last executing test programs: 20.178953067s ago: executing program 3 (id=1528): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 15.604498375s ago: executing program 3 (id=1528): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 10.978147565s ago: executing program 3 (id=1528): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 7.836130421s ago: executing program 3 (id=1528): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 4.968283273s ago: executing program 1 (id=1976): ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x324) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0x5, &(0x7f0000001180)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="cbd1ac4f8e360300000004000000040000000a00427c3df76016d07430aca4437fbb8d6670927bbd27df7d62fd8b0c5f8874b5315d7a4971e21b825032a13f8c04a1f4c6c6", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000000), &(0x7f0000000140)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, &(0x7f00000002c0), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000000300)=r9) write$cgroup_devices(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 4.587419662s ago: executing program 1 (id=1983): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffeffffffffffffe, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 4.287769587s ago: executing program 3 (id=1528): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 2.174520272s ago: executing program 1 (id=1987): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x4, &(0x7f0000001140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b40)={r0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 1) 2.130812354s ago: executing program 4 (id=1990): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x50) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000000200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) 1.878101647s ago: executing program 2 (id=1991): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) r6 = getpid() r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0x0, r5, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(0x3) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x80ffff) r10 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r10, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.873807257s ago: executing program 4 (id=1992): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67a4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) socketpair(0x1, 0x2, 0x1, &(0x7f0000000100)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=ANY=[@ANYBLOB="0900000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB="ef0d0004000000000000b015a70000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x90}, 0x100) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="1800000000000000001000000000000085000000610000001879809001000020646c2500000000002020207b1af8ff00000006000000000000000007010000eee94a56b702000008000000b703000000000000850bcc86479c", @ANYRES64=r4, @ANYRESDEC=r5, @ANYRESOCT=r1], &(0x7f0000000200)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r6, 0x27, 0x22, 0x0, &(0x7f0000000040)="f8ad48cc02cb29dcc8007f5b080038d69f8c018a11e060905e900a41a355104010af", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r4, 0x58, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r7, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000880)="f93844c3b72ec31ed77c86be9618b161e7f6fbccc077d595782fbf2dc9b4f6d7c23226636eb33426dc406f4a85e72dcdce06eb904a9b925a6ba8fd25b03437a38ae944cac67780299d17d51294c5103ac99634deee5d9673fd35f8026d78baf79d97febff44026d2a042b47e4d6b30ddc9b11d68af9989eff64af0fb2f6acb47b4a2fa", 0x83}, {&(0x7f0000000940)="7256bc90e4649337333822ce2c86747b9636352de61b1828b40e474d939e92674a4b57027f510c347e5c43610e30aec395fc4bfea415806054958e93a306b86808d46116f6d58ebebdff9100cbfaf62b2d6d4ce1f21918fe89a09e5dd518c83450a8b5646461ed9bd6ee2018e921ae8366cd90170f2643a866a885d5f727ab28f866a75808faa515d64227144dd56b", 0x8f}, {&(0x7f0000000ac0)="57497e993f485af12989916524fa58c013bc7e154979a90960ca95e5deef7565d29d38cb3d5298c27772c0ae7abb78a9e97dd4f9fc59646d6bfea3a3915961db92c8c9afaa8d52c417cba0cb74d13c5c12b32845bc51b0729e3fddf785f4556cf0bfd0711248000f95c0fcd5bf14643504340c13e3fe9f06bec451a3ddff3289216d1d44946a255047973695855a25db28acc0e7d713ce", 0x97}, {&(0x7f0000000480)="7d211b5410d3f21f093f2bdd7978794a00dff7a0362952e1d09726774e07c41d7bd3c919db66d73e8c024a034c2e93849751f01067f246a18b291510926a372a7545e10b4bb81ab19eb6d75858027c331a48a318a00453500711b5800e318156d2ba6fe6dae4f5daf92e61041f", 0x6d}], 0x4, &(0x7f0000000c00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x40, 0x0, 0x7, {[@generic={0x82, 0xf, "98ba788616c5dc5ea6b0c15bd1"}, @cipso={0x86, 0x1a, 0x3, [{0x7, 0xe, "9760434a67b58cd1e1f2f9b2"}, {0x6, 0x6, "b91b31ad"}]}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7d}}], 0xf8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="0500000000000000000000000000000000000000000000000000000097953989e83c9c1eb45916d497c8c53f881c1136ef26239d1233"]) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) 1.785245401s ago: executing program 1 (id=1993): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000005000000020000001c"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@call={0x85, 0x0, 0x0, 0x79}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r3, r2}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r7}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x20, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfff}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100048d4) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) close(0x3) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000010000000000a247c22218110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7020000140000001ff70000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7020000000000008500004086000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xfd, &(0x7f0000000100)=""/253, 0x1f00, 0x4}, 0x25) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000052000000010"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000001073012d0000000000950000000000000052594c316f8f62d8a9821ee237a765f2c94a82db47f7bdf5a46928f2a055bb76c7aa7bb369864fac81c7179433b6192a992899ab7d4265aee475719489aaeeb3c3fa8f4d8b4ad9"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@map_fd={0x18, 0xb, 0x1, 0x0, r2}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.506625485s ago: executing program 2 (id=1994): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67a4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) socketpair(0x1, 0x2, 0x1, &(0x7f0000000100)) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000003f01f00660000007f00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000001800"/28], 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x40, r3}, 0x38) 1.318417325s ago: executing program 2 (id=1995): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x19, 0x4, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000}, 0x50) 1.317603314s ago: executing program 0 (id=1996): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x36d8}, 0x0, 0xf7ffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0x44c04, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x5, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000007c87000000eb0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000008000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r0) 1.19501507s ago: executing program 2 (id=1997): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000200000002"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b79d0100000000007b8af8ff00000000bfa200000000000007020000f8ffffffb732c59eeaec94f9e99a03000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40081, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8fffdffb702000008000000b7030000000000008500000008000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c250000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) recvmsg$unix(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)}, 0x0) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) 1.165618562s ago: executing program 0 (id=1998): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="611534000ffff00061134c0000000000bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf67000000000000350607000fff07206706000002000000160300000ee60060bf050000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000005574d074fa7e93447a88c0fbab48660aae7cdf367ef0e4538279b6113de5b94e1056f443305145c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 1.133274974s ago: executing program 0 (id=1999): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffeffffffffffffe, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 969.465841ms ago: executing program 1 (id=2000): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67a4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) socketpair(0x1, 0x2, 0x1, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=ANY=[@ANYBLOB="0900000016000000b40000007f00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x90}, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="1800000000000000001000000000000085000000610000001879809001000020646c2500000000002020207b1af8ff00000006000000000000000007010000eee94a56b702000008000000b703000000000000850bcc86479c", @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESOCT=r0], &(0x7f0000000200)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x27, 0x22, 0x0, &(0x7f0000000040)="f8ad48cc02cb29dcc8007f5b080038d69f8c018a11e060905e900a41a355104010af", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r3, 0x58, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r6, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000880)="f93844c3b72ec31ed77c86be9618b161e7f6fbccc077d595782fbf2dc9b4f6d7c23226636eb33426dc406f4a85e72dcdce06eb904a9b925a6ba8fd25b03437a38ae944cac67780299d17d51294c5103ac99634deee5d9673fd35f8026d78baf79d97febff44026d2a042b47e4d6b30ddc9b11d68af9989eff64af0fb2f6acb47b4a2fa", 0x83}, {&(0x7f0000000940)="7256bc90e4649337333822ce2c86747b9636352de61b1828b40e474d939e92674a4b57027f510c347e5c43610e30aec395fc4bfea415806054958e93a306b86808d46116f6d58ebebdff9100cbfaf62b2d6d4ce1f21918fe89a09e5dd518c83450a8b5646461ed9bd6ee2018e921ae8366cd90170f2643a866a885d5f727ab28f866a75808faa515d64227144dd56b", 0x8f}, {&(0x7f0000000ac0)="57497e993f485af12989916524fa58c013bc7e154979a90960ca95e5deef7565d29d38cb3d5298c27772c0ae7abb78a9e97dd4f9fc59646d6bfea3a3915961db92c8c9afaa8d52c417cba0cb74d13c5c12b32845bc51b0729e3fddf785f4556cf0bfd0711248000f95c0fcd5bf14643504340c13e3fe9f06bec451a3ddff3289216d1d44946a255047973695855a25db28acc0e7d713ce", 0x97}, {&(0x7f0000000480)="7d211b5410d3f21f093f2bdd7978794a00dff7a0362952e1d09726774e07c41d7bd3c919db66d73e8c024a034c2e93849751f01067f246a18b291510926a372a7545e10b4bb81ab19eb6d75858027c331a48a318a00453500711b5800e318156d2ba6fe6dae4f5daf92e61041f", 0x6d}], 0x4, &(0x7f0000000c00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x40, 0x0, 0x7, {[@generic={0x82, 0xf, "98ba788616c5dc5ea6b0c15bd1"}, @cipso={0x86, 0x1a, 0x3, [{0x7, 0xe, "9760434a67b58cd1e1f2f9b2"}, {0x6, 0x6, "b91b31ad"}]}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7d}}], 0xf8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000003f01f00660000007f00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000001800"/28], 0x48) 968.831692ms ago: executing program 4 (id=2001): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x123202, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) socketpair(0x23, 0x80000, 0x100, &(0x7f0000000000)) close(0x3) 860.833757ms ago: executing program 4 (id=2002): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x50) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000000200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, 0x0) 844.461788ms ago: executing program 0 (id=2003): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="020000000400000008000000b16e3b99d60012b0", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x24, 0x0, 0x0, &(0x7f0000001300)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000003040)={0x12, 0x4, &(0x7f0000003500)=ANY=[@ANYBLOB="180000000a00000000000000100000026b1106000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6af}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0xb, 0x1, 0x0, 0x5, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b7020000000000006b2af8ff00000000b509000000000000c38af8ff50000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 789.246281ms ago: executing program 4 (id=2004): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(0x3) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80ffff) r7 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r7, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 243.507368ms ago: executing program 2 (id=2005): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67a4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) socketpair(0x1, 0x2, 0x1, &(0x7f0000000100)) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000003f01f00660000007f00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000001800"/28], 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x40, r3}, 0x38) 235.304038ms ago: executing program 0 (id=2006): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000380)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000200000", @ANYRESDEC], 0xffdd) 89.936525ms ago: executing program 1 (id=2007): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) socketpair(0x1, 0x2, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="ef0d0004000000000000b015a700"/23, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x7300, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x90}, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="1800000000000000001000000000000085000000610000001879809001000020646c2500000000002020207b1af8ff00000006000000000000000007010000eee94a56b702000008000000b703000000000000850bcc86479c", @ANYRES64=r3, @ANYRESDEC=r4, @ANYRESOCT=r0], &(0x7f0000000200)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r3, 0x58, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r5, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000880)="f93844c3b72ec31ed77c86be9618b161e7f6fbccc077d595782fbf2dc9b4f6d7c23226636eb33426dc406f4a85e72dcdce06eb904a9b925a6ba8fd25b03437a38ae944cac67780299d17d51294c5103ac99634deee5d9673fd35f8026d78baf79d97febff44026d2a042b47e4d6b30ddc9b11d68af9989eff64af0fb2f6acb47b4a2fa", 0x83}, {&(0x7f0000000940)="7256bc90e4649337333822ce2c86747b9636352de61b1828b40e474d939e92674a4b57027f510c347e5c43610e30aec395fc4bfea415806054958e93a306b86808d46116f6d58ebebdff9100cbfaf62b2d6d4ce1f21918fe89a09e5dd518c83450a8b5646461ed9bd6ee2018e921ae8366cd90170f2643a866a885d5f727ab28f866a75808faa515d64227144dd56b", 0x8f}, {&(0x7f0000000ac0)="57497e993f485af12989916524fa58c013bc7e154979a90960ca95e5deef7565d29d38cb3d5298c27772c0ae7abb78a9e97dd4f9fc59646d6bfea3a3915961db92c8c9afaa8d52c417cba0cb74d13c5c12b32845bc51b0729e3fddf785f4556cf0bfd0711248000f95c0fcd5bf14643504340c13e3fe9f06bec451a3ddff3289216d1d44946a255047973695855a25db28acc0e7d713ce", 0x97}, {&(0x7f0000000480)="7d211b5410d3f21f093f2bdd7978794a00dff7a0362952e1d09726774e07c41d7bd3c919db66d73e8c024a034c2e93849751f01067f246a18b291510926a372a7545e10b4bb81ab19eb6d75858027c331a48a318a00453500711b5800e318156d2ba6fe6dae4f5daf92e61041f", 0x6d}], 0x4, &(0x7f0000000c00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x40, 0x0, 0x7, {[@generic={0x82, 0xf, "98ba788616c5dc5ea6b0c15bd1"}, @cipso={0x86, 0x1a, 0x3, [{0x7, 0xe, "9760434a67b58cd1e1f2f9b2"}, {0x6, 0x6, "b91b31ad"}]}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7d}}], 0xf8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) 70.870596ms ago: executing program 4 (id=2008): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x5, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4000}, [@call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r0}, 0xc) 47.454717ms ago: executing program 3 (id=1528): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 46.334417ms ago: executing program 0 (id=2009): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x1b, 0x0, 0xfffff035, 0x8000, 0x0, 0xffffffffffffffff, 0x27}, 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d86dd", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg(r1, 0x0, 0x20004004) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r5, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/6, 0x6}, {&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/62, 0x3e}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f0000000500)=""/241, 0xf1}, {&(0x7f0000000600)=""/20, 0x14}], 0x7, &(0x7f00000006c0)=""/171, 0xab}, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', r2, 0x4000, r0}, 0x18) sendmsg$inet(r5, &(0x7f00000008c0)={&(0x7f00000004c0)={0x2, 0x4e22, @empty}, 0x10, 0x0}, 0x20000014) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 0s ago: executing program 2 (id=2010): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) kernel console output (not intermixed with test programs): 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 159.352133][ T4154] RSP: 002b:00007feff5d9b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 159.360674][ T4154] RAX: ffffffffffffffda RBX: 00007feff75b9fa0 RCX: 00007feff7340799 [ 159.368663][ T4154] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 159.376659][ T4154] RBP: 00007feff5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 159.384646][ T4154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.392630][ T4154] R13: 00007feff75ba038 R14: 00007feff75b9fa0 R15: 00007ffdfe632668 [ 159.400632][ T4154] [ 159.838107][ T4177] device syzkaller0 entered promiscuous mode [ 160.468535][ T4198] device veth1_macvtap left promiscuous mode [ 160.476823][ T4198] device macsec0 entered promiscuous mode [ 160.924932][ T4215] FAULT_INJECTION: forcing a failure. [ 160.924932][ T4215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.937422][ T4213] device syzkaller0 entered promiscuous mode [ 161.029007][ T4215] CPU: 0 PID: 4215 Comm: syz.1.1444 Tainted: G W syzkaller #0 [ 161.037818][ T4215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 161.047891][ T4215] Call Trace: [ 161.051174][ T4215] [ 161.054111][ T4215] __dump_stack+0x21/0x30 [ 161.058454][ T4215] dump_stack_lvl+0x110/0x170 [ 161.063178][ T4215] ? show_regs_print_info+0x20/0x20 [ 161.068407][ T4215] dump_stack+0x15/0x20 [ 161.072606][ T4215] should_fail+0x3c1/0x510 [ 161.077043][ T4215] should_fail_usercopy+0x1a/0x20 [ 161.082077][ T4215] _copy_from_user+0x20/0xd0 [ 161.086689][ T4215] bpf_test_init+0x13d/0x1c0 [ 161.091294][ T4215] bpf_prog_test_run_skb+0x193/0x1150 [ 161.096716][ T4215] ? __kasan_check_write+0x14/0x20 [ 161.101846][ T4215] ? fput_many+0x15a/0x1a0 [ 161.106287][ T4215] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 161.112201][ T4215] bpf_prog_test_run+0x3d5/0x630 [ 161.117168][ T4215] ? bpf_prog_query+0x230/0x230 [ 161.122039][ T4215] ? selinux_bpf+0xce/0xf0 [ 161.126485][ T4215] ? security_bpf+0x82/0xa0 [ 161.130981][ T4215] __sys_bpf+0x590/0x7d0 [ 161.135211][ T4215] ? bpf_link_show_fdinfo+0x330/0x330 [ 161.140586][ T4215] ? debug_smp_processor_id+0x17/0x20 [ 161.146072][ T4215] __x64_sys_bpf+0x7c/0x90 [ 161.150488][ T4215] x64_sys_call+0x4b9/0x9a0 [ 161.155078][ T4215] do_syscall_64+0x4c/0xa0 [ 161.159639][ T4215] ? clear_bhb_loop+0x50/0xa0 [ 161.164347][ T4215] ? clear_bhb_loop+0x50/0xa0 [ 161.169024][ T4215] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.174919][ T4215] RIP: 0033:0x7fbf8bdbf799 [ 161.179343][ T4215] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 161.199099][ T4215] RSP: 002b:00007fbf8a81a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.207536][ T4215] RAX: ffffffffffffffda RBX: 00007fbf8c038fa0 RCX: 00007fbf8bdbf799 [ 161.215551][ T4215] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 161.223541][ T4215] RBP: 00007fbf8a81a090 R08: 0000000000000000 R09: 0000000000000000 [ 161.231539][ T4215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.239522][ T4215] R13: 00007fbf8c039038 R14: 00007fbf8c038fa0 R15: 00007ffc4cd3dc58 [ 161.247517][ T4215] [ 161.319759][ T4218] device syzkaller0 entered promiscuous mode [ 161.343293][ T4222] device syzkaller0 entered promiscuous mode [ 161.438579][ T4230] device syzkaller0 entered promiscuous mode [ 162.052255][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.281861][ T4265] FAULT_INJECTION: forcing a failure. [ 162.281861][ T4265] name failslab, interval 1, probability 0, space 0, times 0 [ 162.366448][ T4265] CPU: 0 PID: 4265 Comm: syz.0.1463 Tainted: G W syzkaller #0 [ 162.375315][ T4265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 162.385401][ T4265] Call Trace: [ 162.388700][ T4265] [ 162.391647][ T4265] __dump_stack+0x21/0x30 [ 162.395998][ T4265] dump_stack_lvl+0x110/0x170 [ 162.400698][ T4265] ? show_regs_print_info+0x20/0x20 [ 162.405930][ T4265] dump_stack+0x15/0x20 [ 162.410102][ T4265] should_fail+0x3c1/0x510 [ 162.414529][ T4265] __should_failslab+0xa4/0xe0 [ 162.419308][ T4265] should_failslab+0x9/0x20 [ 162.423841][ T4265] slab_pre_alloc_hook+0x3b/0xe0 [ 162.428817][ T4265] __kmalloc+0x6d/0x2c0 [ 162.432996][ T4265] ? sk_prot_alloc+0xed/0x320 [ 162.437702][ T4265] sk_prot_alloc+0xed/0x320 [ 162.442235][ T4265] sk_alloc+0x38/0x430 [ 162.446326][ T4265] bpf_prog_test_run_skb+0x24b/0x1150 [ 162.451723][ T4265] ? __kasan_check_write+0x14/0x20 [ 162.456868][ T4265] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 162.462786][ T4265] bpf_prog_test_run+0x3d5/0x630 [ 162.467746][ T4265] ? bpf_prog_query+0x230/0x230 [ 162.472617][ T4265] ? selinux_bpf+0xce/0xf0 [ 162.477056][ T4265] ? security_bpf+0x82/0xa0 [ 162.481568][ T4265] __sys_bpf+0x590/0x7d0 [ 162.485822][ T4265] ? bpf_link_show_fdinfo+0x330/0x330 [ 162.491227][ T4265] ? debug_smp_processor_id+0x17/0x20 [ 162.496633][ T4265] __x64_sys_bpf+0x7c/0x90 [ 162.501066][ T4265] x64_sys_call+0x4b9/0x9a0 [ 162.505585][ T4265] do_syscall_64+0x4c/0xa0 [ 162.510017][ T4265] ? clear_bhb_loop+0x50/0xa0 [ 162.514721][ T4265] ? clear_bhb_loop+0x50/0xa0 [ 162.519411][ T4265] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 162.525321][ T4265] RIP: 0033:0x7f9270cb7799 [ 162.529756][ T4265] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 162.549374][ T4265] RSP: 002b:00007f926f712028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 162.557824][ T4265] RAX: ffffffffffffffda RBX: 00007f9270f30fa0 RCX: 00007f9270cb7799 [ 162.565834][ T4265] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 162.573840][ T4265] RBP: 00007f926f712090 R08: 0000000000000000 R09: 0000000000000000 [ 162.581848][ T4265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.589859][ T4265] R13: 00007f9270f31038 R14: 00007f9270f30fa0 R15: 00007ffcc12f1f58 [ 162.597869][ T4265] [ 163.141787][ T4286] FAULT_INJECTION: forcing a failure. [ 163.141787][ T4286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.254224][ T4286] CPU: 0 PID: 4286 Comm: syz.4.1470 Tainted: G W syzkaller #0 [ 163.263031][ T4286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 163.273122][ T4286] Call Trace: [ 163.276424][ T4286] [ 163.279363][ T4286] __dump_stack+0x21/0x30 [ 163.283708][ T4286] dump_stack_lvl+0x110/0x170 [ 163.288414][ T4286] ? show_regs_print_info+0x20/0x20 [ 163.293639][ T4286] ? __alloc_skb+0x21a/0x740 [ 163.298252][ T4286] ? tun_get_user+0xb41/0x3400 [ 163.303051][ T4286] ? tun_chr_write_iter+0x1eb/0x2e0 [ 163.308279][ T4286] dump_stack+0x15/0x20 [ 163.312458][ T4286] should_fail+0x3c1/0x510 [ 163.317020][ T4286] should_fail_alloc_page+0x55/0x80 [ 163.322256][ T4286] prepare_alloc_pages+0x156/0x610 [ 163.327394][ T4286] ? __alloc_pages_bulk+0xad0/0xad0 [ 163.332617][ T4286] __alloc_pages+0x11d/0x460 [ 163.337244][ T4286] ? prep_new_page+0x110/0x110 [ 163.342043][ T4286] ? __alloc_skb+0x463/0x740 [ 163.346672][ T4286] alloc_skb_with_frags+0x20c/0x620 [ 163.351923][ T4286] sock_alloc_send_pskb+0x87f/0x9a0 [ 163.357153][ T4286] ? sock_kzfree_s+0x60/0x60 [ 163.361761][ T4286] ? iov_iter_advance+0x1f9/0x360 [ 163.366811][ T4286] tun_get_user+0xb41/0x3400 [ 163.371415][ T4286] ? kmem_cache_free+0xa0/0x320 [ 163.376283][ T4286] ? putname+0x111/0x160 [ 163.380536][ T4286] ? do_syscall_64+0x4c/0xa0 [ 163.385138][ T4286] ? tun_do_read+0x1d30/0x1d30 [ 163.390003][ T4286] ? kstrtouint_from_user+0x1c4/0x220 [ 163.395387][ T4286] ? kstrtol_from_user+0x2a0/0x2a0 [ 163.400512][ T4286] ? avc_policy_seqno+0x1b/0x70 [ 163.405380][ T4286] ? selinux_file_permission+0x2aa/0x510 [ 163.411041][ T4286] tun_chr_write_iter+0x1eb/0x2e0 [ 163.416083][ T4286] vfs_write+0x835/0xfd0 [ 163.420360][ T4286] ? file_end_write+0x1b0/0x1b0 [ 163.425223][ T4286] ? __fget_files+0x2c4/0x320 [ 163.429918][ T4286] ? __fdget_pos+0x1f7/0x380 [ 163.434520][ T4286] ? ksys_write+0x71/0x250 [ 163.438956][ T4286] ksys_write+0x149/0x250 [ 163.443311][ T4286] ? __ia32_sys_read+0x90/0x90 [ 163.448098][ T4286] ? debug_smp_processor_id+0x17/0x20 [ 163.453483][ T4286] __x64_sys_write+0x7b/0x90 [ 163.458095][ T4286] x64_sys_call+0x8ef/0x9a0 [ 163.462623][ T4286] do_syscall_64+0x4c/0xa0 [ 163.467056][ T4286] ? clear_bhb_loop+0x50/0xa0 [ 163.471751][ T4286] ? clear_bhb_loop+0x50/0xa0 [ 163.476458][ T4286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 163.482375][ T4286] RIP: 0033:0x7feff7340799 [ 163.486805][ T4286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 163.506435][ T4286] RSP: 002b:00007feff5d9b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 163.514883][ T4286] RAX: ffffffffffffffda RBX: 00007feff75b9fa0 RCX: 00007feff7340799 [ 163.522864][ T4286] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000005 [ 163.530873][ T4286] RBP: 00007feff5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 163.538945][ T4286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.546923][ T4286] R13: 00007feff75ba038 R14: 00007feff75b9fa0 R15: 00007ffdfe632668 [ 163.554912][ T4286] [ 163.739412][ T4293] device veth1_to_team entered promiscuous mode [ 164.156937][ T4307] device syzkaller0 entered promiscuous mode [ 164.715446][ T4330] FAULT_INJECTION: forcing a failure. [ 164.715446][ T4330] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 164.749191][ T4330] CPU: 1 PID: 4330 Comm: syz.0.1487 Tainted: G W syzkaller #0 [ 164.758020][ T4330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 164.768113][ T4330] Call Trace: [ 164.771421][ T4330] [ 164.774355][ T4330] __dump_stack+0x21/0x30 [ 164.778707][ T4330] dump_stack_lvl+0x110/0x170 [ 164.783413][ T4330] ? show_regs_print_info+0x20/0x20 [ 164.788629][ T4330] ? __alloc_skb+0x21a/0x740 [ 164.793301][ T4330] ? tun_get_user+0xb41/0x3400 [ 164.798085][ T4330] ? tun_chr_write_iter+0x1eb/0x2e0 [ 164.803297][ T4330] dump_stack+0x15/0x20 [ 164.807473][ T4330] should_fail+0x3c1/0x510 [ 164.811961][ T4330] should_fail_alloc_page+0x55/0x80 [ 164.817191][ T4330] prepare_alloc_pages+0x156/0x610 [ 164.822325][ T4330] ? __alloc_pages_bulk+0xad0/0xad0 [ 164.827553][ T4330] __alloc_pages+0x11d/0x460 [ 164.832168][ T4330] ? prep_new_page+0x110/0x110 [ 164.836977][ T4330] ? __alloc_skb+0x463/0x740 [ 164.841586][ T4330] alloc_skb_with_frags+0x20c/0x620 [ 164.846800][ T4330] sock_alloc_send_pskb+0x87f/0x9a0 [ 164.852018][ T4330] ? sock_kzfree_s+0x60/0x60 [ 164.856631][ T4330] ? iov_iter_advance+0x1f9/0x360 [ 164.861687][ T4330] tun_get_user+0xb41/0x3400 [ 164.866297][ T4330] ? kmem_cache_free+0xa0/0x320 [ 164.871162][ T4330] ? putname+0x111/0x160 [ 164.875417][ T4330] ? do_syscall_64+0x4c/0xa0 [ 164.880021][ T4330] ? tun_do_read+0x1d30/0x1d30 [ 164.884804][ T4330] ? kstrtouint_from_user+0x1c4/0x220 [ 164.890202][ T4330] ? kstrtol_from_user+0x2a0/0x2a0 [ 164.895327][ T4330] ? avc_policy_seqno+0x1b/0x70 [ 164.900214][ T4330] ? selinux_file_permission+0x2aa/0x510 [ 164.905881][ T4330] tun_chr_write_iter+0x1eb/0x2e0 [ 164.910925][ T4330] vfs_write+0x835/0xfd0 [ 164.915187][ T4330] ? file_end_write+0x1b0/0x1b0 [ 164.920057][ T4330] ? __fget_files+0x2c4/0x320 [ 164.924755][ T4330] ? __fdget_pos+0x1f7/0x380 [ 164.929384][ T4330] ? ksys_write+0x71/0x250 [ 164.933816][ T4330] ksys_write+0x149/0x250 [ 164.938159][ T4330] ? __ia32_sys_read+0x90/0x90 [ 164.942947][ T4330] ? debug_smp_processor_id+0x17/0x20 [ 164.948337][ T4330] __x64_sys_write+0x7b/0x90 [ 164.952942][ T4330] x64_sys_call+0x8ef/0x9a0 [ 164.957463][ T4330] do_syscall_64+0x4c/0xa0 [ 164.961911][ T4330] ? clear_bhb_loop+0x50/0xa0 [ 164.966615][ T4330] ? clear_bhb_loop+0x50/0xa0 [ 164.971317][ T4330] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 164.977226][ T4330] RIP: 0033:0x7f9270cb7799 [ 164.981656][ T4330] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 165.001377][ T4330] RSP: 002b:00007f926f712028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 165.009811][ T4330] RAX: ffffffffffffffda RBX: 00007f9270f30fa0 RCX: 00007f9270cb7799 [ 165.017803][ T4330] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000005 [ 165.025798][ T4330] RBP: 00007f926f712090 R08: 0000000000000000 R09: 0000000000000000 [ 165.033789][ T4330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.041774][ T4330] R13: 00007f9270f31038 R14: 00007f9270f30fa0 R15: 00007ffcc12f1f58 [ 165.049776][ T4330] [ 165.137513][ T4332] syz.3.1488[4332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.137601][ T4332] syz.3.1488[4332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.324965][ T4335] device syzkaller0 entered promiscuous mode [ 166.115744][ T4380] device syzkaller0 entered promiscuous mode [ 166.201408][ T4379] FAULT_INJECTION: forcing a failure. [ 166.201408][ T4379] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.321374][ T4379] CPU: 1 PID: 4379 Comm: syz.1.1504 Tainted: G W syzkaller #0 [ 166.330305][ T4379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 166.340374][ T4379] Call Trace: [ 166.343675][ T4379] [ 166.346642][ T4379] __dump_stack+0x21/0x30 [ 166.351116][ T4379] dump_stack_lvl+0x110/0x170 [ 166.355910][ T4379] ? show_regs_print_info+0x20/0x20 [ 166.361261][ T4379] ? __alloc_skb+0x21a/0x740 [ 166.365898][ T4379] ? tun_get_user+0xb41/0x3400 [ 166.370686][ T4379] ? tun_chr_write_iter+0x1eb/0x2e0 [ 166.375916][ T4379] dump_stack+0x15/0x20 [ 166.380106][ T4379] should_fail+0x3c1/0x510 [ 166.384542][ T4379] should_fail_alloc_page+0x55/0x80 [ 166.389901][ T4379] prepare_alloc_pages+0x156/0x610 [ 166.395052][ T4379] ? __alloc_pages_bulk+0xad0/0xad0 [ 166.400277][ T4379] __alloc_pages+0x11d/0x460 [ 166.404899][ T4379] ? prep_new_page+0x110/0x110 [ 166.409794][ T4379] ? __alloc_skb+0x463/0x740 [ 166.414409][ T4379] alloc_skb_with_frags+0x20c/0x620 [ 166.419660][ T4379] sock_alloc_send_pskb+0x87f/0x9a0 [ 166.424893][ T4379] ? sock_kzfree_s+0x60/0x60 [ 166.429503][ T4379] ? iov_iter_advance+0x1f9/0x360 [ 166.434595][ T4379] tun_get_user+0xb41/0x3400 [ 166.439211][ T4379] ? kmem_cache_free+0xa0/0x320 [ 166.444083][ T4379] ? putname+0x111/0x160 [ 166.448337][ T4379] ? do_syscall_64+0x4c/0xa0 [ 166.452964][ T4379] ? tun_do_read+0x1d30/0x1d30 [ 166.457757][ T4379] ? kstrtouint_from_user+0x1c4/0x220 [ 166.463151][ T4379] ? kstrtol_from_user+0x2a0/0x2a0 [ 166.468289][ T4379] ? avc_policy_seqno+0x1b/0x70 [ 166.473161][ T4379] ? selinux_file_permission+0x2aa/0x510 [ 166.478806][ T4379] tun_chr_write_iter+0x1eb/0x2e0 [ 166.483861][ T4379] vfs_write+0x835/0xfd0 [ 166.488115][ T4379] ? putname+0x111/0x160 [ 166.492382][ T4379] ? file_end_write+0x1b0/0x1b0 [ 166.497255][ T4379] ? __fget_files+0x2c4/0x320 [ 166.502011][ T4379] ? __fdget_pos+0x1f7/0x380 [ 166.506626][ T4379] ? ksys_write+0x71/0x250 [ 166.511071][ T4379] ksys_write+0x149/0x250 [ 166.515417][ T4379] ? __ia32_sys_read+0x90/0x90 [ 166.520202][ T4379] ? debug_smp_processor_id+0x17/0x20 [ 166.525596][ T4379] __x64_sys_write+0x7b/0x90 [ 166.530209][ T4379] x64_sys_call+0x8ef/0x9a0 [ 166.534812][ T4379] do_syscall_64+0x4c/0xa0 [ 166.539259][ T4379] ? clear_bhb_loop+0x50/0xa0 [ 166.543951][ T4379] ? clear_bhb_loop+0x50/0xa0 [ 166.548635][ T4379] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.554543][ T4379] RIP: 0033:0x7fbf8bdbf799 [ 166.558974][ T4379] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 166.578597][ T4379] RSP: 002b:00007fbf8a7f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 166.587044][ T4379] RAX: ffffffffffffffda RBX: 00007fbf8c039090 RCX: 00007fbf8bdbf799 [ 166.595029][ T4379] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000005 [ 166.603027][ T4379] RBP: 00007fbf8a7f9090 R08: 0000000000000000 R09: 0000000000000000 [ 166.611035][ T4379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 166.619020][ T4379] R13: 00007fbf8c039128 R14: 00007fbf8c039090 R15: 00007ffc4cd3dc58 [ 166.627010][ T4379] [ 166.818513][ T4385] device syzkaller0 entered promiscuous mode [ 166.996058][ T4399] device syzkaller0 entered promiscuous mode [ 167.353695][ T4421] FAULT_INJECTION: forcing a failure. [ 167.353695][ T4421] name failslab, interval 1, probability 0, space 0, times 0 [ 167.475866][ T4421] CPU: 0 PID: 4421 Comm: syz.2.1522 Tainted: G W syzkaller #0 [ 167.484673][ T4421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 167.494742][ T4421] Call Trace: [ 167.498036][ T4421] [ 167.500983][ T4421] __dump_stack+0x21/0x30 [ 167.505326][ T4421] dump_stack_lvl+0x110/0x170 [ 167.510016][ T4421] ? show_regs_print_info+0x20/0x20 [ 167.515236][ T4421] dump_stack+0x15/0x20 [ 167.519404][ T4421] should_fail+0x3c1/0x510 [ 167.523831][ T4421] __should_failslab+0xa4/0xe0 [ 167.528604][ T4421] should_failslab+0x9/0x20 [ 167.533121][ T4421] slab_pre_alloc_hook+0x3b/0xe0 [ 167.538679][ T4421] __kmalloc+0x6d/0x2c0 [ 167.542846][ T4421] ? bpf_test_init+0x100/0x1c0 [ 167.547630][ T4421] bpf_test_init+0x100/0x1c0 [ 167.552239][ T4421] bpf_prog_test_run_xdp+0x1cb/0x910 [ 167.557550][ T4421] ? __kasan_check_write+0x14/0x20 [ 167.562766][ T4421] ? dev_put+0x80/0x80 [ 167.566854][ T4421] ? __fget_files+0x2c4/0x320 [ 167.571566][ T4421] ? fput_many+0x15a/0x1a0 [ 167.575996][ T4421] ? dev_put+0x80/0x80 [ 167.580074][ T4421] bpf_prog_test_run+0x3d5/0x630 [ 167.585024][ T4421] ? bpf_prog_query+0x230/0x230 [ 167.589975][ T4421] ? selinux_bpf+0xce/0xf0 [ 167.594414][ T4421] ? security_bpf+0x82/0xa0 [ 167.599012][ T4421] __sys_bpf+0x590/0x7d0 [ 167.603267][ T4421] ? bpf_link_show_fdinfo+0x330/0x330 [ 167.608740][ T4421] ? debug_smp_processor_id+0x17/0x20 [ 167.614130][ T4421] __x64_sys_bpf+0x7c/0x90 [ 167.618551][ T4421] x64_sys_call+0x4b9/0x9a0 [ 167.623084][ T4421] do_syscall_64+0x4c/0xa0 [ 167.627523][ T4421] ? clear_bhb_loop+0x50/0xa0 [ 167.632302][ T4421] ? clear_bhb_loop+0x50/0xa0 [ 167.637005][ T4421] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.642937][ T4421] RIP: 0033:0x7f2168616799 [ 167.647367][ T4421] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 167.667047][ T4421] RSP: 002b:00007f2167071028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.675471][ T4421] RAX: ffffffffffffffda RBX: 00007f216888ffa0 RCX: 00007f2168616799 [ 167.683513][ T4421] RDX: 000000000000000c RSI: 0000200000000500 RDI: 000000000000000a [ 167.691503][ T4421] RBP: 00007f2167071090 R08: 0000000000000000 R09: 0000000000000000 [ 167.699694][ T4421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.707669][ T4421] R13: 00007f2168890038 R14: 00007f216888ffa0 R15: 00007fff7d35efb8 [ 167.715681][ T4421] [ 167.886100][ T4427] device syzkaller0 entered promiscuous mode [ 167.998229][ T282] syz-executor (282) used greatest stack depth: 21760 bytes left [ 168.341727][ T4445] device syzkaller0 entered promiscuous mode [ 168.550717][ T4441] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.557962][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.565404][ T4441] device bridge_slave_0 entered promiscuous mode [ 168.596131][ T4441] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.705964][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.713500][ T4441] device bridge_slave_1 entered promiscuous mode [ 169.506007][ T30] audit: type=1400 audit(1774270796.173:137): avc: denied { create } for pid=4441 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 169.567178][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.589183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.608166][ T30] audit: type=1400 audit(1774270796.173:138): avc: denied { write } for pid=4441 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 169.630050][ T30] audit: type=1400 audit(1774270796.173:139): avc: denied { read } for pid=4441 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 169.630177][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.686188][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.700905][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.708022][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.716484][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.724983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.743037][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.750162][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.758200][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.828959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.837119][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.845303][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.854029][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.922808][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.931059][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.938830][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.946603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.955389][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.985232][ T4441] device veth0_vlan entered promiscuous mode [ 170.001728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.011635][ T4441] device veth1_macvtap entered promiscuous mode [ 170.043941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.053056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.074518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.082983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.156337][ T4494] FAULT_INJECTION: forcing a failure. [ 170.156337][ T4494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 170.171121][ T4494] CPU: 1 PID: 4494 Comm: syz.0.1546 Tainted: G W syzkaller #0 [ 170.179907][ T4494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 170.189991][ T4494] Call Trace: [ 170.193280][ T4494] [ 170.196228][ T4494] __dump_stack+0x21/0x30 [ 170.200579][ T4494] dump_stack_lvl+0x110/0x170 [ 170.205295][ T4494] ? show_regs_print_info+0x20/0x20 [ 170.210508][ T4494] dump_stack+0x15/0x20 [ 170.214689][ T4494] should_fail+0x3c1/0x510 [ 170.219112][ T4494] should_fail_usercopy+0x1a/0x20 [ 170.224157][ T4494] _copy_from_user+0x20/0xd0 [ 170.228761][ T4494] bpf_test_init+0x13d/0x1c0 [ 170.233367][ T4494] bpf_prog_test_run_xdp+0x1cb/0x910 [ 170.238662][ T4494] ? __kasan_check_write+0x14/0x20 [ 170.243785][ T4494] ? dev_put+0x80/0x80 [ 170.247867][ T4494] ? __fget_files+0x2c4/0x320 [ 170.252564][ T4494] ? fput_many+0x15a/0x1a0 [ 170.256998][ T4494] ? dev_put+0x80/0x80 [ 170.261081][ T4494] bpf_prog_test_run+0x3d5/0x630 [ 170.266022][ T4494] ? bpf_prog_query+0x230/0x230 [ 170.270884][ T4494] ? selinux_bpf+0xce/0xf0 [ 170.275313][ T4494] ? security_bpf+0x82/0xa0 [ 170.279823][ T4494] __sys_bpf+0x590/0x7d0 [ 170.284079][ T4494] ? bpf_link_show_fdinfo+0x330/0x330 [ 170.289460][ T4494] ? debug_smp_processor_id+0x17/0x20 [ 170.294842][ T4494] __x64_sys_bpf+0x7c/0x90 [ 170.299270][ T4494] x64_sys_call+0x4b9/0x9a0 [ 170.303776][ T4494] do_syscall_64+0x4c/0xa0 [ 170.308206][ T4494] ? clear_bhb_loop+0x50/0xa0 [ 170.312891][ T4494] ? clear_bhb_loop+0x50/0xa0 [ 170.317590][ T4494] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.323498][ T4494] RIP: 0033:0x7f9270cb7799 [ 170.327918][ T4494] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 170.347624][ T4494] RSP: 002b:00007f926f712028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 170.356056][ T4494] RAX: ffffffffffffffda RBX: 00007f9270f30fa0 RCX: 00007f9270cb7799 [ 170.364050][ T4494] RDX: 000000000000000c RSI: 0000200000000500 RDI: 000000000000000a [ 170.372032][ T4494] RBP: 00007f926f712090 R08: 0000000000000000 R09: 0000000000000000 [ 170.380103][ T4494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.388078][ T4494] R13: 00007f9270f31038 R14: 00007f9270f30fa0 R15: 00007ffcc12f1f58 [ 170.396070][ T4494] [ 171.124892][ T4511] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.132189][ T4511] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.139922][ T4511] device bridge_slave_0 entered promiscuous mode [ 171.156837][ T4511] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.163938][ T4511] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.171691][ T4511] device bridge_slave_1 entered promiscuous mode [ 171.248447][ T3818] device bridge_slave_1 left promiscuous mode [ 171.255740][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.263841][ T3818] device bridge_slave_0 left promiscuous mode [ 171.270247][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.281274][ T3818] device veth1_macvtap left promiscuous mode [ 171.287519][ T3818] device veth0_vlan left promiscuous mode [ 171.694715][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.704780][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.736207][ T4511] device veth0_vlan entered promiscuous mode [ 171.763470][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.772184][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.780564][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.787643][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.795157][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.803650][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.812038][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.819197][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.826608][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.834626][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.842904][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.850908][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.859173][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.867515][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.875756][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.883714][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.891877][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.900218][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.908455][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.916135][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.923537][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.933605][ T4511] device veth1_macvtap entered promiscuous mode [ 171.960610][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.968375][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.977217][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.988075][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.996376][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.677844][ T4551] device syzkaller0 entered promiscuous mode [ 173.061838][ T4567] FAULT_INJECTION: forcing a failure. [ 173.061838][ T4567] name failslab, interval 1, probability 0, space 0, times 0 [ 173.086437][ T4567] CPU: 0 PID: 4567 Comm: syz.0.1567 Tainted: G W syzkaller #0 [ 173.095237][ T4567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 173.105521][ T4567] Call Trace: [ 173.108822][ T4567] [ 173.111765][ T4567] __dump_stack+0x21/0x30 [ 173.116137][ T4567] dump_stack_lvl+0x110/0x170 [ 173.120923][ T4567] ? show_regs_print_info+0x20/0x20 [ 173.126178][ T4567] dump_stack+0x15/0x20 [ 173.130350][ T4567] should_fail+0x3c1/0x510 [ 173.134780][ T4567] __should_failslab+0xa4/0xe0 [ 173.139568][ T4567] should_failslab+0x9/0x20 [ 173.144090][ T4567] slab_pre_alloc_hook+0x3b/0xe0 [ 173.149091][ T4567] ? skb_clone+0x1cf/0x360 [ 173.153528][ T4567] kmem_cache_alloc+0x44/0x260 [ 173.158312][ T4567] skb_clone+0x1cf/0x360 [ 173.162667][ T4567] bpf_clone_redirect+0x17c/0x4b0 [ 173.167715][ T4567] bpf_prog_b36a1f39e2fdd4f4+0x56/0x674 [ 173.173279][ T4567] ? __kasan_slab_alloc+0xcf/0xf0 [ 173.178308][ T4567] ? __kasan_slab_alloc+0xbd/0xf0 [ 173.183332][ T4567] ? slab_post_alloc_hook+0x4f/0x2b0 [ 173.188617][ T4567] ? kmem_cache_alloc+0xf7/0x260 [ 173.193562][ T4567] ? __build_skb+0x2d/0x310 [ 173.198078][ T4567] ? build_skb+0x24/0x200 [ 173.202414][ T4567] ? bpf_prog_test_run_skb+0x279/0x1150 [ 173.207977][ T4567] ? bpf_prog_test_run+0x3d5/0x630 [ 173.213108][ T4567] ? __sys_bpf+0x590/0x7d0 [ 173.217536][ T4567] ? __x64_sys_bpf+0x7c/0x90 [ 173.222138][ T4567] ? x64_sys_call+0x4b9/0x9a0 [ 173.226832][ T4567] ? do_syscall_64+0x4c/0xa0 [ 173.231436][ T4567] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.237527][ T4567] ? __kasan_check_read+0x11/0x20 [ 173.242559][ T4567] ? bpf_test_timer_continue+0x146/0x4a0 [ 173.248203][ T4567] bpf_test_run+0x351/0x900 [ 173.252719][ T4567] ? convert___skb_to_skb+0x4f0/0x4f0 [ 173.258094][ T4567] ? eth_get_headlen+0x200/0x200 [ 173.263069][ T4567] ? convert___skb_to_skb+0x41/0x4f0 [ 173.268369][ T4567] bpf_prog_test_run_skb+0x9ec/0x1150 [ 173.273741][ T4567] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 173.279634][ T4567] bpf_prog_test_run+0x3d5/0x630 [ 173.284567][ T4567] ? bpf_prog_query+0x230/0x230 [ 173.289499][ T4567] ? selinux_bpf+0xce/0xf0 [ 173.293912][ T4567] ? security_bpf+0x82/0xa0 [ 173.298532][ T4567] __sys_bpf+0x590/0x7d0 [ 173.302790][ T4567] ? bpf_link_show_fdinfo+0x330/0x330 [ 173.308186][ T4567] ? debug_smp_processor_id+0x17/0x20 [ 173.313562][ T4567] __x64_sys_bpf+0x7c/0x90 [ 173.317973][ T4567] x64_sys_call+0x4b9/0x9a0 [ 173.322480][ T4567] do_syscall_64+0x4c/0xa0 [ 173.326906][ T4567] ? clear_bhb_loop+0x50/0xa0 [ 173.331754][ T4567] ? clear_bhb_loop+0x50/0xa0 [ 173.336432][ T4567] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.342423][ T4567] RIP: 0033:0x7f9270cb7799 [ 173.346866][ T4567] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 173.366496][ T4567] RSP: 002b:00007f926f712028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 173.374914][ T4567] RAX: ffffffffffffffda RBX: 00007f9270f30fa0 RCX: 00007f9270cb7799 [ 173.382895][ T4567] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 173.390875][ T4567] RBP: 00007f926f712090 R08: 0000000000000000 R09: 0000000000000000 [ 173.398839][ T4567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.406809][ T4567] R13: 00007f9270f31038 R14: 00007f9270f30fa0 R15: 00007ffcc12f1f58 [ 173.414788][ T4567] [ 173.992887][ T4553] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.005804][ T4553] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.013349][ T4553] device bridge_slave_0 entered promiscuous mode [ 174.038076][ T4553] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.070820][ T4553] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.092414][ T4553] device bridge_slave_1 entered promiscuous mode [ 174.338393][ T4553] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.345472][ T4553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.352812][ T4553] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.359867][ T4553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.379043][ T3818] device bridge_slave_1 left promiscuous mode [ 174.385207][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.478155][ T3818] device bridge_slave_0 left promiscuous mode [ 174.495877][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.580645][ T3818] device bridge_slave_1 left promiscuous mode [ 174.627233][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.711723][ T3818] device bridge_slave_0 left promiscuous mode [ 174.718308][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.732579][ T3818] device veth1_macvtap left promiscuous mode [ 174.739571][ T3818] device veth0_vlan left promiscuous mode [ 174.745721][ T3818] device veth1_macvtap left promiscuous mode [ 174.752474][ T3818] device veth0_vlan left promiscuous mode [ 174.963764][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.981167][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.012205][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.019844][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.036583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.051020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.068979][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.076047][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.085135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.094353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.113860][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.120930][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.137125][ T4611] device syzkaller0 entered promiscuous mode [ 175.184473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.202935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.247253][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.260965][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.314354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.328143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.354804][ T4553] device veth0_vlan entered promiscuous mode [ 175.368793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.383524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.430931][ T4553] device veth1_macvtap entered promiscuous mode [ 175.463389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.487608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.556369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.599545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.636437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.752350][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.791040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.855409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.914800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.639559][ T4654] device syzkaller0 entered promiscuous mode [ 177.085629][ T3818] device bridge_slave_1 left promiscuous mode [ 177.093187][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.154257][ T3818] device bridge_slave_0 left promiscuous mode [ 177.165875][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.206159][ T3818] device veth1_macvtap left promiscuous mode [ 177.217718][ T3818] device veth0_vlan left promiscuous mode [ 177.538092][ T4665] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.548734][ T4665] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.556908][ T4665] device bridge_slave_0 entered promiscuous mode [ 177.624161][ T4665] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.631491][ T4665] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.663719][ T4665] device bridge_slave_1 entered promiscuous mode [ 177.762249][ T4701] FAULT_INJECTION: forcing a failure. [ 177.762249][ T4701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.775532][ T4701] CPU: 1 PID: 4701 Comm: syz.1.1609 Tainted: G W syzkaller #0 [ 177.784402][ T4701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 177.794472][ T4701] Call Trace: [ 177.797869][ T4701] [ 177.800817][ T4701] __dump_stack+0x21/0x30 [ 177.805188][ T4701] dump_stack_lvl+0x110/0x170 [ 177.809876][ T4701] ? show_regs_print_info+0x20/0x20 [ 177.815095][ T4701] dump_stack+0x15/0x20 [ 177.819263][ T4701] should_fail+0x3c1/0x510 [ 177.823697][ T4701] should_fail_alloc_page+0x55/0x80 [ 177.828910][ T4701] prepare_alloc_pages+0x156/0x610 [ 177.834119][ T4701] ? __alloc_pages_bulk+0xad0/0xad0 [ 177.839333][ T4701] __alloc_pages+0x11d/0x460 [ 177.843938][ T4701] ? prep_new_page+0x110/0x110 [ 177.848720][ T4701] ? __dev_queue_xmit+0x181c/0x2da0 [ 177.853933][ T4701] __stack_depot_save+0x37e/0x480 [ 177.858972][ T4701] stack_depot_save+0xe/0x10 [ 177.863576][ T4701] save_stack+0x12f/0x230 [ 177.867950][ T4701] ? __reset_page_owner+0x190/0x190 [ 177.873164][ T4701] ? post_alloc_hook+0x192/0x1b0 [ 177.878112][ T4701] ? prep_new_page+0x1c/0x110 [ 177.882798][ T4701] ? get_page_from_freelist+0x2d3a/0x2dc0 [ 177.888544][ T4701] ? __alloc_pages+0x1a2/0x460 [ 177.893321][ T4701] ? __stack_depot_save+0x37e/0x480 [ 177.898536][ T4701] ? kasan_set_track+0x5b/0x70 [ 177.903322][ T4701] ? kasan_set_free_info+0x23/0x40 [ 177.908445][ T4701] ? ____kasan_slab_free+0x125/0x160 [ 177.913736][ T4701] ? __kasan_slab_free+0x11/0x20 [ 177.918804][ T4701] ? slab_free_freelist_hook+0xc2/0x190 [ 177.924360][ T4701] ? kfree+0xc4/0x270 [ 177.928347][ T4701] ? skb_release_data+0x814/0xa10 [ 177.933404][ T4701] ? kfree_skb+0xb9/0x2f0 [ 177.937744][ T4701] ? vti_tunnel_xmit+0xd77/0x1480 [ 177.942779][ T4701] ? dev_hard_start_xmit+0x244/0x670 [ 177.948164][ T4701] ? __dev_queue_xmit+0x181c/0x2da0 [ 177.953366][ T4701] ? unwind_next_frame+0x3d5/0x700 [ 177.958485][ T4701] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 177.964562][ T4701] __set_page_owner+0x2b/0x2e0 [ 177.969340][ T4701] ? kernel_init_free_pages+0xdc/0xf0 [ 177.974939][ T4701] post_alloc_hook+0x192/0x1b0 [ 177.979727][ T4701] prep_new_page+0x1c/0x110 [ 177.984263][ T4701] get_page_from_freelist+0x2d3a/0x2dc0 [ 177.989840][ T4701] ? __alloc_pages+0x460/0x460 [ 177.994621][ T4701] ? __alloc_pages_bulk+0xad0/0xad0 [ 177.999918][ T4701] ? 0xffffffffa001af20 [ 178.004087][ T4701] ? is_bpf_text_address+0x177/0x190 [ 178.009390][ T4701] __alloc_pages+0x1a2/0x460 [ 178.014083][ T4701] ? stack_trace_save+0xf0/0xf0 [ 178.019033][ T4701] ? prep_new_page+0x110/0x110 [ 178.023835][ T4701] ? stack_trace_save+0xa6/0xf0 [ 178.028717][ T4701] __stack_depot_save+0x37e/0x480 [ 178.033763][ T4701] kasan_set_track+0x5b/0x70 [ 178.038361][ T4701] ? kasan_set_track+0x4a/0x70 [ 178.043129][ T4701] ? kasan_set_free_info+0x23/0x40 [ 178.048247][ T4701] ? ____kasan_slab_free+0x125/0x160 [ 178.053544][ T4701] ? __kasan_slab_free+0x11/0x20 [ 178.058577][ T4701] ? slab_free_freelist_hook+0xc2/0x190 [ 178.064138][ T4701] ? kfree+0xc4/0x270 [ 178.068156][ T4701] ? skb_release_data+0x814/0xa10 [ 178.073196][ T4701] ? kfree_skb+0xb9/0x2f0 [ 178.077536][ T4701] ? vti_tunnel_xmit+0xd77/0x1480 [ 178.082578][ T4701] ? dev_hard_start_xmit+0x244/0x670 [ 178.087874][ T4701] ? __dev_queue_xmit+0x181c/0x2da0 [ 178.093081][ T4701] ? dev_queue_xmit+0x17/0x20 [ 178.097794][ T4701] ? __bpf_redirect+0x68a/0xe60 [ 178.102661][ T4701] ? bpf_clone_redirect+0x303/0x4b0 [ 178.107875][ T4701] ? bpf_prog_b36a1f39e2fdd4f4+0x56/0xb9c [ 178.113678][ T4701] ? bpf_test_run+0x351/0x900 [ 178.118361][ T4701] ? bpf_prog_test_run_skb+0x9ec/0x1150 [ 178.123912][ T4701] ? bpf_prog_test_run+0x3d5/0x630 [ 178.129039][ T4701] ? __sys_bpf+0x590/0x7d0 [ 178.133492][ T4701] ? __x64_sys_bpf+0x7c/0x90 [ 178.138094][ T4701] ? x64_sys_call+0x4b9/0x9a0 [ 178.142778][ T4701] ? do_syscall_64+0x4c/0xa0 [ 178.147386][ T4701] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.153470][ T4701] ? kfree+0xc4/0x270 [ 178.157474][ T4701] kasan_set_free_info+0x23/0x40 [ 178.162418][ T4701] ____kasan_slab_free+0x125/0x160 [ 178.167548][ T4701] __kasan_slab_free+0x11/0x20 [ 178.172339][ T4701] slab_free_freelist_hook+0xc2/0x190 [ 178.177734][ T4701] ? skb_release_data+0x814/0xa10 [ 178.182771][ T4701] kfree+0xc4/0x270 [ 178.186617][ T4701] ? skb_release_data+0x814/0xa10 [ 178.191682][ T4701] skb_release_data+0x814/0xa10 [ 178.196554][ T4701] kfree_skb+0xb9/0x2f0 [ 178.200722][ T4701] vti_tunnel_xmit+0xd77/0x1480 [ 178.205602][ T4701] ? __kasan_check_write+0x14/0x20 [ 178.210734][ T4701] ? vti_tunnel_init+0x260/0x260 [ 178.215680][ T4701] ? netif_skb_features+0x831/0xb90 [ 178.220901][ T4701] dev_hard_start_xmit+0x244/0x670 [ 178.226040][ T4701] __dev_queue_xmit+0x181c/0x2da0 [ 178.231077][ T4701] ? dev_queue_xmit+0x20/0x20 [ 178.235779][ T4701] ? __kasan_check_write+0x14/0x20 [ 178.240898][ T4701] ? skb_release_data+0x1c6/0xa10 [ 178.246057][ T4701] ? __kasan_check_write+0x14/0x20 [ 178.251177][ T4701] ? pskb_expand_head+0xbe6/0x11d0 [ 178.256307][ T4701] dev_queue_xmit+0x17/0x20 [ 178.260823][ T4701] __bpf_redirect+0x68a/0xe60 [ 178.265516][ T4701] bpf_clone_redirect+0x303/0x4b0 [ 178.270560][ T4701] bpf_prog_b36a1f39e2fdd4f4+0x56/0xb9c [ 178.276110][ T4701] ? __kasan_slab_alloc+0xcf/0xf0 [ 178.281147][ T4701] ? __kasan_slab_alloc+0xbd/0xf0 [ 178.286200][ T4701] ? slab_post_alloc_hook+0x4f/0x2b0 [ 178.291509][ T4701] ? kmem_cache_alloc+0xf7/0x260 [ 178.296458][ T4701] ? __build_skb+0x2d/0x310 [ 178.300971][ T4701] ? build_skb+0x24/0x200 [ 178.305311][ T4701] ? bpf_prog_test_run_skb+0x279/0x1150 [ 178.310869][ T4701] ? bpf_prog_test_run+0x3d5/0x630 [ 178.315991][ T4701] ? __sys_bpf+0x590/0x7d0 [ 178.320427][ T4701] ? __x64_sys_bpf+0x7c/0x90 [ 178.325057][ T4701] ? x64_sys_call+0x4b9/0x9a0 [ 178.329754][ T4701] ? do_syscall_64+0x4c/0xa0 [ 178.334363][ T4701] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.340463][ T4701] ? ktime_get+0x12f/0x160 [ 178.344892][ T4701] bpf_test_run+0x351/0x900 [ 178.349414][ T4701] ? convert___skb_to_skb+0x4f0/0x4f0 [ 178.354796][ T4701] ? eth_get_headlen+0x200/0x200 [ 178.359752][ T4701] ? convert___skb_to_skb+0x41/0x4f0 [ 178.365054][ T4701] bpf_prog_test_run_skb+0x9ec/0x1150 [ 178.370457][ T4701] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 178.376368][ T4701] bpf_prog_test_run+0x3d5/0x630 [ 178.381342][ T4701] ? bpf_prog_query+0x230/0x230 [ 178.386218][ T4701] ? selinux_bpf+0xce/0xf0 [ 178.390651][ T4701] ? security_bpf+0x82/0xa0 [ 178.395177][ T4701] __sys_bpf+0x590/0x7d0 [ 178.399516][ T4701] ? bpf_link_show_fdinfo+0x330/0x330 [ 178.404908][ T4701] ? debug_smp_processor_id+0x17/0x20 [ 178.410292][ T4701] __x64_sys_bpf+0x7c/0x90 [ 178.414722][ T4701] x64_sys_call+0x4b9/0x9a0 [ 178.419238][ T4701] do_syscall_64+0x4c/0xa0 [ 178.423672][ T4701] ? clear_bhb_loop+0x50/0xa0 [ 178.428378][ T4701] ? clear_bhb_loop+0x50/0xa0 [ 178.433103][ T4701] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.439022][ T4701] RIP: 0033:0x7fbf8bdbf799 [ 178.443444][ T4701] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 178.463062][ T4701] RSP: 002b:00007fbf8a81a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.471500][ T4701] RAX: ffffffffffffffda RBX: 00007fbf8c038fa0 RCX: 00007fbf8bdbf799 [ 178.479480][ T4701] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 178.487462][ T4701] RBP: 00007fbf8a81a090 R08: 0000000000000000 R09: 0000000000000000 [ 178.495457][ T4701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 178.503436][ T4701] R13: 00007fbf8c039038 R14: 00007fbf8c038fa0 R15: 00007ffc4cd3dc58 [ 178.511428][ T4701] [ 178.914658][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.924322][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.938502][ T4723] FAULT_INJECTION: forcing a failure. [ 178.938502][ T4723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.036209][ T4723] CPU: 0 PID: 4723 Comm: syz.0.1616 Tainted: G W syzkaller #0 [ 179.041944][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.045022][ T4723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 179.045037][ T4723] Call Trace: [ 179.045044][ T4723] [ 179.045052][ T4723] __dump_stack+0x21/0x30 [ 179.045082][ T4723] dump_stack_lvl+0x110/0x170 [ 179.045104][ T4723] ? show_regs_print_info+0x20/0x20 [ 179.045126][ T4723] ? bpf_test_timer_continue+0x155/0x4a0 [ 179.045150][ T4723] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 179.045170][ T4723] dump_stack+0x15/0x20 [ 179.045190][ T4723] should_fail+0x3c1/0x510 [ 179.045225][ T4723] should_fail_usercopy+0x1a/0x20 [ 179.045245][ T4723] _copy_to_user+0x20/0x90 [ 179.045263][ T4723] bpf_test_finish+0x217/0x3c0 [ 179.045284][ T4723] ? convert_skb_to___skb+0x360/0x360 [ 179.045308][ T4723] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 179.128759][ T4723] bpf_prog_test_run_xdp+0x621/0x910 [ 179.134068][ T4723] ? dev_put+0x80/0x80 [ 179.138162][ T4723] ? __fget_files+0x2c4/0x320 [ 179.142859][ T4723] ? fput_many+0x15a/0x1a0 [ 179.147292][ T4723] ? dev_put+0x80/0x80 [ 179.151382][ T4723] bpf_prog_test_run+0x3d5/0x630 [ 179.156331][ T4723] ? bpf_prog_query+0x230/0x230 [ 179.161207][ T4723] ? selinux_bpf+0xce/0xf0 [ 179.165640][ T4723] ? security_bpf+0x82/0xa0 [ 179.170269][ T4723] __sys_bpf+0x590/0x7d0 [ 179.174519][ T4723] ? bpf_link_show_fdinfo+0x330/0x330 [ 179.179924][ T4723] ? debug_smp_processor_id+0x17/0x20 [ 179.185340][ T4723] __x64_sys_bpf+0x7c/0x90 [ 179.189769][ T4723] x64_sys_call+0x4b9/0x9a0 [ 179.194282][ T4723] do_syscall_64+0x4c/0xa0 [ 179.198702][ T4723] ? clear_bhb_loop+0x50/0xa0 [ 179.203378][ T4723] ? clear_bhb_loop+0x50/0xa0 [ 179.208064][ T4723] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 179.213976][ T4723] RIP: 0033:0x7f9270cb7799 [ 179.218396][ T4723] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 179.238012][ T4723] RSP: 002b:00007f926f712028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 179.246456][ T4723] RAX: ffffffffffffffda RBX: 00007f9270f30fa0 RCX: 00007f9270cb7799 [ 179.254436][ T4723] RDX: 000000000000000c RSI: 0000200000000500 RDI: 000000000000000a [ 179.262423][ T4723] RBP: 00007f926f712090 R08: 0000000000000000 R09: 0000000000000000 [ 179.270415][ T4723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.278404][ T4723] R13: 00007f9270f31038 R14: 00007f9270f30fa0 R15: 00007ffcc12f1f58 [ 179.286403][ T4723] [ 179.351695][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.380269][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.387376][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.400037][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.408624][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.433538][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.440654][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.480291][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.503993][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.513784][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.521952][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.542378][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.567063][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.591406][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.660892][ T4665] device veth0_vlan entered promiscuous mode [ 179.724715][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.763168][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.835285][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.893694][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.989954][ T4665] device veth1_macvtap entered promiscuous mode [ 180.062542][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 180.088749][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.158157][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.188213][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.204262][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.223581][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.240566][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.976300][ T4773] device syzkaller0 entered promiscuous mode [ 180.991573][ T3818] device bridge_slave_1 left promiscuous mode [ 181.004610][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.020670][ T3818] device bridge_slave_0 left promiscuous mode [ 181.034569][ T4780] FAULT_INJECTION: forcing a failure. [ 181.034569][ T4780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.048032][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.056822][ T4780] CPU: 0 PID: 4780 Comm: syz.1.1634 Tainted: G W syzkaller #0 [ 181.065614][ T4780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 181.075697][ T4780] Call Trace: [ 181.078987][ T4780] [ 181.081940][ T4780] __dump_stack+0x21/0x30 [ 181.086304][ T4780] dump_stack_lvl+0x110/0x170 [ 181.091095][ T4780] ? show_regs_print_info+0x20/0x20 [ 181.096412][ T4780] dump_stack+0x15/0x20 [ 181.100594][ T4780] should_fail+0x3c1/0x510 [ 181.105039][ T4780] should_fail_usercopy+0x1a/0x20 [ 181.110099][ T4780] _copy_to_user+0x20/0x90 [ 181.114539][ T4780] simple_read_from_buffer+0xe9/0x160 [ 181.119940][ T4780] proc_fail_nth_read+0x1a6/0x220 [ 181.125005][ T4780] ? proc_fault_inject_write+0x310/0x310 [ 181.130669][ T4780] ? security_file_permission+0x83/0xa0 [ 181.136241][ T4780] ? proc_fault_inject_write+0x310/0x310 [ 181.142002][ T4780] vfs_read+0x28d/0xc40 [ 181.146190][ T4780] ? __kasan_check_write+0x14/0x20 [ 181.151321][ T4780] ? kernel_read+0x1f0/0x1f0 [ 181.155924][ T4780] ? __kasan_check_write+0x14/0x20 [ 181.161066][ T4780] ? mutex_lock+0x9b/0x1c0 [ 181.165507][ T4780] ? wait_for_completion_killable_timeout+0x10/0x10 [ 181.172233][ T4780] ? __fget_files+0x2c4/0x320 [ 181.176935][ T4780] ? __fdget_pos+0x2d2/0x380 [ 181.181540][ T4780] ? ksys_read+0x71/0x250 [ 181.185890][ T4780] ksys_read+0x149/0x250 [ 181.190147][ T4780] ? vfs_write+0xfd0/0xfd0 [ 181.194589][ T4780] ? debug_smp_processor_id+0x17/0x20 [ 181.199971][ T4780] __x64_sys_read+0x7b/0x90 [ 181.204487][ T4780] x64_sys_call+0x96d/0x9a0 [ 181.208999][ T4780] do_syscall_64+0x4c/0xa0 [ 181.213435][ T4780] ? clear_bhb_loop+0x50/0xa0 [ 181.218121][ T4780] ? clear_bhb_loop+0x50/0xa0 [ 181.222814][ T4780] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 181.228733][ T4780] RIP: 0033:0x7fbf8bd7ffce [ 181.233163][ T4780] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 181.252796][ T4780] RSP: 002b:00007fbf8a819fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 181.261237][ T4780] RAX: ffffffffffffffda RBX: 00007fbf8a81a6c0 RCX: 00007fbf8bd7ffce [ 181.269227][ T4780] RDX: 000000000000000f RSI: 00007fbf8a81a0a0 RDI: 0000000000000005 [ 181.277218][ T4780] RBP: 00007fbf8a81a090 R08: 0000000000000000 R09: 0000000000000000 [ 181.285214][ T4780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.293194][ T4780] R13: 00007fbf8c039038 R14: 00007fbf8c038fa0 R15: 00007ffc4cd3dc58 [ 181.301197][ T4780] [ 181.330140][ T3818] device veth1_macvtap left promiscuous mode [ 181.345651][ T3818] device veth0_vlan left promiscuous mode [ 181.503281][ T4782] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.510821][ T4782] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.518587][ T4782] device bridge_slave_0 entered promiscuous mode [ 181.531535][ T4782] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.559477][ T4782] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.568341][ T4782] device bridge_slave_1 entered promiscuous mode [ 181.734134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.744640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.753199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.760814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.769561][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.778740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.787595][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.794658][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.802360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.811001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.819426][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.826504][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.851912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.867225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.875461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.883208][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.891016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.900648][ T4782] device veth0_vlan entered promiscuous mode [ 181.934425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.944228][ T4782] device veth1_macvtap entered promiscuous mode [ 181.955164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.993955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.915109][ T4831] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.922347][ T4831] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.930141][ T4831] device bridge_slave_0 entered promiscuous mode [ 182.937490][ T4831] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.944664][ T4831] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.952781][ T4831] device bridge_slave_1 entered promiscuous mode [ 183.262753][ T3818] device bridge_slave_1 left promiscuous mode [ 183.273513][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.338783][ T3818] device bridge_slave_0 left promiscuous mode [ 183.358769][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.373667][ T3818] device veth1_macvtap left promiscuous mode [ 183.379783][ T3818] device veth0_vlan left promiscuous mode [ 183.525059][ T4859] device syzkaller0 entered promiscuous mode [ 183.532573][ T4831] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.539658][ T4831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.547000][ T4831] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.554020][ T4831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.601186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.615505][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.623578][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.656951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.697331][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.744996][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.752101][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.766687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.775122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.783510][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.790580][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.946989][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.957995][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.973061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.985667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.042650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.064850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.077873][ T4831] device veth0_vlan entered promiscuous mode [ 184.130680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.160161][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.176763][ T4882] device sit0 entered promiscuous mode [ 184.403384][ T4831] device veth1_macvtap entered promiscuous mode [ 184.411168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.423571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.431382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.440525][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.449072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.500223][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.516377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.525413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.533673][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.638222][ T4904] device syzkaller0 entered promiscuous mode [ 184.722147][ T4831] syz-executor (4831) used greatest stack depth: 21728 bytes left [ 185.826327][ T3818] device bridge_slave_1 left promiscuous mode [ 185.832507][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.876290][ T3818] device bridge_slave_0 left promiscuous mode [ 185.882497][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.970383][ T3818] device veth1_macvtap left promiscuous mode [ 185.986435][ T3818] device veth0_vlan left promiscuous mode [ 186.222167][ T4939] FAULT_INJECTION: forcing a failure. [ 186.222167][ T4939] name failslab, interval 1, probability 0, space 0, times 0 [ 186.240294][ T4939] CPU: 1 PID: 4939 Comm: syz.1.1683 Tainted: G W syzkaller #0 [ 186.249100][ T4939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 186.259356][ T4939] Call Trace: [ 186.262658][ T4939] [ 186.265609][ T4939] __dump_stack+0x21/0x30 [ 186.269962][ T4939] dump_stack_lvl+0x110/0x170 [ 186.274649][ T4939] ? show_regs_print_info+0x20/0x20 [ 186.279864][ T4939] dump_stack+0x15/0x20 [ 186.284040][ T4939] should_fail+0x3c1/0x510 [ 186.288470][ T4939] __should_failslab+0xa4/0xe0 [ 186.293250][ T4939] should_failslab+0x9/0x20 [ 186.297766][ T4939] slab_pre_alloc_hook+0x3b/0xe0 [ 186.302720][ T4939] ? prepare_creds+0x2f/0x640 [ 186.307425][ T4939] kmem_cache_alloc+0x44/0x260 [ 186.312213][ T4939] prepare_creds+0x2f/0x640 [ 186.316729][ T4939] copy_creds+0xe4/0x640 [ 186.320990][ T4939] copy_process+0x7b9/0x3250 [ 186.325599][ T4939] ? kstrtol_from_user+0x2a0/0x2a0 [ 186.330763][ T4939] ? __kasan_check_write+0x14/0x20 [ 186.335975][ T4939] ? proc_fail_nth_write+0x180/0x200 [ 186.341273][ T4939] ? proc_fail_nth_read+0x220/0x220 [ 186.346497][ T4939] ? __pidfd_prepare+0x150/0x150 [ 186.351447][ T4939] kernel_clone+0x233/0x960 [ 186.355963][ T4939] ? create_io_thread+0x170/0x170 [ 186.361005][ T4939] ? __kasan_check_write+0x14/0x20 [ 186.366136][ T4939] ? mutex_unlock+0x8f/0x230 [ 186.370751][ T4939] __x64_sys_clone+0x198/0x210 [ 186.375529][ T4939] ? __kasan_check_write+0x14/0x20 [ 186.380659][ T4939] ? __ia32_sys_vfork+0x130/0x130 [ 186.385714][ T4939] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 186.391815][ T4939] x64_sys_call+0x41f/0x9a0 [ 186.396336][ T4939] do_syscall_64+0x4c/0xa0 [ 186.400762][ T4939] ? clear_bhb_loop+0x50/0xa0 [ 186.405468][ T4939] ? clear_bhb_loop+0x50/0xa0 [ 186.410167][ T4939] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 186.416080][ T4939] RIP: 0033:0x7fbf8bdbf799 [ 186.420525][ T4939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 186.440156][ T4939] RSP: 002b:00007fbf8a819fd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 186.448587][ T4939] RAX: ffffffffffffffda RBX: 00007fbf8c038fa0 RCX: 00007fbf8bdbf799 [ 186.456572][ T4939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 186.464555][ T4939] RBP: 00007fbf8a81a090 R08: 0000000000000000 R09: 0000000000000000 [ 186.472535][ T4939] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 186.480554][ T4939] R13: 00007fbf8c039038 R14: 00007fbf8c038fa0 R15: 00007ffc4cd3dc58 [ 186.488560][ T4939] [ 186.593857][ T4952] device syzkaller0 entered promiscuous mode [ 186.868439][ T4927] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.875501][ T4927] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.963536][ T4927] device bridge_slave_0 entered promiscuous mode [ 186.976266][ T4927] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.983315][ T4927] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.990920][ T4927] device bridge_slave_1 entered promiscuous mode [ 187.110859][ T4927] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.117991][ T4927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.147108][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.154935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.162524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.173133][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.181727][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.190403][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.197503][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.227824][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.236084][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.243176][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.258143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.292146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.333220][ T4927] device veth0_vlan entered promiscuous mode [ 187.351117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.366189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.375599][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.384171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.399921][ T4927] device veth1_macvtap entered promiscuous mode [ 187.417208][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.441953][ T4989] device syzkaller0 entered promiscuous mode [ 187.464683][ T4992] device syzkaller0 entered promiscuous mode [ 187.497993][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.542182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.972093][ T5010] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.979585][ T5010] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.987081][ T5010] device bridge_slave_0 entered promiscuous mode [ 188.994239][ T5010] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.001314][ T5010] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.008867][ T5010] device bridge_slave_1 entered promiscuous mode [ 189.108487][ T5010] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.115780][ T5010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.123072][ T5010] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.130143][ T5010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.155632][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.198859][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.224451][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.247789][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.261841][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.268956][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.277722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.302290][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.309377][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.317544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.325746][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.391598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 189.402267][ T3818] device bridge_slave_1 left promiscuous mode [ 189.409262][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.423466][ T3818] device bridge_slave_0 left promiscuous mode [ 189.429960][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.455554][ T3818] device veth1_macvtap left promiscuous mode [ 189.462586][ T3818] device veth0_vlan left promiscuous mode [ 189.607334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.619825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.629603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.647136][ T5010] device veth0_vlan entered promiscuous mode [ 189.675934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.686480][ T5010] device veth1_macvtap entered promiscuous mode [ 189.709023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.726988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.031547][ T5078] device syzkaller0 entered promiscuous mode [ 191.111289][ T3818] device bridge_slave_1 left promiscuous mode [ 191.119428][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.127353][ T3818] device bridge_slave_0 left promiscuous mode [ 191.133561][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.142368][ T3818] device veth1_macvtap left promiscuous mode [ 191.149707][ T3818] device veth0_vlan left promiscuous mode [ 191.295907][ T5089] device syzkaller0 entered promiscuous mode [ 191.343910][ T5096] FAULT_INJECTION: forcing a failure. [ 191.343910][ T5096] name failslab, interval 1, probability 0, space 0, times 0 [ 191.356641][ T5096] CPU: 1 PID: 5096 Comm: syz.0.1734 Tainted: G W syzkaller #0 [ 191.365426][ T5096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 191.375513][ T5096] Call Trace: [ 191.378489][ T5083] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.378819][ T5096] [ 191.385990][ T5083] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.388767][ T5096] __dump_stack+0x21/0x30 [ 191.397191][ T5083] device bridge_slave_0 entered promiscuous mode [ 191.400124][ T5096] dump_stack_lvl+0x110/0x170 [ 191.408597][ T5083] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.411154][ T5096] ? show_regs_print_info+0x20/0x20 [ 191.418372][ T5083] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.423397][ T5096] dump_stack+0x15/0x20 [ 191.431785][ T5083] device bridge_slave_1 entered promiscuous mode [ 191.434643][ T5096] should_fail+0x3c1/0x510 [ 191.445393][ T5096] __should_failslab+0xa4/0xe0 [ 191.450189][ T5096] should_failslab+0x9/0x20 [ 191.454711][ T5096] slab_pre_alloc_hook+0x3b/0xe0 [ 191.459664][ T5096] kmem_cache_alloc_trace+0x48/0x270 [ 191.464987][ T5096] ? alloc_fdtable+0xcd/0x2e0 [ 191.469678][ T5096] alloc_fdtable+0xcd/0x2e0 [ 191.474208][ T5096] ? _find_last_bit+0x7c/0x120 [ 191.478995][ T5096] dup_fd+0x886/0xaa0 [ 191.482998][ T5096] ? put_ctx+0xa2/0x1a0 [ 191.487187][ T5096] copy_files+0x76/0xe0 [ 191.491378][ T5096] copy_process+0x10cc/0x3250 [ 191.496085][ T5096] ? kstrtol_from_user+0x2a0/0x2a0 [ 191.501232][ T5096] ? __kasan_check_write+0x14/0x20 [ 191.506375][ T5096] ? __pidfd_prepare+0x150/0x150 [ 191.511338][ T5096] kernel_clone+0x233/0x960 [ 191.515857][ T5096] ? create_io_thread+0x170/0x170 [ 191.520900][ T5096] ? __kasan_check_write+0x14/0x20 [ 191.526033][ T5096] ? mutex_unlock+0x8f/0x230 [ 191.530638][ T5096] __x64_sys_clone+0x198/0x210 [ 191.535450][ T5096] ? __kasan_check_write+0x14/0x20 [ 191.540606][ T5096] ? __ia32_sys_vfork+0x130/0x130 [ 191.545685][ T5096] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 191.551802][ T5096] x64_sys_call+0x41f/0x9a0 [ 191.556335][ T5096] do_syscall_64+0x4c/0xa0 [ 191.560782][ T5096] ? clear_bhb_loop+0x50/0xa0 [ 191.565484][ T5096] ? clear_bhb_loop+0x50/0xa0 [ 191.570172][ T5096] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.576112][ T5096] RIP: 0033:0x7f9270cb7799 [ 191.580541][ T5096] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 191.588043][ T5083] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.600170][ T5096] RSP: 002b:00007f926f711fd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 191.600196][ T5096] RAX: ffffffffffffffda RBX: 00007f9270f30fa0 RCX: 00007f9270cb7799 [ 191.600211][ T5096] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 191.607276][ T5083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.615648][ T5096] RBP: 00007f926f712090 R08: 0000000000000000 R09: 0000000000000000 [ 191.623906][ T5083] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.631582][ T5096] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 191.631598][ T5096] R13: 00007f9270f31038 R14: 00007f9270f30fa0 R15: 00007ffcc12f1f58 [ 191.638885][ T5083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.646785][ T5096] [ 191.741591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.769525][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.828857][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.907261][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.977800][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.984991][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.087788][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.096135][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.103187][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.129072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.137480][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.163307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.183313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.212843][ T5083] device veth0_vlan entered promiscuous mode [ 192.226109][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.234619][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.243976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 192.252148][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.260748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.268458][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.281890][ T5083] device veth1_macvtap entered promiscuous mode [ 192.327864][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 192.336525][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.344748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 192.352518][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.361277][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.370276][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.378796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.979271][ T3818] device bridge_slave_1 left promiscuous mode [ 193.995913][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.021362][ T3818] device bridge_slave_0 left promiscuous mode [ 194.035891][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.044549][ T3818] device veth1_macvtap left promiscuous mode [ 194.050908][ T3818] device veth0_vlan left promiscuous mode [ 194.251892][ T5144] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.292959][ T5144] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.351387][ T5144] device bridge_slave_0 entered promiscuous mode [ 194.419896][ T5144] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.486698][ T5144] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.549347][ T5144] device bridge_slave_1 entered promiscuous mode [ 195.140059][ T5144] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.147156][ T5144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.154432][ T5144] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.161484][ T5144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.261060][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.272910][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.292493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.313302][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.348230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.357221][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.367241][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.374306][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.441180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.483380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.556294][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.563414][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.675303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.691796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.713397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.727053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.754151][ T5144] device veth0_vlan entered promiscuous mode [ 195.766584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.774875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.783411][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 195.791476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.802649][ T5144] device veth1_macvtap entered promiscuous mode [ 195.817338][ T5189] device syzkaller0 entered promiscuous mode [ 195.827367][ T30] audit: type=1400 audit(1774270822.513:140): avc: denied { create } for pid=5190 comm="syz.1.1771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 195.833832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.863371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.876271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 195.891814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 195.900305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 195.985116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.999427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.010992][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.019617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.856563][ T3818] device bridge_slave_1 left promiscuous mode [ 196.862688][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.870325][ T3818] device bridge_slave_0 left promiscuous mode [ 196.876566][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.884465][ T3818] device veth1_macvtap left promiscuous mode [ 196.890530][ T3818] device veth0_vlan left promiscuous mode [ 197.768762][ T5241] device syzkaller0 entered promiscuous mode [ 197.775669][ T5232] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.785885][ T5232] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.793673][ T5232] device bridge_slave_0 entered promiscuous mode [ 197.801152][ T5235] device bridge0 entered promiscuous mode [ 197.816724][ T5232] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.823800][ T5232] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.831579][ T5232] device bridge_slave_1 entered promiscuous mode [ 197.838670][ T5242] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.845926][ T5242] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.853870][ T5242] device bridge0 left promiscuous mode [ 201.301636][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.327782][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.379018][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.396084][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.406559][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.413632][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.458717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.535347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.585988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.648642][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.655720][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.751993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.797705][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.810883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.819244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.868911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 201.920148][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.980332][ T5232] device veth0_vlan entered promiscuous mode [ 202.023230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.058716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.103301][ T5232] device veth1_macvtap entered promiscuous mode [ 202.200770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.215618][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.240701][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.302908][ T5279] device syzkaller0 entered promiscuous mode [ 202.320656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.351241][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.379767][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.396442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.493112][ T5291] device syzkaller0 entered promiscuous mode [ 203.916647][ T3818] device bridge_slave_1 left promiscuous mode [ 203.922816][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.008475][ T3818] device bridge_slave_0 left promiscuous mode [ 204.065868][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.123938][ T3818] device veth1_macvtap left promiscuous mode [ 204.167859][ T3818] device veth0_vlan left promiscuous mode [ 204.938884][ T5306] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.946049][ T5306] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.953624][ T5306] device bridge_slave_0 entered promiscuous mode [ 204.960915][ T5306] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.968076][ T5306] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.976666][ T5306] device bridge_slave_1 entered promiscuous mode [ 205.009674][ T5330] FAULT_INJECTION: forcing a failure. [ 205.009674][ T5330] name failslab, interval 1, probability 0, space 0, times 0 [ 205.048106][ T5306] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.055300][ T5306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.062649][ T5306] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.069729][ T5306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.139525][ T5330] CPU: 0 PID: 5330 Comm: syz.4.1817 Tainted: G W syzkaller #0 [ 205.148445][ T5330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 205.158531][ T5330] Call Trace: [ 205.161821][ T5330] [ 205.164758][ T5330] __dump_stack+0x21/0x30 [ 205.169101][ T5330] dump_stack_lvl+0x110/0x170 [ 205.173794][ T5330] ? show_regs_print_info+0x20/0x20 [ 205.179013][ T5330] ? slab_post_alloc_hook+0x4f/0x2b0 [ 205.184322][ T5330] ? copy_signal+0x54/0x600 [ 205.188842][ T5330] ? copy_process+0x1150/0x3250 [ 205.193710][ T5330] ? kernel_clone+0x233/0x960 [ 205.198437][ T5330] ? x64_sys_call+0x41f/0x9a0 [ 205.203128][ T5330] ? do_syscall_64+0x4c/0xa0 [ 205.207749][ T5330] dump_stack+0x15/0x20 [ 205.211955][ T5330] should_fail+0x3c1/0x510 [ 205.216403][ T5330] __should_failslab+0xa4/0xe0 [ 205.221195][ T5330] should_failslab+0x9/0x20 [ 205.225723][ T5330] slab_pre_alloc_hook+0x3b/0xe0 [ 205.230678][ T5330] ? copy_mm+0x189/0x13c0 [ 205.235028][ T5330] kmem_cache_alloc+0x44/0x260 [ 205.239818][ T5330] copy_mm+0x189/0x13c0 [ 205.244000][ T5330] ? __kasan_check_write+0x14/0x20 [ 205.249129][ T5330] ? _raw_spin_lock+0x94/0xf0 [ 205.253835][ T5330] ? copy_signal+0x600/0x600 [ 205.258446][ T5330] ? __init_rwsem+0xfc/0x1d0 [ 205.263080][ T5330] ? copy_signal+0x4cb/0x600 [ 205.267698][ T5330] copy_process+0x117c/0x3250 [ 205.272397][ T5330] ? __kasan_check_write+0x14/0x20 [ 205.277550][ T5330] ? __pidfd_prepare+0x150/0x150 [ 205.282523][ T5330] kernel_clone+0x233/0x960 [ 205.287055][ T5330] ? create_io_thread+0x170/0x170 [ 205.292098][ T5330] ? __kasan_check_write+0x14/0x20 [ 205.297361][ T5330] ? mutex_unlock+0x8f/0x230 [ 205.301985][ T5330] __x64_sys_clone+0x198/0x210 [ 205.306775][ T5330] ? __kasan_check_write+0x14/0x20 [ 205.311930][ T5330] ? __ia32_sys_vfork+0x130/0x130 [ 205.316992][ T5330] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 205.323081][ T5330] x64_sys_call+0x41f/0x9a0 [ 205.327630][ T5330] do_syscall_64+0x4c/0xa0 [ 205.332081][ T5330] ? clear_bhb_loop+0x50/0xa0 [ 205.336780][ T5330] ? clear_bhb_loop+0x50/0xa0 [ 205.341489][ T5330] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.347410][ T5330] RIP: 0033:0x7feff7340799 [ 205.351861][ T5330] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.371610][ T5330] RSP: 002b:00007feff5d9afd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 205.380058][ T5330] RAX: ffffffffffffffda RBX: 00007feff75b9fa0 RCX: 00007feff7340799 [ 205.388048][ T5330] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 205.396032][ T5330] RBP: 00007feff5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 205.404095][ T5330] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 205.412097][ T5330] R13: 00007feff75ba038 R14: 00007feff75b9fa0 R15: 00007ffdfe632668 [ 205.420095][ T5330] [ 205.433882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.441841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.450289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.470878][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.479745][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.501505][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.510033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.518155][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.525614][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.553184][ T5333] device syzkaller0 entered promiscuous mode [ 205.560462][ T5306] device veth0_vlan entered promiscuous mode [ 205.616091][ T5306] device veth1_macvtap entered promiscuous mode [ 205.633407][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.697502][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.720727][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.240027][ T10] device bridge_slave_1 left promiscuous mode [ 206.256092][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.303658][ T10] device bridge_slave_0 left promiscuous mode [ 206.348064][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.398860][ T10] device veth1_macvtap left promiscuous mode [ 206.436565][ T10] device veth0_vlan left promiscuous mode [ 207.398023][ T5367] device syzkaller0 entered promiscuous mode [ 207.511634][ T5372] device syzkaller0 entered promiscuous mode [ 207.569544][ T5374] device syzkaller0 entered promiscuous mode [ 207.719243][ T5362] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.756803][ T5362] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.776753][ T5362] device bridge_slave_0 entered promiscuous mode [ 207.791379][ T5362] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.798570][ T5362] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.806115][ T5362] device bridge_slave_1 entered promiscuous mode [ 208.470509][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.501683][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.509604][ T5400] FAULT_INJECTION: forcing a failure. [ 208.509604][ T5400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 208.637101][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.671731][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.686130][ T5400] CPU: 1 PID: 5400 Comm: syz.4.1840 Tainted: G W syzkaller #0 [ 208.694927][ T5400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 208.704991][ T5400] Call Trace: [ 208.708311][ T5400] [ 208.711263][ T5400] __dump_stack+0x21/0x30 [ 208.715614][ T5400] dump_stack_lvl+0x110/0x170 [ 208.720305][ T5400] ? show_regs_print_info+0x20/0x20 [ 208.725511][ T5400] dump_stack+0x15/0x20 [ 208.729668][ T5400] should_fail+0x3c1/0x510 [ 208.734092][ T5400] should_fail_alloc_page+0x55/0x80 [ 208.739379][ T5400] prepare_alloc_pages+0x156/0x610 [ 208.744508][ T5400] ? __alloc_pages_bulk+0xad0/0xad0 [ 208.749718][ T5400] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 208.756402][ T5400] __alloc_pages+0x11d/0x460 [ 208.760992][ T5400] ? prep_new_page+0x110/0x110 [ 208.765767][ T5400] __get_free_pages+0x10/0x30 [ 208.770461][ T5400] pgd_alloc+0x21/0x280 [ 208.774645][ T5400] mm_init+0x594/0x980 [ 208.778716][ T5400] copy_mm+0x1da/0x13c0 [ 208.782874][ T5400] ? __kasan_check_write+0x14/0x20 [ 208.788001][ T5400] ? _raw_spin_lock+0x94/0xf0 [ 208.792693][ T5400] ? copy_signal+0x600/0x600 [ 208.797293][ T5400] ? __init_rwsem+0xfc/0x1d0 [ 208.801887][ T5400] ? copy_signal+0x4cb/0x600 [ 208.806510][ T5400] copy_process+0x117c/0x3250 [ 208.811197][ T5400] ? __kasan_check_write+0x14/0x20 [ 208.816329][ T5400] ? __pidfd_prepare+0x150/0x150 [ 208.821486][ T5400] kernel_clone+0x233/0x960 [ 208.826014][ T5400] ? create_io_thread+0x170/0x170 [ 208.831064][ T5400] ? __kasan_check_write+0x14/0x20 [ 208.836203][ T5400] ? mutex_unlock+0x8f/0x230 [ 208.840818][ T5400] __x64_sys_clone+0x198/0x210 [ 208.845594][ T5400] ? __kasan_check_write+0x14/0x20 [ 208.850737][ T5400] ? __ia32_sys_vfork+0x130/0x130 [ 208.855779][ T5400] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 208.861853][ T5400] x64_sys_call+0x41f/0x9a0 [ 208.866393][ T5400] do_syscall_64+0x4c/0xa0 [ 208.870810][ T5400] ? clear_bhb_loop+0x50/0xa0 [ 208.875499][ T5400] ? clear_bhb_loop+0x50/0xa0 [ 208.880191][ T5400] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.886111][ T5400] RIP: 0033:0x7feff7340799 [ 208.890539][ T5400] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 208.910167][ T5400] RSP: 002b:00007feff5d9afd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 208.918586][ T5400] RAX: ffffffffffffffda RBX: 00007feff75b9fa0 RCX: 00007feff7340799 [ 208.926562][ T5400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 208.934560][ T5400] RBP: 00007feff5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 208.942540][ T5400] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 208.950520][ T5400] R13: 00007feff75ba038 R14: 00007feff75b9fa0 R15: 00007ffdfe632668 [ 208.958608][ T5400] [ 208.976630][ T3818] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.983737][ T3818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.991279][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.000055][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.008549][ T3818] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.015625][ T3818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.023141][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.031266][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.140432][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.168654][ T5362] device veth0_vlan entered promiscuous mode [ 209.215453][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 209.259699][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.316290][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 209.353872][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.403952][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.411699][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.430242][ T5362] device veth1_macvtap entered promiscuous mode [ 209.440801][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.449261][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.458211][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.516546][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.538760][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.557316][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.565572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.697938][ T5425] device syzkaller0 entered promiscuous mode [ 211.336452][ T305] device bridge_slave_1 left promiscuous mode [ 211.342659][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.350471][ T305] device bridge_slave_0 left promiscuous mode [ 211.356611][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.364790][ T305] device veth1_macvtap left promiscuous mode [ 211.372940][ T305] device veth0_vlan left promiscuous mode [ 211.609929][ T5442] device syzkaller0 entered promiscuous mode [ 211.724142][ T5438] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.737829][ T5438] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.746247][ T5438] device bridge_slave_0 entered promiscuous mode [ 211.753406][ T5438] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.760511][ T5438] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.768022][ T5438] device bridge_slave_1 entered promiscuous mode [ 211.970101][ T5438] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.977195][ T5438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.984493][ T5438] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.991555][ T5438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.098573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.120037][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.165319][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.220088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.251727][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.268038][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.275108][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.306373][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.353302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.420353][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.427453][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.516299][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.551584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.567008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.575434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.610933][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.621147][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.635196][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.651328][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.665851][ T5438] device veth0_vlan entered promiscuous mode [ 212.701488][ T5469] device syzkaller0 entered promiscuous mode [ 212.726303][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.738889][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.765326][ T30] audit: type=1400 audit(1774270839.443:141): avc: denied { create } for pid=5473 comm="syz.4.1865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 212.819575][ T5438] device veth1_macvtap entered promiscuous mode [ 212.839878][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.850174][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.859622][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.914026][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.944264][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.952908][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.961531][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.004981][ T5482] device syzkaller0 entered promiscuous mode [ 214.457119][ T305] device bridge_slave_1 left promiscuous mode [ 214.463275][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.470977][ T305] device bridge_slave_0 left promiscuous mode [ 214.477160][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.485114][ T305] device veth1_macvtap left promiscuous mode [ 214.491176][ T305] device veth0_vlan left promiscuous mode [ 215.090305][ T5516] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.097488][ T5516] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.105115][ T5516] device bridge_slave_0 entered promiscuous mode [ 215.112688][ T5516] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.120216][ T5516] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.128043][ T5516] device bridge_slave_1 entered promiscuous mode [ 215.211240][ T5532] device syzkaller0 entered promiscuous mode [ 215.598494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.618225][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.654286][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.672890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.710516][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.717711][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.730876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.741436][ T5542] FAULT_INJECTION: forcing a failure. [ 215.741436][ T5542] name failslab, interval 1, probability 0, space 0, times 0 [ 215.772241][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.826483][ T5542] CPU: 0 PID: 5542 Comm: syz.4.1886 Tainted: G W syzkaller #0 [ 215.835290][ T5542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 215.845358][ T5542] Call Trace: [ 215.848641][ T5542] [ 215.851579][ T5542] __dump_stack+0x21/0x30 [ 215.855923][ T5542] dump_stack_lvl+0x110/0x170 [ 215.860621][ T5542] ? show_regs_print_info+0x20/0x20 [ 215.865845][ T5542] dump_stack+0x15/0x20 [ 215.870037][ T5542] should_fail+0x3c1/0x510 [ 215.874476][ T5542] __should_failslab+0xa4/0xe0 [ 215.879256][ T5542] should_failslab+0x9/0x20 [ 215.883782][ T5542] slab_pre_alloc_hook+0x3b/0xe0 [ 215.888745][ T5542] ? vm_area_dup+0x26/0x210 [ 215.893281][ T5542] kmem_cache_alloc+0x44/0x260 [ 215.898063][ T5542] vm_area_dup+0x26/0x210 [ 215.902414][ T5542] copy_mm+0x947/0x13c0 [ 215.906596][ T5542] ? copy_signal+0x600/0x600 [ 215.911225][ T5542] ? __init_rwsem+0xfc/0x1d0 [ 215.915831][ T5542] ? copy_signal+0x4cb/0x600 [ 215.920454][ T5542] copy_process+0x117c/0x3250 [ 215.925165][ T5542] ? __kasan_check_write+0x14/0x20 [ 215.930294][ T5542] ? __pidfd_prepare+0x150/0x150 [ 215.935246][ T5542] kernel_clone+0x233/0x960 [ 215.939759][ T5542] ? create_io_thread+0x170/0x170 [ 215.944798][ T5542] ? __kasan_check_write+0x14/0x20 [ 215.949934][ T5542] ? mutex_unlock+0x8f/0x230 [ 215.954556][ T5542] __x64_sys_clone+0x198/0x210 [ 215.959333][ T5542] ? __kasan_check_write+0x14/0x20 [ 215.964453][ T5542] ? __ia32_sys_vfork+0x130/0x130 [ 215.969492][ T5542] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 215.975562][ T5542] x64_sys_call+0x41f/0x9a0 [ 215.980079][ T5542] do_syscall_64+0x4c/0xa0 [ 215.984585][ T5542] ? clear_bhb_loop+0x50/0xa0 [ 215.989259][ T5542] ? clear_bhb_loop+0x50/0xa0 [ 215.993932][ T5542] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.999824][ T5542] RIP: 0033:0x7feff7340799 [ 216.004293][ T5542] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 216.024078][ T5542] RSP: 002b:00007feff5d9afd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 216.032493][ T5542] RAX: ffffffffffffffda RBX: 00007feff75b9fa0 RCX: 00007feff7340799 [ 216.040476][ T5542] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 216.048514][ T5542] RBP: 00007feff5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 216.056505][ T5542] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 216.064492][ T5542] R13: 00007feff75ba038 R14: 00007feff75b9fa0 R15: 00007ffdfe632668 [ 216.072482][ T5542] [ 216.097715][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.104782][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.125890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.169747][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.203250][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.211456][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.358903][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.374893][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.412965][ T5516] device veth0_vlan entered promiscuous mode [ 216.461650][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.472135][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.492385][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.529728][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.581359][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.609978][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.646659][ T5516] device veth1_macvtap entered promiscuous mode [ 216.697471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.726088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.775977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.882214][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.920850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.116717][ T30] audit: type=1400 audit(1774270843.793:142): avc: denied { ioctl } for pid=5578 comm="syz.0.1898" path="net:[4026532462]" dev="nsfs" ino=4026532462 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 218.456499][ T305] device bridge_slave_1 left promiscuous mode [ 218.462972][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.470525][ T305] device bridge_slave_0 left promiscuous mode [ 218.476690][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.484612][ T305] device veth1_macvtap left promiscuous mode [ 218.490680][ T305] device veth0_vlan left promiscuous mode [ 219.004551][ T5597] FAULT_INJECTION: forcing a failure. [ 219.004551][ T5597] name failslab, interval 1, probability 0, space 0, times 0 [ 219.119039][ T5597] CPU: 0 PID: 5597 Comm: syz.2.1903 Tainted: G W syzkaller #0 [ 219.127862][ T5597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 219.137977][ T5597] Call Trace: [ 219.141273][ T5597] [ 219.144282][ T5597] __dump_stack+0x21/0x30 [ 219.148637][ T5597] dump_stack_lvl+0x110/0x170 [ 219.153338][ T5597] ? show_regs_print_info+0x20/0x20 [ 219.158557][ T5597] ? __kasan_kmalloc+0xec/0x110 [ 219.163437][ T5597] ? kmem_cache_alloc_trace+0x119/0x270 [ 219.169002][ T5597] ? alloc_fdtable+0xcd/0x2e0 [ 219.173695][ T5597] ? dup_fd+0x886/0xaa0 [ 219.177867][ T5597] ? copy_process+0x10cc/0x3250 [ 219.182742][ T5597] ? kernel_clone+0x233/0x960 [ 219.187460][ T5597] ? __x64_sys_clone+0x198/0x210 [ 219.192418][ T5597] ? x64_sys_call+0x41f/0x9a0 [ 219.197119][ T5597] dump_stack+0x15/0x20 [ 219.201297][ T5597] should_fail+0x3c1/0x510 [ 219.205735][ T5597] __should_failslab+0xa4/0xe0 [ 219.210534][ T5597] should_failslab+0x9/0x20 [ 219.215049][ T5597] slab_pre_alloc_hook+0x3b/0xe0 [ 219.220002][ T5597] __kmalloc+0x6d/0x2c0 [ 219.224204][ T5597] ? kvmalloc_node+0x211/0x320 [ 219.228977][ T5597] kvmalloc_node+0x211/0x320 [ 219.233591][ T5597] ? vm_mmap+0xb0/0xb0 [ 219.237675][ T5597] ? kmem_cache_alloc_trace+0x119/0x270 [ 219.243251][ T5597] ? alloc_fdtable+0xcd/0x2e0 [ 219.247952][ T5597] alloc_fdtable+0x10b/0x2e0 [ 219.252563][ T5597] ? _find_last_bit+0x7c/0x120 [ 219.257351][ T5597] dup_fd+0x886/0xaa0 [ 219.261354][ T5597] ? put_ctx+0xa2/0x1a0 [ 219.265622][ T5597] copy_files+0x76/0xe0 [ 219.269821][ T5597] copy_process+0x10cc/0x3250 [ 219.274533][ T5597] ? kstrtol_from_user+0x2a0/0x2a0 [ 219.279672][ T5597] ? __kasan_check_write+0x14/0x20 [ 219.284807][ T5597] ? __pidfd_prepare+0x150/0x150 [ 219.289778][ T5597] kernel_clone+0x233/0x960 [ 219.294303][ T5597] ? create_io_thread+0x170/0x170 [ 219.299348][ T5597] ? __kasan_check_write+0x14/0x20 [ 219.304479][ T5597] ? mutex_unlock+0x8f/0x230 [ 219.309097][ T5597] __x64_sys_clone+0x198/0x210 [ 219.313890][ T5597] ? __kasan_check_write+0x14/0x20 [ 219.319048][ T5597] ? __ia32_sys_vfork+0x130/0x130 [ 219.324192][ T5597] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 219.330283][ T5597] x64_sys_call+0x41f/0x9a0 [ 219.334815][ T5597] do_syscall_64+0x4c/0xa0 [ 219.339278][ T5597] ? clear_bhb_loop+0x50/0xa0 [ 219.343976][ T5597] ? clear_bhb_loop+0x50/0xa0 [ 219.348668][ T5597] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.354601][ T5597] RIP: 0033:0x7f2168616799 [ 219.359116][ T5597] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 219.378748][ T5597] RSP: 002b:00007f2167070fd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 219.387188][ T5597] RAX: ffffffffffffffda RBX: 00007f216888ffa0 RCX: 00007f2168616799 [ 219.395175][ T5597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c0126080 [ 219.403182][ T5597] RBP: 00007f2167071090 R08: 0000000000000000 R09: 0000000000000000 [ 219.411163][ T5597] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 219.419160][ T5597] R13: 00007f2168890038 R14: 00007f216888ffa0 R15: 00007fff7d35efb8 [ 219.427155][ T5597] [ 219.670545][ T5601] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.712088][ T5601] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.785225][ T5601] device bridge_slave_0 entered promiscuous mode [ 219.806080][ T5601] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.821046][ T5601] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.836330][ T5601] device bridge_slave_1 entered promiscuous mode [ 219.952691][ T5612] device veth0_vlan left promiscuous mode [ 219.972296][ T5612] device veth0_vlan entered promiscuous mode [ 220.321861][ T5601] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.328985][ T5601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.336308][ T5601] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.343359][ T5601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.510509][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.586063][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.635647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.723119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.782318][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.862757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.945171][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.952276][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.092461][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.156119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.189819][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.196910][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.229326][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.246202][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.261908][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.270124][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.282196][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.290876][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.317738][ T5659] device syzkaller0 entered promiscuous mode [ 221.324529][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.332770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.348905][ T5601] device veth0_vlan entered promiscuous mode [ 221.365341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.373005][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.432135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.440377][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.450112][ T5601] device veth1_macvtap entered promiscuous mode [ 221.460113][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.468061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.476788][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.486989][ T5668] device veth1_to_team entered promiscuous mode [ 221.504456][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.528038][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.567445][ T5670] device syzkaller0 entered promiscuous mode [ 222.578172][ T305] device bridge_slave_1 left promiscuous mode [ 222.584288][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.591752][ T305] device bridge_slave_0 left promiscuous mode [ 222.597975][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.606033][ T305] device veth1_macvtap left promiscuous mode [ 222.612049][ T305] device veth0_vlan left promiscuous mode [ 223.420045][ T5686] device syzkaller0 entered promiscuous mode [ 223.641501][ T5694] nr0: port 1(macsec0) entered blocking state [ 223.676006][ T5694] nr0: port 1(macsec0) entered disabled state [ 223.720648][ T5694] device macsec0 entered promiscuous mode [ 223.784875][ T5701] device syzkaller0 entered promiscuous mode [ 223.897949][ T5705] device syzkaller0 entered promiscuous mode [ 223.921463][ T5697] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.931793][ T5697] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.939547][ T5697] device bridge_slave_0 entered promiscuous mode [ 223.946911][ T5697] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.954022][ T5697] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.961859][ T5697] device bridge_slave_1 entered promiscuous mode [ 224.442344][ T5697] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.449445][ T5697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.456753][ T5697] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.463786][ T5697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.833319][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.869296][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.963770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.972426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.088262][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.129131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.194035][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.201130][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.403029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.495236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.574747][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.581887][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.690639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.711015][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.735351][ T5733] device syzkaller0 entered promiscuous mode [ 225.773622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.800225][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.809536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 225.818169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 225.827595][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 225.846186][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.856243][ T5697] device veth0_vlan entered promiscuous mode [ 225.886357][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.920219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.952259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 225.976270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.988795][ T5697] device veth1_macvtap entered promiscuous mode [ 226.037492][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.046014][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.054817][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.092328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.456615][ T305] device bridge_slave_1 left promiscuous mode [ 227.462748][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.470363][ T305] device bridge_slave_0 left promiscuous mode [ 227.476485][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.484376][ T305] device veth1_macvtap left promiscuous mode [ 227.490470][ T305] device veth0_vlan left promiscuous mode [ 228.589831][ T5770] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.650301][ T5770] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.715389][ T5770] device bridge_slave_0 entered promiscuous mode [ 228.825223][ T5770] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.838957][ T5770] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.854326][ T5770] device bridge_slave_1 entered promiscuous mode [ 228.965859][ T5789] device syzkaller0 entered promiscuous mode [ 229.006983][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.014637][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.028013][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.046883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.056171][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.063244][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.070861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.079570][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.088073][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.095143][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.120457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.129088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.139663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.147900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.156326][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.172203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.185090][ T5770] device veth0_vlan entered promiscuous mode [ 229.192333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.205664][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.215918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.232201][ T5770] device veth1_macvtap entered promiscuous mode [ 229.255361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.274804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.285514][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.319092][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.341747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.216686][ T305] device bridge_slave_1 left promiscuous mode [ 231.222807][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.230351][ T305] device bridge_slave_0 left promiscuous mode [ 231.236665][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.244700][ T305] device veth1_macvtap left promiscuous mode [ 231.250781][ T305] device veth0_vlan left promiscuous mode [ 232.243678][ T5815] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.288615][ T5815] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.331752][ T5815] device bridge_slave_0 entered promiscuous mode [ 232.376647][ T5815] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.383807][ T5815] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.391413][ T5815] device bridge_slave_1 entered promiscuous mode [ 232.414725][ T5828] device syzkaller0 entered promiscuous mode [ 232.574432][ T5815] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.581530][ T5815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.588962][ T5815] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.596004][ T5815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.636383][ T3818] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.643961][ T3818] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.653386][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.662200][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.688425][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.703602][ T3818] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.710695][ T3818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.720202][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.728553][ T3818] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.735616][ T3818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.755122][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.763297][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.814039][ T5815] device veth0_vlan entered promiscuous mode [ 232.827701][ T5815] device veth1_macvtap entered promiscuous mode [ 232.834791][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.843291][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.851379][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.859073][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.867181][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.897003][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.909328][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.656809][ T305] device bridge_slave_1 left promiscuous mode [ 233.662956][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.670763][ T305] device bridge_slave_0 left promiscuous mode [ 233.676999][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.685061][ T305] device veth1_macvtap left promiscuous mode [ 233.691131][ T305] device veth0_vlan left promiscuous mode [ 235.087105][ T5858] FAULT_INJECTION: forcing a failure. [ 235.087105][ T5858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 235.135880][ T5858] CPU: 0 PID: 5858 Comm: syz.1.1987 Tainted: G W syzkaller #0 [ 235.144943][ T5858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 235.155031][ T5858] Call Trace: [ 235.158321][ T5858] [ 235.161264][ T5858] __dump_stack+0x21/0x30 [ 235.165724][ T5858] dump_stack_lvl+0x110/0x170 [ 235.170450][ T5858] ? show_regs_print_info+0x20/0x20 [ 235.175668][ T5858] ? vfs_write+0xc72/0xfd0 [ 235.180111][ T5858] dump_stack+0x15/0x20 [ 235.184278][ T5858] should_fail+0x3c1/0x510 [ 235.188825][ T5858] should_fail_usercopy+0x1a/0x20 [ 235.193869][ T5858] _copy_from_user+0x20/0xd0 [ 235.198486][ T5858] __sys_bpf+0x258/0x7d0 [ 235.202744][ T5858] ? bpf_link_show_fdinfo+0x330/0x330 [ 235.208138][ T5858] ? debug_smp_processor_id+0x17/0x20 [ 235.213523][ T5858] __x64_sys_bpf+0x7c/0x90 [ 235.217954][ T5858] x64_sys_call+0x4b9/0x9a0 [ 235.222484][ T5858] do_syscall_64+0x4c/0xa0 [ 235.226938][ T5858] ? clear_bhb_loop+0x50/0xa0 [ 235.231640][ T5858] ? clear_bhb_loop+0x50/0xa0 [ 235.236338][ T5858] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 235.242292][ T5858] RIP: 0033:0x7fbf8bdbf799 [ 235.246822][ T5858] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.266547][ T5858] RSP: 002b:00007fbf8a81a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 235.275076][ T5858] RAX: ffffffffffffffda RBX: 00007fbf8c038fa0 RCX: 00007fbf8bdbf799 [ 235.283146][ T5858] RDX: 0000000000000050 RSI: 0000200000001b40 RDI: 000000000000000a [ 235.291133][ T5858] RBP: 00007fbf8a81a090 R08: 0000000000000000 R09: 0000000000000000 [ 235.299113][ T5858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.307099][ T5858] R13: 00007fbf8c039038 R14: 00007fbf8c038fa0 R15: 00007ffc4cd3dc58 [ 235.315242][ T5858] [ 235.804115][ T5870] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.862238][ T5870] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.930076][ T5870] device bridge_slave_0 entered promiscuous mode [ 235.937202][ T5870] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.945623][ T5870] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.953243][ T5870] device bridge_slave_1 entered promiscuous mode [ 236.161046][ T5870] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.168314][ T5870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.175594][ T5870] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.182649][ T5870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.259614][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.277334][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.285928][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.293431][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.316040][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.324360][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.355985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.370904][ T5870] device veth0_vlan entered promiscuous mode [ 236.387756][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.464052][ T5902] device sit0 left promiscuous mode [ 236.535382][ T5870] device veth1_macvtap entered promiscuous mode [ 236.557945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.579256][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.587056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.616255][ T5902] device sit0 entered promiscuous mode [ 236.938539][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.976470][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.081355][ T5912] device syzkaller0 entered promiscuous mode [ 237.090035][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.102514][ T3818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=1528 state=3 status=67 (errno 9: Bad file descriptor) [ 237.406106][ T30] audit: type=1400 audit(1774270864.093:143): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14058]" dev="pipefs" ino=14058 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 238.074406][ T281] syz-executor (281) used greatest stack depth: 20768 bytes left [ 239.056700][ T45] device bridge_slave_1 left promiscuous mode [ 239.062831][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.070403][ T45] device bridge_slave_0 left promiscuous mode [ 239.076583][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.084464][ T45] device veth1_macvtap left promiscuous mode [ 239.090526][ T45] device veth0_vlan left promiscuous mode [ 240.576535][ T45] device bridge_slave_1 left promiscuous mode [ 240.582696][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.590180][ T45] device bridge_slave_0 left promiscuous mode [ 240.596491][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.604387][ T45] device macsec0 left promiscuous mode [ 240.610044][ T45] nr0: port 1(macsec0) entered disabled state [ 240.617113][ T45] device bridge_slave_1 left promiscuous mode [ 240.623223][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.630579][ T45] device bridge_slave_0 left promiscuous mode [ 240.636743][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.644517][ T45] device bridge_slave_1 left promiscuous mode [ 240.650695][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.658430][ T45] device bridge_slave_0 left promiscuous mode [ 240.664525][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.672852][ T45] device bridge_slave_1 left promiscuous mode [ 240.679105][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.686657][ T45] device bridge_slave_0 left promiscuous mode [ 240.692757][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.701358][ T45] device veth1_macvtap left promiscuous mode [ 240.707392][ T45] device veth0_vlan left promiscuous mode [ 240.713500][ T45] device veth1_macvtap left promiscuous mode [ 240.719545][ T45] device veth0_vlan left promiscuous mode [ 240.725626][ T45] device veth0_vlan left promiscuous mode [ 240.731779][ T45] device veth1_macvtap left promiscuous mode [ 240.737901][ T45] device veth0_vlan left promiscuous mode [ 241.800005][ T30] audit: type=1400 audit(1774270868.483:144): avc: denied { read } for pid=5925 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 192) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 241.955182][ T30] audit: type=1400 audit(1774270868.633:145): avc: denied { search } for pid=5937 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: OK [ 242.047450][ T30] audit: type=1400 audit(1774270868.723:146): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 242.075032][ T30] audit: type=1400 audit(1774270868.723:147): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 242.098177][ T30] audit: type=1400 audit(1774270868.723:148): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping iptables: [ 242.124209][ T30] audit: type=1400 audit(1774270868.793:149): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 242.146041][ T30] audit: type=1400 audit(1774270868.813:150): avc: denied { search } for pid=5951 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 242.168050][ T30] audit: type=1400 audit(1774270868.813:151): avc: denied { write } for pid=5951 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 242.189922][ T30] audit: type=1400 audit(1774270868.813:152): avc: denied { add_name } for pid=5951 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping system message bus: done Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: devtmpfs busy - remounted read-only [ 243.615384][ T5971] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. The system is going down NOW! Sent SIGKILL to all processes Requesting system poweroff [ 245.648730][ T5972] kvm: exiting hardware virtualization [ 245.655586][ T5972] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 245.662551][ T5972] ACPI: PM: Preparing to enter system sleep state S5 [ 245.669547][ T5972] reboot: Power down serialport: VM disconnected.