last executing test programs: 29.044293995s ago: executing program 1 (id=72): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 18.41137203s ago: executing program 1 (id=72): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13.859440945s ago: executing program 1 (id=72): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10.386965564s ago: executing program 1 (id=72): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.507937587s ago: executing program 1 (id=72): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.168882437s ago: executing program 2 (id=622): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 4.097333749s ago: executing program 2 (id=624): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000005000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0x1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x50) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x10001, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000015c0)=ANY=[@ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r10}, &(0x7f00000006c0), &(0x7f0000000700)=r9}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd63"], 0xfdef) r14 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r14}, 0x8) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004100000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000006c0), 0x20005, r15}, 0x38) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x100, 0x66, &(0x7f00000000c0)=""/87, 0x40f00, 0x8, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x3, 0x0, 0x8}, 0x10, 0x2a467, r0, 0x6, &(0x7f0000000940)=[r4, r5, r6, r7, r8, r10, r13, r14, r15], &(0x7f0000000980)=[{0x5, 0x5, 0x7, 0x8}, {0x1, 0x2, 0x6, 0x1}, {0x3, 0x2, 0x6, 0x8}, {0x4, 0x4, 0x10, 0x8}, {0x0, 0x5, 0x6, 0xb}, {0x2, 0x1, 0x2, 0xb}], 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r16, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffd}, 0x39) gettid() 3.460037301s ago: executing program 0 (id=635): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3c8}, 0x15040, 0x0, 0xe0ac, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000000000009aaa004018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000011000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000ff8500000015000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x21}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x80) 3.409469753s ago: executing program 0 (id=637): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="09000000040000000c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x9af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000611200000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r5, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000a00)=[0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0], 0x0, 0x3e, &(0x7f0000000a80)=[{}, {}], 0x10, 0x10, &(0x7f0000000ac0), &(0x7f0000000540), 0x8, 0x70, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)='%ps \x00'}, 0x20) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d80)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000002000000000000000000000218110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000000000850000001700000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000120000008500000082000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x1d, 0xb, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @generic={0x2, 0xb, 0x3, 0x1, 0x7ff}, @alu={0x7, 0x0, 0xb, 0x2, 0x6, 0xfffffffffffffffc, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x5, 0x2}, 0x8, 0x10, 0x0, 0x0, r6, r1, 0x1, &(0x7f0000000e00)=[r0, r7, r0, r0, r0, r0, r0, r8], &(0x7f0000000e40)=[{0x5, 0x4, 0x9, 0xb4379c49828144ce}], 0x10, 0x19}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x4, 0x0, &(0x7f0000000200)="63eced8e", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f00000000c0)={'team_slave_1\x00', @random="01320136b1ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0x44063400, 0x0, 0x3, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) socketpair(0x28, 0x2, 0xfffffefd, &(0x7f0000000040)) 3.302097527s ago: executing program 4 (id=639): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 3.19934407s ago: executing program 2 (id=641): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0xffffff7f, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.546264087s ago: executing program 4 (id=642): bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x8}, @ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0xd2, &(0x7f00000002c0)=""/210}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x62005000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 1.488119839s ago: executing program 2 (id=643): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000711236000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x4, 0x0, 0x800000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) syz_clone(0x5000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xf3, 0x7, 0x1, 0x1, 0x0, 0x4, 0x0, 0xe, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x9}, 0x18040, 0x4, 0xf78d, 0x9, 0xff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1}, r1, 0xb, r0, 0x3) 1.415916811s ago: executing program 0 (id=644): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/10, @ANYRESDEC=r0], 0x50) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x1}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0, 0x5}, 0x94) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000ac0)=ANY=[@ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="3985c7f703e984eba21b9141ff7b75f6981eaefefd5ae85fcc7c753da9462c2817a05baad9929131f7300317ec739153bb9677572e2dbb652e389b0b0dfc5482714a8715edf7d80d09852f6ac3496f5b0974321ec75520b83ebaf63b7e41e57fb9117156574bdd896c0bc632ca21e74a145ad246038c1668f7fe8e20a20f17779d6a9b5c64dcb272c7"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xb, &(0x7f0000000200)=ANY=[@ANYRES8, @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) (async) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x19, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711817000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.swap.events\x00', 0x26e1, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000000)=ANY=[], 0x0, 0x52, 0x0, 0x10000000, 0x5}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x2e, &(0x7f0000000b80)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000852000000100000018110000", @ANYRES64=r9, @ANYBLOB="0000000000000000b70200000000000085000000860000001853000003000000000000000000000018380000040000000000000000000000852000000200000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000036300007b8af8ff00000000bfa200000000000007020000f8ffff020000000000000000b704000003000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000001851000008000000000000000000000078190800f0ffffffbf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000900)='syzkaller\x00', 0xb, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x9, &(0x7f0000000980)=[r8], &(0x7f00000009c0)=[{0x1, 0x1, 0x4, 0xb}, {0x3, 0x3, 0xb, 0x8}, {0x3, 0x0, 0x11, 0xc}, {0x2, 0x2, 0x6, 0x9}, {0x2, 0x5, 0x7, 0xc}, {0x4, 0x3, 0x19, 0x4}, {0x3, 0x3, 0x10, 0x4}, {0x2, 0x4, 0xf, 0x9}, {0x0, 0x2, 0xb, 0xc}], 0x10, 0x80000000}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000007a0a058fa2a9d8aff6c0848163b6dabdf92b2cebc3bd079209aea92ed01b81bc0ee49c094a808c0ac40655b1cb12ec5e483dfbc0be0d963cffa82e6986881c3861de8f9eb34d29df5dd81afbad0d0074762817efae5313c87e78dff6986b942aee192845a47be88b18eff042871fa441cf2ce3ee9c621c0a183c5e0f627594761516af8ece1b9f2a912f6274a55ec0bb25fa", @ANYRES32=0x0, @ANYRES32=r11, @ANYBLOB="010000000300"/28], 0x50) write$cgroup_netprio_ifpriomap(r10, &(0x7f0000000080)=ANY=[], 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff01000000", @ANYBLOB="008000"/19, @ANYRES32, @ANYBLOB="00000000020000000000"], 0x48) (async) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r12 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x40, 0x39, 0xc, 0x3, 0x0, 0x8000, 0xa10, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10020, 0xa9, 0x6, 0x4, 0x2, 0x4, 0xf, 0x0, 0x6, 0x0, 0x1}, r8, 0xc, r7, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r12, 0x2401, 0x5) (async) openat$cgroup_netprio_ifpriomap(r8, &(0x7f00000001c0), 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x9) 1.413715641s ago: executing program 2 (id=646): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) 1.409689752s ago: executing program 0 (id=647): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000400000000000000000000f3850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000002850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) write$cgroup_type(r1, &(0x7f0000000040), 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r3) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x0, 0x0, 0xfc, 0x0, 0x800000000000, 0xd212, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x303d80bf, 0x2, @perf_bp={0x0, 0x1}, 0x100049, 0x4, 0x0, 0x4, 0xfffffffffffffffc, 0xffff0000, 0x9, 0x0, 0xffffbffe, 0x0, 0xfff}, 0xffffffffffffffff, 0x8, r3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'macsec0\x00', @remote}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x4, 0x0, r1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) write$cgroup_pressure(r5, &(0x7f0000000680)={'some', 0x20, 0x4, 0x20, 0x7}, 0x2f) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000005000000010000000000000700006e55060000000000000a0100000008000000000000100c000000002e5f6100"], &(0x7f0000000880)=""/7, 0x41, 0x7, 0x0, 0x3}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x17, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x9a, &(0x7f00000004c0)=""/154, 0x41100, 0x3a, '\x00', r7, 0x0, r8, 0x8, &(0x7f0000000900)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000940)=[r1], &(0x7f0000000980)=[{0x1, 0x4, 0xb, 0x5}, {0x2, 0x4, 0xd, 0x3}, {0x0, 0x2, 0x6, 0x3}, {0x4, 0x2, 0x6, 0x8}, {0x1, 0x2, 0x10, 0xb}, {0x3, 0x2, 0xb, 0xa}, {0x3, 0x2, 0xa, 0x4}, {0x1, 0x2, 0xc, 0x7}], 0x10, 0x9}, 0x94) 1.211840528s ago: executing program 4 (id=650): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x47, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000000e00)={&(0x7f00000001c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000340)="641ba75e499efcebe400b4ee3f5f710562aa15d782d9cdd2d3fb5d3e8105ae4691c59dd8b164403c95c1bfa522949817cc90adc7645d110adf35ca5f50afb5fb97f9876327b44abeb83fc6b4800e8d3d70fe461b63adaef9ebccb73ccbb0c0ab95e9af4b9490d01f876cbf5719dabe4edb59d357c0f0eed68ef1b15a0145d29eaca587fac2a00f2a583b4a1a0aafe40cba7a48b1f414dd204865df9e4b5b446935fde44ed6418ccc5016c109e0619206435972351ee29d334b24d9b2a8407d8fa7fe41b7a214feaf8cb7d21875be877b51c048d2bd265c00de715549b558b211b1414881843748b6bfc2408245608c43", 0xf0}, {&(0x7f00000004c0)="3eed08ad9b02f8ca1a8b10a8237c7b90f04b81ff9821950fefacb84079977fd0f8955ac0d6067ba3bab7e111cb671caecff98f2b13a83e8ba623a4e2c698107555fb3ad36e234760ea9742b2b2547bffa7452d7a51ac4d465bcf554d022795279a", 0x61}, {&(0x7f0000000680)="dc07c597dbd66a408b69be6a4fe4ec3f1c028fbadfce18401bb4aee9626b40f65d40ad020db025408393d7c61c0d7caa5838723ccf5d22bec1dead1b5fa43d8725dbd8a628716f8afc4949ddadc11f8a1be671205c56a87d742f4a5f2938dbc8bbdf3555b6e3aeb8a88f7944b7f3ad203d8da2c7448828f86ec2ab43a3c738da0164bfd8b21bfdc1f29c3755ce581571399cb1fb8e77f8e1289bb85a836bc03867ac4bb86ee0ed986390f24850f2", 0xae}, {&(0x7f0000000740)="d8f9b8533cde99273ec770b84e4d8752f8583bf511f8a7f4407a4409ef6037a7daf1d0d3920b8e3f81cd4eaf4eb79b2b8c212668dc1c610933aa5b4f443edc6b4af2638dd54578c5493cebf1f98a75", 0x4f}, {&(0x7f0000000840)="f8970ee245b11dcef47138b76b92ddbbb4d73b486fa3357e95ed28b1bf131760cd3ce57d5fd2e052879ac7ac7d8c1e005324a1493d0c13409e2b791e878a8d03d18c7f131e55ba66104314eefb3f65a18d2636feadfafb8f65405b6f1876e89daeec0d1654125edf96f3b908", 0x6c}], 0x5, &(0x7f0000000d00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4b6e}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xbc}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffe00}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private=0xa010101, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private=0xa010100, @rand_addr=0x64010102}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@end, @noop, @ssrr={0x89, 0x17, 0x9f, [@loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @remote]}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0xa, [0x7, 0x0]}, @generic={0x88, 0xe, "89cbf98e720e80766bb84c14"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0x100}, 0x44000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) 1.210914278s ago: executing program 2 (id=651): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="130000000800000008"], 0x50) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000004711232000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x2db, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x140, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)=r5}, 0x20) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.209393678s ago: executing program 3 (id=652): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 1.15188043s ago: executing program 3 (id=653): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x62, 0x0, 0x0, 0x0}, 0x50) 1.136221861s ago: executing program 3 (id=654): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)='\"', 0x1}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) recvmsg$unix(r1, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x38}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x14, &(0x7f0000010080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x60000002}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xa6}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x4b, 0x8}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r4, 0x4) 1.059727624s ago: executing program 3 (id=655): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000020000f600000000000000008500000041000000850000000500000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x4000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x14, 0x4, 0x8, 0x10001}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f00000004c0)="e97742535e8b287fe3856295b753", 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000020000f600000000000000008500000041000000850000000500000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x4000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x14, 0x4, 0x8, 0x10001}, 0x50) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f00000004c0)="e97742535e8b287fe3856295b753", 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) (async) 899.551779ms ago: executing program 4 (id=656): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="750a00000000000061115c00000000001800000000000000000000000000000095000000000000007364672ac79fb91930b4280bb1a01e8a843ef3f9a1864a638723ca7274bc54e7844244460c65042b5d2c3eb69c4b07a28bb2c7e73e9db822e28083f4b8a0cd068cea77dab6f834023668891810d88882610c7c75d4c6096117bbc55df9"], &(0x7f0000000000)='GPL\x00'}, 0x80) 898.859979ms ago: executing program 4 (id=657): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xf, 0x40, 0x40, 0x41}, 0x50) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbd, 0x5, 0x0, 0x0, 0x0, 0x5, 0x80420, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c97a160, 0x1, @perf_bp={0x0, 0x3}, 0x300, 0x100000001, 0x200000, 0x7, 0x29a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_clone(0x100, &(0x7f0000000a80)="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", 0x1000, &(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)="414b94076c5dc4b300447733d56783451f96e431ca00cc369462dd86b295a2b00c8132c76ca34543b85a8676dc238584b4f835d34d7a43367ea911f2f6d286eb24951a3db0c5af440fcd62386d74706e7702b3c412") r5 = perf_event_open(&(0x7f0000001bc0)={0x0, 0x80, 0x9, 0xa, 0x4, 0x2, 0x0, 0x9, 0x40008, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000001b80), 0xf}, 0xf00, 0x6, 0x4, 0x5, 0x1, 0xfe5, 0x517f, 0x0, 0xfff, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r1, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10, r6}, 0x94) r7 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x4c, 0xff, 0x28, 0x0, 0x0, 0xdd2, 0x21081, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000180)}, 0x10002, 0x3, 0x1ff, 0x8, 0x9, 0x2, 0x8, 0x0, 0x3, 0x0, 0x4}, r4, 0x4, r5, 0xa) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x91050}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x1003, r0}, 0x38) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xfff, 0x9c, 0xffffeb16, 0x26102, r0, 0xd4c0, '\x00', 0x0, r8, 0x0, 0x5, 0x2, 0xf}, 0x50) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x63f) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, r8, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r10, 0x18000000000002a0, 0x2f, 0x0, &(0x7f0000000500)="b90103600040f000009e0ff008001fffffe100004000632f77fbac141411e0000601be3e7d2a7495ac5e1b0cd3b954", 0x0, 0x104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd={0x7}]}, {0x0, [0x30, 0x0, 0x9814b867edc5b7b0, 0x30, 0x0, 0x0, 0x5f, 0x61, 0x2e]}}, 0x0, 0x2f}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1f, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000fcffffff000000000800000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000020000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a80000290095000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000008e82411ca58bc8c7bad8e743ea960000000000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r13) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r15}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r14, 0x10f, 0x87, &(0x7f0000000180), 0x127) recvmsg(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/41, 0x29}], 0x1, &(0x7f0000000540)=""/209, 0xd1}, 0x2100) setsockopt$sock_attach_bpf(r12, 0x1, 0x34, &(0x7f0000000140)=r11, 0x4) 851.058461ms ago: executing program 0 (id=658): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 670.810957ms ago: executing program 0 (id=659): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) syz_clone(0x1700, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="04000000040000000400000005140b14200931e4", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) close(0x3) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRESOCT=r3, @ANYRES32, @ANYRESDEC], 0x0, 0x3ff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='cpu&\t\t') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r9, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_subtree(r9, &(0x7f0000000180), 0x2, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_procs(r10, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="2d70696473206aa4af"], 0x6) 596.023239ms ago: executing program 3 (id=660): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x7, &(0x7f0000000200)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit, @alu={0x5, 0x1, 0x2, 0xa, 0xa, 0xc}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xec, &(0x7f00000004c0)=""/236, 0x0, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) 587.52054ms ago: executing program 3 (id=661): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0e0000000400000004000000ffffffff00000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="80000000000000000000000090ae7442090076850000000000000000"], 0x50) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000b80)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001c40)={r1, 0x58, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001c80), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r4, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x10000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001e40)={0x9, 0x4, &(0x7f0000001f00)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3], &(0x7f0000000100)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe95, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r7, r8, 0x2, 0x2}, 0x10) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r9, r10, 0x2, 0x2}, 0x10) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0xfffffcde, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r11, r12, 0x2, 0x2}, 0x10) socketpair(0x2, 0x2, 0x1, &(0x7f0000000bc0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x5452, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r13, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000640), 0x8, 0xd3, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x1d, 0xe, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0xf}, @ldst={0x0, 0x2, 0x3, 0x5, 0x3, 0xffffffffffffffc0, 0xfffffffffffffff0}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000003c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000bc0)=""/4096, 0x40f00, 0x0, '\x00', r2, @lsm=0x381d0e3408e577cf, r3, 0x8, &(0x7f0000001cc0)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x3, &(0x7f0000001d00)=[r6, r0], &(0x7f0000001d40)=[{0x3, 0x2, 0x8, 0x8}, {0x1, 0x3, 0x40, 0xa}, {0x2, 0x3, 0x8, 0x8}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@ifindex=r2, 0x3, 0x0, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0]}, 0x40) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2fe600, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000080)={'bridge_slave_1\x00', 0x400}) 4.67836ms ago: executing program 4 (id=662): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) 0s ago: executing program 1 (id=72): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.79' (ED25519) to the list of known hosts. [ 20.831085][ T28] audit: type=1400 audit(1775150191.182:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.834497][ T275] cgroup: Unknown subsys name 'net' [ 20.853852][ T28] audit: type=1400 audit(1775150191.182:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.881187][ T28] audit: type=1400 audit(1775150191.212:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.881671][ T275] cgroup: Unknown subsys name 'devices' [ 20.997031][ T275] cgroup: Unknown subsys name 'hugetlb' [ 21.002664][ T275] cgroup: Unknown subsys name 'rlimit' [ 21.136710][ T28] audit: type=1400 audit(1775150191.492:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.159921][ T28] audit: type=1400 audit(1775150191.492:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.184849][ T28] audit: type=1400 audit(1775150191.492:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.206361][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.216979][ T28] audit: type=1400 audit(1775150191.572:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.242413][ T28] audit: type=1400 audit(1775150191.572:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.252877][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.268845][ T28] audit: type=1400 audit(1775150191.602:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.302293][ T28] audit: type=1400 audit(1775150191.602:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.510346][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.517438][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.525014][ T285] device bridge_slave_0 entered promiscuous mode [ 22.531967][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.539066][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.546586][ T285] device bridge_slave_1 entered promiscuous mode [ 22.589366][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.596513][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.603839][ T283] device bridge_slave_0 entered promiscuous mode [ 22.621722][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.628800][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.636328][ T287] device bridge_slave_0 entered promiscuous mode [ 22.644836][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.652111][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.659522][ T283] device bridge_slave_1 entered promiscuous mode [ 22.684971][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.692051][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.699541][ T287] device bridge_slave_1 entered promiscuous mode [ 22.719572][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.726700][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.734150][ T284] device bridge_slave_0 entered promiscuous mode [ 22.744104][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.751260][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.758802][ T284] device bridge_slave_1 entered promiscuous mode [ 22.814289][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.821434][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.829058][ T286] device bridge_slave_0 entered promiscuous mode [ 22.840245][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.847549][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.854984][ T286] device bridge_slave_1 entered promiscuous mode [ 23.001882][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.009046][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.016345][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.023380][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.031803][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.038873][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.046160][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.053183][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.067582][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.074741][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.082035][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.089081][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.117124][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.124266][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.131594][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.138649][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.152297][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.159366][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.166663][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.173690][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.206056][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.213394][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.220865][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.228205][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.235935][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.243208][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.250528][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.257924][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.265245][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.272795][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.280115][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.305589][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.313225][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.320855][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.329263][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.336332][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.343819][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.352331][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.359416][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.379515][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.388396][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.396870][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.403924][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.411601][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.420801][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.427880][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.435244][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.443391][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.450450][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.457940][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.466217][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.473260][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.480867][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.511560][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.520023][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.528487][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.535577][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.543088][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.552331][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.560502][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.568995][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.577300][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.584328][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.591909][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.599990][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.608001][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.615425][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.622826][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.631154][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.639148][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.647391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.655440][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.663469][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.671563][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.679627][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.687675][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.695774][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.707497][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.715917][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.731472][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.739822][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.750304][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.759035][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.772297][ T285] device veth0_vlan entered promiscuous mode [ 23.784838][ T287] device veth0_vlan entered promiscuous mode [ 23.793322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.801683][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.809979][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.818548][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.826937][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.834024][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.841601][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.850271][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.858726][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.866736][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.874768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.882472][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.890212][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.897892][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.910978][ T285] device veth1_macvtap entered promiscuous mode [ 23.922663][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.931169][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.939673][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.946776][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.954310][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.962559][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.970939][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.980365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.988428][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.005739][ T283] device veth0_vlan entered promiscuous mode [ 24.012596][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.020090][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.027773][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.036158][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.044475][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.053128][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.061492][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.069919][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.078023][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.086311][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.099663][ T287] device veth1_macvtap entered promiscuous mode [ 24.111452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.120018][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.131052][ T284] device veth0_vlan entered promiscuous mode [ 24.144559][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 24.155850][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.163899][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.172462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.180994][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.188599][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.199212][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.221304][ T286] device veth0_vlan entered promiscuous mode [ 24.230384][ T284] device veth1_macvtap entered promiscuous mode [ 24.238858][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.247553][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.256170][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.265035][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.273801][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.282889][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.291457][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.300832][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.308515][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.323227][ T286] device veth1_macvtap entered promiscuous mode [ 24.333216][ T283] device veth1_macvtap entered promiscuous mode [ 24.365901][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.368857][ C0] hrtimer: interrupt took 67166 ns [ 24.377353][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.388636][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.400239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.408811][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.417470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.426212][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.479153][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.488772][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.497965][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.512804][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.521432][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.529919][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.411559][ T350] sock: sock_set_timeout: `syz.3.14' (pid 350) tries to set negative timeout [ 26.106067][ T396] Illegal XDP return value 366825728 on prog (id 24) dev N/A, expect packet loss! [ 26.332101][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 26.332127][ T28] audit: type=1400 audit(1775150196.682:112): avc: denied { relabelfrom } for pid=415 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.359609][ T28] audit: type=1400 audit(1775150196.712:113): avc: denied { relabelto } for pid=415 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.642105][ T28] audit: type=1400 audit(1775150196.992:114): avc: denied { read write } for pid=430 comm="syz.3.47" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.738553][ T28] audit: type=1400 audit(1775150196.992:115): avc: denied { open } for pid=430 comm="syz.3.47" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.433410][ T28] audit: type=1400 audit(1775150197.782:116): avc: denied { create } for pid=486 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 27.709732][ T495] device syzkaller0 entered promiscuous mode [ 27.745299][ T28] audit: type=1400 audit(1775150198.092:117): avc: denied { ioctl } for pid=492 comm="syz.3.69" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.132276][ T502] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.154954][ T502] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.172610][ T502] device bridge_slave_0 entered promiscuous mode [ 28.189785][ T502] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.199478][ T502] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.231001][ T502] device bridge_slave_1 entered promiscuous mode [ 28.353068][ T43] device bridge_slave_1 left promiscuous mode [ 28.362923][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.385782][ T43] device bridge_slave_0 left promiscuous mode [ 28.403824][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.431793][ T43] device veth1_macvtap left promiscuous mode [ 28.441786][ T43] device veth0_vlan left promiscuous mode [ 28.719552][ T28] audit: type=1400 audit(1775150199.072:118): avc: denied { create } for pid=502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.772429][ T28] audit: type=1400 audit(1775150199.102:119): avc: denied { write } for pid=502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.071782][ T28] audit: type=1400 audit(1775150199.102:120): avc: denied { read } for pid=502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.130618][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.185835][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.300561][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.355273][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.365166][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.372230][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.379947][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.392063][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.400372][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.407442][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.442016][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.455365][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.465808][ T28] audit: type=1400 audit(1775150199.812:121): avc: denied { create } for pid=551 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 29.474570][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.493905][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.502255][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.641164][ T557] device syzkaller0 entered promiscuous mode [ 30.624860][ C0] sched: RT throttling activated [ 30.648339][ T422] syz.4.35 (422) used greatest stack depth: 22048 bytes left [ 30.649319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.664284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.698586][ T502] device veth0_vlan entered promiscuous mode [ 30.728341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.742836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.752383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.762823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.854060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.864847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.898695][ T502] device veth1_macvtap entered promiscuous mode [ 30.924780][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.940060][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.957982][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.028340][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.037969][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.096167][ T502] syz-executor (502) used greatest stack depth: 22016 bytes left [ 31.246124][ T588] FAULT_INJECTION: forcing a failure. [ 31.246124][ T588] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 31.280010][ T588] CPU: 0 PID: 588 Comm: syz.2.99 Not tainted syzkaller #0 [ 31.287187][ T588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 31.297308][ T588] Call Trace: [ 31.300614][ T588] [ 31.303572][ T588] __dump_stack+0x21/0x24 [ 31.307957][ T588] dump_stack_lvl+0x110/0x170 [ 31.312669][ T588] ? __cfi_dump_stack_lvl+0x8/0x8 [ 31.317736][ T588] dump_stack+0x15/0x24 [ 31.321925][ T588] should_fail_ex+0x3d4/0x520 [ 31.326637][ T588] should_fail+0xb/0x10 [ 31.330833][ T588] should_fail_usercopy+0x1a/0x20 [ 31.335889][ T588] _copy_from_user+0x1e/0xc0 [ 31.340509][ T588] __sys_bpf+0x2a0/0x850 [ 31.344775][ T588] ? bpf_link_show_fdinfo+0x330/0x330 [ 31.350170][ T588] ? __cfi_ksys_write+0x10/0x10 [ 31.355038][ T588] ? debug_smp_processor_id+0x17/0x20 [ 31.360446][ T588] __x64_sys_bpf+0x7c/0x90 [ 31.364910][ T588] x64_sys_call+0x488/0x9a0 [ 31.369442][ T588] do_syscall_64+0x4c/0xa0 [ 31.373891][ T588] ? clear_bhb_loop+0x30/0x80 [ 31.378597][ T588] ? clear_bhb_loop+0x30/0x80 [ 31.383310][ T588] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.389224][ T588] RIP: 0033:0x7fb02c59c819 [ 31.393678][ T588] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 31.413297][ T588] RSP: 002b:00007fb02d41a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.421743][ T588] RAX: ffffffffffffffda RBX: 00007fb02c815fa0 RCX: 00007fb02c59c819 [ 31.429723][ T588] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 31.437716][ T588] RBP: 00007fb02d41a090 R08: 0000000000000000 R09: 0000000000000000 [ 31.445710][ T588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.453702][ T588] R13: 00007fb02c816038 R14: 00007fb02c815fa0 R15: 00007ffc6ea7b6a8 [ 31.461694][ T588] [ 31.465093][ T28] audit: type=1400 audit(1775150201.792:122): avc: denied { create } for pid=590 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 31.648575][ T28] audit: type=1400 audit(1775150202.002:123): avc: denied { create } for pid=597 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.734362][ T592] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.741826][ T592] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.754827][ T592] device bridge_slave_0 entered promiscuous mode [ 31.762091][ T592] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.769177][ T592] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.776742][ T592] device bridge_slave_1 entered promiscuous mode [ 32.216042][ T622] device veth0_vlan left promiscuous mode [ 32.233730][ T622] device veth0_vlan entered promiscuous mode [ 32.337595][ T621] device sit0 entered promiscuous mode [ 32.562568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.570320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.587942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.597258][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.604310][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.611968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.620310][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.627412][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.650486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 32.659560][ T625] FAULT_INJECTION: forcing a failure. [ 32.659560][ T625] name failslab, interval 1, probability 0, space 0, times 1 [ 32.672518][ T625] CPU: 1 PID: 625 Comm: syz.3.113 Not tainted syzkaller #0 [ 32.679753][ T625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 32.689805][ T625] Call Trace: [ 32.693083][ T625] [ 32.696010][ T625] __dump_stack+0x21/0x24 [ 32.700340][ T625] dump_stack_lvl+0x110/0x170 [ 32.705036][ T625] ? __cfi_dump_stack_lvl+0x8/0x8 [ 32.710069][ T625] ? _parse_integer_limit+0x18a/0x1d0 [ 32.715466][ T625] dump_stack+0x15/0x24 [ 32.719626][ T625] should_fail_ex+0x3d4/0x520 [ 32.724352][ T625] __should_failslab+0xac/0xf0 [ 32.729132][ T625] ? bpf_prog_test_run_skb+0x248/0x12c0 [ 32.734684][ T625] should_failslab+0x9/0x20 [ 32.739186][ T625] __kmem_cache_alloc_node+0x3d/0x2c0 [ 32.744578][ T625] ? bpf_prog_test_run_skb+0x248/0x12c0 [ 32.750153][ T625] __kmalloc+0xa1/0x1e0 [ 32.754309][ T625] bpf_prog_test_run_skb+0x248/0x12c0 [ 32.759678][ T625] ? __fget_files+0x2d5/0x330 [ 32.764394][ T625] ? __kasan_check_write+0x14/0x20 [ 32.769502][ T625] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 32.775305][ T625] bpf_prog_test_run+0x3e3/0x640 [ 32.780244][ T625] ? bpf_prog_query+0x270/0x270 [ 32.785096][ T625] ? selinux_bpf+0xce/0xf0 [ 32.789520][ T625] ? security_bpf+0x93/0xb0 [ 32.794021][ T625] __sys_bpf+0x5ee/0x850 [ 32.798262][ T625] ? bpf_link_show_fdinfo+0x330/0x330 [ 32.803631][ T625] ? __cfi_ksys_write+0x10/0x10 [ 32.808504][ T625] ? debug_smp_processor_id+0x17/0x20 [ 32.813879][ T625] __x64_sys_bpf+0x7c/0x90 [ 32.818300][ T625] x64_sys_call+0x488/0x9a0 [ 32.822827][ T625] do_syscall_64+0x4c/0xa0 [ 32.827257][ T625] ? clear_bhb_loop+0x30/0x80 [ 32.831956][ T625] ? clear_bhb_loop+0x30/0x80 [ 32.836636][ T625] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 32.842534][ T625] RIP: 0033:0x7f5757d9c819 [ 32.846946][ T625] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 32.866668][ T625] RSP: 002b:00007f5758cca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.875099][ T625] RAX: ffffffffffffffda RBX: 00007f5758015fa0 RCX: 00007f5757d9c819 [ 32.883061][ T625] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 32.891039][ T625] RBP: 00007f5758cca090 R08: 0000000000000000 R09: 0000000000000000 [ 32.899027][ T625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.907114][ T625] R13: 00007f5758016038 R14: 00007f5758015fa0 R15: 00007ffe04fda238 [ 32.915080][ T625] [ 32.922636][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.966554][ T43] device bridge_slave_1 left promiscuous mode [ 32.972751][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.985699][ T43] device bridge_slave_0 left promiscuous mode [ 32.993197][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.005887][ T43] device veth1_macvtap left promiscuous mode [ 33.011953][ T43] device veth0_vlan left promiscuous mode [ 33.267688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.279706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.291031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.300904][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.315957][ T592] device veth0_vlan entered promiscuous mode [ 33.326380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.334514][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.354005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.362764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.380952][ T592] device veth1_macvtap entered promiscuous mode [ 33.408183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.419920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.430738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.460037][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.468879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.578236][ T592] syz-executor (592) used greatest stack depth: 21984 bytes left [ 33.835638][ T28] audit: type=1400 audit(1775150204.192:124): avc: denied { create } for pid=650 comm="syz.4.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 33.876854][ T658] FAULT_INJECTION: forcing a failure. [ 33.876854][ T658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 33.890221][ T658] CPU: 0 PID: 658 Comm: syz.3.125 Not tainted syzkaller #0 [ 33.897456][ T658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 33.907540][ T658] Call Trace: [ 33.910851][ T658] [ 33.913810][ T658] __dump_stack+0x21/0x24 [ 33.918165][ T658] dump_stack_lvl+0x110/0x170 [ 33.922865][ T658] ? __cfi_dump_stack_lvl+0x8/0x8 [ 33.927919][ T658] dump_stack+0x15/0x24 [ 33.932124][ T658] should_fail_ex+0x3d4/0x520 [ 33.936827][ T658] should_fail+0xb/0x10 [ 33.941014][ T658] should_fail_usercopy+0x1a/0x20 [ 33.946069][ T658] _copy_from_user+0x1e/0xc0 [ 33.950709][ T658] bpf_prog_test_run_skb+0x282/0x12c0 [ 33.956098][ T658] ? __fget_files+0x2d5/0x330 [ 33.960805][ T658] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 33.966631][ T658] bpf_prog_test_run+0x3e3/0x640 [ 33.971587][ T658] ? bpf_prog_query+0x270/0x270 [ 33.976450][ T658] ? selinux_bpf+0xce/0xf0 [ 33.980895][ T658] ? security_bpf+0x93/0xb0 [ 33.985423][ T658] __sys_bpf+0x5ee/0x850 [ 33.989684][ T658] ? bpf_link_show_fdinfo+0x330/0x330 [ 33.995091][ T658] ? __cfi_ksys_write+0x10/0x10 [ 33.999961][ T658] ? debug_smp_processor_id+0x17/0x20 [ 34.005371][ T658] __x64_sys_bpf+0x7c/0x90 [ 34.009817][ T658] x64_sys_call+0x488/0x9a0 [ 34.014341][ T658] do_syscall_64+0x4c/0xa0 [ 34.018783][ T658] ? clear_bhb_loop+0x30/0x80 [ 34.023493][ T658] ? clear_bhb_loop+0x30/0x80 [ 34.028195][ T658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 34.034116][ T658] RIP: 0033:0x7f5757d9c819 [ 34.038556][ T658] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 34.058185][ T658] RSP: 002b:00007f5758cca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.066611][ T658] RAX: ffffffffffffffda RBX: 00007f5758015fa0 RCX: 00007f5757d9c819 [ 34.074596][ T658] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 34.082569][ T658] RBP: 00007f5758cca090 R08: 0000000000000000 R09: 0000000000000000 [ 34.090559][ T658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.098541][ T658] R13: 00007f5758016038 R14: 00007f5758015fa0 R15: 00007ffe04fda238 [ 34.106526][ T658] [ 34.301948][ T663] device wg2 entered promiscuous mode [ 34.381013][ T43] device bridge_slave_1 left promiscuous mode [ 34.389583][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.401183][ T43] device bridge_slave_0 left promiscuous mode [ 34.411531][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.441372][ T43] device veth1_macvtap left promiscuous mode [ 34.458588][ T43] device veth0_vlan left promiscuous mode [ 34.829986][ T659] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.840931][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.860194][ T659] device bridge_slave_0 entered promiscuous mode [ 34.868196][ T659] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.875323][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.883589][ T659] device bridge_slave_1 entered promiscuous mode [ 35.003660][ T674] device syzkaller0 entered promiscuous mode [ 35.375841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.400315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.446595][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.477624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.486499][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.493560][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.501279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.510712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.519572][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.526654][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.548436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.565972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.586674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.601236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.615563][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.694240][ T659] device veth0_vlan entered promiscuous mode [ 35.700666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.709598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.718472][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.726539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.781445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.789680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.887221][ T659] device veth1_macvtap entered promiscuous mode [ 35.971171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.979972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.989011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.062927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.077872][ T700] FAULT_INJECTION: forcing a failure. [ 36.077872][ T700] name failslab, interval 1, probability 0, space 0, times 0 [ 36.091217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.118812][ T700] CPU: 0 PID: 700 Comm: syz.3.138 Not tainted syzkaller #0 [ 36.126077][ T700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 36.136164][ T700] Call Trace: [ 36.139504][ T700] [ 36.142452][ T700] __dump_stack+0x21/0x24 [ 36.146832][ T700] dump_stack_lvl+0x110/0x170 [ 36.151546][ T700] ? __cfi_dump_stack_lvl+0x8/0x8 [ 36.156594][ T700] ? do_syscall_64+0x4c/0xa0 [ 36.161213][ T700] dump_stack+0x15/0x24 [ 36.165404][ T700] should_fail_ex+0x3d4/0x520 [ 36.170113][ T700] __should_failslab+0xac/0xf0 [ 36.174900][ T700] ? sk_prot_alloc+0xed/0x320 [ 36.179616][ T700] should_failslab+0x9/0x20 [ 36.184160][ T700] __kmem_cache_alloc_node+0x3d/0x2c0 [ 36.189579][ T700] ? sk_prot_alloc+0xed/0x320 [ 36.194364][ T700] __kmalloc+0xa1/0x1e0 [ 36.198542][ T700] sk_prot_alloc+0xed/0x320 [ 36.203079][ T700] sk_alloc+0x3b/0x460 [ 36.207175][ T700] ? __kasan_check_write+0x14/0x20 [ 36.212304][ T700] bpf_prog_test_run_skb+0x375/0x12c0 [ 36.217697][ T700] ? __fget_files+0x2d5/0x330 [ 36.222417][ T700] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 36.228254][ T700] bpf_prog_test_run+0x3e3/0x640 [ 36.233217][ T700] ? bpf_prog_query+0x270/0x270 [ 36.238074][ T700] ? selinux_bpf+0xce/0xf0 [ 36.242508][ T700] ? security_bpf+0x93/0xb0 [ 36.247036][ T700] __sys_bpf+0x5ee/0x850 [ 36.251301][ T700] ? bpf_link_show_fdinfo+0x330/0x330 [ 36.256702][ T700] ? __cfi_ksys_write+0x10/0x10 [ 36.261596][ T700] ? debug_smp_processor_id+0x17/0x20 [ 36.266993][ T700] __x64_sys_bpf+0x7c/0x90 [ 36.271439][ T700] x64_sys_call+0x488/0x9a0 [ 36.275967][ T700] do_syscall_64+0x4c/0xa0 [ 36.280407][ T700] ? clear_bhb_loop+0x30/0x80 [ 36.285108][ T700] ? clear_bhb_loop+0x30/0x80 [ 36.289812][ T700] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 36.295725][ T700] RIP: 0033:0x7f5757d9c819 [ 36.300159][ T700] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 36.319787][ T700] RSP: 002b:00007f5758cca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 36.328230][ T700] RAX: ffffffffffffffda RBX: 00007f5758015fa0 RCX: 00007f5757d9c819 [ 36.331861][ T28] audit: type=1400 audit(1775150206.632:125): avc: denied { create } for pid=706 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 36.336218][ T700] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 36.336251][ T700] RBP: 00007f5758cca090 R08: 0000000000000000 R09: 0000000000000000 [ 36.336263][ T700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.379466][ T700] R13: 00007f5758016038 R14: 00007f5758015fa0 R15: 00007ffe04fda238 [ 36.387460][ T700] [ 36.393427][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.402894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.422423][ T707] device veth1_macvtap left promiscuous mode [ 36.461806][ T709] device veth1_macvtap entered promiscuous mode [ 36.475587][ T709] device macsec0 entered promiscuous mode [ 36.481367][ T28] audit: type=1400 audit(1775150206.822:126): avc: denied { append } for pid=706 comm="syz.0.142" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.511643][ T28] audit: type=1400 audit(1775150206.862:127): avc: denied { create } for pid=710 comm="syz.3.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 37.455982][ T746] FAULT_INJECTION: forcing a failure. [ 37.455982][ T746] name failslab, interval 1, probability 0, space 0, times 0 [ 37.530261][ T746] CPU: 1 PID: 746 Comm: syz.2.153 Not tainted syzkaller #0 [ 37.537525][ T746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 37.547594][ T746] Call Trace: [ 37.550884][ T746] [ 37.553835][ T746] __dump_stack+0x21/0x24 [ 37.558201][ T746] dump_stack_lvl+0x110/0x170 [ 37.562894][ T746] ? __cfi_dump_stack_lvl+0x8/0x8 [ 37.567945][ T746] dump_stack+0x15/0x24 [ 37.572135][ T746] should_fail_ex+0x3d4/0x520 [ 37.576834][ T746] __should_failslab+0xac/0xf0 [ 37.581631][ T746] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 37.587373][ T746] should_failslab+0x9/0x20 [ 37.591913][ T746] __kmem_cache_alloc_node+0x3d/0x2c0 [ 37.597317][ T746] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 37.603058][ T746] kmalloc_trace+0x29/0xb0 [ 37.607491][ T746] selinux_sk_alloc_security+0x7e/0x1a0 [ 37.613065][ T746] security_sk_alloc+0x83/0xb0 [ 37.617852][ T746] sk_prot_alloc+0x108/0x320 [ 37.622463][ T746] sk_alloc+0x3b/0x460 [ 37.626555][ T746] ? __kasan_check_write+0x14/0x20 [ 37.631694][ T746] bpf_prog_test_run_skb+0x375/0x12c0 [ 37.637172][ T746] ? __fget_files+0x2d5/0x330 [ 37.641887][ T746] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 37.647726][ T746] bpf_prog_test_run+0x3e3/0x640 [ 37.652702][ T746] ? bpf_prog_query+0x270/0x270 [ 37.657600][ T746] ? selinux_bpf+0xce/0xf0 [ 37.662041][ T746] ? security_bpf+0x93/0xb0 [ 37.666584][ T746] __sys_bpf+0x5ee/0x850 [ 37.669753][ T742] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.670882][ T746] ? bpf_link_show_fdinfo+0x330/0x330 [ 37.683291][ T746] ? __cfi_ksys_write+0x10/0x10 [ 37.688158][ T746] ? debug_smp_processor_id+0x17/0x20 [ 37.693556][ T746] __x64_sys_bpf+0x7c/0x90 [ 37.698003][ T746] x64_sys_call+0x488/0x9a0 [ 37.702525][ T746] do_syscall_64+0x4c/0xa0 [ 37.706973][ T746] ? clear_bhb_loop+0x30/0x80 [ 37.711666][ T746] ? clear_bhb_loop+0x30/0x80 [ 37.716383][ T746] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 37.722352][ T746] RIP: 0033:0x7fb02c59c819 [ 37.726790][ T746] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 37.746415][ T746] RSP: 002b:00007fb02d41a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.754854][ T746] RAX: ffffffffffffffda RBX: 00007fb02c815fa0 RCX: 00007fb02c59c819 [ 37.762842][ T746] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 37.770831][ T746] RBP: 00007fb02d41a090 R08: 0000000000000000 R09: 0000000000000000 [ 37.776296][ T742] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.778820][ T746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.793837][ T746] R13: 00007fb02c816038 R14: 00007fb02c815fa0 R15: 00007ffc6ea7b6a8 [ 37.801839][ T746] [ 37.825951][ T742] device bridge_slave_0 entered promiscuous mode [ 37.882615][ T742] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.926227][ T742] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.943163][ T28] audit: type=1400 audit(1775150208.292:128): avc: denied { create } for pid=761 comm="syz.4.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 38.003581][ T742] device bridge_slave_1 entered promiscuous mode [ 38.074927][ T28] audit: type=1400 audit(1775150208.372:129): avc: denied { associate } for pid=765 comm="syz.2.158" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.216652][ T43] device bridge_slave_1 left promiscuous mode [ 38.237018][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.267684][ T43] device bridge_slave_0 left promiscuous mode [ 38.273857][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.324960][ T43] device veth1_macvtap left promiscuous mode [ 38.331046][ T43] device veth0_vlan left promiscuous mode [ 38.690691][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.715264][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.746926][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.765357][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.805124][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.812209][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.834542][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.915017][ T28] audit: type=1400 audit(1775150209.262:130): avc: denied { ioctl } for pid=802 comm="syz.0.166" path="socket:[18191]" dev="sockfs" ino=18191 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.962691][ T810] FAULT_INJECTION: forcing a failure. [ 38.962691][ T810] name failslab, interval 1, probability 0, space 0, times 0 [ 38.989013][ T810] CPU: 1 PID: 810 Comm: syz.2.168 Not tainted syzkaller #0 [ 38.993826][ T806] device syzkaller0 entered promiscuous mode [ 38.996355][ T810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 38.996368][ T810] Call Trace: [ 38.996374][ T810] [ 38.996381][ T810] __dump_stack+0x21/0x24 [ 38.996415][ T810] dump_stack_lvl+0x110/0x170 [ 38.996442][ T810] ? __cfi_dump_stack_lvl+0x8/0x8 [ 38.996471][ T810] ? kasan_save_alloc_info+0x25/0x30 [ 38.996501][ T810] ? __kasan_kmalloc+0x95/0xb0 [ 38.996525][ T810] dump_stack+0x15/0x24 [ 38.996552][ T810] should_fail_ex+0x3d4/0x520 [ 38.996580][ T810] ? build_skb+0x2a/0x220 [ 39.056158][ T810] __should_failslab+0xac/0xf0 [ 39.060958][ T810] should_failslab+0x9/0x20 [ 39.065486][ T810] kmem_cache_alloc+0x3b/0x330 [ 39.070296][ T810] build_skb+0x2a/0x220 [ 39.074480][ T810] bpf_prog_test_run_skb+0x39b/0x12c0 [ 39.079913][ T810] ? __fget_files+0x2d5/0x330 [ 39.084619][ T810] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 39.090454][ T810] bpf_prog_test_run+0x3e3/0x640 [ 39.095418][ T810] ? bpf_prog_query+0x270/0x270 [ 39.100300][ T810] ? selinux_bpf+0xce/0xf0 [ 39.104755][ T810] ? security_bpf+0x93/0xb0 [ 39.109293][ T810] __sys_bpf+0x5ee/0x850 [ 39.113561][ T810] ? bpf_link_show_fdinfo+0x330/0x330 [ 39.118968][ T810] ? __cfi_ksys_write+0x10/0x10 [ 39.123840][ T810] ? debug_smp_processor_id+0x17/0x20 [ 39.129243][ T810] __x64_sys_bpf+0x7c/0x90 [ 39.133699][ T810] x64_sys_call+0x488/0x9a0 [ 39.138231][ T810] do_syscall_64+0x4c/0xa0 [ 39.142681][ T810] ? clear_bhb_loop+0x30/0x80 [ 39.147392][ T810] ? clear_bhb_loop+0x30/0x80 [ 39.152109][ T810] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 39.158049][ T810] RIP: 0033:0x7fb02c59c819 [ 39.162486][ T810] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 39.182117][ T810] RSP: 002b:00007fb02d41a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.190562][ T810] RAX: ffffffffffffffda RBX: 00007fb02c815fa0 RCX: 00007fb02c59c819 [ 39.198552][ T810] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 39.206543][ T810] RBP: 00007fb02d41a090 R08: 0000000000000000 R09: 0000000000000000 [ 39.214532][ T810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.222542][ T810] R13: 00007fb02c816038 R14: 00007fb02c815fa0 R15: 00007ffc6ea7b6a8 [ 39.230541][ T810] [ 39.235861][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.244772][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.254737][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.261817][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.311350][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.342084][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.362794][ T820] syz.2.171 (820) used greatest stack depth: 21728 bytes left [ 39.386689][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.395497][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.415288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.430082][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.467766][ T742] device veth0_vlan entered promiscuous mode [ 39.498794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.525133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.568783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.590430][ T839] FAULT_INJECTION: forcing a failure. [ 39.590430][ T839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 39.604169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.612176][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.620544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.630028][ T839] CPU: 1 PID: 839 Comm: syz.3.179 Not tainted syzkaller #0 [ 39.637259][ T839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 39.647327][ T839] Call Trace: [ 39.650617][ T839] [ 39.653559][ T839] __dump_stack+0x21/0x24 [ 39.657923][ T839] dump_stack_lvl+0x110/0x170 [ 39.662634][ T839] ? __cfi_dump_stack_lvl+0x8/0x8 [ 39.667682][ T839] ? migrate_enable+0x1af/0x2a0 [ 39.672559][ T839] ? __cfi_migrate_enable+0x10/0x10 [ 39.677779][ T839] dump_stack+0x15/0x24 [ 39.681962][ T839] should_fail_ex+0x3d4/0x520 [ 39.686678][ T839] should_fail+0xb/0x10 [ 39.690858][ T839] should_fail_usercopy+0x1a/0x20 [ 39.695915][ T839] _copy_to_user+0x1e/0x90 [ 39.700364][ T839] bpf_test_finish+0x20a/0x6c0 [ 39.705172][ T839] ? convert_skb_to___skb+0x430/0x430 [ 39.710575][ T839] bpf_prog_test_run_skb+0xce6/0x12c0 [ 39.716002][ T839] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 39.721835][ T839] bpf_prog_test_run+0x3e3/0x640 [ 39.726787][ T839] ? bpf_prog_query+0x270/0x270 [ 39.731657][ T839] ? selinux_bpf+0xce/0xf0 [ 39.736093][ T839] ? security_bpf+0x93/0xb0 [ 39.740622][ T839] __sys_bpf+0x5ee/0x850 [ 39.744891][ T839] ? bpf_link_show_fdinfo+0x330/0x330 [ 39.750287][ T839] ? __cfi_ksys_write+0x10/0x10 [ 39.755155][ T839] ? debug_smp_processor_id+0x17/0x20 [ 39.760543][ T839] __x64_sys_bpf+0x7c/0x90 [ 39.765010][ T839] x64_sys_call+0x488/0x9a0 [ 39.769558][ T839] do_syscall_64+0x4c/0xa0 [ 39.774010][ T839] ? clear_bhb_loop+0x30/0x80 [ 39.778704][ T839] ? clear_bhb_loop+0x30/0x80 [ 39.783410][ T839] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 39.789331][ T839] RIP: 0033:0x7f5757d9c819 [ 39.793768][ T839] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 39.813395][ T839] RSP: 002b:00007f5758cca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.821838][ T839] RAX: ffffffffffffffda RBX: 00007f5758015fa0 RCX: 00007f5757d9c819 [ 39.829845][ T839] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 39.837847][ T839] RBP: 00007f5758cca090 R08: 0000000000000000 R09: 0000000000000000 [ 39.845838][ T839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.853868][ T839] R13: 00007f5758016038 R14: 00007f5758015fa0 R15: 00007ffe04fda238 [ 39.861870][ T839] [ 39.870464][ T742] device veth1_macvtap entered promiscuous mode [ 39.893970][ T844] device sit0 entered promiscuous mode [ 40.077229][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.105275][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.127335][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.145366][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.168535][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.275864][ T878] device syzkaller0 entered promiscuous mode [ 41.822907][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.846303][ T881] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.901040][ T881] device bridge_slave_0 entered promiscuous mode [ 41.946008][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.953102][ T881] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.978106][ T881] device bridge_slave_1 entered promiscuous mode [ 42.300692][ T43] device bridge_slave_1 left promiscuous mode [ 42.312317][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.340263][ T43] device bridge_slave_0 left promiscuous mode [ 42.364942][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.399040][ T43] device veth1_macvtap left promiscuous mode [ 42.409479][ T43] device veth0_vlan left promiscuous mode [ 42.787219][ T28] audit: type=1400 audit(1775150213.142:131): avc: denied { create } for pid=945 comm="syz.2.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 42.893735][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.923693][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.962572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.984247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.996640][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.003712][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.013785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 43.026896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.035480][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.042547][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.050940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.094754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.116072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.161180][ T28] audit: type=1400 audit(1775150213.512:132): avc: denied { create } for pid=964 comm="syz.2.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 43.187713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.209858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.226572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.239372][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.256172][ T881] device veth0_vlan entered promiscuous mode [ 43.270354][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 43.278944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.291737][ T881] device veth1_macvtap entered promiscuous mode [ 43.302505][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 43.310717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.627094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.668569][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.679861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.255603][ T981] device syzkaller0 entered promiscuous mode [ 47.669881][ T43] device bridge_slave_1 left promiscuous mode [ 47.682421][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.703001][ T43] device bridge_slave_0 left promiscuous mode [ 47.718068][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.758062][ T43] device veth1_macvtap left promiscuous mode [ 47.771238][ T43] device veth0_vlan left promiscuous mode [ 48.159666][ T1047] syz.4.244 (1047) used obsolete PPPIOCDETACH ioctl [ 48.222340][ T1035] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.229465][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.237756][ T1035] device bridge_slave_0 entered promiscuous mode [ 48.245075][ T1035] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.252122][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.259765][ T1035] device bridge_slave_1 entered promiscuous mode [ 48.330156][ T1035] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.337275][ T1035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.344779][ T1035] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.351876][ T1035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.385717][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.397382][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.408605][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.466275][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.474751][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.481858][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.531981][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.540419][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.547505][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.585391][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.593799][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.641235][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.655102][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.663488][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.673010][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.681644][ T1035] device veth0_vlan entered promiscuous mode [ 48.698916][ T1035] device veth1_macvtap entered promiscuous mode [ 48.732078][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.741739][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.750844][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.625906][ T43] device bridge_slave_1 left promiscuous mode [ 49.632100][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.644935][ T28] audit: type=1400 audit(1775150219.992:133): avc: denied { create } for pid=1102 comm="syz.0.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 49.708011][ T43] device bridge_slave_0 left promiscuous mode [ 49.714210][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.722630][ T43] device veth1_macvtap left promiscuous mode [ 49.728740][ T43] device veth0_vlan left promiscuous mode [ 49.800919][ T1105] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.808183][ T1105] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.832741][ T1106] device syzkaller0 entered promiscuous mode [ 49.900924][ T28] audit: type=1400 audit(1775150220.252:134): avc: denied { create } for pid=1114 comm="syz.4.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 50.006680][ T1110] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.014057][ T1110] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.021674][ T1110] device bridge_slave_0 entered promiscuous mode [ 50.030161][ T1110] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.037651][ T1110] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.045308][ T1110] device bridge_slave_1 entered promiscuous mode [ 50.274469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.284295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.359431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.380147][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.388609][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.395680][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.403084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.411721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.419961][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.427030][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.434527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.442852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.459710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.541822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.588377][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.621000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.657435][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.698700][ T1110] device veth0_vlan entered promiscuous mode [ 50.737059][ T1162] device syzkaller0 entered promiscuous mode [ 50.843219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.891401][ T1167] device syzkaller0 entered promiscuous mode [ 50.904816][ T1110] device veth1_macvtap entered promiscuous mode [ 50.921201][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 50.948050][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.042039][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.099342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.232909][ T1179] device syzkaller0 entered promiscuous mode [ 52.085386][ T43] device bridge_slave_1 left promiscuous mode [ 52.091531][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.099069][ T43] device bridge_slave_0 left promiscuous mode [ 52.105296][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.113045][ T43] device veth1_macvtap left promiscuous mode [ 52.119123][ T43] device veth0_vlan left promiscuous mode [ 52.633103][ T28] audit: type=1400 audit(1775150222.982:135): avc: denied { create } for pid=1224 comm="syz.3.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 52.763492][ T1226] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.771239][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.779481][ T1226] device bridge_slave_0 entered promiscuous mode [ 52.786910][ T1226] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.794034][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.802174][ T1226] device bridge_slave_1 entered promiscuous mode [ 53.022237][ T1226] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.029348][ T1226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.036677][ T1226] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.043751][ T1226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.269455][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.323529][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.335523][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.344658][ T28] audit: type=1400 audit(1775150223.692:136): avc: denied { create } for pid=1261 comm="syz.3.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 53.383839][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.395391][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.411280][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.418396][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.426842][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.437821][ T28] audit: type=1400 audit(1775150223.792:137): avc: denied { create } for pid=1263 comm="syz.4.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 53.461811][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.492449][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.499562][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.508176][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.517954][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.526267][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.536132][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.776665][ T1262] device syzkaller0 entered promiscuous mode [ 53.819491][ T1285] device syzkaller0 entered promiscuous mode [ 53.855179][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.873679][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.898418][ T1226] device veth0_vlan entered promiscuous mode [ 53.912405][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.920717][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.952466][ T1226] device veth1_macvtap entered promiscuous mode [ 53.962826][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.986282][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.993834][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.002203][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.017388][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.184957][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.275142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.323997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.385090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.255366][ T43] device bridge_slave_1 left promiscuous mode [ 55.261519][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.269055][ T43] device bridge_slave_0 left promiscuous mode [ 55.275305][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.283071][ T43] device veth1_macvtap left promiscuous mode [ 55.289154][ T43] device veth0_vlan left promiscuous mode [ 56.070776][ T1350] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.136486][ T1350] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.205024][ T1350] device bridge_slave_0 entered promiscuous mode [ 56.249777][ T1350] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.334896][ T1350] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.342451][ T1350] device bridge_slave_1 entered promiscuous mode [ 56.483228][ T1350] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.490332][ T1350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.497639][ T1350] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.504692][ T1350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.755953][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.763620][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.829178][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.905275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.912775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.034518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.075618][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.082695][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.225060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.260024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.270244][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.277369][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.384946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.393177][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.405810][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.414327][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.463193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 57.479505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.542471][ T1350] device veth0_vlan entered promiscuous mode [ 57.563117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.670430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.827607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.835396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.850444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.865825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.896509][ T1350] device veth1_macvtap entered promiscuous mode [ 57.962777][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.973208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.984717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.997339][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.009658][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.316519][ T8] device bridge_slave_1 left promiscuous mode [ 59.322720][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.340467][ T8] device bridge_slave_0 left promiscuous mode [ 59.349036][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.387365][ T8] device veth1_macvtap left promiscuous mode [ 59.393441][ T8] device veth0_vlan left promiscuous mode [ 59.768013][ T1466] device syzkaller0 entered promiscuous mode [ 60.008711][ T1488] device syzkaller0 entered promiscuous mode [ 60.104457][ T1476] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.165182][ T1476] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.172717][ T1476] device bridge_slave_0 entered promiscuous mode [ 60.219372][ T1476] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.255666][ T1476] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.265590][ T1476] device bridge_slave_1 entered promiscuous mode [ 60.581396][ T1476] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.588537][ T1476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.595876][ T1476] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.602938][ T1476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.745692][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.761474][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.830019][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.845978][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.885997][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.896505][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.905454][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.912515][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.921475][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.930713][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.939486][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.946558][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.988534][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.651398][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.299923][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.315142][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.393929][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.425547][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.440070][ T1476] device veth0_vlan entered promiscuous mode [ 64.461942][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 64.475510][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.507212][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.519819][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.531921][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 64.547602][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.614724][ T1476] device veth1_macvtap entered promiscuous mode [ 64.691164][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 64.704442][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.720987][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.744597][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 64.755299][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.395618][ T43] device bridge_slave_1 left promiscuous mode [ 65.401794][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.410399][ T43] device bridge_slave_0 left promiscuous mode [ 65.416717][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.424555][ T43] device veth1_macvtap left promiscuous mode [ 65.430673][ T43] device veth0_vlan left promiscuous mode [ 66.270073][ T1573] device wg2 entered promiscuous mode [ 66.409951][ T1586] device syzkaller0 entered promiscuous mode [ 66.477612][ T1588] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.484770][ T1588] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.494462][ T1588] device bridge_slave_0 entered promiscuous mode [ 66.505951][ T1588] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.525120][ T1588] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.544890][ T1588] device bridge_slave_1 entered promiscuous mode [ 66.905553][ T1588] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.912684][ T1588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.920043][ T1588] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.927104][ T1588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.725345][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.733333][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.745656][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.783337][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.801138][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.816531][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.824055][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.869206][ T28] audit: type=1400 audit(1775150238.222:138): avc: denied { create } for pid=1632 comm="syz.3.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 67.906593][ T1633] device syzkaller0 entered promiscuous mode [ 67.922976][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.937150][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.666642][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.685241][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.724332][ T1640] device syzkaller0 entered promiscuous mode [ 71.801232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.836717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.873407][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.881635][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.890041][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.898047][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.929768][ T1588] device veth0_vlan entered promiscuous mode [ 72.023042][ T1588] device veth1_macvtap entered promiscuous mode [ 72.059629][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.071220][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.092989][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.116524][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.130395][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.160961][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.185276][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.075492][ T10] device bridge_slave_1 left promiscuous mode [ 73.081691][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.089265][ T10] device bridge_slave_0 left promiscuous mode [ 73.095542][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.103366][ T10] device veth1_macvtap left promiscuous mode [ 73.109454][ T10] device veth0_vlan left promiscuous mode [ 73.900267][ T1684] device lo entered promiscuous mode [ 73.941865][ T1680] device syzkaller0 entered promiscuous mode [ 74.091943][ T1686] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.118405][ T1686] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.189807][ T1686] device bridge_slave_0 entered promiscuous mode [ 74.262127][ T1686] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.306844][ T1686] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.385610][ T1686] device bridge_slave_1 entered promiscuous mode [ 74.607529][ T1686] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.614656][ T1686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.622006][ T1686] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.629078][ T1686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.666390][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.705547][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.791045][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.802573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.835248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.844547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.856334][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.863407][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.912406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.921312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.929994][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.937079][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.976861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.986173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.003904][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 80.012879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 80.034091][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 80.043000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 80.067134][ T1686] device veth0_vlan entered promiscuous mode [ 80.085804][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 80.093962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.109263][ T1686] device veth1_macvtap entered promiscuous mode [ 80.117300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.134396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.149476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.159297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.168048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.190492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.235278][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.250868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.260523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.579932][ T1757] syz.0.452[1757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.580033][ T1757] syz.0.452[1757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.839469][ T1757] ±ÿ: renamed from team_slave_1 [ 81.735645][ T10] device bridge_slave_1 left promiscuous mode [ 81.741787][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.749299][ T10] device bridge_slave_0 left promiscuous mode [ 81.755557][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.763308][ T10] device veth1_macvtap left promiscuous mode [ 81.769389][ T10] device veth0_vlan left promiscuous mode [ 82.637548][ T1784] FAULT_INJECTION: forcing a failure. [ 82.637548][ T1784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.684957][ T1784] CPU: 1 PID: 1784 Comm: syz.4.459 Not tainted syzkaller #0 [ 82.692324][ T1784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 82.702430][ T1784] Call Trace: [ 82.705739][ T1784] [ 82.708689][ T1784] __dump_stack+0x21/0x24 [ 82.713057][ T1784] dump_stack_lvl+0x110/0x170 [ 82.717776][ T1784] ? __cfi_dump_stack_lvl+0x8/0x8 [ 82.722836][ T1784] ? rcu_report_exp_cpu_mult+0x125/0x2b0 [ 82.728496][ T1784] dump_stack+0x15/0x24 [ 82.732711][ T1784] should_fail_ex+0x3d4/0x520 [ 82.737423][ T1784] should_fail+0xb/0x10 [ 82.741607][ T1784] should_fail_usercopy+0x1a/0x20 [ 82.746664][ T1784] _copy_to_user+0x1e/0x90 [ 82.751108][ T1784] bpf_test_finish+0x251/0x6c0 [ 82.755906][ T1784] ? convert_skb_to___skb+0x430/0x430 [ 82.761300][ T1784] ? __rcu_read_unlock+0x5e/0xa0 [ 82.766271][ T1784] bpf_prog_test_run_flow_dissector+0x4c0/0x640 [ 82.772548][ T1784] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 82.779348][ T1784] ? __kasan_check_write+0x14/0x20 [ 82.784502][ T1784] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 82.791302][ T1784] bpf_prog_test_run+0x3e3/0x640 [ 82.796272][ T1784] ? bpf_prog_query+0x270/0x270 [ 82.801174][ T1784] ? selinux_bpf+0xce/0xf0 [ 82.805640][ T1784] ? security_bpf+0x93/0xb0 [ 82.810178][ T1784] __sys_bpf+0x5ee/0x850 [ 82.814444][ T1784] ? bpf_link_show_fdinfo+0x330/0x330 [ 82.819843][ T1784] ? __cfi_ksys_write+0x10/0x10 [ 82.824722][ T1784] ? debug_smp_processor_id+0x17/0x20 [ 82.830129][ T1784] __x64_sys_bpf+0x7c/0x90 [ 82.834585][ T1784] x64_sys_call+0x488/0x9a0 [ 82.839123][ T1784] do_syscall_64+0x4c/0xa0 [ 82.843591][ T1784] ? clear_bhb_loop+0x30/0x80 [ 82.848306][ T1784] ? clear_bhb_loop+0x30/0x80 [ 82.853022][ T1784] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 82.858944][ T1784] RIP: 0033:0x7fe6cc39c819 [ 82.863401][ T1784] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 82.883061][ T1784] RSP: 002b:00007fe6cd2a3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.891506][ T1784] RAX: ffffffffffffffda RBX: 00007fe6cc615fa0 RCX: 00007fe6cc39c819 [ 82.899595][ T1784] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 000000000000000a [ 82.907588][ T1784] RBP: 00007fe6cd2a3090 R08: 0000000000000000 R09: 0000000000000000 [ 82.915595][ T1784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.923596][ T1784] R13: 00007fe6cc616038 R14: 00007fe6cc615fa0 R15: 00007ffdd9bc10b8 [ 82.931619][ T1784] [ 83.046738][ T1786] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.074088][ T1786] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.098902][ T1786] device bridge_slave_0 entered promiscuous mode [ 83.112735][ T1786] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.145019][ T1786] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.152692][ T1786] device bridge_slave_1 entered promiscuous mode [ 83.631723][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.649519][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.665147][ T28] audit: type=1400 audit(1775150254.022:139): avc: denied { create } for pid=1801 comm="syz.0.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 83.696109][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.746646][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.765004][ T1629] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.772139][ T1629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.795022][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.804161][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.820986][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.849991][ T1629] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.857116][ T1629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.915995][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.944530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.981797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.016476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.026695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.037276][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.070678][ T1786] device veth0_vlan entered promiscuous mode [ 84.090660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 84.104989][ T1786] device veth1_macvtap entered promiscuous mode [ 84.139809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 84.156666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 84.200495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 84.227796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 84.321952][ T1824] syz.4.470[1824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.323370][ T1824] syz.4.470[1824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.105620][ T10] device bridge_slave_1 left promiscuous mode [ 85.123179][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.130832][ T10] device bridge_slave_0 left promiscuous mode [ 85.137113][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.145805][ T10] device veth1_macvtap left promiscuous mode [ 85.151884][ T10] device veth0_vlan left promiscuous mode [ 85.943462][ T1832] FAULT_INJECTION: forcing a failure. [ 85.943462][ T1832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.982939][ T1852] device syzkaller0 entered promiscuous mode [ 85.984972][ T1832] CPU: 0 PID: 1832 Comm: syz.3.473 Not tainted syzkaller #0 [ 85.996535][ T1832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 86.006624][ T1832] Call Trace: [ 86.009936][ T1832] [ 86.012901][ T1832] __dump_stack+0x21/0x24 [ 86.017282][ T1832] dump_stack_lvl+0x110/0x170 [ 86.022000][ T1832] ? __cfi_dump_stack_lvl+0x8/0x8 [ 86.027073][ T1832] dump_stack+0x15/0x24 [ 86.031260][ T1832] should_fail_ex+0x3d4/0x520 [ 86.035967][ T1832] should_fail+0xb/0x10 [ 86.040138][ T1832] should_fail_usercopy+0x1a/0x20 [ 86.045208][ T1832] _copy_to_user+0x1e/0x90 [ 86.049681][ T1832] bpf_test_finish+0x497/0x6c0 [ 86.054471][ T1832] ? convert_skb_to___skb+0x430/0x430 [ 86.059866][ T1832] ? bpf_test_timer_continue+0x156/0x4a0 [ 86.065505][ T1832] bpf_prog_test_run_flow_dissector+0x4c0/0x640 [ 86.071751][ T1832] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 86.078520][ T1832] ? __kasan_check_write+0x14/0x20 [ 86.083633][ T1832] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 86.090405][ T1832] bpf_prog_test_run+0x3e3/0x640 [ 86.095361][ T1832] ? bpf_prog_query+0x270/0x270 [ 86.100223][ T1832] ? selinux_bpf+0xce/0xf0 [ 86.104651][ T1832] ? security_bpf+0x93/0xb0 [ 86.109188][ T1832] __sys_bpf+0x5ee/0x850 [ 86.113441][ T1832] ? bpf_link_show_fdinfo+0x330/0x330 [ 86.118835][ T1832] ? __cfi_ksys_write+0x10/0x10 [ 86.123699][ T1832] ? debug_smp_processor_id+0x17/0x20 [ 86.129089][ T1832] __x64_sys_bpf+0x7c/0x90 [ 86.133530][ T1832] x64_sys_call+0x488/0x9a0 [ 86.138051][ T1832] do_syscall_64+0x4c/0xa0 [ 86.142492][ T1832] ? clear_bhb_loop+0x30/0x80 [ 86.147192][ T1832] ? clear_bhb_loop+0x30/0x80 [ 86.151891][ T1832] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 86.157798][ T1832] RIP: 0033:0x7f5757d9c819 [ 86.162233][ T1832] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 86.181887][ T1832] RSP: 002b:00007f5758cca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 86.190323][ T1832] RAX: ffffffffffffffda RBX: 00007f5758015fa0 RCX: 00007f5757d9c819 [ 86.198316][ T1832] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 000000000000000a [ 86.206304][ T1832] RBP: 00007f5758cca090 R08: 0000000000000000 R09: 0000000000000000 [ 86.214285][ T1832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.222264][ T1832] R13: 00007f5758016038 R14: 00007f5758015fa0 R15: 00007ffe04fda238 [ 86.230259][ T1832] [ 86.344577][ T1854] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.352339][ T1854] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.360512][ T1854] device bridge_slave_0 entered promiscuous mode [ 86.368251][ T1854] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.375935][ T1854] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.383646][ T1854] device bridge_slave_1 entered promiscuous mode [ 86.456081][ T1854] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.463197][ T1854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.470536][ T1854] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.477598][ T1854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.645745][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.680107][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.687865][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.014970][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.025688][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.040575][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.047709][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.084333][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.113007][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.120142][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.182498][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.191077][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.301278][ T1854] device veth0_vlan entered promiscuous mode [ 87.325785][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.344094][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.354076][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.558078][ T1878] device syzkaller0 entered promiscuous mode [ 87.600438][ T1854] device veth1_macvtap entered promiscuous mode [ 87.647500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.675286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.721252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 87.775804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 87.815215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 87.869705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 87.879290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 88.985792][ T353] device bridge_slave_1 left promiscuous mode [ 88.991942][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.999467][ T353] device bridge_slave_0 left promiscuous mode [ 89.005713][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.013453][ T353] device veth1_macvtap left promiscuous mode [ 89.019551][ T353] device veth0_vlan left promiscuous mode [ 89.926650][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.978966][ T1917] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.992751][ T1917] device bridge_slave_0 entered promiscuous mode [ 90.002783][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.010644][ T1917] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.023512][ T1917] device bridge_slave_1 entered promiscuous mode [ 90.215127][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.222273][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.229622][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.236690][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.262935][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.278712][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.305668][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.324135][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.332662][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.339772][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.348825][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.357276][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.364402][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.380611][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.388884][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.413588][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.439655][ T1917] device veth0_vlan entered promiscuous mode [ 90.447186][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.458822][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.474453][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.483217][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.491033][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.506683][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.522630][ T1917] device veth1_macvtap entered promiscuous mode [ 90.560555][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.573898][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.618051][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.653855][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.705215][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.965879][ T1629] device bridge_slave_1 left promiscuous mode [ 91.972012][ T1629] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.979559][ T1629] device bridge_slave_0 left promiscuous mode [ 91.985787][ T1629] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.993544][ T1629] device veth1_macvtap left promiscuous mode [ 91.999646][ T1629] device veth0_vlan left promiscuous mode [ 92.726300][ T1976] device sit0 left promiscuous mode [ 92.892499][ T1980] device sit0 entered promiscuous mode [ 93.037429][ T1986] device syzkaller0 entered promiscuous mode [ 93.052922][ T1983] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.067438][ T1983] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.076341][ T1983] device bridge_slave_0 entered promiscuous mode [ 93.099952][ T1983] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.110188][ T1983] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.141076][ T1983] device bridge_slave_1 entered promiscuous mode [ 95.636641][ T2009] device syzkaller0 entered promiscuous mode [ 98.675091][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.693015][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.701401][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.719270][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.727870][ T1629] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.734956][ T1629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.751393][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.760237][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.784677][ T1629] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.791801][ T1629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.799769][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.830712][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.843340][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.875416][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.888438][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.938312][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.949442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.960974][ T28] audit: type=1400 audit(1775150269.312:140): avc: denied { attach_queue } for pid=2037 comm="syz.2.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 99.085706][ T2034] device syzkaller0 entered promiscuous mode [ 99.092212][ T1983] device veth0_vlan entered promiscuous mode [ 99.108850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 99.134261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.166127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.205485][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.252798][ T1983] device veth1_macvtap entered promiscuous mode [ 99.370938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.405609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.446225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.485587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.531403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.557317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.588607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.035881][ T43] device bridge_slave_1 left promiscuous mode [ 102.042078][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.065385][ T43] device bridge_slave_0 left promiscuous mode [ 102.071571][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.096491][ T43] device veth1_macvtap left promiscuous mode [ 102.102576][ T43] device veth0_vlan left promiscuous mode [ 103.448023][ T28] audit: type=1400 audit(1775150273.802:141): avc: denied { create } for pid=2075 comm="syz.4.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 103.474299][ T2076] FAULT_INJECTION: forcing a failure. [ 103.474299][ T2076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.577175][ T28] audit: type=1400 audit(1775150273.932:142): avc: denied { create } for pid=2084 comm="syz.4.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 103.614911][ T2076] CPU: 1 PID: 2076 Comm: syz.3.538 Not tainted syzkaller #0 [ 103.622353][ T2076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 103.632443][ T2076] Call Trace: [ 103.635762][ T2076] [ 103.638711][ T2076] __dump_stack+0x21/0x24 [ 103.643077][ T2076] dump_stack_lvl+0x110/0x170 [ 103.647783][ T2076] ? __cfi_dump_stack_lvl+0x8/0x8 [ 103.652842][ T2076] dump_stack+0x15/0x24 [ 103.657056][ T2076] should_fail_ex+0x3d4/0x520 [ 103.661768][ T2076] should_fail+0xb/0x10 [ 103.665958][ T2076] should_fail_usercopy+0x1a/0x20 [ 103.671018][ T2076] _copy_from_user+0x1e/0xc0 [ 103.675636][ T2076] __sys_bpf+0x2a0/0x850 [ 103.679908][ T2076] ? bpf_link_show_fdinfo+0x330/0x330 [ 103.685309][ T2076] ? __cfi_ksys_write+0x10/0x10 [ 103.690178][ T2076] ? debug_smp_processor_id+0x17/0x20 [ 103.695567][ T2076] __x64_sys_bpf+0x7c/0x90 [ 103.700008][ T2076] x64_sys_call+0x488/0x9a0 [ 103.704521][ T2076] do_syscall_64+0x4c/0xa0 [ 103.708967][ T2076] ? clear_bhb_loop+0x30/0x80 [ 103.713660][ T2076] ? clear_bhb_loop+0x30/0x80 [ 103.718353][ T2076] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 103.724266][ T2076] RIP: 0033:0x7f5757d9c819 [ 103.728709][ T2076] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 103.748331][ T2076] RSP: 002b:00007f5758cca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.756766][ T2076] RAX: ffffffffffffffda RBX: 00007f5758015fa0 RCX: 00007f5757d9c819 [ 103.764751][ T2076] RDX: 0000000000000010 RSI: 0000200000000740 RDI: 000000000000000a [ 103.772736][ T2076] RBP: 00007f5758cca090 R08: 0000000000000000 R09: 0000000000000000 [ 103.780719][ T2076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.788702][ T2076] R13: 00007f5758016038 R14: 00007f5758015fa0 R15: 00007ffe04fda238 [ 103.796695][ T2076] [ 104.137700][ T2099] device syzkaller0 entered promiscuous mode [ 104.256181][ T28] audit: type=1400 audit(1775150274.612:143): avc: denied { setattr } for pid=2105 comm="syz.3.546" path="socket:[24981]" dev="sockfs" ino=24981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 104.499223][ T2098] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.515353][ T2098] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.560746][ T2098] device bridge_slave_0 entered promiscuous mode [ 104.584690][ T2098] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.619888][ T2098] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.630807][ T2098] device bridge_slave_1 entered promiscuous mode [ 104.870768][ T2137] FAULT_INJECTION: forcing a failure. [ 104.870768][ T2137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 104.884246][ T2137] CPU: 1 PID: 2137 Comm: syz.0.555 Not tainted syzkaller #0 [ 104.891571][ T2137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 104.901655][ T2137] Call Trace: [ 104.904963][ T2137] [ 104.907945][ T2137] __dump_stack+0x21/0x24 [ 104.912317][ T2137] dump_stack_lvl+0x110/0x170 [ 104.917032][ T2137] ? __cfi_dump_stack_lvl+0x8/0x8 [ 104.922101][ T2137] ? bpf_send_signal_thread+0x16/0x20 [ 104.927532][ T2137] dump_stack+0x15/0x24 [ 104.931723][ T2137] should_fail_ex+0x3d4/0x520 [ 104.933063][ T2098] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.936443][ T2137] should_fail+0xb/0x10 [ 104.936472][ T2137] should_fail_usercopy+0x1a/0x20 [ 104.943509][ T2098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.947664][ T2137] _copy_to_user+0x1e/0x90 [ 104.947689][ T2137] bpf_prog_test_run_raw_tp+0x4ee/0x680 [ 104.952976][ T2098] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.959912][ T2137] ? __cfi_bpf_prog_test_run_raw_tp+0x10/0x10 [ 104.964341][ T2098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.969883][ T2137] ? __kasan_check_write+0x14/0x20 [ 104.995331][ T2137] ? __cfi_bpf_prog_test_run_raw_tp+0x10/0x10 [ 105.001441][ T2137] bpf_prog_test_run+0x3e3/0x640 [ 105.006421][ T2137] ? bpf_prog_query+0x270/0x270 [ 105.011315][ T2137] ? selinux_bpf+0xce/0xf0 [ 105.015755][ T2137] ? security_bpf+0x93/0xb0 [ 105.020301][ T2137] __sys_bpf+0x5ee/0x850 [ 105.024579][ T2137] ? bpf_link_show_fdinfo+0x330/0x330 [ 105.030011][ T2137] ? __cfi_ksys_write+0x10/0x10 [ 105.034893][ T2137] ? debug_smp_processor_id+0x17/0x20 [ 105.040298][ T2137] __x64_sys_bpf+0x7c/0x90 [ 105.044751][ T2137] x64_sys_call+0x488/0x9a0 [ 105.049290][ T2137] do_syscall_64+0x4c/0xa0 [ 105.053741][ T2137] ? clear_bhb_loop+0x30/0x80 [ 105.058450][ T2137] ? clear_bhb_loop+0x30/0x80 [ 105.063159][ T2137] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 105.069086][ T2137] RIP: 0033:0x7f3d1379c819 [ 105.073525][ T2137] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 105.093168][ T2137] RSP: 002b:00007f3d14668028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.101626][ T2137] RAX: ffffffffffffffda RBX: 00007f3d13a15fa0 RCX: 00007f3d1379c819 [ 105.106095][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.109630][ T2137] RDX: 0000000000000010 RSI: 0000200000000740 RDI: 000000000000000a [ 105.119008][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.124816][ T2137] RBP: 00007f3d14668090 R08: 0000000000000000 R09: 0000000000000000 [ 105.140795][ T2137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.148799][ T2137] R13: 00007f3d13a16038 R14: 00007f3d13a15fa0 R15: 00007fff283f0cc8 [ 105.156808][ T2137] [ 105.169132][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.232423][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.269968][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.304179][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.321518][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.344251][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.356503][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.530153][ T2147] device syzkaller0 entered promiscuous mode [ 105.560707][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.571918][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.608477][ T2098] device veth0_vlan entered promiscuous mode [ 105.620958][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.636972][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.668966][ T2098] device veth1_macvtap entered promiscuous mode [ 105.685533][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.717622][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.728369][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.755323][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.773303][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.786041][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.794749][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.832753][ T2154] device syzkaller0 entered promiscuous mode [ 106.165213][ T2160] device syzkaller0 entered promiscuous mode [ 106.536007][ T10] device bridge_slave_1 left promiscuous mode [ 106.542451][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.550842][ T10] device bridge_slave_0 left promiscuous mode [ 106.557166][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.567550][ T10] device veth1_macvtap left promiscuous mode [ 106.573640][ T10] device veth0_vlan left promiscuous mode [ 108.054330][ T2170] device wg2 entered promiscuous mode [ 108.321878][ T2187] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.370884][ T2187] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.380941][ T2187] device bridge_slave_0 entered promiscuous mode [ 108.388334][ T2187] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.401568][ T2187] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.414736][ T2187] device bridge_slave_1 entered promiscuous mode [ 108.542119][ T2198] device lo left promiscuous mode [ 108.586844][ T2199] device lo entered promiscuous mode [ 108.777849][ T2187] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.784977][ T2187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.792304][ T2187] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.799404][ T2187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.837911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.846348][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.853939][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.901747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.910410][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.917529][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.929490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.937879][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.944969][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.973820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.989942][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.167880][ T2187] device veth0_vlan entered promiscuous mode [ 109.184774][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.199567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.214019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.232021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.257619][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.275900][ T2187] device veth1_macvtap entered promiscuous mode [ 109.288530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.298263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.399607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.437261][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.325461][ T1629] device bridge_slave_1 left promiscuous mode [ 110.331604][ T1629] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.339227][ T1629] device bridge_slave_0 left promiscuous mode [ 110.345509][ T1629] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.353366][ T1629] device veth1_macvtap left promiscuous mode [ 110.359485][ T1629] device veth0_vlan left promiscuous mode [ 111.983078][ T2269] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.024564][ T2269] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.056781][ T2269] device bridge_slave_0 entered promiscuous mode [ 112.073841][ T2280] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.094252][ T2269] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.111307][ T2269] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.166434][ T2269] device bridge_slave_1 entered promiscuous mode [ 112.413841][ T2296] device syzkaller0 entered promiscuous mode [ 112.452882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.462410][ T28] audit: type=1400 audit(1775150282.812:144): avc: denied { create } for pid=2295 comm="syz.0.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 112.462951][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.514887][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.523368][ T28] audit: type=1400 audit(1775150282.862:145): avc: denied { create } for pid=2297 comm="syz.4.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.545282][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.555639][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.562724][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.579934][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.598826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.614660][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.621762][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.691284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.704431][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.721415][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.739576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.764478][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.877330][ T2300] device syzkaller0 entered promiscuous mode [ 112.984945][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.997908][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.018620][ T2269] device veth0_vlan entered promiscuous mode [ 113.058696][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.067556][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.109231][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.119784][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.143046][ T1629] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.177811][ T2269] device veth1_macvtap entered promiscuous mode [ 113.221553][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.254651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.290394][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.327341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.898553][ T10] device bridge_slave_1 left promiscuous mode [ 113.910912][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.944564][ T10] device bridge_slave_0 left promiscuous mode [ 113.952050][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.966829][ T10] device veth1_macvtap left promiscuous mode [ 113.977527][ T10] device veth0_vlan left promiscuous mode [ 115.420530][ T28] audit: type=1400 audit(1775150285.772:146): avc: denied { read } for pid=2327 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 193) OK Stopping crond: stopped /usr/sbin/crond (pid 186) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 140) [ 115.725647][ T28] audit: type=1400 audit(1775150286.082:147): avc: denied { read } for pid=2355 comm="syz.4.618" dev="nsfs" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 115.804964][ T28] audit: type=1400 audit(1775150286.102:148): avc: denied { open } for pid=2355 comm="syz.4.618" path="net:[4026532638]" dev="nsfs" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 Stopping network: [ 115.984387][ T28] audit: type=1400 audit(1775150286.122:149): avc: denied { search } for pid=2351 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 116.102586][ T28] audit: type=1400 audit(1775150286.452:150): avc: denied { mounton } for pid=2390 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 OK Stopping iptables: [ 116.245033][ T28] audit: type=1400 audit(1775150286.592:151): avc: denied { write } for pid=141 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 116.301647][ T28] audit: type=1400 audit(1775150286.592:152): avc: denied { remove_name } for pid=141 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 116.351423][ T2390] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.359826][ T28] audit: type=1400 audit(1775150286.592:153): avc: denied { unlink } for pid=141 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping system [ 116.383448][ T2390] bridge0: port 1(bridge_slave_0) entered disabled state message bus: [ 116.410207][ T2390] device bridge_slave_0 entered promiscuous mode [ 116.435343][ T2390] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.442447][ T2390] bridge0: port 2(bridge_slave_1) entered disabled state done [ 116.472452][ T2390] device bridge_slave_1 entered promiscuous mode [ 116.693614][ T2390] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.700727][ T2390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.708067][ T2390] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.715137][ T2390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.357923][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.385918][ T10] bridge0: port 2(bridge_slave_1) entered disabled state Stopping klogd: [ 118.486121][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready OK [ 118.499240][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready Stopping acpid: [ 118.537376][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.553024][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 118.553054][ T28] audit: type=1400 audit(1775150288.902:161): avc: denied { write } for pid=87 comm="acpid" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 118.590982][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.599102][ T28] audit: type=1400 audit(1775150288.902:162): avc: denied { remove_name } for pid=87 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 118.599136][ T28] audit: type=1400 audit(1775150288.902:163): avc: denied { unlink } for pid=87 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 118.624989][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.650244][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.701286][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.713421][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.764913][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.772032][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.842886][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 118.852113][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.872003][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 118.905335][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.049857][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 119.095886][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 119.298521][ T2390] device veth0_vlan entered promiscuous mode [ 119.383008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 119.402948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.411220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.418868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.565402][ T2390] device veth1_macvtap entered promiscuous mode [ 119.632489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.657442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready OK [ 119.707709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.759349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready Stopping syslogd: [ 119.776938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.786694][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.806024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.841207][ T28] audit: type=1400 audit(1775150290.192:164): avc: denied { mount } for pid=2390 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 stopped /sbin/syslogd (pid 84) OK [ 119.950283][ T28] audit: type=1400 audit(1775150290.222:165): avc: denied { mounton } for pid=2390 comm="syz-executor" path="/root/syzkaller.eQiCVq/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=72 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 120.027987][ T28] audit: type=1400 audit(1775150290.222:166): avc: denied { unmount } for pid=2390 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 120.107870][ T28] audit: type=1400 audit(1775150290.452:167): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14423]" dev="pipefs" ino=14423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes [ 121.546103][ T10] device bridge_slave_1 left promiscuous mode [ 121.552248][ T10] bridge0: port 2(bridge_slave_1) entered disabled state Sent SIGKILL to[ 121.560552][ T10] device bridge_slave_0 left promiscuous mode all processes [ 121.567553][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.576551][ T10] device bridge_slave_1 left promiscuous mode [ 121.582813][ T10] bridge0: port 2(bridge_slave_1) entered disabled state Requesting syst[ 121.590862][ T10] device bridge_slave_0 left promiscuous mode em poweroff [ 121.598156][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.607172][ T10] device bridge_slave_1 left promiscuous mode [ 121.613289][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.620795][ T10] device bridge_slave_0 left promiscuous mode [ 121.626966][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.635285][ T10] device bridge_slave_1 left promiscuous mode [ 121.641402][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.648875][ T10] device bridge_slave_0 left promiscuous mode [ 121.655123][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.663802][ T10] device veth1_macvtap left promiscuous mode [ 121.669895][ T10] device veth0_vlan left promiscuous mode [ 121.676030][ T10] device veth1_macvtap left promiscuous mode [ 121.682056][ T10] device veth0_vlan left promiscuous mode [ 121.688187][ T10] device veth1_macvtap left promiscuous mode [ 121.694188][ T10] device veth0_vlan left promiscuous mode [ 121.700284][ T10] device veth1_macvtap left promiscuous mode [ 121.706470][ T10] device veth0_vlan left promiscuous mode [ 122.592340][ T2531] kvm: exiting hardware virtualization [ 122.598611][ T2531] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 122.605576][ T2531] ACPI: PM: Preparing to enter system sleep state S5 [ 122.612693][ T2531] reboot: Power down serialport: VM disconnected.