slave_1 entered promiscuous mode [ 402.536163][ T8716] device vlan0 left promiscuous mode [ 402.541919][ T8716] @: port 1(vlan0) entered disabled state [ 402.947853][T12481] device veth0_vlan left promiscuous mode [ 403.122027][T12481] device veth0_vlan entered promiscuous mode [ 403.671195][T12508] device syzkaller0 entered promiscuous mode [ 403.860230][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 403.868209][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.909591][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 403.939587][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.947896][ T2360] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.954983][ T2360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.988746][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 404.017085][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.048852][ T2360] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.055933][ T2360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.073752][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.089040][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.152054][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 404.162386][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 404.191880][T12471] device veth0_vlan entered promiscuous mode [ 404.200341][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.215606][T12471] device veth1_macvtap entered promiscuous mode [ 404.238749][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 404.247303][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.275790][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.302579][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 404.321371][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.389677][ T28] audit: type=1400 audit(1776954556.298:162): avc: denied { unmount } for pid=12471 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 404.423754][T12540] device syzkaller0 entered promiscuous mode [ 404.458800][T12540] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 404.706315][T12555] device lo entered promiscuous mode [ 404.960683][T12563] pimreg: tun_chr_ioctl cmd 1074025672 [ 405.009037][T12563] pimreg: ignored: set checksum enabled [ 405.203525][T12567] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.210719][T12567] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.218289][T12567] device bridge_slave_0 entered promiscuous mode [ 405.225898][T12567] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.233120][T12567] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.241175][T12567] device bridge_slave_1 entered promiscuous mode [ 405.361664][T12567] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.368772][T12567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.376164][T12567] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.383239][T12567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.520421][ T2352] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.531365][ T2352] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.593088][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.619025][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.638908][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.655906][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.679151][ T2352] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.686345][ T2352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.709134][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.727957][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.747105][ T2352] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.754201][ T2352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.778893][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 405.787273][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.820348][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 405.842144][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.922318][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 405.933883][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.963741][T12567] device veth0_vlan entered promiscuous mode [ 405.985506][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 406.009427][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.046986][T12612] device syzkaller0 entered promiscuous mode [ 406.065885][T12567] device veth1_macvtap entered promiscuous mode [ 406.091473][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.105155][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.118990][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 406.130816][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 406.139766][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 406.154733][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 406.174242][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 406.209440][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 406.242973][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.409887][ T8716] device bridge_slave_1 left promiscuous mode [ 406.416102][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.459130][ T8716] device bridge_slave_0 left promiscuous mode [ 406.468931][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.499552][ T8716] device veth1_macvtap left promiscuous mode [ 406.505622][ T8716] device veth0_vlan left promiscuous mode [ 406.795832][T12674] device bridge0 entered promiscuous mode [ 406.808776][T12678] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.816020][T12678] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.866583][T12678] device bridge0 left promiscuous mode [ 407.374890][T12679] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.404335][T12679] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.442071][T12679] device bridge_slave_0 entered promiscuous mode [ 407.463148][T12679] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.482741][T12679] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.513280][T12679] device bridge_slave_1 entered promiscuous mode [ 407.938854][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 407.966409][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 407.999341][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 408.029297][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.069501][ T2348] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.076578][ T2348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.113681][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 408.136799][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.165147][ T2348] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.172255][ T2348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.212822][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 408.241402][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 408.265211][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.309820][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 408.334374][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.386908][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 408.430101][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 408.516702][T12679] device veth0_vlan entered promiscuous mode [ 408.539164][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 408.578150][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 408.629443][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 408.738963][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.762233][T12679] device veth1_macvtap entered promiscuous mode [ 408.783982][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 408.839021][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 408.847285][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 408.935283][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 408.968900][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 408.977323][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 409.050026][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 409.312576][ T8716] device bridge_slave_1 left promiscuous mode [ 409.338928][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.379057][ T8716] device bridge_slave_0 left promiscuous mode [ 409.385238][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.413769][ T8716] device veth1_macvtap left promiscuous mode [ 409.442334][ T8716] device veth0_vlan left promiscuous mode [ 410.161385][T12801] device sit0 left promiscuous mode [ 410.294027][T12806] device sit0 entered promiscuous mode [ 410.334103][T12789] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.341305][T12789] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.349329][T12789] device bridge_slave_0 entered promiscuous mode [ 410.445191][T12789] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.453437][T12789] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.466448][T12789] device bridge_slave_1 entered promiscuous mode [ 410.529283][T12805] device syzkaller0 entered promiscuous mode [ 410.830943][ T8716] device bridge_slave_1 left promiscuous mode [ 410.837153][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.868999][ T8716] device bridge_slave_0 left promiscuous mode [ 410.894496][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.926905][ T8716] device veth1_macvtap left promiscuous mode [ 410.950115][ T8716] device veth0_vlan left promiscuous mode [ 411.214501][T12789] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.221611][T12789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.228962][T12789] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.236008][T12789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.360447][ T2352] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.378220][ T2352] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.437752][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.464258][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.511021][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.550472][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.578913][ T2352] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.586008][ T2352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.620859][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 411.758364][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 411.777112][ T2352] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.784264][ T2352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.824994][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 411.833451][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 411.842178][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 411.850350][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 411.873896][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 411.890143][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 411.925611][T12789] device veth0_vlan entered promiscuous mode [ 411.947941][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 411.979292][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.988091][T12864] FAULT_INJECTION: forcing a failure. [ 411.988091][T12864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.016833][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.029107][T12864] CPU: 0 PID: 12864 Comm: syz.4.4106 Tainted: G W syzkaller #0 [ 412.038089][T12864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 412.048357][T12864] Call Trace: [ 412.051760][T12864] [ 412.054745][T12864] __dump_stack+0x21/0x24 [ 412.059107][T12864] dump_stack_lvl+0x110/0x170 [ 412.063808][T12864] ? __cfi_dump_stack_lvl+0x8/0x8 [ 412.065532][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.068847][T12864] dump_stack+0x15/0x24 [ 412.068868][T12864] should_fail_ex+0x3d4/0x520 [ 412.084904][T12864] should_fail+0xb/0x10 [ 412.087189][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 412.089103][T12864] should_fail_usercopy+0x1a/0x20 [ 412.089125][T12864] _copy_to_user+0x1e/0x90 [ 412.089149][T12864] simple_read_from_buffer+0xe9/0x160 [ 412.089172][T12864] proc_fail_nth_read+0x1a6/0x220 [ 412.107123][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 412.111951][T12864] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 412.111978][T12864] ? security_file_permission+0x94/0xb0 [ 412.130619][T12789] device veth1_macvtap entered promiscuous mode [ 412.135987][T12864] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 412.147877][T12864] vfs_read+0x27a/0x910 [ 412.152057][T12864] ? __cfi_vfs_read+0x10/0x10 [ 412.156750][T12864] ? __kasan_check_write+0x14/0x20 [ 412.161876][T12864] ? mutex_lock+0x93/0x1b0 [ 412.166309][T12864] ? __cfi_mutex_lock+0x10/0x10 [ 412.171182][T12864] ? __fdget_pos+0x2cd/0x380 [ 412.175803][T12864] ? ksys_read+0x71/0x250 [ 412.180147][T12864] ksys_read+0x149/0x250 [ 412.183620][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 412.184404][T12864] ? __cfi_ksys_read+0x10/0x10 [ 412.196533][T12864] ? debug_smp_processor_id+0x17/0x20 [ 412.201937][T12864] __x64_sys_read+0x7b/0x90 [ 412.206273][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 412.206454][T12864] x64_sys_call+0x2f/0x9a0 [ 412.218850][T12864] do_syscall_64+0x4c/0xa0 [ 412.223282][T12864] ? clear_bhb_loop+0x30/0x80 [ 412.227977][T12864] ? clear_bhb_loop+0x30/0x80 [ 412.232676][T12864] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 412.238614][T12864] RIP: 0033:0x7ff80355d04e [ 412.238953][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 412.243039][T12864] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 412.243056][T12864] RSP: 002b:00007ff80443bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 412.279317][T12864] RAX: ffffffffffffffda RBX: 00007ff80443c6c0 RCX: 00007ff80355d04e [ 412.287306][T12864] RDX: 000000000000000f RSI: 00007ff80443c0a0 RDI: 0000000000000007 [ 412.295290][T12864] RBP: 00007ff80443c090 R08: 0000000000000000 R09: 0000000000000000 [ 412.303278][T12864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.311261][T12864] R13: 00007ff803816038 R14: 00007ff803815fa0 R15: 00007ffc587b8eb8 [ 412.319254][T12864] [ 412.327460][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 412.346192][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 412.423929][T12877] pimreg: tun_chr_ioctl cmd 1074025672 [ 412.433735][T12877] pimreg: ignored: set checksum enabled [ 412.445672][T12877] pimreg: tun_chr_ioctl cmd 35092 [ 413.145478][T12890] device syzkaller0 entered promiscuous mode [ 413.499903][T12902] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.538641][T12902] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.546622][T12902] device bridge_slave_0 entered promiscuous mode [ 413.621764][T12902] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.649989][T12902] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.694333][T12902] device bridge_slave_1 entered promiscuous mode [ 413.864452][ T8716] device bridge_slave_1 left promiscuous mode [ 413.873807][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.884620][ T8716] device bridge_slave_0 left promiscuous mode [ 413.891113][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.908067][ T8716] device veth1_macvtap left promiscuous mode [ 413.925216][ T8716] device veth0_vlan left promiscuous mode [ 414.201411][T12963] syz.4.4137[12963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.202843][T12963] syz.4.4137[12963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.227694][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 414.247654][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.296347][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 414.320213][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.365373][ T2348] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.372481][ T2348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.380025][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 414.388459][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.396770][ T2348] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.403835][ T2348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.419018][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.427328][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.437081][T12963] ±ÿ: renamed from team_slave_1 [ 414.527986][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 414.602655][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 414.623554][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.640659][T12902] device veth0_vlan entered promiscuous mode [ 414.647305][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 414.666989][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.705214][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.726120][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.742296][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 414.767796][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.777802][T12902] device veth1_macvtap entered promiscuous mode [ 414.850239][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 414.858264][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 414.868328][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.911973][T12990] device syzkaller0 entered promiscuous mode [ 414.920046][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 414.930015][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 415.879979][T13013] device syzkaller0 entered promiscuous mode [ 416.051149][ T8716] device bridge_slave_1 left promiscuous mode [ 416.058451][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.084923][ T8716] device bridge_slave_0 left promiscuous mode [ 416.101400][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.111086][ T8716] device veth1_macvtap left promiscuous mode [ 416.117268][ T8716] device veth0_vlan left promiscuous mode [ 416.305507][T13042] GPL: port 1(gretap0) entered blocking state [ 416.338749][T13042] GPL: port 1(gretap0) entered disabled state [ 416.345450][T13042] device gretap0 entered promiscuous mode [ 416.380812][T13044] IPv6: õš: Disabled Multicast RS [ 416.451705][T13030] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.468588][T13030] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.476412][T13030] device bridge_slave_0 entered promiscuous mode [ 416.484104][T13030] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.491269][T13030] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.498909][T13030] device bridge_slave_1 entered promiscuous mode [ 416.644505][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 416.653777][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.668453][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.677011][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.685326][ T2357] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.692411][ T2357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.721487][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 416.730838][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.739774][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.747991][ T2357] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.755145][ T2357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.763576][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.777965][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.806072][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 416.831502][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.841238][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 416.848846][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 416.868512][T13030] device veth0_vlan entered promiscuous mode [ 416.922279][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 416.937742][T13030] device veth1_macvtap entered promiscuous mode [ 416.949382][T13062] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.956584][T13062] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.964356][T13062] device bridge_slave_0 entered promiscuous mode [ 416.971584][T13062] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.979025][T13062] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.986798][T13062] device bridge_slave_1 entered promiscuous mode [ 417.007558][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 417.018933][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 417.071540][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 417.138982][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 417.280596][T13062] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.287720][T13062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.295141][T13062] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.302291][T13062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.509503][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.517697][ T2348] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.559070][ T2348] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.636264][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.655910][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.674343][ T2348] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.681575][ T2348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.705490][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.723055][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.740108][ T2348] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.747205][ T2348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.777822][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 417.786027][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.807141][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 417.816057][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.834234][T13062] device veth0_vlan entered promiscuous mode [ 417.840673][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 417.849370][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 417.857794][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 417.866431][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.875026][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.882740][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.902877][ T8716] device vlan0 left promiscuous mode [ 417.908296][ T8716] @: port 1(vlan0) entered disabled state [ 417.915051][ T8716] device bridge_slave_1 left promiscuous mode [ 417.921731][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.929779][ T8716] device bridge_slave_0 left promiscuous mode [ 417.935894][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.943800][ T8716] device veth1_macvtap left promiscuous mode [ 417.950031][ T8716] device veth0_vlan left promiscuous mode [ 418.187375][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 418.195735][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 418.219562][T13062] device veth1_macvtap entered promiscuous mode [ 418.250833][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 418.261003][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 418.269672][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 418.305958][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 418.329140][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 419.017569][T13112] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.027373][T13112] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.035106][T13112] device bridge_slave_0 entered promiscuous mode [ 419.043687][T13112] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.051327][T13112] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.062342][T13112] device bridge_slave_1 entered promiscuous mode [ 419.491171][T13112] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.498271][T13112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.505676][T13112] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.512748][T13112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.595065][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.603067][ T2352] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.614595][ T2352] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.669343][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 419.690391][ T2348] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.697490][ T2348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.766035][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 419.817770][ T2348] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.824883][ T2348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.894892][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 419.950251][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 419.978939][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 420.062188][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 420.091937][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 420.121747][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 420.159418][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.888041][T13112] device veth0_vlan entered promiscuous mode [ 423.901096][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.919282][ T2348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.945648][T13112] device veth1_macvtap entered promiscuous mode [ 423.960316][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 423.972791][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 423.983052][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 424.002851][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 424.020318][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 424.031994][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 424.040482][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 424.112176][ T8716] device bridge_slave_1 left promiscuous mode [ 424.121140][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.144668][ T8716] device bridge_slave_0 left promiscuous mode [ 424.151923][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.189449][ T8716] device veth1_macvtap left promiscuous mode [ 424.196984][ T8716] device veth0_vlan left promiscuous mode [ 425.290443][ T8716] device bridge_slave_1 left promiscuous mode [ 425.296661][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.359898][ T8716] device bridge_slave_0 left promiscuous mode [ 425.392286][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.427396][ T8716] device veth1_macvtap left promiscuous mode [ 425.433516][ T8716] device veth0_vlan left promiscuous mode [ 425.702636][T13230] device syzkaller0 entered promiscuous mode [ 425.894007][T13226] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.913312][T13226] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.925971][T13226] device bridge_slave_0 entered promiscuous mode [ 425.970750][T13226] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.006918][T13226] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.041064][T13226] device bridge_slave_1 entered promiscuous mode [ 426.470043][T13261] device syzkaller0 entered promiscuous mode [ 426.592241][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 426.642398][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 426.727874][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 426.762038][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.808212][ T2349] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.815319][ T2349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.869672][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 426.908355][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 426.973249][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 427.024894][ T2349] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.032035][ T2349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.078459][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 427.091376][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 427.153255][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 427.174174][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.265164][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 427.286258][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 427.352244][T13226] device veth0_vlan entered promiscuous mode [ 427.385783][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 427.435257][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.463554][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 427.489115][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 427.517378][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 427.550966][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 427.653117][T13226] device veth1_macvtap entered promiscuous mode [ 427.694760][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.705465][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 427.722355][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 427.733044][T13295] bpf setsockopt: ignoring program buffer with optlen=65463 (max_optlen=4096) [ 427.767163][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 427.813374][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 428.410243][ T2349] device bridge_slave_1 left promiscuous mode [ 428.416517][ T2349] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.424872][ T2349] device bridge_slave_0 left promiscuous mode [ 428.433448][ T2349] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.443706][ T2349] device veth1_macvtap left promiscuous mode [ 428.449931][ T2349] device veth0_vlan left promiscuous mode [ 429.587709][T13330] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.601014][T13330] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.614594][T13330] device bridge_slave_0 entered promiscuous mode [ 429.644873][T13330] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.658575][T13330] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.680896][T13330] device bridge_slave_1 entered promiscuous mode [ 429.986578][T13330] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.993787][T13330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.001246][T13330] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.008386][T13330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.055378][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.064082][ T2349] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.082043][ T2349] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.108747][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.138841][ T2352] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.145944][ T2352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.172657][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.194516][ T2352] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.201751][ T2352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.235692][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 430.253630][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 430.270329][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 430.282707][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 430.343705][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 430.361557][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 430.381998][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 430.399204][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 430.410531][T13330] device veth0_vlan entered promiscuous mode [ 430.449427][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 430.464970][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 430.542131][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 430.551529][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 430.580402][T13330] device veth1_macvtap entered promiscuous mode [ 430.609991][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 430.623868][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 430.651493][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 430.714480][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 430.732545][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 431.526828][T13391] device syzkaller0 entered promiscuous mode [ 431.881197][ T2349] device bridge_slave_1 left promiscuous mode [ 431.889986][ T2349] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.928052][ T2349] device bridge_slave_0 left promiscuous mode [ 431.936610][ T2349] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.966762][ T2349] device veth1_macvtap left promiscuous mode [ 431.974012][ T2349] device veth0_vlan left promiscuous mode [ 432.754522][T13415] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.815735][T13415] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.832375][T13415] device bridge_slave_0 entered promiscuous mode [ 432.868932][T13415] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.909445][T13415] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.954649][T13415] device bridge_slave_1 entered promiscuous mode [ 433.167495][T13426] device syzkaller0 entered promiscuous mode [ 434.662574][T13434] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.670185][T13434] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.679026][T13434] device bridge_slave_0 entered promiscuous mode [ 434.779390][T13434] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.786641][T13434] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.796090][T13434] device bridge_slave_1 entered promiscuous mode [ 435.049488][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 435.061902][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.088977][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.097579][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.106920][ T2357] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.114014][ T2357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.166221][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 435.176481][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 435.209232][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.239583][ T2357] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.246655][ T2357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.283989][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 435.293072][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 435.340497][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 435.365934][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 435.375488][ T2349] device bond_slave_1 left promiscuous mode [ 435.381674][ T2349] bridge0: port 3(bond_slave_1) entered disabled state [ 435.389578][ T2349] device bridge_slave_1 left promiscuous mode [ 435.396915][ T2349] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.437626][ T2349] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.464719][ T2349] device veth0_vlan left promiscuous mode [ 435.692868][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 435.728398][T13415] device veth0_vlan entered promiscuous mode [ 435.758755][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 435.801495][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.849662][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.867354][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.930298][T13415] device veth1_macvtap entered promiscuous mode [ 435.996273][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 436.011246][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.029053][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 436.053168][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 436.069317][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.139080][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 436.147425][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 436.168965][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.177230][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.191301][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 436.209313][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.218377][ T2357] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.225686][ T2357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.233636][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.263314][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 436.277950][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.296450][ T2357] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.303680][ T2357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.313973][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 436.322827][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.340854][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 436.350880][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.382323][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 436.391242][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 436.403557][T13434] device veth0_vlan entered promiscuous mode [ 436.411552][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 436.428888][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.437746][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.445770][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.458747][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 436.467099][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.476328][T13434] device veth1_macvtap entered promiscuous mode [ 436.486529][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 436.494300][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 436.502876][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.512637][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 436.521369][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 437.630145][ T2349] device bridge_slave_1 left promiscuous mode [ 437.636384][ T2349] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.665704][ T2349] device bridge_slave_0 left promiscuous mode [ 437.672046][ T2349] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.687822][ T2349] device veth1_macvtap left promiscuous mode [ 437.701097][ T2349] device veth0_vlan left promiscuous mode [ 437.955629][T13492] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.008554][T13492] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.016142][T13492] device bridge_slave_0 entered promiscuous mode [ 438.030627][T13492] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.037715][T13492] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.109316][T13492] device bridge_slave_1 entered promiscuous mode [ 438.120655][T13504] syz_tun: refused to change device tx_queue_len [ 438.662746][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 438.684092][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 438.755227][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 438.840076][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 438.876485][ T2357] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.883706][ T2357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.931155][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 438.975041][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 439.006814][ T2357] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.014036][ T2357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.159372][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 439.175532][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.188196][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 439.268479][T13492] device veth0_vlan entered promiscuous mode [ 439.441287][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 439.459937][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 439.487663][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 439.528918][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.549437][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.589002][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.632447][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 439.649642][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 439.662245][T13492] device veth1_macvtap entered promiscuous mode [ 439.704942][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 439.713286][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 439.723065][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 439.756187][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 439.777708][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 439.904104][T13532] device syzkaller0 entered promiscuous mode [ 440.979047][ T2349] device bridge_slave_1 left promiscuous mode [ 440.985467][ T2349] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.993118][ T2349] device bridge_slave_0 left promiscuous mode [ 440.999342][ T2349] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.007041][ T2349] device veth1_macvtap left promiscuous mode [ 441.013124][ T2349] device veth0_vlan left promiscuous mode [ 441.568148][T13558] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.575354][T13558] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.583135][T13558] device bridge_slave_0 entered promiscuous mode [ 441.590470][T13558] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.597526][T13558] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.609164][T13558] device bridge_slave_1 entered promiscuous mode [ 442.375311][T13573] device syzkaller0 entered promiscuous mode [ 442.640788][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 442.704183][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.735229][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 442.763313][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.775386][ T2349] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.782472][ T2349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.812608][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 442.838271][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 442.858058][ T2349] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.865229][ T2349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.901041][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 442.978379][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.995064][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.040124][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 443.074320][T13558] device veth0_vlan entered promiscuous mode [ 443.097636][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.106438][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.129762][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.243236][T13558] device veth1_macvtap entered promiscuous mode [ 443.262701][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 443.321092][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 443.338734][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 443.398213][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 443.455467][ T2349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 445.012302][ T2352] device bridge_slave_1 left promiscuous mode [ 445.018500][ T2352] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.026087][ T2352] device bridge_slave_0 left promiscuous mode [ 445.032289][ T2352] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.040272][ T2352] device veth1_macvtap left promiscuous mode [ 445.046334][ T2352] device veth0_vlan left promiscuous mode [ 445.352017][T13632] device bridge_slave_1 left promiscuous mode [ 445.359473][T13632] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.545639][T13639] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.600336][T13639] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.612332][T13639] device bridge_slave_0 entered promiscuous mode [ 445.624005][T13639] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.636056][T13639] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.662370][T13639] device bridge_slave_1 entered promiscuous mode [ 445.751484][T13653] syz_tun: refused to change device tx_queue_len [ 446.275739][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 446.355399][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 446.384166][ T2357] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.391275][ T2357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.489119][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 446.504785][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 446.515451][ T2357] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.522629][ T2357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.540247][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 446.553802][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 446.609234][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 446.617961][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 446.664332][T13639] device veth0_vlan entered promiscuous mode [ 446.678081][T13639] device veth1_macvtap entered promiscuous mode [ 446.702951][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 446.728895][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.753091][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 446.773852][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 446.812188][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 446.878925][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 446.910784][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 446.935132][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 446.943759][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 446.965817][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 446.985051][ T2357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 447.049559][T13686] device bridge_slave_1 left promiscuous mode [ 447.069676][T13686] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.709381][ T2352] device bridge_slave_1 left promiscuous mode [ 448.715567][ T2352] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.723620][ T2352] device bridge_slave_0 left promiscuous mode [ 448.729961][ T2352] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.738082][ T2352] device veth1_macvtap left promiscuous mode [ 448.744385][ T2352] device veth0_vlan left promiscuous mode [ 449.063547][T13732] syz_tun: refused to change device tx_queue_len [ 449.372364][T13744] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.383918][T13744] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.406410][T13744] device bridge_slave_0 entered promiscuous mode [ 449.423750][T13744] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.459923][T13744] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.469367][T13744] device bridge_slave_1 entered promiscuous mode [ 449.603269][T13776] device syz_tun entered promiscuous mode [ 449.680417][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 449.692127][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 449.763763][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 449.789053][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 449.801427][T13715] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.808495][T13715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.816685][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 449.832603][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 449.847656][T13715] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.854763][T13715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 449.873864][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 449.893715][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 449.910752][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 449.955006][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 449.985915][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.997080][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.014046][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.057841][T13744] device veth0_vlan entered promiscuous mode [ 450.102197][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 450.119628][T13744] device veth1_macvtap entered promiscuous mode [ 450.168755][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 450.302101][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 451.509389][ T2361] device bridge_slave_1 left promiscuous mode [ 451.515745][ T2361] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.549247][ T2361] device bridge_slave_0 left promiscuous mode [ 451.555521][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.580090][ T2361] device veth1_macvtap left promiscuous mode [ 451.586187][ T2361] device veth0_vlan left promiscuous mode [ 453.827740][T13852] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.834911][T13852] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.842753][T13852] device bridge_slave_0 entered promiscuous mode [ 453.850193][T13852] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.868263][T13852] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.889193][T13852] device bridge_slave_1 entered promiscuous mode [ 453.983380][T13852] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.990508][T13852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.997914][T13852] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.004988][T13852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.089446][ T2365] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.344306][ T2365] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.372751][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.403099][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.433409][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.471055][ T2365] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.478240][ T2365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.558661][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.567126][ T2365] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.574344][ T2365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.647464][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 454.700583][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 454.738876][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 454.761151][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.794163][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.803361][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.824262][T13852] device veth0_vlan entered promiscuous mode [ 454.861242][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 454.885089][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 454.916278][T13852] device veth1_macvtap entered promiscuous mode [ 455.019686][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 455.038895][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 455.059180][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 455.092693][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 455.109823][ T2352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 456.399212][ T2364] device bridge_slave_1 left promiscuous mode [ 456.405454][ T2364] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.413008][ T2364] device bridge_slave_0 left promiscuous mode [ 456.419313][ T2364] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.427273][ T2364] device veth1_macvtap left promiscuous mode [ 456.433375][ T2364] device veth0_vlan left promiscuous mode [ 457.573662][T13972] FAULT_INJECTION: forcing a failure. [ 457.573662][T13972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 457.625548][T13958] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.628767][T13972] CPU: 1 PID: 13972 Comm: syz.2.4454 Tainted: G W syzkaller #0 [ 457.641740][T13972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 457.651814][T13972] Call Trace: [ 457.655108][T13972] [ 457.658144][T13972] __dump_stack+0x21/0x24 [ 457.662591][T13972] dump_stack_lvl+0x110/0x170 [ 457.667291][T13972] ? __cfi_dump_stack_lvl+0x8/0x8 [ 457.667984][T13958] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.672370][T13972] dump_stack+0x15/0x24 [ 457.672392][T13972] should_fail_ex+0x3d4/0x520 [ 457.672420][T13972] should_fail+0xb/0x10 [ 457.692633][T13972] should_fail_usercopy+0x1a/0x20 [ 457.697686][T13972] _copy_from_user+0x1e/0xc0 [ 457.702302][T13972] __sys_bpf+0x2a0/0x850 [ 457.706577][T13972] ? bpf_link_show_fdinfo+0x330/0x330 [ 457.712121][T13972] ? __cfi_ksys_write+0x10/0x10 [ 457.716988][T13972] ? debug_smp_processor_id+0x17/0x20 [ 457.717057][T13958] device bridge_slave_0 entered promiscuous mode [ 457.722473][T13972] __x64_sys_bpf+0x7c/0x90 [ 457.722501][T13972] x64_sys_call+0x488/0x9a0 [ 457.737780][T13972] do_syscall_64+0x4c/0xa0 [ 457.742828][T13972] ? clear_bhb_loop+0x30/0x80 [ 457.747635][T13972] ? clear_bhb_loop+0x30/0x80 [ 457.752349][T13972] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 457.758289][T13972] RIP: 0033:0x7fb989f9c819 [ 457.762726][T13972] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 457.782559][T13972] RSP: 002b:00007fb98af10028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 457.791009][T13972] RAX: ffffffffffffffda RBX: 00007fb98a215fa0 RCX: 00007fb989f9c819 [ 457.792525][T13958] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.798995][T13972] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 457.799013][T13972] RBP: 00007fb98af10090 R08: 0000000000000000 R09: 0000000000000000 [ 457.799025][T13972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.799036][T13972] R13: 00007fb98a216038 R14: 00007fb98a215fa0 R15: 00007fff0d3bd2f8 [ 457.799056][T13972] [ 457.843812][T13958] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.853705][T13958] device bridge_slave_1 entered promiscuous mode [ 458.224483][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 458.240541][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 458.274514][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 458.311623][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 458.320867][ T2361] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.328472][ T2361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.336447][T14009] FAULT_INJECTION: forcing a failure. [ 458.336447][T14009] name failslab, interval 1, probability 0, space 0, times 0 [ 458.358191][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 458.370410][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 458.378810][T14009] CPU: 1 PID: 14009 Comm: syz.4.4468 Tainted: G W syzkaller #0 [ 458.387856][T14009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 458.398003][T14009] Call Trace: [ 458.401292][T14009] [ 458.404342][T14009] __dump_stack+0x21/0x24 [ 458.408688][T14009] dump_stack_lvl+0x110/0x170 [ 458.413382][T14009] ? __cfi_dump_stack_lvl+0x8/0x8 [ 458.418426][T14009] ? stack_trace_save+0xa6/0xf0 [ 458.423297][T14009] dump_stack+0x15/0x24 [ 458.427470][T14009] should_fail_ex+0x3d4/0x520 [ 458.432167][T14009] __should_failslab+0xac/0xf0 [ 458.436952][T14009] ? bpf_test_init+0xa7/0x140 [ 458.441642][T14009] should_failslab+0x9/0x20 [ 458.446153][T14009] __kmem_cache_alloc_node+0x3d/0x2c0 [ 458.451541][T14009] ? avc_has_perm_noaudit+0x391/0x490 [ 458.456941][T14009] ? bpf_test_init+0xa7/0x140 [ 458.461640][T14009] __kmalloc+0xa1/0x1e0 [ 458.465830][T14009] bpf_test_init+0xa7/0x140 [ 458.470351][T14009] bpf_prog_test_run_xdp+0x484/0xf10 [ 458.475744][T14009] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 458.481569][T14009] ? __kasan_check_write+0x14/0x20 [ 458.486871][T14009] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 458.492689][T14009] bpf_prog_test_run+0x3e3/0x640 [ 458.497638][T14009] ? bpf_prog_query+0x270/0x270 [ 458.502585][T14009] ? selinux_bpf+0xce/0xf0 [ 458.507020][T14009] ? security_bpf+0x93/0xb0 [ 458.511538][T14009] __sys_bpf+0x5ee/0x850 [ 458.515790][T14009] ? bpf_link_show_fdinfo+0x330/0x330 [ 458.521308][T14009] ? __cfi_ksys_write+0x10/0x10 [ 458.526173][T14009] ? debug_smp_processor_id+0x17/0x20 [ 458.531563][T14009] __x64_sys_bpf+0x7c/0x90 [ 458.535999][T14009] x64_sys_call+0x488/0x9a0 [ 458.540517][T14009] do_syscall_64+0x4c/0xa0 [ 458.544946][T14009] ? clear_bhb_loop+0x30/0x80 [ 458.549640][T14009] ? clear_bhb_loop+0x30/0x80 [ 458.554426][T14009] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 458.560341][T14009] RIP: 0033:0x7ff80359c819 [ 458.564851][T14009] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 458.584470][T14009] RSP: 002b:00007ff80443c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 458.592898][T14009] RAX: ffffffffffffffda RBX: 00007ff803815fa0 RCX: 00007ff80359c819 [ 458.601057][T14009] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 458.609038][T14009] RBP: 00007ff80443c090 R08: 0000000000000000 R09: 0000000000000000 [ 458.617018][T14009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.625093][T14009] R13: 00007ff803816038 R14: 00007ff803815fa0 R15: 00007ffc587b8eb8 [ 458.633080][T14009] [ 458.679043][ T2361] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.686148][ T2361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.768923][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 458.782036][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 458.800257][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 458.919942][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 458.961814][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 458.989448][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.027845][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.062886][T13958] device veth0_vlan entered promiscuous mode [ 459.076119][T14037] Â: renamed from pim6reg1 [ 459.105480][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 459.119376][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 459.162543][T13958] device veth1_macvtap entered promiscuous mode [ 459.230475][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 459.253116][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 459.279836][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 459.312224][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 459.359143][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 459.405762][T14051] FAULT_INJECTION: forcing a failure. [ 459.405762][T14051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.428654][T14051] CPU: 1 PID: 14051 Comm: syz.4.4482 Tainted: G W syzkaller #0 [ 459.437635][T14051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 459.447699][T14051] Call Trace: [ 459.450990][T14051] [ 459.453933][T14051] __dump_stack+0x21/0x24 [ 459.458273][T14051] dump_stack_lvl+0x110/0x170 [ 459.462947][T14051] ? __cfi_dump_stack_lvl+0x8/0x8 [ 459.467972][T14051] dump_stack+0x15/0x24 [ 459.472189][T14051] should_fail_ex+0x3d4/0x520 [ 459.476880][T14051] should_fail+0xb/0x10 [ 459.481038][T14051] should_fail_usercopy+0x1a/0x20 [ 459.486059][T14051] _copy_from_user+0x1e/0xc0 [ 459.490702][T14051] bpf_test_init+0xe5/0x140 [ 459.495212][T14051] bpf_prog_test_run_xdp+0x484/0xf10 [ 459.500507][T14051] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 459.506377][T14051] ? __kasan_check_write+0x14/0x20 [ 459.511491][T14051] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 459.517299][T14051] bpf_prog_test_run+0x3e3/0x640 [ 459.522238][T14051] ? bpf_prog_query+0x270/0x270 [ 459.527090][T14051] ? selinux_bpf+0xce/0xf0 [ 459.531512][T14051] ? security_bpf+0x93/0xb0 [ 459.536023][T14051] __sys_bpf+0x5ee/0x850 [ 459.540279][T14051] ? bpf_link_show_fdinfo+0x330/0x330 [ 459.545650][T14051] ? __cfi_ksys_write+0x10/0x10 [ 459.550500][T14051] ? debug_smp_processor_id+0x17/0x20 [ 459.555878][T14051] __x64_sys_bpf+0x7c/0x90 [ 459.560302][T14051] x64_sys_call+0x488/0x9a0 [ 459.564811][T14051] do_syscall_64+0x4c/0xa0 [ 459.569226][T14051] ? clear_bhb_loop+0x30/0x80 [ 459.573907][T14051] ? clear_bhb_loop+0x30/0x80 [ 459.578590][T14051] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 459.584496][T14051] RIP: 0033:0x7ff80359c819 [ 459.588915][T14051] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 459.608605][T14051] RSP: 002b:00007ff80443c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 459.617110][T14051] RAX: ffffffffffffffda RBX: 00007ff803815fa0 RCX: 00007ff80359c819 [ 459.625089][T14051] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 459.633110][T14051] RBP: 00007ff80443c090 R08: 0000000000000000 R09: 0000000000000000 [ 459.641079][T14051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.649049][T14051] R13: 00007ff803816038 R14: 00007ff803815fa0 R15: 00007ffc587b8eb8 [ 459.657286][T14051] [ 460.902330][ T2364] device bridge_slave_1 left promiscuous mode [ 460.908497][ T2364] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.929097][ T2364] device bridge_slave_0 left promiscuous mode [ 460.935281][ T2364] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.949872][ T2364] device veth1_macvtap left promiscuous mode [ 460.955932][ T2364] device veth0_vlan left promiscuous mode [ 461.805964][T14078] device bridge_slave_1 left promiscuous mode [ 461.819367][T14078] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.027214][T14104] FAULT_INJECTION: forcing a failure. [ 462.027214][T14104] name failslab, interval 1, probability 0, space 0, times 0 [ 462.041138][T14104] CPU: 1 PID: 14104 Comm: syz.3.4502 Tainted: G W syzkaller #0 [ 462.050111][T14104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 462.060241][T14104] Call Trace: [ 462.063539][T14104] [ 462.066485][T14104] __dump_stack+0x21/0x24 [ 462.070838][T14104] dump_stack_lvl+0x110/0x170 [ 462.075532][T14104] ? __cfi_dump_stack_lvl+0x8/0x8 [ 462.080571][T14104] ? __cfi_synchronize_rcu_expedited+0x10/0x10 [ 462.086831][T14104] ? bpf_dispatcher_xdp_func+0x20/0x30 [ 462.092353][T14104] dump_stack+0x15/0x24 [ 462.096524][T14104] should_fail_ex+0x3d4/0x520 [ 462.101233][T14104] __should_failslab+0xac/0xf0 [ 462.106107][T14104] ? kvmalloc_node+0x28a/0x460 [ 462.110896][T14104] should_failslab+0x9/0x20 [ 462.115414][T14104] __kmem_cache_alloc_node+0x3d/0x2c0 [ 462.120812][T14104] ? kvmalloc_node+0x28a/0x460 [ 462.125587][T14104] __kmalloc_node+0xa1/0x1e0 [ 462.130280][T14104] kvmalloc_node+0x28a/0x460 [ 462.134891][T14104] ? __cfi_kvmalloc_node+0x10/0x10 [ 462.140026][T14104] ? synchronize_rcu+0x97/0x3d0 [ 462.144896][T14104] bpf_test_run_xdp_live+0x1dd/0x1b00 [ 462.150293][T14104] ? __cfi_mutex_unlock+0x10/0x10 [ 462.155345][T14104] ? text_poke_copy+0x7b/0x90 [ 462.160133][T14104] ? 0xffffffffa0004300 [ 462.164482][T14104] ? 0xffffffffa0004300 [ 462.168647][T14104] ? 0xffffffffa0004300 [ 462.172900][T14104] ? __asan_set_shadow_00+0xe/0x10 [ 462.178043][T14104] ? bpf_dispatcher_change_prog+0xc5f/0xeb0 [ 462.183974][T14104] ? 0xffffffffa0004300 [ 462.188159][T14104] ? xdp_convert_md_to_buff+0x370/0x370 [ 462.193752][T14104] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 462.199683][T14104] ? __kasan_check_write+0x14/0x20 [ 462.204809][T14104] ? _copy_from_user+0x8f/0xc0 [ 462.209582][T14104] bpf_prog_test_run_xdp+0x736/0xf10 [ 462.214969][T14104] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 462.220785][T14104] ? __kasan_check_write+0x14/0x20 [ 462.225899][T14104] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 462.231707][T14104] bpf_prog_test_run+0x3e3/0x640 [ 462.236679][T14104] ? bpf_prog_query+0x270/0x270 [ 462.241537][T14104] ? selinux_bpf+0xce/0xf0 [ 462.245956][T14104] ? security_bpf+0x93/0xb0 [ 462.250464][T14104] __sys_bpf+0x5ee/0x850 [ 462.254710][T14104] ? bpf_link_show_fdinfo+0x330/0x330 [ 462.260085][T14104] ? __cfi_ksys_write+0x10/0x10 [ 462.264935][T14104] ? debug_smp_processor_id+0x17/0x20 [ 462.270311][T14104] __x64_sys_bpf+0x7c/0x90 [ 462.274739][T14104] x64_sys_call+0x488/0x9a0 [ 462.279253][T14104] do_syscall_64+0x4c/0xa0 [ 462.283670][T14104] ? clear_bhb_loop+0x30/0x80 [ 462.288352][T14104] ? clear_bhb_loop+0x30/0x80 [ 462.293067][T14104] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 462.299079][T14104] RIP: 0033:0x7fe189f9c819 [ 462.303504][T14104] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 462.323746][T14104] RSP: 002b:00007fe18ae73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 462.332197][T14104] RAX: ffffffffffffffda RBX: 00007fe18a215fa0 RCX: 00007fe189f9c819 [ 462.340695][T14104] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 462.348671][T14104] RBP: 00007fe18ae73090 R08: 0000000000000000 R09: 0000000000000000 [ 462.356643][T14104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.364620][T14104] R13: 00007fe18a216038 R14: 00007fe18a215fa0 R15: 00007ffdeec41058 [ 462.372601][T14104] [ 462.409751][T14082] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.420833][T14082] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.461231][T14082] device bridge_slave_0 entered promiscuous mode [ 462.503371][T14082] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.533380][T14082] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.553068][T14082] device bridge_slave_1 entered promiscuous mode [ 462.660497][T14082] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.667598][T14082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.674953][T14082] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.682105][T14082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.733813][ T2364] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.744152][ T2364] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.776924][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 462.786604][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 462.802828][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 462.824458][T14143] FAULT_INJECTION: forcing a failure. [ 462.824458][T14143] name failslab, interval 1, probability 0, space 0, times 0 [ 462.825826][ T2365] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.844258][ T2365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.851713][T14143] CPU: 0 PID: 14143 Comm: syz.3.4514 Tainted: G W syzkaller #0 [ 462.860686][T14143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 462.870767][T14143] Call Trace: [ 462.874073][T14143] [ 462.877032][T14143] __dump_stack+0x21/0x24 [ 462.881390][T14143] dump_stack_lvl+0x110/0x170 [ 462.886100][T14143] ? __cfi_dump_stack_lvl+0x8/0x8 [ 462.891161][T14143] dump_stack+0x15/0x24 [ 462.895348][T14143] should_fail_ex+0x3d4/0x520 [ 462.900062][T14143] __should_failslab+0xac/0xf0 [ 462.904910][T14143] ? kvmalloc_node+0x28a/0x460 [ 462.905485][T14082] device veth0_vlan entered promiscuous mode [ 462.909698][T14143] should_failslab+0x9/0x20 [ 462.909720][T14143] __kmem_cache_alloc_node+0x3d/0x2c0 [ 462.909744][T14143] ? kasan_save_alloc_info+0x25/0x30 [ 462.931110][T14143] ? kvmalloc_node+0x28a/0x460 [ 462.933909][T14082] device veth1_macvtap entered promiscuous mode [ 462.935933][T14143] __kmalloc_node+0xa1/0x1e0 [ 462.935959][T14143] kvmalloc_node+0x28a/0x460 [ 462.951483][T14143] ? __cfi_kvmalloc_node+0x10/0x10 [ 462.957058][T14143] ? synchronize_rcu+0x97/0x3d0 [ 462.961941][T14143] bpf_test_run_xdp_live+0x209/0x1b00 [ 462.967355][T14143] ? __cfi_mutex_unlock+0x10/0x10 [ 462.972499][T14143] ? text_poke_copy+0x7b/0x90 [ 462.977199][T14143] ? 0xffffffffa0004300 [ 462.981383][T14143] ? 0xffffffffa0004300 [ 462.985559][T14143] ? __asan_set_shadow_00+0xe/0x10 [ 462.990881][T14143] ? bpf_dispatcher_change_prog+0xc5f/0xeb0 [ 462.997067][T14143] ? 0xffffffffa0004300 [ 463.001253][T14143] ? xdp_convert_md_to_buff+0x370/0x370 [ 463.007284][T14143] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 463.013212][T14143] ? __kasan_check_write+0x14/0x20 [ 463.018623][T14143] ? _copy_from_user+0x8f/0xc0 [ 463.023433][T14143] bpf_prog_test_run_xdp+0x736/0xf10 [ 463.028755][T14143] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 463.034712][T14143] ? __kasan_check_write+0x14/0x20 [ 463.039945][T14143] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 463.045794][T14143] bpf_prog_test_run+0x3e3/0x640 [ 463.050763][T14143] ? bpf_prog_query+0x270/0x270 [ 463.055729][T14143] ? selinux_bpf+0xce/0xf0 [ 463.060177][T14143] ? security_bpf+0x93/0xb0 [ 463.064880][T14143] __sys_bpf+0x5ee/0x850 [ 463.069151][T14143] ? bpf_link_show_fdinfo+0x330/0x330 [ 463.074553][T14143] ? __cfi_ksys_write+0x10/0x10 [ 463.079429][T14143] ? debug_smp_processor_id+0x17/0x20 [ 463.084925][T14143] __x64_sys_bpf+0x7c/0x90 [ 463.089379][T14143] x64_sys_call+0x488/0x9a0 [ 463.094013][T14143] do_syscall_64+0x4c/0xa0 [ 463.098456][T14143] ? clear_bhb_loop+0x30/0x80 [ 463.103166][T14143] ? clear_bhb_loop+0x30/0x80 [ 463.107880][T14143] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 463.114237][T14143] RIP: 0033:0x7fe189f9c819 [ 463.118674][T14143] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 463.138850][T14143] RSP: 002b:00007fe18ae73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 463.147282][T14143] RAX: ffffffffffffffda RBX: 00007fe18a215fa0 RCX: 00007fe189f9c819 [ 463.155267][T14143] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 463.163249][T14143] RBP: 00007fe18ae73090 R08: 0000000000000000 R09: 0000000000000000 [ 463.171311][T14143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.179312][T14143] R13: 00007fe18a216038 R14: 00007fe18a215fa0 R15: 00007ffdeec41058 [ 463.187296][T14143] [ 463.195843][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 463.204632][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 463.213648][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 463.225513][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.233864][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.241620][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 463.250906][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 463.262289][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 463.270677][T14151] FAULT_INJECTION: forcing a failure. [ 463.270677][T14151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.284170][ T2365] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.291251][ T2365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.299100][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 463.307015][T14151] CPU: 0 PID: 14151 Comm: syz.4.4517 Tainted: G W syzkaller #0 [ 463.316063][T14151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 463.326234][T14151] Call Trace: [ 463.329533][T14151] [ 463.332483][T14151] __dump_stack+0x21/0x24 [ 463.336839][T14151] dump_stack_lvl+0x110/0x170 [ 463.338728][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 463.341538][T14151] ? __cfi_dump_stack_lvl+0x8/0x8 [ 463.341563][T14151] ? has_cap_mac_admin+0x370/0x370 [ 463.359507][T14151] dump_stack+0x15/0x24 [ 463.363685][T14151] should_fail_ex+0x3d4/0x520 [ 463.368402][T14151] should_fail+0xb/0x10 [ 463.372672][T14151] should_fail_usercopy+0x1a/0x20 [ 463.377715][T14151] _copy_from_user+0x1e/0xc0 [ 463.382328][T14151] get_user_ifreq+0x6c/0x180 [ 463.386954][T14151] sock_ioctl+0x631/0x710 [ 463.391386][T14151] ? __cfi_sock_ioctl+0x10/0x10 [ 463.396329][T14151] ? security_file_ioctl+0x95/0xc0 [ 463.401446][T14151] ? __cfi_sock_ioctl+0x10/0x10 [ 463.406383][T14151] __se_sys_ioctl+0x12f/0x1b0 [ 463.411089][T14151] __x64_sys_ioctl+0x7b/0x90 [ 463.415695][T14151] x64_sys_call+0x58b/0x9a0 [ 463.420225][T14151] do_syscall_64+0x4c/0xa0 [ 463.424648][T14151] ? clear_bhb_loop+0x30/0x80 [ 463.429330][T14151] ? clear_bhb_loop+0x30/0x80 [ 463.434022][T14151] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 463.439920][T14151] RIP: 0033:0x7ff80359c819 [ 463.444340][T14151] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 463.464061][T14151] RSP: 002b:00007ff80443c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.472480][T14151] RAX: ffffffffffffffda RBX: 00007ff803815fa0 RCX: 00007ff80359c819 [ 463.480459][T14151] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000006 [ 463.488440][T14151] RBP: 00007ff80443c090 R08: 0000000000000000 R09: 0000000000000000 [ 463.496412][T14151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.504389][T14151] R13: 00007ff803816038 R14: 00007ff803815fa0 R15: 00007ffc587b8eb8 [ 463.512365][T14151] [ 463.572644][T14157] FAULT_INJECTION: forcing a failure. [ 463.572644][T14157] name failslab, interval 1, probability 0, space 0, times 0 [ 463.586670][T14157] CPU: 1 PID: 14157 Comm: syz.4.4520 Tainted: G W syzkaller #0 [ 463.595646][T14157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 463.605806][T14157] Call Trace: [ 463.609100][T14157] [ 463.612048][T14157] __dump_stack+0x21/0x24 [ 463.616396][T14157] dump_stack_lvl+0x110/0x170 [ 463.621099][T14157] ? __cfi_dump_stack_lvl+0x8/0x8 [ 463.626145][T14157] dump_stack+0x15/0x24 [ 463.630318][T14157] should_fail_ex+0x3d4/0x520 [ 463.635016][T14157] __should_failslab+0xac/0xf0 [ 463.639796][T14157] ? allocate_cgrp_cset_links+0xdc/0x380 [ 463.645712][T14157] should_failslab+0x9/0x20 [ 463.650233][T14157] __kmem_cache_alloc_node+0x3d/0x2c0 [ 463.655632][T14157] ? kasan_save_alloc_info+0x25/0x30 [ 463.661119][T14157] ? allocate_cgrp_cset_links+0xdc/0x380 [ 463.666765][T14157] kmalloc_trace+0x29/0xb0 [ 463.671198][T14157] allocate_cgrp_cset_links+0xdc/0x380 [ 463.676755][T14157] find_css_set+0x95e/0x1580 [ 463.681366][T14157] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 463.687281][T14157] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 463.692851][T14157] ? link_css_set+0x3fd/0x4e0 [ 463.697545][T14157] find_css_set+0x1398/0x1580 [ 463.702240][T14157] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 463.708146][T14157] cgroup_migrate_prepare_dst+0xe0/0x910 [ 463.713790][T14157] cgroup_attach_task+0x298/0x520 [ 463.718823][T14157] ? __cfi_cgroup_attach_task+0x10/0x10 [ 463.724379][T14157] ? cgroup_attach_permissions+0x41d/0x8a0 [ 463.730294][T14157] ? __kasan_check_write+0x14/0x20 [ 463.735415][T14157] ? revert_creds+0xb5/0x140 [ 463.740025][T14157] __cgroup_procs_write+0x271/0x2d0 [ 463.745242][T14157] cgroup_procs_write+0x27/0x50 [ 463.750105][T14157] ? __cfi_cgroup_procs_write+0x10/0x10 [ 463.755664][T14157] cgroup_file_write+0x2b3/0x5b0 [ 463.760685][T14157] ? __cfi_cgroup_file_write+0x10/0x10 [ 463.766244][T14157] ? mutex_lock+0x93/0x1b0 [ 463.770683][T14157] ? __cfi_mutex_lock+0x10/0x10 [ 463.775553][T14157] ? __kasan_check_write+0x14/0x20 [ 463.780685][T14157] kernfs_fop_write_iter+0x312/0x470 [ 463.785989][T14157] ? __cfi_cgroup_file_write+0x10/0x10 [ 463.791554][T14157] vfs_write+0x603/0xce0 [ 463.795811][T14157] ? __cfi_vfs_write+0x10/0x10 [ 463.800585][T14157] ? __cfi_mutex_lock+0x10/0x10 [ 463.805460][T14157] ? __fdget_pos+0x2cd/0x380 [ 463.810063][T14157] ? ksys_write+0x71/0x250 [ 463.814490][T14157] ksys_write+0x149/0x250 [ 463.818830][T14157] ? __cfi_ksys_write+0x10/0x10 [ 463.823777][T14157] ? debug_smp_processor_id+0x17/0x20 [ 463.829167][T14157] __x64_sys_write+0x7b/0x90 [ 463.833766][T14157] x64_sys_call+0x27b/0x9a0 [ 463.838289][T14157] do_syscall_64+0x4c/0xa0 [ 463.842717][T14157] ? clear_bhb_loop+0x30/0x80 [ 463.847848][T14157] ? clear_bhb_loop+0x30/0x80 [ 463.852541][T14157] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 463.858454][T14157] RIP: 0033:0x7ff80359c819 [ 463.862881][T14157] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 463.882583][T14157] RSP: 002b:00007ff80443c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 463.891282][T14157] RAX: ffffffffffffffda RBX: 00007ff803815fa0 RCX: 00007ff80359c819 [ 463.899354][T14157] RDX: 0000000000000012 RSI: 00002000000005c0 RDI: 0000000000000009 [ 463.907350][T14157] RBP: 00007ff80443c090 R08: 0000000000000000 R09: 0000000000000000 [ 463.915330][T14157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 463.923396][T14157] R13: 00007ff803816038 R14: 00007ff803815fa0 R15: 00007ffc587b8eb8 [ 463.931387][T14157] [ 464.889288][T13715] device bridge_slave_1 left promiscuous mode [ 464.895419][T13715] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.903282][T13715] device bridge_slave_0 left promiscuous mode [ 464.909615][T13715] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.917374][T13715] device veth1_macvtap left promiscuous mode [ 464.923560][T13715] device veth0_vlan left promiscuous mode [ 465.932050][T14178] FAULT_INJECTION: forcing a failure. [ 465.932050][T14178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 465.958670][T14178] CPU: 0 PID: 14178 Comm: syz.3.4528 Tainted: G W syzkaller #0 [ 465.967665][T14178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 465.977925][T14178] Call Trace: [ 465.981316][T14178] [ 465.984279][T14178] __dump_stack+0x21/0x24 [ 465.988636][T14178] dump_stack_lvl+0x110/0x170 [ 465.993333][T14178] ? __cfi_dump_stack_lvl+0x8/0x8 [ 465.998383][T14178] dump_stack+0x15/0x24 [ 466.002564][T14178] should_fail_ex+0x3d4/0x520 [ 466.007285][T14178] should_fail+0xb/0x10 [ 466.011658][T14178] should_fail_usercopy+0x1a/0x20 [ 466.016675][T14178] _copy_from_user+0x1e/0xc0 [ 466.021270][T14178] vti6_siocdevprivate+0x43b/0xd80 [ 466.026412][T14178] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 466.032084][T14178] ? full_name_hash+0xba/0xf0 [ 466.036813][T14178] dev_ifsioc+0xa8b/0xd80 [ 466.041177][T14178] ? dev_ioctl+0xcf0/0xcf0 [ 466.045630][T14178] ? __mutex_lock_slowpath+0xe/0x10 [ 466.050867][T14178] ? mutex_lock+0x10a/0x1b0 [ 466.055402][T14178] ? __cfi_mutex_lock+0x10/0x10 [ 466.060291][T14178] ? dev_get_by_name_rcu+0xe5/0x130 [ 466.065530][T14178] dev_ioctl+0x5d9/0xcf0 [ 466.069803][T14178] sock_ioctl+0x68b/0x710 [ 466.074170][T14178] ? __cfi_sock_ioctl+0x10/0x10 [ 466.079056][T14178] ? security_file_ioctl+0x95/0xc0 [ 466.084201][T14178] ? __cfi_sock_ioctl+0x10/0x10 [ 466.089088][T14178] __se_sys_ioctl+0x12f/0x1b0 [ 466.093799][T14178] __x64_sys_ioctl+0x7b/0x90 [ 466.098431][T14178] x64_sys_call+0x58b/0x9a0 [ 466.102960][T14178] do_syscall_64+0x4c/0xa0 [ 466.107413][T14178] ? clear_bhb_loop+0x30/0x80 [ 466.112252][T14178] ? clear_bhb_loop+0x30/0x80 [ 466.116965][T14178] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 466.122978][T14178] RIP: 0033:0x7fe189f9c819 [ 466.127416][T14178] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 466.147142][T14178] RSP: 002b:00007fe18ae73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 466.155588][T14178] RAX: ffffffffffffffda RBX: 00007fe18a215fa0 RCX: 00007fe189f9c819 [ 466.163792][T14178] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000006 [ 466.171798][T14178] RBP: 00007fe18ae73090 R08: 0000000000000000 R09: 0000000000000000 [ 466.179893][T14178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.187893][T14178] R13: 00007fe18a216038 R14: 00007fe18a215fa0 R15: 00007ffdeec41058 [ 466.195989][T14178] [ 466.357391][T14183] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.364706][T14183] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.374576][T14183] device bridge_slave_0 entered promiscuous mode [ 466.395374][T14183] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.432862][T14183] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.440861][T14183] device bridge_slave_1 entered promiscuous mode [ 466.461735][T14218] FAULT_INJECTION: forcing a failure. [ 466.461735][T14218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.475532][T14218] CPU: 0 PID: 14218 Comm: syz.3.4537 Tainted: G W syzkaller #0 [ 466.484535][T14218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 466.494856][T14218] Call Trace: [ 466.498242][T14218] [ 466.501193][T14218] __dump_stack+0x21/0x24 [ 466.505552][T14218] dump_stack_lvl+0x110/0x170 [ 466.510256][T14218] ? __cfi_dump_stack_lvl+0x8/0x8 [ 466.515391][T14218] dump_stack+0x15/0x24 [ 466.519573][T14218] should_fail_ex+0x3d4/0x520 [ 466.524287][T14218] should_fail+0xb/0x10 [ 466.528467][T14218] should_fail_usercopy+0x1a/0x20 [ 466.533512][T14218] _copy_to_user+0x1e/0x90 [ 466.537956][T14218] simple_read_from_buffer+0xe9/0x160 [ 466.543350][T14218] proc_fail_nth_read+0x1a6/0x220 [ 466.548408][T14218] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 466.553984][T14218] ? security_file_permission+0x94/0xb0 [ 466.559554][T14218] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 466.565133][T14218] vfs_read+0x27a/0x910 [ 466.569311][T14218] ? __cfi_vfs_read+0x10/0x10 [ 466.574007][T14218] ? __kasan_check_write+0x14/0x20 [ 466.579225][T14218] ? mutex_lock+0x93/0x1b0 [ 466.583667][T14218] ? __cfi_mutex_lock+0x10/0x10 [ 466.588545][T14218] ? __fdget_pos+0x2cd/0x380 [ 466.593146][T14218] ? ksys_read+0x71/0x250 [ 466.597482][T14218] ksys_read+0x149/0x250 [ 466.601739][T14218] ? __cfi_ksys_read+0x10/0x10 [ 466.606516][T14218] ? fpregs_restore_userregs+0x128/0x260 [ 466.612172][T14218] __x64_sys_read+0x7b/0x90 [ 466.616683][T14218] x64_sys_call+0x2f/0x9a0 [ 466.621114][T14218] do_syscall_64+0x4c/0xa0 [ 466.625541][T14218] ? clear_bhb_loop+0x30/0x80 [ 466.630347][T14218] ? clear_bhb_loop+0x30/0x80 [ 466.635040][T14218] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 466.640951][T14218] RIP: 0033:0x7fe189f5d04e [ 466.645456][T14218] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 466.665433][T14218] RSP: 002b:00007fe18ae72fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 466.673889][T14218] RAX: ffffffffffffffda RBX: 00007fe18ae736c0 RCX: 00007fe189f5d04e [ 466.681932][T14218] RDX: 000000000000000f RSI: 00007fe18ae730a0 RDI: 000000000000000c [ 466.689921][T14218] RBP: 00007fe18ae73090 R08: 0000000000000000 R09: 0000000000000000 [ 466.698240][T14218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 466.706323][T14218] R13: 00007fe18a216038 R14: 00007fe18a215fa0 R15: 00007ffdeec41058 [ 466.714407][T14218] [ 466.988039][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 466.997220][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 467.051513][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 467.099192][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 467.115886][T14230] FAULT_INJECTION: forcing a failure. [ 467.115886][T14230] name failslab, interval 1, probability 0, space 0, times 0 [ 467.133853][T13715] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.141047][T13715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.158853][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 467.167123][T14230] CPU: 0 PID: 14230 Comm: syz.3.4542 Tainted: G W syzkaller #0 [ 467.176088][T14230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 467.186156][T14230] Call Trace: [ 467.189441][T14230] [ 467.192371][T14230] __dump_stack+0x21/0x24 [ 467.196714][T14230] dump_stack_lvl+0x110/0x170 [ 467.201565][T14230] ? __cfi_dump_stack_lvl+0x8/0x8 [ 467.206681][T14230] ? _parse_integer_limit+0x18a/0x1d0 [ 467.212055][T14230] dump_stack+0x15/0x24 [ 467.216219][T14230] should_fail_ex+0x3d4/0x520 [ 467.221097][T14230] __should_failslab+0xac/0xf0 [ 467.225882][T14230] ? bpf_prog_test_run_skb+0x248/0x12c0 [ 467.231531][T14230] should_failslab+0x9/0x20 [ 467.236220][T14230] __kmem_cache_alloc_node+0x3d/0x2c0 [ 467.241611][T14230] ? bpf_prog_test_run_skb+0x248/0x12c0 [ 467.247168][T14230] __kmalloc+0xa1/0x1e0 [ 467.251418][T14230] bpf_prog_test_run_skb+0x248/0x12c0 [ 467.256795][T14230] ? __fget_files+0x2d5/0x330 [ 467.261479][T14230] ? __kasan_check_write+0x14/0x20 [ 467.266591][T14230] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 467.272406][T14230] bpf_prog_test_run+0x3e3/0x640 [ 467.277433][T14230] ? bpf_prog_query+0x270/0x270 [ 467.282368][T14230] ? selinux_bpf+0xce/0xf0 [ 467.286793][T14230] ? security_bpf+0x93/0xb0 [ 467.291301][T14230] __sys_bpf+0x5ee/0x850 [ 467.295546][T14230] ? bpf_link_show_fdinfo+0x330/0x330 [ 467.301102][T14230] ? __cfi_ksys_write+0x10/0x10 [ 467.305954][T14230] ? debug_smp_processor_id+0x17/0x20 [ 467.311332][T14230] __x64_sys_bpf+0x7c/0x90 [ 467.315757][T14230] x64_sys_call+0x488/0x9a0 [ 467.320283][T14230] do_syscall_64+0x4c/0xa0 [ 467.324703][T14230] ? clear_bhb_loop+0x30/0x80 [ 467.329389][T14230] ? clear_bhb_loop+0x30/0x80 [ 467.334082][T14230] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 467.340331][T14230] RIP: 0033:0x7fe189f9c819 [ 467.344753][T14230] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 467.364371][T14230] RSP: 002b:00007fe18ae73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 467.372800][T14230] RAX: ffffffffffffffda RBX: 00007fe18a215fa0 RCX: 00007fe189f9c819 [ 467.380959][T14230] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 467.388949][T14230] RBP: 00007fe18ae73090 R08: 0000000000000000 R09: 0000000000000000 [ 467.396928][T14230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.404991][T14230] R13: 00007fe18a216038 R14: 00007fe18a215fa0 R15: 00007ffdeec41058 [ 467.412975][T14230] [ 467.592679][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 467.618812][T13715] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.625900][T13715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.659458][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 467.678804][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 467.699919][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 467.732431][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 467.750591][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 467.787061][T14183] device veth0_vlan entered promiscuous mode [ 467.803785][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 467.818873][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.834032][T14183] device veth1_macvtap entered promiscuous mode [ 467.888369][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.907695][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.939475][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 467.980932][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 468.008965][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 468.028966][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 468.044425][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 468.068787][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 468.085971][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 469.049144][ T2365] device bridge_slave_1 left promiscuous mode [ 469.055368][ T2365] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.062838][ T2365] device bridge_slave_0 left promiscuous mode [ 469.069049][ T2365] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.076720][ T2365] device veth1_macvtap left promiscuous mode [ 469.082820][ T2365] device veth0_vlan left promiscuous mode [ 473.925957][T14276] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.949646][T14276] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.957384][T14276] device bridge_slave_0 entered promiscuous mode [ 473.972796][T14276] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.985353][T14276] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.048948][T14276] device bridge_slave_1 entered promiscuous mode [ 474.258951][T14276] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.266133][T14276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.273502][T14276] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.280586][T14276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.355706][ T2365] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.415114][ T2365] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.460160][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 474.499683][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.564014][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.580537][ T2365] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.587725][ T2365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.626258][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 474.640985][ T2365] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.648537][ T2365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.666297][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.688808][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.738235][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 474.765438][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.792113][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.826185][ T2365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.855451][T14276] device veth0_vlan entered promiscuous mode [ 474.894009][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 474.930441][T14276] device veth1_macvtap entered promiscuous mode [ 475.009993][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 475.038351][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 475.139983][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 475.151928][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 476.879448][ T2365] device bridge_slave_1 left promiscuous mode [ 476.885578][ T2365] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.893028][ T2365] device bridge_slave_0 left promiscuous mode [ 476.899330][ T2365] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.906957][ T2365] device veth1_macvtap left promiscuous mode [ 476.913119][ T2365] device veth0_vlan left promiscuous mode [ 478.239765][T14349] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 478.282651][T14349] device syzkaller0 entered promiscuous mode [ 478.376048][T14353] device syzkaller0 entered promiscuous mode [ 478.939922][T14354] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.947007][T14354] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.003350][T14354] device bridge_slave_0 entered promiscuous mode [ 479.268907][T14354] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.310080][T14354] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.317730][T14354] device bridge_slave_1 entered promiscuous mode [ 480.782604][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 480.790331][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 480.813162][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 480.828255][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 480.843034][ T2364] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.850325][ T2364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.869358][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 480.930769][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 480.949028][ T2364] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.956125][ T2364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.009116][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 481.016840][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 481.045471][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 481.081011][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 481.099179][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 481.111076][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 481.120806][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 481.162199][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 481.170548][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.181902][T14354] device veth0_vlan entered promiscuous mode [ 481.194959][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 481.204210][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 481.221007][T14354] device veth1_macvtap entered promiscuous mode [ 481.227846][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 481.241038][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 481.250687][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 481.490322][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 481.500771][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 481.526598][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 481.552046][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 481.613496][T14414] pimreg: tun_chr_ioctl cmd 1074025692 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=3978 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 481.908565][ T28] audit: type=1400 audit(1776954633.788:163): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[8702]" dev="pipefs" ino=8702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 482.768675][ T28] audit: type=1400 audit(1776954634.678:164): avc: denied { read } for pid=14426 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 482.978806][ T2361] bridge0: port 3(ip6gretap0) entered disabled state [ 482.990840][ T2361] device ip6gretap0 left promiscuous mode [ 482.996660][ T2361] bridge0: port 3(ip6gretap0) entered disabled state Stopping sshd: stopped /usr/sbin/sshd (pid 196) OK Stopping crond: stopped /usr/sbin/crond (pid 186) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 140) Stopping network: [ 483.401591][ T28] audit: type=1400 audit(1776954635.308:165): avc: denied { search } for pid=14438 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 483.554723][ T28] audit: type=1400 audit(1776954635.458:166): avc: denied { write } for pid=141 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 483.578479][ T28] audit: type=1400 audit(1776954635.458:167): avc: denied { remove_name } for pid=141 comm="dhcpcd" name="sock" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 483.605132][ T28] audit: type=1400 audit(1776954635.458:168): avc: denied { unlink } for pid=141 comm="dhcpcd" name="sock" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping iptable[ 483.627696][ T28] audit: type=1400 audit(1776954635.508:169): avc: denied { unlink } for pid=141 comm="dhcpcd" name="pid" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 s: [ 483.694164][ T28] audit: type=1400 audit(1776954635.598:170): avc: denied { search } for pid=14452 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 483.720714][ T28] audit: type=1400 audit(1776954635.618:171): avc: denied { write } for pid=14452 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 483.744243][ T28] audit: type=1400 audit(1776954635.618:172): avc: denied { add_name } for pid=14452 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 483.770830][ T2361] device gretap0 left promiscuous mode [ 483.776325][ T2361] GPL: port 1(gretap0) entered disabled state Stopping system message bus: done [ 483.981286][ T2361] device bridge_slave_0 left promiscuous mode [ 483.987624][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.996381][ T2361] device bridge_slave_0 left promiscuous mode [ 484.003464][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.023453][ T2361] device veth1_to_team left promiscuous mode Stopping klogd: [ 484.038613][ T2361] bridge0: port 2(veth1_to_team) entered disabled state [ 484.058752][ T2361] device bridge_slave_0 left promiscuous mode OK[ 484.064957][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state Stopping acpid: [ 484.089672][ T2361] device bridge_slave_1 left promiscuous mode [ 484.095788][ T2361] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.109505][ T2361] device bridge_slave_0 left promiscuous mode [ 484.115725][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.133566][ T2361] device veth0_vlan left promiscuous mode [ 484.139853][ T2361] device veth0_vlan left promiscuous mode [ 484.146371][ T2361] device veth1_macvtap left promiscuous mode [ 484.152530][ T2361] device veth0_vlan left promiscuous mode OK Stopping syslogd: stopped /sbin/syslogd (pid 84) OK umount: devtmpfs busy - remounted read-only [ 485.346443][T14472] EXT4-fs (sda1): re-mounted. Quota mode: none. The system is g[ 485.489288][ T2361] device bridge_slave_0 left promiscuous mode [ 485.495432][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.503396][ T2361] device veth0_vlan left promiscuous mode Sent SIGKILL to all processes Requesting system poweroff [ 487.394278][T14473] kvm: exiting hardware virtualization [ 487.402097][T14473] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 487.409061][T14473] ACPI: PM: Preparing to enter system sleep state S5 [ 487.415905][T14473] reboot: Power down serialport: VM disconnected.