last executing test programs: 28.460290758s ago: executing program 3 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/user\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='svc_stats_latency\x00', r0}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r4], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 23.19145718s ago: executing program 3 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/user\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='svc_stats_latency\x00', r0}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r4], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 20.344092048s ago: executing program 3 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/user\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='svc_stats_latency\x00', r0}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r4], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 15.024778475s ago: executing program 3 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/user\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='svc_stats_latency\x00', r0}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r4], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 10.910246625s ago: executing program 3 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599911df77098a8cd51e5ee070239f048bff4c9d6d337c8759d1737b62deae7412f1b5c334ef76307b8139d8f019360bea59a74b86ce453bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e80171753107cee23ecb376879ae14b9e1ab987023c7db41925c55b0a4141ae3c08d264831d0f6365469c3562185000000000000004f78cd03163b2d00101e000000000000000000000000000000001a18f6de00bb8c95f8bdc2a5effe88e5bc3a969a35af8033d11474cfa5d73d92c9bd2b72c3ce63d47075ae7c59d82cea124301000000000000000cb56281877934e99919c82bfdffaedc4df6f74e8f286454fcd2967415b826a6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268ee7fee0486fa294b41c1d4dc44a9801c34ada4ed759f4312dd000000000000000000000000f4ad23f3df7cdc65edcb81f103ef861a5d12eb4e1f33f6b43b6661b680850fc55aa8465b0500000000000000a17b60f43b4b2a2afc8730a587525ba1fd296b7aa4cc8936da97ff62885b8586b67e3e9b5b8d4f18df39f65ef75a42bb84587a838b828024ece8f64d74a1502d74f7e42d103e469920ae8c58f7418e67918676abfe37c9a619c27ff1a82d78431843ae38f5ba8207978a16ec9c1fc0dc752684576c8830e8e4e480b4b1649717078100000000000000001900000000ecdc068efc4f590529f07f581874420767f696a260fde832f3bbd50b84d2f0e03d75459da25aee1d3e99d41da9938eb84dfb58dbca8d9d4f1a23e6ce8b6e7e95034e6c1c"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/user\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='svc_stats_latency\x00', r0}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r4], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 8.950780983s ago: executing program 0 (id=1136): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000040), 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0\x00', @random="7a444618ba25"}) sendmsg$tipc(r3, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/119, 0x77}], 0x1, &(0x7f00000011c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r2, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xad1f}, 0x481}, 0x0, 0xffefffdfffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r0], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000004c0), &(0x7f0000000640)=""/162}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f00000000c0), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) mkdir(&(0x7f0000001a40)='./file0\x00', 0xc5) 6.839859912s ago: executing program 2 (id=1157): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffff001}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x80000001, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c764360000000100", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x702, 0xe, 0x0, &(0x7f0000000380)="e460334470b8d480eb00c1520800", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 4.137775288s ago: executing program 2 (id=1158): r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(())') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r0, @ANYRES32, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRES8=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRESHEX=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r2}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xfffffff8, 0x0, r1, 0xea5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x50) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.017042558s ago: executing program 4 (id=1161): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x5, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, [@map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000}, @jmp={0x5, 0x1, 0x7, 0x5, 0x7, 0x20, 0xfffffffffffffffc}]}, &(0x7f0000000280)='syzkaller\x00', 0x8c1c, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xd, 0x6, 0xa}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0xa, &(0x7f00000006c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000700)=[{0x5, 0x3, 0x7, 0x6}, {0x3, 0x4, 0x1, 0x9}, {0x0, 0x2, 0x5, 0x5}, {0x0, 0x5, 0xe, 0x9}, {0x1, 0x4, 0x0, 0x7}, {0x1, 0x3, 0x4, 0x1}, {0x1, 0x5, 0xa, 0x1}, {0x1, 0x2, 0xa, 0xb}, {0x2, 0x4}, {0x4, 0x3, 0x7, 0x8}], 0x10, 0xffffffff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYRESDEC=r3, @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058e41d650ea75b68156f22998001c02478c92a3d6cb2226c248a7c309ca7457ab7c8245bf5d76cf56ebd6ac49ffdf478439e1efee9bffb30b3d0ac0e1a7ee8bebf67ae5230b017c5f4f8c7a7f8069b4edde601f5a3927d0076d0d9892af2adbd8d915ea32c1939d384b5dd47052b49d7b9b89e05252ef65c7a2609eb51e109b67b90c3645f2f16098933fbb718480ffb5c926a777142fc4795"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r9, 0x10e, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r4}, 0x10) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x100, 0x0) ioctl$TUNSETSTEERINGEBPF(r10, 0x800454e0, &(0x7f00000009c0)=r5) r11 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) close(r11) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r11, 0xffffffffffffffff, 0x0, r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0xd325d418a748763b, 0x29, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd1}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @map_fd={0x18, 0xb}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='syzkaller\x00', 0x1ff, 0x56, &(0x7f0000000540)=""/86, 0x41000, 0x10, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000001540)={0x0, 0x0, 0x18, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000001580)=[r11], &(0x7f00000015c0)=[{0x5, 0x1, 0x10, 0xa}, {0x5, 0x6, 0x1, 0xc}, {0x0, 0x4, 0xe, 0xc}, {0x2, 0x2, 0xa, 0x7}, {0x1, 0x1, 0x1, 0x4}, {0x3, 0x4, 0x5, 0x9}, {0x1, 0x2, 0xa, 0x3}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x1a, 0x7, &(0x7f0000000a00)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @exit, @generic={0x3, 0x2, 0x1, 0x4, 0x5}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40}, @generic={0x0, 0x9, 0x7, 0x2}], &(0x7f0000001c80)='GPL\x00', 0x6, 0x5b, &(0x7f0000001cc0)=""/91, 0x40f00, 0x4b, '\x00', 0x0, @fallback=0xaf3746ce7cb2ac7f, 0xffffffffffffffff, 0x8, &(0x7f0000001d80)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001dc0)={0x1, 0x7, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xae2}, 0x94) 4.00141423s ago: executing program 2 (id=1162): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x513b1fb7caeba709, 0xc8, 0x2, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x8d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1a9) (async) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1a9) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000e8c91cefb74ae500000000000000000000000000000000000000987276da7647fa859511372080b5fc7f0e34e16bed2e2de84807fe4183a23f5d5f5796f981aa09337c172d9cfd1953fb12211bc3b57dfb1a12c0406e459a30feb4a9d761d2bc8e0d81c1204c0bbbc737de1aea5b52830956380b73d575ccd630834d18e0a208a896ae8dc834a06acee226a929ecc0fe518b3946d4611fccbe81ff8092be0dab62bbf66ef963076fd59b4be77f16a9fac0abbda4e59e81a72809fa3030f0281f70331f01e9bc68e6e4a743918b34de95ff4006a11ee1a3"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000200e4ff7a8af8ff00717c00000000000000000007020000f86fffffb70300dd07000000b704000000000000850000000300"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5}, &(0x7f00000002c0), &(0x7f0000000340)=r3}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5}, &(0x7f00000002c0), &(0x7f0000000340)=r3}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) gettid() (async) r7 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x10, 0x0, 0xfc, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x10, 0x0, 0xfc, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x3, 0x87, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r7, 0x0) (async) syz_open_procfs$namespace(r7, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x5, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61129200000000006113500000000000bf2000000018b30000000000000000003d030100000000009500f000000000006926000000000000bf67000000000000560602000fff07007706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3100000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3100000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000640)={r8, &(0x7f0000000540)}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000640)={r8, &(0x7f0000000540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 3.577600654s ago: executing program 3 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/user\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000380)='svc_stats_latency\x00', r0}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r4], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 1.528831667s ago: executing program 0 (id=1166): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x4, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000001000), 0x0}, 0x20) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 1.526836798s ago: executing program 2 (id=1168): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x12, &(0x7f0000000040)=r1, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000010000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000001000000575e00000000000000000000000000000000001a00"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000700000018110000", @ANYRES32=r5], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x18) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 32) perf_event_open(&(0x7f0000000640)={0x6, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x28018, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 1.523098848s ago: executing program 4 (id=1169): bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xc0020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x4, 0x2, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x18) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 64) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x4008744b, 0x0) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x42}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x28, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) (async) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.485965941s ago: executing program 2 (id=1170): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 100) 1.480988081s ago: executing program 0 (id=1171): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x9, 0x7, 0x6, 0x6, 0x0, 0xcd, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x40, 0x100}, 0x208164, 0x6, 0x0, 0x9, 0xf5, 0x23b5, 0x8001, 0x0, 0x81, 0x0, 0x7f}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) close(r0) (async) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200040, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200040, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000000c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) (async) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/88, 0x58}, {&(0x7f0000000240)=""/54, 0x36}], 0x2}, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000300)={'veth0_virt_wifi\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x25, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', r5, r7, 0x5, 0x2}, 0x50) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', r5, r7, 0x5, 0x2}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000700)='\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x2, &(0x7f0000000780)=@raw=[@jmp={0x5, 0x1, 0x7, 0x2, 0x1, 0x1, 0x1}, @alu={0x0, 0x1, 0xd, 0x8, 0x9, 0x1, 0x1}], &(0x7f00000007c0)='syzkaller\x00', 0xf8, 0xf1, &(0x7f0000000800)=""/241, 0x0, 0x8, '\x00', 0x0, @fallback=0x2d, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x3, 0xb, 0x5, 0x208314ac}, 0x10, r6, 0xffffffffffffffff, 0x5, &(0x7f0000000940)=[r8, r8, r8, r2], &(0x7f0000000980)=[{0x8000, 0x5, 0xe, 0x8}, {0x4, 0x4, 0x1, 0xa}, {0x0, 0x3, 0x1, 0x2}, {0x2, 0x3, 0xa, 0x2}, {0x4, 0x2, 0x0, 0x5}], 0x10, 0x2}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x2, &(0x7f0000000780)=@raw=[@jmp={0x5, 0x1, 0x7, 0x2, 0x1, 0x1, 0x1}, @alu={0x0, 0x1, 0xd, 0x8, 0x9, 0x1, 0x1}], &(0x7f00000007c0)='syzkaller\x00', 0xf8, 0xf1, &(0x7f0000000800)=""/241, 0x0, 0x8, '\x00', 0x0, @fallback=0x2d, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x3, 0xb, 0x5, 0x208314ac}, 0x10, r6, 0xffffffffffffffff, 0x5, &(0x7f0000000940)=[r8, r8, r8, r2], &(0x7f0000000980)=[{0x8000, 0x5, 0xe, 0x8}, {0x4, 0x4, 0x1, 0xa}, {0x0, 0x3, 0x1, 0x2}, {0x2, 0x3, 0xa, 0x2}, {0x4, 0x2, 0x0, 0x5}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000bc0)={@map=r8, 0x20, 0x1, 0x7fff, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000b00)=[0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000bc0)={@map=r8, 0x20, 0x1, 0x7fff, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000b00)=[0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000c00)={@fallback=r4, r1, 0x38, 0x20, r9, @void, @void, @void, @value, r11}, 0x20) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000c40), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000c80)={r12, r9, 0x0, r9}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d40)={r10, 0x58, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffffff01, '\x00', r13, 0xffffffffffffffff, 0x1, 0x4}, 0x50) gettid() (async) r15 = gettid() r16 = perf_event_open$cgroup(&(0x7f0000000e80)={0x3, 0x80, 0x8, 0x1, 0x5, 0x1, 0x0, 0x5, 0x20004, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0x79b, 0xff1}, 0x10050, 0x8000000000000001, 0x8a, 0x0, 0x2, 0x1, 0x4, 0x0, 0x1, 0x0, 0x4}, r2, 0xc, r0, 0x8) perf_event_open(&(0x7f0000000e00)={0x5, 0x80, 0xff, 0x10, 0x1, 0x1, 0x0, 0x4, 0x1400c, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7fff}, 0xc0, 0xb, 0x3, 0x4, 0x7, 0x4, 0x0, 0x0, 0x3, 0x0, 0x9}, r15, 0x5, r16, 0x9) (async) perf_event_open(&(0x7f0000000e00)={0x5, 0x80, 0xff, 0x10, 0x1, 0x1, 0x0, 0x4, 0x1400c, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7fff}, 0xc0, 0xb, 0x3, 0x4, 0x7, 0x4, 0x0, 0x0, 0x3, 0x0, 0x9}, r15, 0x5, r16, 0x9) ioctl$PERF_EVENT_IOC_DISABLE(r16, 0x2401, 0x1) sendmsg$inet(r12, &(0x7f0000001480)={&(0x7f0000000f00)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000f40)="a756edc832080f89257ededab7b5627107774f91a10d9eb5f2e7c408727eda1b477b0f98c1f6e150dd5f4711573177b969bfd028669fe3a1f74bc4fb528c56544ce634d4ff29929530b3044932feab9aef71efbad45ab6d0144eecf73f7d6e502e948b7d982937430293f40fb6834912094fa568852c8e163fa48ac061c3a422946ad3c8e83bfd754aafc877526cf69822849982a60299345a32db54370841102fd6404c1ec0e558f84aa1b5810d4eab1a4eb386cd05807a5584652114a6522f8b2c3f329d4577028d48d70f7e63f161bc45533c50b017817715a6becc4d9949ce40f63205b227cf8d379ffa", 0xec}, {&(0x7f0000001040)="4f3fa74dcfe81eddb395ac007f54ef7af3f31afabd7938de9285815857b9378889abc162f1bbc433cffbdfbca66c48983b6066e9e3543faa97bd31338231fd8c93425766d8113cb2d813c5d9655032c1b013d8240e731eeaec101d14a5e9bf8439aeb377280c45b5b0533f48bd51910b78c198a65087861f8feaef4fc34ffd091447ea3542aed18956b66a2eb48d89a53b72d1e9e09f3c6ffdebd851b2a1cf98739bb395de1d3aba71809d3b4af28569fd2e0828b2f970aaa1380c40463f34fd2c50a3c72c4a5e4bce393dee3ee4402af7c60868c30447d2dea89857d03fff8016acf54cdff8cbab39ff", 0xea}, {&(0x7f0000001140)="2b709bfacbd064b9c796d0ab48c3b056cee028cc6259bef9d527086ee2508bd9e661ebb30073aa0bca193952b887a3153e03b56fba3f3ec841647d36b46fc18698cf61af6734c80f4b07a79f68258b6b668c010440261a45e765f32450378b0cd1548cbc08caca3a33ef6183924b50870af45d1d288d73602983f6339f1aee5f1331ac2b8f9c7baa311ccfda2e311aff73b40213ef102a485d263b1177aff8c1422a19518f5683f7398f2266", 0xac}, {&(0x7f0000001200)="86e505420ffb43f9508082dd6749b0d4a43ef723e45ad0889508b0cfeb2584e76e489d1f586e1dc2fd0cb040beef24037fc3ae852cc0db205f5581a14e612d4da4c12d5333466b70edf0925e11823358b993e322158180bd341af640f5e9c84d48192108bd7e64530bbc61cb2bde2318e85e0ff057a2a2a6ddb9ba", 0x7b}], 0x4, &(0x7f00000012c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0xb}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5d4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @broadcast}}}, @ip_retopts={{0xb8, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0xd3, 0x0, 0x1, [0x8001, 0x0, 0x5]}, @end, @end, @lsrr={0x83, 0x1f, 0x47, [@private=0xa010101, @broadcast, @private=0xa010102, @broadcast, @empty, @loopback, @remote]}, @cipso={0x86, 0x76, 0x3, [{0x6, 0xe, "29bfcfbe5ca8f52f9534eb68"}, {0x7, 0x11, "b555e720526c6e6a6fee845e55be64"}, {0x7, 0x8, "dabd60222a6d"}, {0x2, 0xf, "156d4a832c402aae3fe8537dcd"}, {0x6, 0x9, "dfd857b890e2db"}, {0x2, 0x12, "102a60904aead4e6fa882c57bec9165f"}, {0x7, 0x6, "123fce82"}, {0x5, 0xf, "371e69571d5b3c40fa69cef03b"}, {0x0, 0x3, 'M'}, {0x1, 0x7, "bfe3293c27"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x99a}}], 0x198}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000001780), 0x10000, 0x0) (async) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000001780), 0x10000, 0x0) r18 = getpid() sendmsg$unix(r3, &(0x7f0000001880)={&(0x7f00000014c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001740)=[{&(0x7f0000001540)="a19076eb8c51153fcaeb767f0a78f74c238cb501d93e170453f045563e1349113189941edae47a2c0d30ceb6027e4b8bc626732f6284956ffa807c176dc016c5dee35b807cf0649d0e0973bd69f010eebf6f127c29b1a9988f53446db6ed026805f11b5dcb70be3eb7d9a7012b7e971e51239aed585f53468e553416c8e070766409ff80cc9208c7dafabe7924f1ac10b18e52ac678b3ec08c457a935bddedda8d5489a424fdbc25f2283b9e2d05a287fc1c1bc92472dd54eae78c4b8318a145723f7f5868921df5ac7080e782ccda522860f31df360e8aedc2e2ebe51ccb8430261416431997bbcecf4fa4dc3c328376edccfe1", 0xf4}, {&(0x7f0000001640)="01359bd8f5af4e7f837159398571b060213979288b6499dc6d909b0253f945b821be566ab66995a91540defdcec13cc636b862d49d0f3eea185668e2b416e919fb89fd62df48bf2318ef1cc0258872278d9e8d4b218df1a867fd012e48188405e053077b1c5305ab68dbb1fe4aeb8e9d73527a2bcbb5c2de65e2dfe49ae4d32db781610ad1c0fa3cf3c74752302244c788721db900cf7096c55e845b6bee3602f74c384f7cdee6227fa88387e78625eb60ebfa88b392b0f3cecba2c2d327503de7d431118e1cfa", 0xc7}], 0x2, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r14, r16, r10, r17, r0]}}, @rights={{0x20, 0x1, 0x1, [r3, r3, r14, r10]}}, @rights={{0x1c, 0x1, 0x1, [r8, r16, r16]}}, @cred={{0x1c, 0x1, 0x2, {r18, 0xee00, 0xee01}}}], 0xa8, 0x1}, 0x44004045) ioctl$TUNGETVNETLE(r17, 0x800454dd, &(0x7f00000018c0)) (async) ioctl$TUNGETVNETLE(r17, 0x800454dd, &(0x7f00000018c0)) 1.425485216s ago: executing program 4 (id=1172): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x7, &(0x7f0000000080)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x93}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', r1, 0x0}, 0x50) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000040)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000200)='syzkaller\x00', 0x200, 0x1000, &(0x7f0000001640)=""/4096, 0x40f00, 0x70, '\x00', r1, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1, 0x4, 0x9, 0x5}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000002c0)=[r0, r0], &(0x7f0000000300)=[{0x4, 0x5, 0xd, 0xb}, {0x2, 0x3, 0x7, 0x3}, {0x1, 0x1, 0xb, 0x1}, {0x3, 0x1, 0x0, 0xa}, {0x4, 0x4, 0x1, 0x1}, {0x2, 0x5, 0xa, 0xa}, {0x1, 0x5, 0x8, 0x1}, {0x5, 0x1, 0xc, 0xc}], 0x10, 0x10}, 0x94) 1.421083956s ago: executing program 1 (id=1173): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) close(r4) 1.420022476s ago: executing program 4 (id=1174): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000200000000899b0a5cb27bc0dea74376badabebee2b61de0", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000075266f83000000000000000004000000ffffffffc3000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x17, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 1.113180771s ago: executing program 1 (id=1175): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r3) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x1ff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000340)='syzkaller\x00', 0x40, 0x84, &(0x7f00000007c0)=""/132, 0x41100, 0x12, '\x00', 0x0, @flow_dissector, r3, 0x8, &(0x7f00000005c0)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, &(0x7f0000000640), &(0x7f0000000880)=[{0x0, 0x1, 0x7, 0xa}, {0x0, 0x4, 0xc, 0xa}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x5, 0xd, 0x4}], 0x10, 0xb638}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x35}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2) write$cgroup_subtree(r10, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={&(0x7f0000000000)="9070d0b29a2fb8219cf1ebcc8cef4de2d4d06b5a1c31aa34b203c101dd1c125d54097202fddb65d3f9ca10f6", &(0x7f0000000040)=""/33, &(0x7f0000000080)="17ea26f239c19cf960532b72e2f3f47a05fcd009ab48630b4f33448a5676affd70d9dd5ec4540c028a15c123400d84fc161e3843afc2921f6badcc0e95976298e2380806ac3cc922322718b80bc566681cce19fd51678e2ed394cafad6483c5b3b1f4ba23329c6a202c205ec32cd743bffae0e6316194070c0f46921206d28c92b774a57945ba29a0b4cdcb709db1cdfa0bae6170520cf0a810d0e24c6e4e7d29b0c8fae9ce89bf136adefbda8674e5910bd0dfe4f01efb712287200f5c1fb63669edd114dd910cc216bfd32580568737aa29db87079d0cf315eda995ac3bad1e6fe2c32cb838df3ef7131164542e709be", &(0x7f0000000180)="54f1730cf2ba6381963d6e", 0xffffffff, r0, 0x4}, 0x38) 1.096868032s ago: executing program 1 (id=1176): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x400, 0x0}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x8, 0x0, 0xffffff55, 0x10, 0x0, 0x0, r1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000600)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac14141683089f034d2f87e589106aab845013f2325f1a39019402038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x15b, &(0x7f0000000000), &(0x7f0000000700)="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"}, 0x50) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x9800}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0xdf, 0x80, 0x2, 0x0, 0x5, 0x80000, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x20, 0x40, 0x8000, 0x6, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x0, 0x584}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x14, 0x0, 0x4000}, 0x10) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x103) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xdf) 1.025465488s ago: executing program 2 (id=1177): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000dd000000000000000000"], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0xf9, 0x6, 0x9, 0x0, 0x6, 0x0, 0x3d2659f3cb77dcf9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffeb1}, 0x1, 0x3, 0x7, 0x8, 0xffffffffffffffff, 0xfffffffd, 0x8001, 0x0, 0xd, 0x0, 0x8}, r0, 0x5, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r1, 0x0, 0xf00000000000000}, 0x38) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080002000000007b8af8ff00000000bfa200210000000007020000f8fffaffb703000008000000b7040000000000008e2fa71c820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x514, 0x266}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.024295388s ago: executing program 1 (id=1178): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x94, 0x0, 0x2, 0x11}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000008140)={&(0x7f0000008000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000005000000010000000000000e420015a44adb2537c5dde6b5ae440000000000000100002e00"], 0x0, 0x39}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x180, 0x7, 0x28}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000010000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x4}, 0x50) socketpair(0x29, 0x5, 0x80000000, &(0x7f0000000380)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000002090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x57, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010900000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r11, 0x7148, 0x8}, 0xc) r13 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r13, &(0x7f0000000540)='tasks\x00', 0x2, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1e00000009000000090000000900000000000000", @ANYRES32=r9, @ANYBLOB="08001000000000000000", @ANYRES32=r12, @ANYRES32, @ANYBLOB="02000000010000000200"/28], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, r14, 0xffff, '\x00', r12, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r10}, 0xc) 632.68313ms ago: executing program 0 (id=1179): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000800)=ANY=[@ANYRES8=r1, @ANYRES64, @ANYBLOB="0000000000000000b708000008fb5b5a4ac3ce60d770a9ca07ba72a6d0dd1ec487d40018150cfd18e57299e75eaa6f71c00ba2ffef195ff0a1e94849f77a762258"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x626f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x18) gettid() openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00e5ff00"/24], 0x48) close(0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x20220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfd}, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18f2fe8fc1e679532900"/27], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) 542.887287ms ago: executing program 1 (id=1180): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800110000000000000000002200000018110000", @ANYRES64=r1, @ANYRES16=r0], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, 0x0, &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r2, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="f835110c62e955a73f36022cd5c4d533d4137f1a0680600ba2fa83cf720104684b4c522c1597292479508d53daae3f782555fc907c75d362d75b97ce0b", 0x3d}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x10001, 0x4}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x2c, 0x0, 0xc7a8, 0x0, 0x4}, r6, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000dc0)=ANY=[], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x20000007}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 209.522574ms ago: executing program 4 (id=1181): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x53a40, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40902280, 0x0, 0x0, 0x0, 0x0, 0x0) 208.611283ms ago: executing program 0 (id=1182): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async, rerun: 64) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRESDEC=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x63, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103104, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) (async, rerun: 64) close(r5) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ab4a00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000020018110000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r8}, 0x10) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000200)='ext4_ext_handle_unwritten_extents\x00', r9}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000840)='cpuhp_enter\x00', r1, 0x0, 0x2}, 0x18) 186.526705ms ago: executing program 1 (id=1183): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000090000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000c176cae05757fc9dce970ff082c494ea1635fc0000000000757d39b4899fab18739ced1ad52c561a5d9854"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x6, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x11, 0x20, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3d7b}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf067}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x37) 150.573718ms ago: executing program 0 (id=1184): bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xfffffffffffffff7}, 0x4140, 0xc8, 0xffff, 0x2, 0x3, 0x1, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) close(r2) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000000000000066bd0cd9db9a6d3394b112e1222358da78f1191c49d635d2c961237213e831e96f33e807ad52e01dc7b48a80ded396e37c2d364937d2a114af6c631edb5ef17c400a1f237bf41947c2a9a745aecdab44298b9380cdeff9212656608a65c6df4659cdc6b6c83dec7ef2343760d9afda166db1f1c98af51542ed377cb7e7285b42dad00200c59a1d6d8eea086df649c6c6e2218652e369a72551da9d83b8f23ae6d5141ee133d769aef0e70ef0263ca6638159e2ea8fb96a4bfcbb0b8d10b7c1", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00', r7}, 0x10) (async, rerun: 32) gettid() (async, rerun: 32) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x60) write$cgroup_subtree(r8, 0x0, 0xfdef) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, 0x0, &(0x7f0000000b00)=""/151}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) 0s ago: executing program 4 (id=1185): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000a5e3045c3a00b09321578bd0ba704a8d7b9a2f78b9d446f8c642990ac6788c20b6715df8e1b507d5788c9b3a5f9a0f84f3a49185689aebf7936b7a53", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYRES8=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={0xffffffffffffffff, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000003c0)="b9fffdd2c82a552c55c76e606e3f2aec03076844268cb89e14f086dd", 0x0, 0x20000005, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x50) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x6}, 0x64) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) kernel console output (not intermixed with test programs): 23.665688][ T3339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 123.673641][ T3339] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 123.681596][ T3339] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 123.689548][ T3339] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 123.697591][ T3339] [ 123.719314][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.728420][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.745820][ T3320] device bridge_slave_0 entered promiscuous mode [ 123.762891][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.782477][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.794833][ T3320] device bridge_slave_1 entered promiscuous mode [ 124.168143][ T30] audit: type=1400 audit(1754815108.515:155): avc: denied { create } for pid=3371 comm="syz.0.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 124.710904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.736550][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.748114][ T3399] FAULT_INJECTION: forcing a failure. [ 124.748114][ T3399] name failslab, interval 1, probability 0, space 0, times 0 [ 124.801510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 124.852577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.875757][ T3399] CPU: 1 PID: 3399 Comm: syz.4.827 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 124.887279][ T3399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 124.897338][ T3399] Call Trace: [ 124.900613][ T3399] [ 124.903542][ T3399] __dump_stack+0x21/0x30 [ 124.907923][ T3399] dump_stack_lvl+0xee/0x150 [ 124.912508][ T3399] ? show_regs_print_info+0x20/0x20 [ 124.917704][ T3399] ? avc_denied+0x1b0/0x1b0 [ 124.922213][ T3399] dump_stack+0x15/0x20 [ 124.926378][ T3399] should_fail+0x3c1/0x510 [ 124.930817][ T3399] __should_failslab+0xa4/0xe0 [ 124.935581][ T3399] should_failslab+0x9/0x20 [ 124.940075][ T3399] slab_pre_alloc_hook+0x3b/0xe0 [ 124.945008][ T3399] ? vm_area_dup+0x26/0x210 [ 124.949518][ T3399] kmem_cache_alloc+0x44/0x260 [ 124.954277][ T3399] vm_area_dup+0x26/0x210 [ 124.958601][ T3399] copy_mm+0x93a/0x1390 [ 124.962807][ T3399] ? copy_signal+0x600/0x600 [ 124.967482][ T3399] ? __init_rwsem+0xfc/0x1d0 [ 124.972067][ T3399] ? copy_signal+0x4cb/0x600 [ 124.976653][ T3399] copy_process+0x115c/0x3210 [ 124.981330][ T3399] ? __kasan_check_write+0x14/0x20 [ 124.986438][ T3399] ? __pidfd_prepare+0x150/0x150 [ 124.991376][ T3399] ? security_file_permission+0x83/0xa0 [ 124.996934][ T3399] kernel_clone+0x23f/0x940 [ 125.001443][ T3399] ? create_io_thread+0x130/0x130 [ 125.006463][ T3399] ? __kasan_check_write+0x14/0x20 [ 125.011681][ T3399] ? mutex_unlock+0x89/0x220 [ 125.016284][ T3399] __x64_sys_clone+0x176/0x1d0 [ 125.021063][ T3399] ? __kasan_check_write+0x14/0x20 [ 125.026173][ T3399] ? __ia32_sys_vfork+0xf0/0xf0 [ 125.029256][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.031031][ T3399] ? debug_smp_processor_id+0x17/0x20 [ 125.038066][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.043375][ T3399] ? perf_trace_sys_enter+0x30/0x150 [ 125.043395][ T3399] ? trace_sys_enter+0x3d/0x50 [ 125.054523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.055926][ T3399] x64_sys_call+0x41f/0x9a0 [ 125.064736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.068826][ T3399] do_syscall_64+0x4c/0xa0 [ 125.073569][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.081448][ T3399] ? clear_bhb_loop+0x50/0xa0 [ 125.081476][ T3399] ? clear_bhb_loop+0x50/0xa0 [ 125.081495][ T3399] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 125.086021][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.092984][ T3399] RIP: 0033:0x7ff4c7394be9 [ 125.107780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.108156][ T3399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.108173][ T3399] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 [ 125.145683][ T3320] device veth0_vlan entered promiscuous mode [ 125.146884][ T3399] ORIG_RAX: 0000000000000038 [ 125.159485][ T3320] device veth1_macvtap entered promiscuous mode [ 125.163544][ T3399] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 125.163558][ T3399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 125.163568][ T3399] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 125.193869][ T3399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 125.201848][ T3399] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 125.209832][ T3399] [ 125.217137][ T3401] device veth1_macvtap left promiscuous mode [ 125.223211][ T3401] device macsec0 entered promiscuous mode [ 125.246367][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.276304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.291630][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.304945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.317279][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.331180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.355479][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.374754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.382742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.396886][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.406248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.414904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.423343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.479611][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.494336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.185999][ T10] device bridge_slave_1 left promiscuous mode [ 126.192156][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.199692][ T10] device bridge_slave_0 left promiscuous mode [ 126.205892][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.213751][ T10] device veth1_macvtap left promiscuous mode [ 126.219832][ T10] device veth0_vlan left promiscuous mode [ 126.584185][ T3454] FAULT_INJECTION: forcing a failure. [ 126.584185][ T3454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 126.597488][ T3454] CPU: 1 PID: 3454 Comm: syz.1.841 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 126.609033][ T3454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 126.619077][ T3454] Call Trace: [ 126.622341][ T3454] [ 126.625257][ T3454] __dump_stack+0x21/0x30 [ 126.629579][ T3454] dump_stack_lvl+0xee/0x150 [ 126.634160][ T3454] ? show_regs_print_info+0x20/0x20 [ 126.639347][ T3454] dump_stack+0x15/0x20 [ 126.643485][ T3454] should_fail+0x3c1/0x510 [ 126.647881][ T3454] should_fail_alloc_page+0x55/0x80 [ 126.653062][ T3454] prepare_alloc_pages+0x156/0x600 [ 126.658156][ T3454] ? __alloc_pages_bulk+0xab0/0xab0 [ 126.663336][ T3454] __alloc_pages+0x10a/0x440 [ 126.667914][ T3454] ? prep_new_page+0x110/0x110 [ 126.672663][ T3454] ? __mod_node_page_state+0x9e/0xd0 [ 126.677929][ T3454] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 126.683550][ T3454] pte_alloc_one+0x70/0x180 [ 126.688040][ T3454] ? pfn_modify_allowed+0x2f0/0x2f0 [ 126.693241][ T3454] ? stack_trace_save+0x98/0xe0 [ 126.698161][ T3454] ? __stack_depot_save+0x34/0x480 [ 126.703257][ T3454] ? copy_mm+0x9d1/0x1390 [ 126.707600][ T3454] ? copy_process+0x115c/0x3210 [ 126.712437][ T3454] __pte_alloc+0x75/0x290 [ 126.716759][ T3454] ? __kasan_check_write+0x14/0x20 [ 126.721853][ T3454] ? _raw_spin_lock+0x8e/0xe0 [ 126.726512][ T3454] ? free_pgtables+0x280/0x280 [ 126.731258][ T3454] ? __kasan_check_write+0x14/0x20 [ 126.736347][ T3454] ? add_mm_rss_vec+0x209/0x220 [ 126.741179][ T3454] copy_page_range+0x2348/0x2890 [ 126.746102][ T3454] ? pfn_valid+0x1d0/0x1d0 [ 126.750503][ T3454] copy_mm+0xbdc/0x1390 [ 126.754651][ T3454] ? copy_signal+0x600/0x600 [ 126.759244][ T3454] ? __init_rwsem+0xfc/0x1d0 [ 126.763914][ T3454] ? copy_signal+0x4cb/0x600 [ 126.768494][ T3454] copy_process+0x115c/0x3210 [ 126.773165][ T3454] ? __kasan_check_write+0x14/0x20 [ 126.778262][ T3454] ? __pidfd_prepare+0x150/0x150 [ 126.783184][ T3454] ? security_file_permission+0x83/0xa0 [ 126.788727][ T3454] kernel_clone+0x23f/0x940 [ 126.793231][ T3454] ? create_io_thread+0x130/0x130 [ 126.798238][ T3454] ? __kasan_check_write+0x14/0x20 [ 126.803330][ T3454] ? mutex_unlock+0x89/0x220 [ 126.807919][ T3454] __x64_sys_clone+0x176/0x1d0 [ 126.812673][ T3454] ? __kasan_check_write+0x14/0x20 [ 126.817781][ T3454] ? __ia32_sys_vfork+0xf0/0xf0 [ 126.822671][ T3454] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 126.828729][ T3454] x64_sys_call+0x41f/0x9a0 [ 126.833215][ T3454] do_syscall_64+0x4c/0xa0 [ 126.837613][ T3454] ? clear_bhb_loop+0x50/0xa0 [ 126.842271][ T3454] ? clear_bhb_loop+0x50/0xa0 [ 126.846928][ T3454] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.852807][ T3454] RIP: 0033:0x7fb221423be9 [ 126.857207][ T3454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.876798][ T3454] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 126.885217][ T3454] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 126.893177][ T3454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 126.901133][ T3454] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 126.909090][ T3454] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 126.917043][ T3454] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 126.925004][ T3454] [ 127.021977][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.029133][ T3460] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.036878][ T3460] device bridge_slave_0 entered promiscuous mode [ 127.053843][ T3460] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.061784][ T3460] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.069297][ T3460] device bridge_slave_1 entered promiscuous mode [ 127.129016][ T30] audit: type=1400 audit(1754815111.475:156): avc: denied { attach_queue } for pid=3472 comm="syz.1.846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 127.152656][ T3460] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.159732][ T3460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.167044][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.174075][ T3460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.203823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.230921][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.338349][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.389714][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.400132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.421151][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 127.432831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.442430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 127.450790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.460469][ T3460] device veth0_vlan entered promiscuous mode [ 127.486304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.501276][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.546140][ T3515] FAULT_INJECTION: forcing a failure. [ 127.546140][ T3515] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 127.574726][ T3515] CPU: 1 PID: 3515 Comm: syz.1.853 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 127.586212][ T3515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 127.590414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 127.596276][ T3515] Call Trace: [ 127.596284][ T3515] [ 127.596290][ T3515] __dump_stack+0x21/0x30 [ 127.596314][ T3515] dump_stack_lvl+0xee/0x150 [ 127.619263][ T3515] ? show_regs_print_info+0x20/0x20 [ 127.624465][ T3515] ? __mod_node_page_state+0x9e/0xd0 [ 127.629761][ T3515] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 127.635390][ T3515] dump_stack+0x15/0x20 [ 127.639879][ T3515] should_fail+0x3c1/0x510 [ 127.644279][ T3515] should_fail_alloc_page+0x55/0x80 [ 127.649466][ T3515] prepare_alloc_pages+0x156/0x600 [ 127.654570][ T3515] ? __alloc_pages_bulk+0xab0/0xab0 [ 127.659750][ T3515] ? __kasan_check_write+0x14/0x20 [ 127.664847][ T3515] ? add_mm_rss_vec+0x209/0x220 [ 127.669683][ T3515] __alloc_pages+0x10a/0x440 [ 127.674257][ T3515] ? prep_new_page+0x110/0x110 [ 127.679004][ T3515] ? avc_has_perm_noaudit+0x2f4/0x460 [ 127.684365][ T3515] new_slab+0xa1/0x4d0 [ 127.688423][ T3515] ___slab_alloc+0x381/0x810 [ 127.692997][ T3515] ? vm_area_dup+0x26/0x210 [ 127.697485][ T3515] ? vm_area_dup+0x26/0x210 [ 127.702057][ T3515] __slab_alloc+0x49/0x90 [ 127.706368][ T3515] ? vm_area_dup+0x26/0x210 [ 127.710854][ T3515] kmem_cache_alloc+0x138/0x260 [ 127.715687][ T3515] vm_area_dup+0x26/0x210 [ 127.720104][ T3515] copy_mm+0x93a/0x1390 [ 127.724338][ T3515] ? copy_signal+0x600/0x600 [ 127.728910][ T3515] ? __init_rwsem+0xfc/0x1d0 [ 127.733496][ T3515] ? copy_signal+0x4cb/0x600 [ 127.738083][ T3515] copy_process+0x115c/0x3210 [ 127.742753][ T3515] ? __kasan_check_write+0x14/0x20 [ 127.747858][ T3515] ? __pidfd_prepare+0x150/0x150 [ 127.752782][ T3515] ? security_file_permission+0x83/0xa0 [ 127.758317][ T3515] kernel_clone+0x23f/0x940 [ 127.762809][ T3515] ? create_io_thread+0x130/0x130 [ 127.767819][ T3515] ? __kasan_check_write+0x14/0x20 [ 127.772912][ T3515] ? mutex_unlock+0x89/0x220 [ 127.777501][ T3515] __x64_sys_clone+0x176/0x1d0 [ 127.782269][ T3515] ? __kasan_check_write+0x14/0x20 [ 127.787375][ T3515] ? __ia32_sys_vfork+0xf0/0xf0 [ 127.792374][ T3515] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 127.798531][ T3515] x64_sys_call+0x41f/0x9a0 [ 127.803032][ T3515] do_syscall_64+0x4c/0xa0 [ 127.807431][ T3515] ? clear_bhb_loop+0x50/0xa0 [ 127.812093][ T3515] ? clear_bhb_loop+0x50/0xa0 [ 127.816764][ T3515] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.822646][ T3515] RIP: 0033:0x7fb221423be9 [ 127.827053][ T3515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.846644][ T3515] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 127.855056][ T3515] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 127.863012][ T3515] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 127.870973][ T3515] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 127.878927][ T3515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 127.886880][ T3515] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 127.894840][ T3515] [ 127.901935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.977776][ T3460] device veth1_macvtap entered promiscuous mode [ 128.090291][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 128.099185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 128.113990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.138797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 128.155668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.210124][ T3543] device pim6reg1 entered promiscuous mode [ 129.296375][ T3563] FAULT_INJECTION: forcing a failure. [ 129.296375][ T3563] name failslab, interval 1, probability 0, space 0, times 0 [ 129.338351][ T3567] device syzkaller0 entered promiscuous mode [ 129.391581][ T3575] device veth0_vlan left promiscuous mode [ 129.399431][ T3575] device veth0_vlan entered promiscuous mode [ 129.405624][ T3563] CPU: 0 PID: 3563 Comm: syz.1.866 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 129.417079][ T3563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 129.427158][ T3563] Call Trace: [ 129.430447][ T3563] [ 129.433390][ T3563] __dump_stack+0x21/0x30 [ 129.437720][ T3563] dump_stack_lvl+0xee/0x150 [ 129.442335][ T3563] ? show_regs_print_info+0x20/0x20 [ 129.447525][ T3563] dump_stack+0x15/0x20 [ 129.451687][ T3563] should_fail+0x3c1/0x510 [ 129.456094][ T3563] __should_failslab+0xa4/0xe0 [ 129.460945][ T3563] should_failslab+0x9/0x20 [ 129.465434][ T3563] slab_pre_alloc_hook+0x3b/0xe0 [ 129.470421][ T3563] ? vm_area_dup+0x26/0x210 [ 129.474924][ T3563] kmem_cache_alloc+0x44/0x260 [ 129.479687][ T3563] vm_area_dup+0x26/0x210 [ 129.484120][ T3563] copy_mm+0x93a/0x1390 [ 129.488263][ T3563] ? copy_signal+0x600/0x600 [ 129.492848][ T3563] ? __init_rwsem+0xfc/0x1d0 [ 129.497574][ T3563] ? copy_signal+0x4cb/0x600 [ 129.502183][ T3563] copy_process+0x115c/0x3210 [ 129.506933][ T3563] ? __kasan_check_write+0x14/0x20 [ 129.512025][ T3563] ? __pidfd_prepare+0x150/0x150 [ 129.516950][ T3563] ? security_file_permission+0x83/0xa0 [ 129.522499][ T3563] kernel_clone+0x23f/0x940 [ 129.526993][ T3563] ? create_io_thread+0x130/0x130 [ 129.532019][ T3563] ? __kasan_check_write+0x14/0x20 [ 129.537113][ T3563] ? mutex_unlock+0x89/0x220 [ 129.541771][ T3563] __x64_sys_clone+0x176/0x1d0 [ 129.546515][ T3563] ? __kasan_check_write+0x14/0x20 [ 129.551715][ T3563] ? __ia32_sys_vfork+0xf0/0xf0 [ 129.556572][ T3563] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 129.562654][ T3563] x64_sys_call+0x41f/0x9a0 [ 129.567162][ T3563] do_syscall_64+0x4c/0xa0 [ 129.571562][ T3563] ? clear_bhb_loop+0x50/0xa0 [ 129.576229][ T3563] ? clear_bhb_loop+0x50/0xa0 [ 129.580909][ T3563] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 129.586785][ T3563] RIP: 0033:0x7fb221423be9 [ 129.591208][ T3563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.610797][ T3563] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 129.619201][ T3563] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 129.627160][ T3563] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 129.635112][ T3563] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 129.643151][ T3563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 129.651113][ T3563] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 129.659084][ T3563] [ 129.663491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.671890][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 129.680940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.706025][ T346] device bridge_slave_1 left promiscuous mode [ 129.724631][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.740889][ T346] device bridge_slave_0 left promiscuous mode [ 129.749489][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.758486][ T346] device veth1_macvtap left promiscuous mode [ 129.764612][ T346] device veth0_vlan left promiscuous mode [ 129.858357][ T3584] device pim6reg1 entered promiscuous mode [ 129.916504][ T3573] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.923775][ T3573] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.931713][ T3573] device bridge_slave_0 entered promiscuous mode [ 129.963222][ T3589] device syzkaller0 entered promiscuous mode [ 129.982625][ T3573] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.990040][ T3573] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.997837][ T3573] device bridge_slave_1 entered promiscuous mode [ 130.076676][ T3573] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.083841][ T3573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.091163][ T3573] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.098212][ T3573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.739772][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.753806][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.793085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.800848][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.815589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.830673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.839395][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.846456][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.854138][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.863042][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.872151][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.879218][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.918233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.957385][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.978781][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.987233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.292046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.318347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.329904][ T3573] device veth0_vlan entered promiscuous mode [ 131.344813][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.353105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.376838][ T3573] device veth1_macvtap entered promiscuous mode [ 131.383564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.391649][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.400405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.409912][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.418652][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.455885][ T3626] FAULT_INJECTION: forcing a failure. [ 131.455885][ T3626] name failslab, interval 1, probability 0, space 0, times 0 [ 131.526306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.554281][ T3626] CPU: 0 PID: 3626 Comm: syz.2.880 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 131.565771][ T3626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 131.575829][ T3626] Call Trace: [ 131.579136][ T3626] [ 131.582075][ T3626] __dump_stack+0x21/0x30 [ 131.586437][ T3626] dump_stack_lvl+0xee/0x150 [ 131.591041][ T3626] ? show_regs_print_info+0x20/0x20 [ 131.596252][ T3626] dump_stack+0x15/0x20 [ 131.600417][ T3626] should_fail+0x3c1/0x510 [ 131.604829][ T3626] __should_failslab+0xa4/0xe0 [ 131.609588][ T3626] should_failslab+0x9/0x20 [ 131.614085][ T3626] slab_pre_alloc_hook+0x3b/0xe0 [ 131.619019][ T3626] ? anon_vma_clone+0xc0/0x500 [ 131.623790][ T3626] kmem_cache_alloc+0x44/0x260 [ 131.628555][ T3626] anon_vma_clone+0xc0/0x500 [ 131.633144][ T3626] anon_vma_fork+0x8c/0x510 [ 131.637643][ T3626] copy_mm+0x9d1/0x1390 [ 131.641834][ T3626] ? copy_signal+0x600/0x600 [ 131.646415][ T3626] ? __init_rwsem+0xfc/0x1d0 [ 131.651003][ T3626] ? copy_signal+0x4cb/0x600 [ 131.655609][ T3626] copy_process+0x115c/0x3210 [ 131.660381][ T3626] ? __kasan_check_write+0x14/0x20 [ 131.665489][ T3626] ? __pidfd_prepare+0x150/0x150 [ 131.670424][ T3626] ? security_file_permission+0x83/0xa0 [ 131.675970][ T3626] kernel_clone+0x23f/0x940 [ 131.680648][ T3626] ? create_io_thread+0x130/0x130 [ 131.685682][ T3626] ? __kasan_check_write+0x14/0x20 [ 131.690799][ T3626] ? mutex_unlock+0x89/0x220 [ 131.695386][ T3626] __x64_sys_clone+0x176/0x1d0 [ 131.700145][ T3626] ? __kasan_check_write+0x14/0x20 [ 131.705286][ T3626] ? __ia32_sys_vfork+0xf0/0xf0 [ 131.710136][ T3626] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 131.716196][ T3626] x64_sys_call+0x41f/0x9a0 [ 131.720697][ T3626] do_syscall_64+0x4c/0xa0 [ 131.725113][ T3626] ? clear_bhb_loop+0x50/0xa0 [ 131.729789][ T3626] ? clear_bhb_loop+0x50/0xa0 [ 131.734485][ T3626] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.740377][ T3626] RIP: 0033:0x7ff94a50cbe9 [ 131.744790][ T3626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.764522][ T3626] RSP: 002b:00007ff948f74fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 131.772945][ T3626] RAX: ffffffffffffffda RBX: 00007ff94a733fa0 RCX: 00007ff94a50cbe9 [ 131.781028][ T3626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 131.789005][ T3626] RBP: 00007ff948f75090 R08: 0000000000000000 R09: 0000000000000000 [ 131.796991][ T3626] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 131.805169][ T3626] R13: 00007ff94a734038 R14: 00007ff94a733fa0 R15: 00007ffde3ff7dd8 [ 131.813148][ T3626] [ 131.824678][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.833559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.842663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.007619][ T30] audit: type=1400 audit(1754815116.355:157): avc: denied { create } for pid=3642 comm="syz.4.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 133.920155][ T3669] FAULT_INJECTION: forcing a failure. [ 133.920155][ T3669] name failslab, interval 1, probability 0, space 0, times 0 [ 133.933403][ T3669] CPU: 1 PID: 3669 Comm: syz.1.893 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 133.944870][ T3669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.954925][ T3669] Call Trace: [ 133.958293][ T3669] [ 133.961221][ T3669] __dump_stack+0x21/0x30 [ 133.965561][ T3669] dump_stack_lvl+0xee/0x150 [ 133.970176][ T3669] ? show_regs_print_info+0x20/0x20 [ 133.975380][ T3669] ? avc_denied+0x1b0/0x1b0 [ 133.979892][ T3669] dump_stack+0x15/0x20 [ 133.984066][ T3669] should_fail+0x3c1/0x510 [ 133.988499][ T3669] __should_failslab+0xa4/0xe0 [ 133.993278][ T3669] should_failslab+0x9/0x20 [ 133.997759][ T3669] slab_pre_alloc_hook+0x3b/0xe0 [ 134.002674][ T3669] ? vm_area_dup+0x26/0x210 [ 134.007336][ T3669] kmem_cache_alloc+0x44/0x260 [ 134.012179][ T3669] vm_area_dup+0x26/0x210 [ 134.016495][ T3669] copy_mm+0x93a/0x1390 [ 134.020758][ T3669] ? copy_signal+0x600/0x600 [ 134.025337][ T3669] ? __init_rwsem+0xfc/0x1d0 [ 134.029918][ T3669] ? copy_signal+0x4cb/0x600 [ 134.034491][ T3669] copy_process+0x115c/0x3210 [ 134.039174][ T3669] ? __kasan_check_write+0x14/0x20 [ 134.044287][ T3669] ? __pidfd_prepare+0x150/0x150 [ 134.049297][ T3669] ? security_file_permission+0x83/0xa0 [ 134.054947][ T3669] kernel_clone+0x23f/0x940 [ 134.059441][ T3669] ? create_io_thread+0x130/0x130 [ 134.064469][ T3669] ? __kasan_check_write+0x14/0x20 [ 134.069564][ T3669] ? mutex_unlock+0x89/0x220 [ 134.074139][ T3669] __x64_sys_clone+0x176/0x1d0 [ 134.078886][ T3669] ? __kasan_check_write+0x14/0x20 [ 134.084045][ T3669] ? __ia32_sys_vfork+0xf0/0xf0 [ 134.088899][ T3669] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 134.094953][ T3669] x64_sys_call+0x41f/0x9a0 [ 134.099439][ T3669] do_syscall_64+0x4c/0xa0 [ 134.103999][ T3669] ? clear_bhb_loop+0x50/0xa0 [ 134.108661][ T3669] ? clear_bhb_loop+0x50/0xa0 [ 134.113324][ T3669] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 134.119194][ T3669] RIP: 0033:0x7fb221423be9 [ 134.123590][ T3669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.143173][ T3669] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 134.151585][ T3669] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 134.159541][ T3669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 134.167496][ T3669] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 134.175450][ T3669] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 134.183486][ T3669] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 134.191443][ T3669] [ 134.197570][ T3667] device pim6reg1 entered promiscuous mode [ 134.271327][ T3665] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.278638][ T3665] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.286066][ T3665] device bridge_slave_0 entered promiscuous mode [ 134.292978][ T3665] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.300614][ T3665] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.308179][ T3665] device bridge_slave_1 entered promiscuous mode [ 134.393103][ T346] device bridge_slave_1 left promiscuous mode [ 134.414901][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.422590][ T346] device bridge_slave_0 left promiscuous mode [ 134.429611][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.438361][ T346] device veth1_macvtap left promiscuous mode [ 134.476216][ T346] device veth0_vlan left promiscuous mode [ 134.774486][ T3713] FAULT_INJECTION: forcing a failure. [ 134.774486][ T3713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 134.787740][ T3713] CPU: 1 PID: 3713 Comm: syz.0.904 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 134.799310][ T3713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 134.809364][ T3713] Call Trace: [ 134.812646][ T3713] [ 134.815583][ T3713] __dump_stack+0x21/0x30 [ 134.819926][ T3713] dump_stack_lvl+0xee/0x150 [ 134.824520][ T3713] ? show_regs_print_info+0x20/0x20 [ 134.829715][ T3713] ? unwind_get_return_address+0x4d/0x90 [ 134.835365][ T3713] ? stack_trace_save+0xe0/0xe0 [ 134.840223][ T3713] dump_stack+0x15/0x20 [ 134.844385][ T3713] should_fail+0x3c1/0x510 [ 134.848831][ T3713] should_fail_alloc_page+0x55/0x80 [ 134.854166][ T3713] prepare_alloc_pages+0x156/0x600 [ 134.859462][ T3713] ? __alloc_pages_bulk+0xab0/0xab0 [ 134.866541][ T3713] ? __kasan_slab_alloc+0xcf/0xf0 [ 134.871575][ T3713] ? __kasan_slab_alloc+0xbd/0xf0 [ 134.876600][ T3713] ? slab_post_alloc_hook+0x4f/0x2b0 [ 134.882264][ T3713] ? kmem_cache_alloc+0xf7/0x260 [ 134.887215][ T3713] ? anon_vma_fork+0xf2/0x510 [ 134.891909][ T3713] ? copy_process+0x115c/0x3210 [ 134.896983][ T3713] __alloc_pages+0x10a/0x440 [ 134.901579][ T3713] ? prep_new_page+0x110/0x110 [ 134.906487][ T3713] new_slab+0xa1/0x4d0 [ 134.910739][ T3713] ___slab_alloc+0x381/0x810 [ 134.915336][ T3713] ? anon_vma_fork+0x200/0x510 [ 134.920111][ T3713] ? anon_vma_fork+0x200/0x510 [ 134.924880][ T3713] __slab_alloc+0x49/0x90 [ 134.929215][ T3713] ? anon_vma_fork+0x200/0x510 [ 134.933986][ T3713] kmem_cache_alloc+0x138/0x260 [ 134.938842][ T3713] anon_vma_fork+0x200/0x510 [ 134.943439][ T3713] copy_mm+0x9d1/0x1390 [ 134.947605][ T3713] ? trace_event_raw_event_hrtimer_init+0x290/0x290 [ 134.954293][ T3713] ? copy_signal+0x600/0x600 [ 134.958958][ T3713] ? __init_rwsem+0xfc/0x1d0 [ 134.963556][ T3713] ? copy_signal+0x4cb/0x600 [ 134.968147][ T3713] copy_process+0x115c/0x3210 [ 134.972833][ T3713] ? __kasan_check_write+0x14/0x20 [ 134.977973][ T3713] ? __pidfd_prepare+0x150/0x150 [ 134.982913][ T3713] ? security_file_permission+0x83/0xa0 [ 134.988464][ T3713] kernel_clone+0x23f/0x940 [ 134.992993][ T3713] ? create_io_thread+0x130/0x130 [ 134.998156][ T3713] ? __kasan_check_write+0x14/0x20 [ 135.003449][ T3713] ? mutex_unlock+0x89/0x220 [ 135.008052][ T3713] __x64_sys_clone+0x176/0x1d0 [ 135.012927][ T3713] ? __kasan_check_write+0x14/0x20 [ 135.018060][ T3713] ? __ia32_sys_vfork+0xf0/0xf0 [ 135.022928][ T3713] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 135.028990][ T3713] x64_sys_call+0x41f/0x9a0 [ 135.033499][ T3713] do_syscall_64+0x4c/0xa0 [ 135.037904][ T3713] ? clear_bhb_loop+0x50/0xa0 [ 135.042563][ T3713] ? clear_bhb_loop+0x50/0xa0 [ 135.047227][ T3713] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 135.053263][ T3713] RIP: 0033:0x7f0669515be9 [ 135.057671][ T3713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.077468][ T3713] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 135.086260][ T3713] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 135.094324][ T3713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 135.102297][ T3713] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 135.110363][ T3713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 135.118437][ T3713] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 135.126410][ T3713] [ 135.164213][ T3665] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.171277][ T3665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.178610][ T3665] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.185663][ T3665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.386369][ T610] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.407162][ T610] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.678707][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.687437][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.701885][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.710406][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.718654][ T610] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.725720][ T610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.745237][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.753900][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.762212][ T610] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.769321][ T610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.780326][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.788893][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.829730][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.846839][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.860131][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.868701][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.897566][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.907820][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.925411][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.933762][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.945933][ T3665] device veth0_vlan entered promiscuous mode [ 135.995507][ T3768] FAULT_INJECTION: forcing a failure. [ 135.995507][ T3768] name failslab, interval 1, probability 0, space 0, times 0 [ 136.009575][ T3768] CPU: 1 PID: 3768 Comm: syz.0.919 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 136.011410][ T3665] device veth1_macvtap entered promiscuous mode [ 136.021043][ T3768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 136.021056][ T3768] Call Trace: [ 136.021061][ T3768] [ 136.021067][ T3768] __dump_stack+0x21/0x30 [ 136.021091][ T3768] dump_stack_lvl+0xee/0x150 [ 136.052472][ T3768] ? show_regs_print_info+0x20/0x20 [ 136.057670][ T3768] dump_stack+0x15/0x20 [ 136.061836][ T3768] should_fail+0x3c1/0x510 [ 136.066324][ T3768] __should_failslab+0xa4/0xe0 [ 136.071228][ T3768] should_failslab+0x9/0x20 [ 136.075845][ T3768] slab_pre_alloc_hook+0x3b/0xe0 [ 136.080779][ T3768] ? anon_vma_clone+0xc0/0x500 [ 136.085533][ T3768] kmem_cache_alloc+0x44/0x260 [ 136.090290][ T3768] anon_vma_clone+0xc0/0x500 [ 136.094877][ T3768] anon_vma_fork+0x8c/0x510 [ 136.099376][ T3768] copy_mm+0x9d1/0x1390 [ 136.103534][ T3768] ? copy_signal+0x600/0x600 [ 136.108112][ T3768] ? __init_rwsem+0xfc/0x1d0 [ 136.112691][ T3768] ? copy_signal+0x4cb/0x600 [ 136.117266][ T3768] copy_process+0x115c/0x3210 [ 136.121930][ T3768] ? __kasan_check_write+0x14/0x20 [ 136.127050][ T3768] ? __pidfd_prepare+0x150/0x150 [ 136.131999][ T3768] ? security_file_permission+0x83/0xa0 [ 136.137565][ T3768] kernel_clone+0x23f/0x940 [ 136.142063][ T3768] ? create_io_thread+0x130/0x130 [ 136.147072][ T3768] ? __kasan_check_write+0x14/0x20 [ 136.152162][ T3768] ? mutex_unlock+0x89/0x220 [ 136.156760][ T3768] __x64_sys_clone+0x176/0x1d0 [ 136.161509][ T3768] ? __kasan_check_write+0x14/0x20 [ 136.166602][ T3768] ? __ia32_sys_vfork+0xf0/0xf0 [ 136.171449][ T3768] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 136.177508][ T3768] x64_sys_call+0x41f/0x9a0 [ 136.181998][ T3768] do_syscall_64+0x4c/0xa0 [ 136.186489][ T3768] ? clear_bhb_loop+0x50/0xa0 [ 136.191253][ T3768] ? clear_bhb_loop+0x50/0xa0 [ 136.195912][ T3768] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 136.201886][ T3768] RIP: 0033:0x7f0669515be9 [ 136.206309][ T3768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.225988][ T3768] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 136.234489][ T3768] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 136.242580][ T3768] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 136.250538][ T3768] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 136.258499][ T3768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 136.266483][ T3768] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 136.274453][ T3768] [ 136.292430][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.301196][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.309864][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 136.352367][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.362139][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.370814][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.379119][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.398539][ T3773] device pim6reg1 entered promiscuous mode [ 137.805510][ T346] device bridge_slave_1 left promiscuous mode [ 137.811842][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.819474][ T346] device bridge_slave_0 left promiscuous mode [ 137.825737][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.833639][ T346] device veth1_macvtap left promiscuous mode [ 137.839679][ T346] device veth0_vlan left promiscuous mode [ 137.906124][ T3802] FAULT_INJECTION: forcing a failure. [ 137.906124][ T3802] name failslab, interval 1, probability 0, space 0, times 0 [ 137.972197][ T3795] device sit0 left promiscuous mode [ 137.977549][ T3802] CPU: 1 PID: 3802 Comm: syz.4.930 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 137.989009][ T3802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.999066][ T3802] Call Trace: [ 138.002349][ T3802] [ 138.005278][ T3802] __dump_stack+0x21/0x30 [ 138.009611][ T3802] dump_stack_lvl+0xee/0x150 [ 138.014202][ T3802] ? show_regs_print_info+0x20/0x20 [ 138.019411][ T3802] dump_stack+0x15/0x20 [ 138.023565][ T3802] should_fail+0x3c1/0x510 [ 138.028062][ T3802] __should_failslab+0xa4/0xe0 [ 138.032824][ T3802] should_failslab+0x9/0x20 [ 138.037325][ T3802] slab_pre_alloc_hook+0x3b/0xe0 [ 138.042257][ T3802] ? vm_area_dup+0x26/0x210 [ 138.046755][ T3802] kmem_cache_alloc+0x44/0x260 [ 138.051515][ T3802] vm_area_dup+0x26/0x210 [ 138.056057][ T3802] copy_mm+0x93a/0x1390 [ 138.060222][ T3802] ? copy_signal+0x600/0x600 [ 138.064806][ T3802] ? __init_rwsem+0xfc/0x1d0 [ 138.069394][ T3802] ? copy_signal+0x4cb/0x600 [ 138.073991][ T3802] copy_process+0x115c/0x3210 [ 138.078679][ T3802] ? __kasan_check_write+0x14/0x20 [ 138.083800][ T3802] ? __pidfd_prepare+0x150/0x150 [ 138.088825][ T3802] ? security_file_permission+0x83/0xa0 [ 138.094404][ T3802] kernel_clone+0x23f/0x940 [ 138.098913][ T3802] ? create_io_thread+0x130/0x130 [ 138.103942][ T3802] ? __kasan_check_write+0x14/0x20 [ 138.109053][ T3802] ? mutex_unlock+0x89/0x220 [ 138.113641][ T3802] __x64_sys_clone+0x176/0x1d0 [ 138.118408][ T3802] ? __kasan_check_write+0x14/0x20 [ 138.123627][ T3802] ? __ia32_sys_vfork+0xf0/0xf0 [ 138.128486][ T3802] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 138.134554][ T3802] x64_sys_call+0x41f/0x9a0 [ 138.139055][ T3802] do_syscall_64+0x4c/0xa0 [ 138.143462][ T3802] ? clear_bhb_loop+0x50/0xa0 [ 138.148134][ T3802] ? clear_bhb_loop+0x50/0xa0 [ 138.152812][ T3802] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 138.158704][ T3802] RIP: 0033:0x7ff4c7394be9 [ 138.163113][ T3802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.182993][ T3802] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 138.191401][ T3802] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 138.199372][ T3802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 138.207350][ T3802] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 138.216113][ T3802] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 138.224087][ T3802] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 138.232073][ T3802] [ 138.257980][ T3795] device sit0 entered promiscuous mode [ 138.352223][ T3806] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.360343][ T3806] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.371129][ T3806] device bridge_slave_0 entered promiscuous mode [ 138.378129][ T3812] device macsec0 left promiscuous mode [ 138.395893][ T3806] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.413437][ T3806] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.422496][ T3806] device bridge_slave_1 entered promiscuous mode [ 138.438124][ T3826] device sit0 left promiscuous mode [ 138.897309][ T3865] FAULT_INJECTION: forcing a failure. [ 138.897309][ T3865] name failslab, interval 1, probability 0, space 0, times 0 [ 138.910353][ T3865] CPU: 1 PID: 3865 Comm: syz.0.944 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 138.921823][ T3865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 138.931888][ T3865] Call Trace: [ 138.935164][ T3865] [ 138.938098][ T3865] __dump_stack+0x21/0x30 [ 138.942572][ T3865] dump_stack_lvl+0xee/0x150 [ 138.947165][ T3865] ? show_regs_print_info+0x20/0x20 [ 138.952364][ T3865] dump_stack+0x15/0x20 [ 138.956689][ T3865] should_fail+0x3c1/0x510 [ 138.961105][ T3865] __should_failslab+0xa4/0xe0 [ 138.965864][ T3865] should_failslab+0x9/0x20 [ 138.970367][ T3865] slab_pre_alloc_hook+0x3b/0xe0 [ 138.975312][ T3865] ? anon_vma_clone+0xc0/0x500 [ 138.980097][ T3865] kmem_cache_alloc+0x44/0x260 [ 138.984871][ T3865] anon_vma_clone+0xc0/0x500 [ 138.989470][ T3865] anon_vma_fork+0x8c/0x510 [ 138.993970][ T3865] copy_mm+0x9d1/0x1390 [ 138.998129][ T3865] ? copy_signal+0x600/0x600 [ 139.002713][ T3865] ? __init_rwsem+0xfc/0x1d0 [ 139.007299][ T3865] ? copy_signal+0x4cb/0x600 [ 139.011888][ T3865] copy_process+0x115c/0x3210 [ 139.016562][ T3865] ? __kasan_check_write+0x14/0x20 [ 139.021780][ T3865] ? __pidfd_prepare+0x150/0x150 [ 139.026701][ T3865] ? security_file_permission+0x83/0xa0 [ 139.032224][ T3865] kernel_clone+0x23f/0x940 [ 139.036708][ T3865] ? create_io_thread+0x130/0x130 [ 139.041717][ T3865] ? __kasan_check_write+0x14/0x20 [ 139.046802][ T3865] ? mutex_unlock+0x89/0x220 [ 139.051366][ T3865] __x64_sys_clone+0x176/0x1d0 [ 139.056120][ T3865] ? __kasan_check_write+0x14/0x20 [ 139.061209][ T3865] ? __ia32_sys_vfork+0xf0/0xf0 [ 139.066062][ T3865] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 139.072101][ T3865] x64_sys_call+0x41f/0x9a0 [ 139.076582][ T3865] do_syscall_64+0x4c/0xa0 [ 139.080970][ T3865] ? clear_bhb_loop+0x50/0xa0 [ 139.085710][ T3865] ? clear_bhb_loop+0x50/0xa0 [ 139.090385][ T3865] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 139.096283][ T3865] RIP: 0033:0x7f0669515be9 [ 139.100671][ T3865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.120245][ T3865] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 139.128637][ T3865] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 139.136618][ T3865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 139.144763][ T3865] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 139.152797][ T3865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 139.160840][ T3865] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 139.168974][ T3865] [ 139.259985][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.270432][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.284936][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.313738][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.388182][ T610] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.395274][ T610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.407842][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.416353][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.424844][ T610] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.431897][ T610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.440507][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.509552][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.606787][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.624784][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.719165][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.766317][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.024409][ T3806] device veth0_vlan entered promiscuous mode [ 140.039229][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.065532][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.083253][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.091569][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.178355][ T3913] FAULT_INJECTION: forcing a failure. [ 140.178355][ T3913] name failslab, interval 1, probability 0, space 0, times 0 [ 140.186860][ T3806] device veth1_macvtap entered promiscuous mode [ 140.197503][ T3913] CPU: 1 PID: 3913 Comm: syz.4.958 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 140.209059][ T3913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 140.219196][ T3913] Call Trace: [ 140.222466][ T3913] [ 140.225385][ T3913] __dump_stack+0x21/0x30 [ 140.229845][ T3913] dump_stack_lvl+0xee/0x150 [ 140.234434][ T3913] ? show_regs_print_info+0x20/0x20 [ 140.239645][ T3913] dump_stack+0x15/0x20 [ 140.243898][ T3913] should_fail+0x3c1/0x510 [ 140.248298][ T3913] __should_failslab+0xa4/0xe0 [ 140.253052][ T3913] should_failslab+0x9/0x20 [ 140.257560][ T3913] slab_pre_alloc_hook+0x3b/0xe0 [ 140.262483][ T3913] ? anon_vma_clone+0xc0/0x500 [ 140.267226][ T3913] kmem_cache_alloc+0x44/0x260 [ 140.271972][ T3913] anon_vma_clone+0xc0/0x500 [ 140.276545][ T3913] anon_vma_fork+0x8c/0x510 [ 140.281033][ T3913] copy_mm+0x9d1/0x1390 [ 140.285171][ T3913] ? copy_signal+0x600/0x600 [ 140.289737][ T3913] ? __init_rwsem+0xfc/0x1d0 [ 140.294313][ T3913] ? copy_signal+0x4cb/0x600 [ 140.298967][ T3913] copy_process+0x115c/0x3210 [ 140.303629][ T3913] ? __kasan_check_write+0x14/0x20 [ 140.308719][ T3913] ? __pidfd_prepare+0x150/0x150 [ 140.313636][ T3913] ? security_file_permission+0x83/0xa0 [ 140.319162][ T3913] kernel_clone+0x23f/0x940 [ 140.323648][ T3913] ? create_io_thread+0x130/0x130 [ 140.328653][ T3913] ? __kasan_check_write+0x14/0x20 [ 140.333742][ T3913] ? mutex_unlock+0x89/0x220 [ 140.338312][ T3913] __x64_sys_clone+0x176/0x1d0 [ 140.343057][ T3913] ? __kasan_check_write+0x14/0x20 [ 140.348149][ T3913] ? __ia32_sys_vfork+0xf0/0xf0 [ 140.353011][ T3913] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 140.359059][ T3913] x64_sys_call+0x41f/0x9a0 [ 140.363544][ T3913] do_syscall_64+0x4c/0xa0 [ 140.367940][ T3913] ? clear_bhb_loop+0x50/0xa0 [ 140.372595][ T3913] ? clear_bhb_loop+0x50/0xa0 [ 140.377249][ T3913] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 140.383127][ T3913] RIP: 0033:0x7ff4c7394be9 [ 140.387522][ T3913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.407105][ T3913] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 140.415498][ T3913] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 140.423450][ T3913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 140.431399][ T3913] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 140.439360][ T3913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 140.447361][ T3913] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 140.455323][ T3913] [ 140.464495][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.476653][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.495829][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.584866][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.618382][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.645248][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.664781][ T610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.788588][ T3927] GPL: port 1(veth0_to_team) entered blocking state [ 140.814838][ T3927] GPL: port 1(veth0_to_team) entered disabled state [ 140.826357][ T3927] device veth0_to_team entered promiscuous mode [ 142.393405][ T3956] device syzkaller0 entered promiscuous mode [ 142.711036][ T3967] FAULT_INJECTION: forcing a failure. [ 142.711036][ T3967] name failslab, interval 1, probability 0, space 0, times 0 [ 142.737399][ T3967] CPU: 0 PID: 3967 Comm: syz.4.971 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 142.748893][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 142.758930][ T3967] Call Trace: [ 142.762211][ T3967] [ 142.765127][ T3967] __dump_stack+0x21/0x30 [ 142.769444][ T3967] dump_stack_lvl+0xee/0x150 [ 142.774031][ T3967] ? show_regs_print_info+0x20/0x20 [ 142.779209][ T3967] dump_stack+0x15/0x20 [ 142.783339][ T3967] should_fail+0x3c1/0x510 [ 142.787734][ T3967] __should_failslab+0xa4/0xe0 [ 142.792475][ T3967] should_failslab+0x9/0x20 [ 142.797045][ T3967] slab_pre_alloc_hook+0x3b/0xe0 [ 142.801981][ T3967] ? anon_vma_fork+0x200/0x510 [ 142.806741][ T3967] kmem_cache_alloc+0x44/0x260 [ 142.811508][ T3967] anon_vma_fork+0x200/0x510 [ 142.816136][ T3967] copy_mm+0x9d1/0x1390 [ 142.820288][ T3967] ? copy_signal+0x600/0x600 [ 142.824861][ T3967] ? __init_rwsem+0xfc/0x1d0 [ 142.829434][ T3967] ? copy_signal+0x4cb/0x600 [ 142.834004][ T3967] copy_process+0x115c/0x3210 [ 142.838670][ T3967] ? __kasan_check_write+0x14/0x20 [ 142.843765][ T3967] ? __pidfd_prepare+0x150/0x150 [ 142.848685][ T3967] ? security_file_permission+0x83/0xa0 [ 142.854218][ T3967] kernel_clone+0x23f/0x940 [ 142.858702][ T3967] ? create_io_thread+0x130/0x130 [ 142.863711][ T3967] ? __kasan_check_write+0x14/0x20 [ 142.868802][ T3967] ? mutex_unlock+0x89/0x220 [ 142.873388][ T3967] __x64_sys_clone+0x176/0x1d0 [ 142.878149][ T3967] ? __kasan_check_write+0x14/0x20 [ 142.883250][ T3967] ? __ia32_sys_vfork+0xf0/0xf0 [ 142.888120][ T3967] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 142.894178][ T3967] x64_sys_call+0x41f/0x9a0 [ 142.898670][ T3967] do_syscall_64+0x4c/0xa0 [ 142.903074][ T3967] ? clear_bhb_loop+0x50/0xa0 [ 142.907735][ T3967] ? clear_bhb_loop+0x50/0xa0 [ 142.912396][ T3967] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.918270][ T3967] RIP: 0033:0x7ff4c7394be9 [ 142.922668][ T3967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.942510][ T3967] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 142.950923][ T3967] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 142.958892][ T3967] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 142.966850][ T3967] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 142.974802][ T3967] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 142.982751][ T3967] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 142.990712][ T3967] [ 143.046116][ T3957] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.053189][ T3957] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.060715][ T3957] device bridge_slave_0 entered promiscuous mode [ 143.094986][ T3957] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.102046][ T3957] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.114987][ T3957] device bridge_slave_1 entered promiscuous mode [ 143.123781][ T3975] device veth0_vlan left promiscuous mode [ 143.157108][ T3975] device veth0_vlan entered promiscuous mode [ 143.181677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.385220][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.506523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.817482][ T346] device bridge_slave_1 left promiscuous mode [ 143.823635][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.849748][ T346] device bridge_slave_0 left promiscuous mode [ 143.883971][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.938576][ T346] device veth1_macvtap left promiscuous mode [ 143.960335][ T346] device veth0_vlan left promiscuous mode [ 144.230846][ T4020] FAULT_INJECTION: forcing a failure. [ 144.230846][ T4020] name failslab, interval 1, probability 0, space 0, times 0 [ 144.400263][ T4020] CPU: 0 PID: 4020 Comm: syz.0.984 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 144.411756][ T4020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 144.421814][ T4020] Call Trace: [ 144.425109][ T4020] [ 144.428033][ T4020] __dump_stack+0x21/0x30 [ 144.432361][ T4020] dump_stack_lvl+0xee/0x150 [ 144.436929][ T4020] ? show_regs_print_info+0x20/0x20 [ 144.442102][ T4020] ? avc_denied+0x1b0/0x1b0 [ 144.446590][ T4020] dump_stack+0x15/0x20 [ 144.450725][ T4020] should_fail+0x3c1/0x510 [ 144.455123][ T4020] __should_failslab+0xa4/0xe0 [ 144.459869][ T4020] should_failslab+0x9/0x20 [ 144.464347][ T4020] slab_pre_alloc_hook+0x3b/0xe0 [ 144.469258][ T4020] ? vm_area_dup+0x26/0x210 [ 144.473750][ T4020] kmem_cache_alloc+0x44/0x260 [ 144.478488][ T4020] vm_area_dup+0x26/0x210 [ 144.482825][ T4020] copy_mm+0x93a/0x1390 [ 144.487045][ T4020] ? copy_signal+0x600/0x600 [ 144.491609][ T4020] ? __init_rwsem+0xfc/0x1d0 [ 144.496179][ T4020] ? copy_signal+0x4cb/0x600 [ 144.500747][ T4020] copy_process+0x115c/0x3210 [ 144.505458][ T4020] ? __kasan_check_write+0x14/0x20 [ 144.510550][ T4020] ? __pidfd_prepare+0x150/0x150 [ 144.515465][ T4020] ? security_file_permission+0x83/0xa0 [ 144.520991][ T4020] kernel_clone+0x23f/0x940 [ 144.525473][ T4020] ? create_io_thread+0x130/0x130 [ 144.530473][ T4020] ? __kasan_check_write+0x14/0x20 [ 144.535557][ T4020] ? mutex_unlock+0x89/0x220 [ 144.540122][ T4020] __x64_sys_clone+0x176/0x1d0 [ 144.544877][ T4020] ? __kasan_check_write+0x14/0x20 [ 144.549974][ T4020] ? __ia32_sys_vfork+0xf0/0xf0 [ 144.554798][ T4020] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 144.560840][ T4020] x64_sys_call+0x41f/0x9a0 [ 144.565324][ T4020] do_syscall_64+0x4c/0xa0 [ 144.569715][ T4020] ? clear_bhb_loop+0x50/0xa0 [ 144.574365][ T4020] ? clear_bhb_loop+0x50/0xa0 [ 144.579017][ T4020] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 144.584891][ T4020] RIP: 0033:0x7f0669515be9 [ 144.589290][ T4020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.608884][ T4020] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 144.617279][ T4020] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 144.625248][ T4020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 144.633216][ T4020] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 144.641168][ T4020] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 144.649128][ T4020] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 144.657204][ T4020] [ 144.833977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.841735][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.857168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.870415][ T4038] FAULT_INJECTION: forcing a failure. [ 144.870415][ T4038] name failslab, interval 1, probability 0, space 0, times 0 [ 144.883465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.892033][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.899117][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.917006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.934926][ T4038] CPU: 0 PID: 4038 Comm: syz.0.998 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 144.946428][ T4038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 144.956499][ T4038] Call Trace: [ 144.959779][ T4038] [ 144.962707][ T4038] __dump_stack+0x21/0x30 [ 144.967046][ T4038] dump_stack_lvl+0xee/0x150 [ 144.971642][ T4038] ? show_regs_print_info+0x20/0x20 [ 144.976846][ T4038] dump_stack+0x15/0x20 [ 144.981106][ T4038] should_fail+0x3c1/0x510 [ 144.985530][ T4038] __should_failslab+0xa4/0xe0 [ 144.990296][ T4038] should_failslab+0x9/0x20 [ 144.994803][ T4038] slab_pre_alloc_hook+0x3b/0xe0 [ 144.999753][ T4038] ? anon_vma_clone+0xc0/0x500 [ 145.004529][ T4038] kmem_cache_alloc+0x44/0x260 [ 145.009298][ T4038] anon_vma_clone+0xc0/0x500 [ 145.013896][ T4038] anon_vma_fork+0x8c/0x510 [ 145.018401][ T4038] copy_mm+0x9d1/0x1390 [ 145.022559][ T4038] ? copy_signal+0x600/0x600 [ 145.027146][ T4038] ? __init_rwsem+0xfc/0x1d0 [ 145.031741][ T4038] ? copy_signal+0x4cb/0x600 [ 145.036333][ T4038] copy_process+0x115c/0x3210 [ 145.041020][ T4038] ? __kasan_check_write+0x14/0x20 [ 145.046139][ T4038] ? __pidfd_prepare+0x150/0x150 [ 145.047785][ T3957] device veth0_vlan entered promiscuous mode [ 145.051076][ T4038] ? security_file_permission+0x83/0xa0 [ 145.051104][ T4038] kernel_clone+0x23f/0x940 [ 145.067067][ T4038] ? create_io_thread+0x130/0x130 [ 145.072100][ T4038] ? __kasan_check_write+0x14/0x20 [ 145.077221][ T4038] ? mutex_unlock+0x89/0x220 [ 145.081819][ T4038] __x64_sys_clone+0x176/0x1d0 [ 145.086576][ T4038] ? __kasan_check_write+0x14/0x20 [ 145.091761][ T4038] ? __ia32_sys_vfork+0xf0/0xf0 [ 145.096631][ T4038] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 145.102690][ T4038] x64_sys_call+0x41f/0x9a0 [ 145.107183][ T4038] do_syscall_64+0x4c/0xa0 [ 145.111591][ T4038] ? clear_bhb_loop+0x50/0xa0 [ 145.116253][ T4038] ? clear_bhb_loop+0x50/0xa0 [ 145.120931][ T4038] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 145.126824][ T4038] RIP: 0033:0x7f0669515be9 [ 145.131225][ T4038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.150904][ T4038] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 145.159304][ T4038] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 145.167259][ T4038] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 145.175215][ T4038] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 145.183168][ T4038] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 145.191118][ T4038] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 145.199080][ T4038] [ 145.202961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.212169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.219863][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.237712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.249046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.258606][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.265663][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.273211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.281530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.290306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.298441][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.306674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.315123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.443291][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 145.461741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.473229][ T3957] device veth1_macvtap entered promiscuous mode [ 145.584033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.592826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.601252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.691429][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.700018][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.385474][ T4066] device syzkaller0 entered promiscuous mode [ 147.586922][ T4089] FAULT_INJECTION: forcing a failure. [ 147.586922][ T4089] name failslab, interval 1, probability 0, space 0, times 0 [ 147.602612][ T4089] CPU: 1 PID: 4089 Comm: syz.2.1003 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 147.614180][ T4089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 147.624325][ T4089] Call Trace: [ 147.627609][ T4089] [ 147.630534][ T4089] __dump_stack+0x21/0x30 [ 147.634865][ T4089] dump_stack_lvl+0xee/0x150 [ 147.639719][ T4089] ? show_regs_print_info+0x20/0x20 [ 147.644917][ T4089] ? avc_denied+0x1b0/0x1b0 [ 147.649423][ T4089] dump_stack+0x15/0x20 [ 147.653583][ T4089] should_fail+0x3c1/0x510 [ 147.657993][ T4089] __should_failslab+0xa4/0xe0 [ 147.662746][ T4089] should_failslab+0x9/0x20 [ 147.667231][ T4089] slab_pre_alloc_hook+0x3b/0xe0 [ 147.672149][ T4089] ? vm_area_dup+0x26/0x210 [ 147.676636][ T4089] kmem_cache_alloc+0x44/0x260 [ 147.681383][ T4089] vm_area_dup+0x26/0x210 [ 147.685692][ T4089] copy_mm+0x93a/0x1390 [ 147.689842][ T4089] ? copy_signal+0x600/0x600 [ 147.694413][ T4089] ? __init_rwsem+0xfc/0x1d0 [ 147.699003][ T4089] ? copy_signal+0x4cb/0x600 [ 147.703571][ T4089] copy_process+0x115c/0x3210 [ 147.708322][ T4089] ? __kasan_check_write+0x14/0x20 [ 147.713414][ T4089] ? __pidfd_prepare+0x150/0x150 [ 147.718332][ T4089] ? security_file_permission+0x83/0xa0 [ 147.723864][ T4089] kernel_clone+0x23f/0x940 [ 147.728350][ T4089] ? create_io_thread+0x130/0x130 [ 147.733367][ T4089] ? __kasan_check_write+0x14/0x20 [ 147.738457][ T4089] ? mutex_unlock+0x89/0x220 [ 147.743033][ T4089] __x64_sys_clone+0x176/0x1d0 [ 147.747781][ T4089] ? __kasan_check_write+0x14/0x20 [ 147.752885][ T4089] ? __ia32_sys_vfork+0xf0/0xf0 [ 147.757718][ T4089] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 147.763767][ T4089] x64_sys_call+0x41f/0x9a0 [ 147.768251][ T4089] do_syscall_64+0x4c/0xa0 [ 147.772650][ T4089] ? clear_bhb_loop+0x50/0xa0 [ 147.777305][ T4089] ? clear_bhb_loop+0x50/0xa0 [ 147.781984][ T4089] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.787858][ T4089] RIP: 0033:0x7ff94a50cbe9 [ 147.792261][ T4089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.811848][ T4089] RSP: 002b:00007ff948f74fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 147.820308][ T4089] RAX: ffffffffffffffda RBX: 00007ff94a733fa0 RCX: 00007ff94a50cbe9 [ 147.828262][ T4089] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 147.836214][ T4089] RBP: 00007ff948f75090 R08: 0000000000000000 R09: 0000000000000000 [ 147.844164][ T4089] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 147.852113][ T4089] R13: 00007ff94a734038 R14: 00007ff94a733fa0 R15: 00007ffde3ff7dd8 [ 147.860077][ T4089] [ 148.058972][ T4097] device syzkaller0 entered promiscuous mode [ 148.370268][ T4106] device sit0 left promiscuous mode [ 148.397591][ T4112] device sit0 entered promiscuous mode [ 148.498910][ T4095] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.527782][ T4095] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.589756][ T4095] device bridge_slave_0 entered promiscuous mode [ 148.599693][ T4095] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.606806][ T4095] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.618301][ T4095] device bridge_slave_1 entered promiscuous mode [ 148.807257][ T4140] FAULT_INJECTION: forcing a failure. [ 148.807257][ T4140] name failslab, interval 1, probability 0, space 0, times 0 [ 148.827667][ T346] device bridge_slave_1 left promiscuous mode [ 148.837859][ T4140] CPU: 1 PID: 4140 Comm: syz.0.1015 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 148.849445][ T4140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 148.859534][ T4140] Call Trace: [ 148.862805][ T4140] [ 148.865726][ T4140] __dump_stack+0x21/0x30 [ 148.870044][ T4140] dump_stack_lvl+0xee/0x150 [ 148.874624][ T4140] ? show_regs_print_info+0x20/0x20 [ 148.879809][ T4140] dump_stack+0x15/0x20 [ 148.883945][ T4140] should_fail+0x3c1/0x510 [ 148.888342][ T4140] __should_failslab+0xa4/0xe0 [ 148.893087][ T4140] should_failslab+0x9/0x20 [ 148.897667][ T4140] slab_pre_alloc_hook+0x3b/0xe0 [ 148.902854][ T4140] ? anon_vma_clone+0xc0/0x500 [ 148.907605][ T4140] kmem_cache_alloc+0x44/0x260 [ 148.912351][ T4140] anon_vma_clone+0xc0/0x500 [ 148.916927][ T4140] anon_vma_fork+0x8c/0x510 [ 148.921532][ T4140] copy_mm+0x9d1/0x1390 [ 148.925672][ T4140] ? copy_signal+0x600/0x600 [ 148.930249][ T4140] ? __init_rwsem+0xfc/0x1d0 [ 148.934821][ T4140] ? copy_signal+0x4cb/0x600 [ 148.939395][ T4140] copy_process+0x115c/0x3210 [ 148.944062][ T4140] ? __kasan_check_write+0x14/0x20 [ 148.949156][ T4140] ? __pidfd_prepare+0x150/0x150 [ 148.954161][ T4140] ? security_file_permission+0x83/0xa0 [ 148.959700][ T4140] kernel_clone+0x23f/0x940 [ 148.964280][ T4140] ? create_io_thread+0x130/0x130 [ 148.969286][ T4140] ? __kasan_check_write+0x14/0x20 [ 148.974383][ T4140] ? mutex_unlock+0x89/0x220 [ 148.979047][ T4140] __x64_sys_clone+0x176/0x1d0 [ 148.983797][ T4140] ? __kasan_check_write+0x14/0x20 [ 148.988913][ T4140] ? __ia32_sys_vfork+0xf0/0xf0 [ 148.993748][ T4140] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 148.999808][ T4140] x64_sys_call+0x41f/0x9a0 [ 149.004310][ T4140] do_syscall_64+0x4c/0xa0 [ 149.008718][ T4140] ? clear_bhb_loop+0x50/0xa0 [ 149.013384][ T4140] ? clear_bhb_loop+0x50/0xa0 [ 149.018048][ T4140] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.023927][ T4140] RIP: 0033:0x7f0669515be9 [ 149.028335][ T4140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.048044][ T4140] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 149.056466][ T4140] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 149.064431][ T4140] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 149.072397][ T4140] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 149.080354][ T4140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 149.088566][ T4140] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 149.096553][ T4140] [ 149.104936][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.116451][ T346] device bridge_slave_0 left promiscuous mode [ 149.122795][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.131217][ T346] device veth1_macvtap left promiscuous mode [ 149.137431][ T346] device veth0_vlan left promiscuous mode [ 149.810364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.822034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.904603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.014884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.058366][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.065436][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.205108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.288033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.308836][ T4192] FAULT_INJECTION: forcing a failure. [ 150.308836][ T4192] name failslab, interval 1, probability 0, space 0, times 0 [ 150.331806][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.339024][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.384778][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.402617][ T4192] CPU: 1 PID: 4192 Comm: syz.2.1027 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 150.414287][ T4192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 150.424344][ T4192] Call Trace: [ 150.427636][ T4192] [ 150.430568][ T4192] __dump_stack+0x21/0x30 [ 150.434899][ T4192] dump_stack_lvl+0xee/0x150 [ 150.439485][ T4192] ? show_regs_print_info+0x20/0x20 [ 150.444682][ T4192] dump_stack+0x15/0x20 [ 150.448836][ T4192] should_fail+0x3c1/0x510 [ 150.453260][ T4192] __should_failslab+0xa4/0xe0 [ 150.458023][ T4192] should_failslab+0x9/0x20 [ 150.462527][ T4192] slab_pre_alloc_hook+0x3b/0xe0 [ 150.467463][ T4192] ? anon_vma_clone+0xc0/0x500 [ 150.472224][ T4192] kmem_cache_alloc+0x44/0x260 [ 150.476988][ T4192] anon_vma_clone+0xc0/0x500 [ 150.481579][ T4192] anon_vma_fork+0x8c/0x510 [ 150.486158][ T4192] copy_mm+0x9d1/0x1390 [ 150.490328][ T4192] ? copy_signal+0x600/0x600 [ 150.494911][ T4192] ? __init_rwsem+0xfc/0x1d0 [ 150.499517][ T4192] ? copy_signal+0x4cb/0x600 [ 150.504100][ T4192] copy_process+0x115c/0x3210 [ 150.508775][ T4192] ? __kasan_check_write+0x14/0x20 [ 150.513882][ T4192] ? __pidfd_prepare+0x150/0x150 [ 150.518822][ T4192] ? security_file_permission+0x83/0xa0 [ 150.524461][ T4192] kernel_clone+0x23f/0x940 [ 150.528968][ T4192] ? create_io_thread+0x130/0x130 [ 150.534030][ T4192] ? __kasan_check_write+0x14/0x20 [ 150.539139][ T4192] ? mutex_unlock+0x89/0x220 [ 150.543721][ T4192] __x64_sys_clone+0x176/0x1d0 [ 150.548481][ T4192] ? __kasan_check_write+0x14/0x20 [ 150.553589][ T4192] ? __ia32_sys_vfork+0xf0/0xf0 [ 150.558443][ T4192] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 150.564508][ T4192] x64_sys_call+0x41f/0x9a0 [ 150.569006][ T4192] do_syscall_64+0x4c/0xa0 [ 150.573415][ T4192] ? clear_bhb_loop+0x50/0xa0 [ 150.578085][ T4192] ? clear_bhb_loop+0x50/0xa0 [ 150.582758][ T4192] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 150.588652][ T4192] RIP: 0033:0x7ff94a50cbe9 [ 150.593066][ T4192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.612752][ T4192] RSP: 002b:00007ff948f74fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 150.621166][ T4192] RAX: ffffffffffffffda RBX: 00007ff94a733fa0 RCX: 00007ff94a50cbe9 [ 150.629142][ T4192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 150.637110][ T4192] RBP: 00007ff948f75090 R08: 0000000000000000 R09: 0000000000000000 [ 150.645074][ T4192] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 150.653041][ T4192] R13: 00007ff94a734038 R14: 00007ff94a733fa0 R15: 00007ffde3ff7dd8 [ 150.661006][ T4192] [ 150.667000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.681617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.693846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.702939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.718146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.736193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.768564][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.784942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.803346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.821199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.839740][ T4095] device veth0_vlan entered promiscuous mode [ 150.891471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.909938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.935741][ T4095] device veth1_macvtap entered promiscuous mode [ 150.968809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.976759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 151.001702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.060032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.082325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.674074][ T346] device bridge_slave_1 left promiscuous mode [ 152.680310][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.745074][ T346] device bridge_slave_0 left promiscuous mode [ 152.777721][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.792561][ T346] device veth1_macvtap left promiscuous mode [ 152.798726][ T346] device veth0_vlan left promiscuous mode [ 152.882998][ T4250] device veth1_macvtap left promiscuous mode [ 152.891150][ T4250] device macsec0 entered promiscuous mode [ 153.013944][ T4261] FAULT_INJECTION: forcing a failure. [ 153.013944][ T4261] name failslab, interval 1, probability 0, space 0, times 0 [ 153.026812][ T4261] CPU: 1 PID: 4261 Comm: syz.0.1045 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 153.038355][ T4261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 153.048583][ T4261] Call Trace: [ 153.051856][ T4261] [ 153.054779][ T4261] __dump_stack+0x21/0x30 [ 153.059113][ T4261] dump_stack_lvl+0xee/0x150 [ 153.063697][ T4261] ? show_regs_print_info+0x20/0x20 [ 153.068888][ T4261] dump_stack+0x15/0x20 [ 153.073033][ T4261] should_fail+0x3c1/0x510 [ 153.077437][ T4261] __should_failslab+0xa4/0xe0 [ 153.082194][ T4261] should_failslab+0x9/0x20 [ 153.086687][ T4261] slab_pre_alloc_hook+0x3b/0xe0 [ 153.091625][ T4261] ? anon_vma_clone+0xc0/0x500 [ 153.096400][ T4261] kmem_cache_alloc+0x44/0x260 [ 153.101171][ T4261] anon_vma_clone+0xc0/0x500 [ 153.105776][ T4261] anon_vma_fork+0x8c/0x510 [ 153.110280][ T4261] copy_mm+0x9d1/0x1390 [ 153.114442][ T4261] ? copy_signal+0x600/0x600 [ 153.119026][ T4261] ? __init_rwsem+0xfc/0x1d0 [ 153.123607][ T4261] ? copy_signal+0x4cb/0x600 [ 153.128193][ T4261] copy_process+0x115c/0x3210 [ 153.132871][ T4261] ? __kasan_check_write+0x14/0x20 [ 153.138003][ T4261] ? __pidfd_prepare+0x150/0x150 [ 153.142933][ T4261] ? security_file_permission+0x83/0xa0 [ 153.148475][ T4261] kernel_clone+0x23f/0x940 [ 153.152970][ T4261] ? create_io_thread+0x130/0x130 [ 153.157987][ T4261] ? __kasan_check_write+0x14/0x20 [ 153.163091][ T4261] ? mutex_unlock+0x89/0x220 [ 153.167674][ T4261] __x64_sys_clone+0x176/0x1d0 [ 153.172428][ T4261] ? __kasan_check_write+0x14/0x20 [ 153.177532][ T4261] ? __ia32_sys_vfork+0xf0/0xf0 [ 153.182379][ T4261] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 153.188440][ T4261] x64_sys_call+0x41f/0x9a0 [ 153.192936][ T4261] do_syscall_64+0x4c/0xa0 [ 153.197347][ T4261] ? clear_bhb_loop+0x50/0xa0 [ 153.202017][ T4261] ? clear_bhb_loop+0x50/0xa0 [ 153.206691][ T4261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 153.212577][ T4261] RIP: 0033:0x7f0669515be9 [ 153.216987][ T4261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.236724][ T4261] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 153.245143][ T4261] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 153.253110][ T4261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 153.261073][ T4261] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 153.269047][ T4261] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 153.277008][ T4261] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 153.284989][ T4261] [ 153.299939][ T4249] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.307225][ T4249] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.315289][ T4249] device bridge_slave_0 entered promiscuous mode [ 153.326064][ T4259] device sit0 entered promiscuous mode [ 153.432389][ T4249] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.440088][ T4249] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.448203][ T4249] device bridge_slave_1 entered promiscuous mode [ 153.559267][ T4249] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.566435][ T4249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.573736][ T4249] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.580795][ T4249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.609201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.629466][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.655179][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.703287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.711811][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.718866][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.727133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.735930][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.742941][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.750495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.758563][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.791482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.809127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.817409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.826951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.835141][ T4249] device veth0_vlan entered promiscuous mode [ 153.845545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.854809][ T4249] device veth1_macvtap entered promiscuous mode [ 153.864483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.873398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.706744][ T4369] FAULT_INJECTION: forcing a failure. [ 155.706744][ T4369] name failslab, interval 1, probability 0, space 0, times 0 [ 155.742681][ T4369] CPU: 1 PID: 4369 Comm: syz.4.1062 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 155.754260][ T4369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 155.764317][ T4369] Call Trace: [ 155.767590][ T4369] [ 155.770525][ T4369] __dump_stack+0x21/0x30 [ 155.774854][ T4369] dump_stack_lvl+0xee/0x150 [ 155.779440][ T4369] ? show_regs_print_info+0x20/0x20 [ 155.784633][ T4369] dump_stack+0x15/0x20 [ 155.788913][ T4369] should_fail+0x3c1/0x510 [ 155.793421][ T4369] __should_failslab+0xa4/0xe0 [ 155.798176][ T4369] should_failslab+0x9/0x20 [ 155.802674][ T4369] slab_pre_alloc_hook+0x3b/0xe0 [ 155.807608][ T4369] ? anon_vma_fork+0x200/0x510 [ 155.812368][ T4369] kmem_cache_alloc+0x44/0x260 [ 155.817133][ T4369] anon_vma_fork+0x200/0x510 [ 155.821718][ T4369] copy_mm+0x9d1/0x1390 [ 155.825881][ T4369] ? copy_signal+0x600/0x600 [ 155.830470][ T4369] ? __init_rwsem+0xfc/0x1d0 [ 155.835089][ T4369] ? copy_signal+0x4cb/0x600 [ 155.839672][ T4369] copy_process+0x115c/0x3210 [ 155.844353][ T4369] ? __kasan_check_write+0x14/0x20 [ 155.849457][ T4369] ? __pidfd_prepare+0x150/0x150 [ 155.854388][ T4369] ? security_file_permission+0x83/0xa0 [ 155.859932][ T4369] kernel_clone+0x23f/0x940 [ 155.864464][ T4369] ? create_io_thread+0x130/0x130 [ 155.869486][ T4369] ? __kasan_check_write+0x14/0x20 [ 155.874676][ T4369] ? mutex_unlock+0x89/0x220 [ 155.879258][ T4369] __x64_sys_clone+0x176/0x1d0 [ 155.884019][ T4369] ? __kasan_check_write+0x14/0x20 [ 155.889148][ T4369] ? __ia32_sys_vfork+0xf0/0xf0 [ 155.894014][ T4369] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 155.900080][ T4369] x64_sys_call+0x41f/0x9a0 [ 155.904584][ T4369] do_syscall_64+0x4c/0xa0 [ 155.908996][ T4369] ? clear_bhb_loop+0x50/0xa0 [ 155.913674][ T4369] ? clear_bhb_loop+0x50/0xa0 [ 155.918350][ T4369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 155.924238][ T4369] RIP: 0033:0x7ff4c7394be9 [ 155.928647][ T4369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.948255][ T4369] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 155.956695][ T4369] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 155.964668][ T4369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 155.972628][ T4369] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 155.980603][ T4369] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 155.988566][ T4369] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 155.996538][ T4369] [ 156.040038][ T4369] ------------[ cut here ]------------ [ 156.051339][ T4381] device syzkaller0 entered promiscuous mode [ 156.054445][ T4369] refcount_t: underflow; use-after-free. [ 156.064171][ T4369] WARNING: CPU: 1 PID: 4369 at lib/refcount.c:28 refcount_warn_saturate+0x120/0x1a0 [ 156.073639][ T4369] Modules linked in: [ 156.077586][ T4369] CPU: 1 PID: 4369 Comm: syz.4.1062 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 156.089540][ T4369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 156.099701][ T4369] RIP: 0010:refcount_warn_saturate+0x120/0x1a0 [ 156.106992][ T4369] Code: 04 01 48 c7 c7 20 fd 62 85 e8 6c 64 53 02 0f 0b eb c3 e8 03 c7 1c ff c6 05 4f 0d 9a 04 01 48 c7 c7 80 fd 62 85 e8 50 64 53 02 <0f> 0b eb a7 e8 e7 c6 1c ff c6 05 30 0d 9a 04 01 48 c7 c7 c0 fc 62 [ 156.126694][ T4369] RSP: 0018:ffffc9000112f928 EFLAGS: 00010246 [ 156.149718][ T4369] RAX: 313bcb38787e6e00 RBX: 0000000000000003 RCX: ffff88814d858000 [ 156.165023][ T4369] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 156.173379][ T346] device bridge_slave_1 left promiscuous mode [ 156.182820][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.191441][ T4369] RBP: ffffc9000112f938 R08: dffffc0000000000 R09: ffffed103ee24e93 [ 156.200497][ T346] device bridge_slave_0 left promiscuous mode [ 156.211308][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.218513][ T4369] R10: ffffed103ee24e93 R11: 1ffff1103ee24e92 R12: 00000000811e658d [ 156.227219][ T4369] R13: ffff88814e057b08 R14: 0000000000000003 R15: ffff888120236059 [ 156.236026][ T4369] FS: 00007ff4c5dfd6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 156.245238][ T346] device veth1_macvtap left promiscuous mode [ 156.251245][ T346] device veth0_vlan left promiscuous mode [ 156.257035][ T4369] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 156.263626][ T4369] CR2: 000000110c2b6199 CR3: 000000011423b000 CR4: 00000000003506a0 [ 156.271838][ T4369] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 156.279870][ T4369] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 156.288007][ T4369] Call Trace: [ 156.294461][ T4369] [ 156.297394][ T4369] vm_area_free_no_check+0x132/0x140 [ 156.302666][ T4369] copy_mm+0xe77/0x1390 [ 156.306865][ T4369] ? copy_signal+0x600/0x600 [ 156.311538][ T4369] ? __init_rwsem+0xfc/0x1d0 [ 156.316291][ T4369] ? copy_signal+0x4cb/0x600 [ 156.320894][ T4369] copy_process+0x115c/0x3210 [ 156.326312][ T4369] ? __kasan_check_write+0x14/0x20 [ 156.331532][ T4369] ? __pidfd_prepare+0x150/0x150 [ 156.336542][ T4369] ? security_file_permission+0x83/0xa0 [ 156.342091][ T4369] kernel_clone+0x23f/0x940 [ 156.346657][ T4369] ? create_io_thread+0x130/0x130 [ 156.351685][ T4369] ? __kasan_check_write+0x14/0x20 [ 156.356862][ T4369] ? mutex_unlock+0x89/0x220 [ 156.361458][ T4369] __x64_sys_clone+0x176/0x1d0 [ 156.366318][ T4369] ? __kasan_check_write+0x14/0x20 [ 156.371431][ T4369] ? __ia32_sys_vfork+0xf0/0xf0 [ 156.376328][ T4369] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 156.382396][ T4369] x64_sys_call+0x41f/0x9a0 [ 156.386938][ T4369] do_syscall_64+0x4c/0xa0 [ 156.391342][ T4369] ? clear_bhb_loop+0x50/0xa0 [ 156.396053][ T4369] ? clear_bhb_loop+0x50/0xa0 [ 156.400743][ T4369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.416079][ T4369] RIP: 0033:0x7ff4c7394be9 [ 156.420980][ T4369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.440764][ T4369] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 156.450968][ T4369] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 156.459762][ T4369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 156.472272][ T4369] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 156.480517][ T4369] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 156.488774][ T4369] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 156.496859][ T4369] [ 156.499893][ T4369] ---[ end trace b8bc9d1e9dad8e18 ]--- [ 156.564060][ T4372] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.601561][ T4372] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.643079][ T4372] device bridge_slave_0 entered promiscuous mode [ 156.676084][ T4372] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.683144][ T4372] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.707614][ T4372] device bridge_slave_1 entered promiscuous mode [ 156.906687][ T4413] device sit0 left promiscuous mode [ 156.972998][ T4414] device sit0 entered promiscuous mode [ 157.176128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.191307][ T4444] FAULT_INJECTION: forcing a failure. [ 157.191307][ T4444] name failslab, interval 1, probability 0, space 0, times 0 [ 157.195311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.211594][ T4444] CPU: 1 PID: 4444 Comm: syz.0.1080 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 157.223251][ T4444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 157.233308][ T4444] Call Trace: [ 157.236582][ T4444] [ 157.239516][ T4444] __dump_stack+0x21/0x30 [ 157.243842][ T4444] dump_stack_lvl+0xee/0x150 [ 157.248427][ T4444] ? show_regs_print_info+0x20/0x20 [ 157.253630][ T4444] dump_stack+0x15/0x20 [ 157.257843][ T4444] should_fail+0x3c1/0x510 [ 157.262392][ T4444] __should_failslab+0xa4/0xe0 [ 157.267161][ T4444] should_failslab+0x9/0x20 [ 157.271668][ T4444] slab_pre_alloc_hook+0x3b/0xe0 [ 157.276613][ T4444] ? anon_vma_clone+0xc0/0x500 [ 157.281381][ T4444] kmem_cache_alloc+0x44/0x260 [ 157.286159][ T4444] anon_vma_clone+0xc0/0x500 [ 157.290759][ T4444] anon_vma_fork+0x8c/0x510 [ 157.295263][ T4444] copy_mm+0x9d1/0x1390 [ 157.299424][ T4444] ? copy_signal+0x600/0x600 [ 157.304020][ T4444] ? __init_rwsem+0xfc/0x1d0 [ 157.308616][ T4444] ? copy_signal+0x4cb/0x600 [ 157.313197][ T4444] copy_process+0x115c/0x3210 [ 157.317882][ T4444] ? __kasan_check_write+0x14/0x20 [ 157.322991][ T4444] ? __pidfd_prepare+0x150/0x150 [ 157.327925][ T4444] ? security_file_permission+0x83/0xa0 [ 157.333474][ T4444] kernel_clone+0x23f/0x940 [ 157.337985][ T4444] ? create_io_thread+0x130/0x130 [ 157.343018][ T4444] ? __kasan_check_write+0x14/0x20 [ 157.348129][ T4444] ? mutex_unlock+0x89/0x220 [ 157.352733][ T4444] __x64_sys_clone+0x176/0x1d0 [ 157.357501][ T4444] ? __kasan_check_write+0x14/0x20 [ 157.362611][ T4444] ? __ia32_sys_vfork+0xf0/0xf0 [ 157.367468][ T4444] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 157.373555][ T4444] x64_sys_call+0x41f/0x9a0 [ 157.378070][ T4444] do_syscall_64+0x4c/0xa0 [ 157.382491][ T4444] ? clear_bhb_loop+0x50/0xa0 [ 157.387164][ T4444] ? clear_bhb_loop+0x50/0xa0 [ 157.391839][ T4444] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 157.397744][ T4444] RIP: 0033:0x7f0669515be9 [ 157.402167][ T4444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.421771][ T4444] RSP: 002b:00007f0667f7dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 157.430203][ T4444] RAX: ffffffffffffffda RBX: 00007f066973cfa0 RCX: 00007f0669515be9 [ 157.438180][ T4444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 157.446324][ T4444] RBP: 00007f0667f7e090 R08: 0000000000000000 R09: 0000000000000000 [ 157.454294][ T4444] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 157.462270][ T4444] R13: 00007f066973d038 R14: 00007f066973cfa0 R15: 00007ffeebd10b58 [ 157.470251][ T4444] [ 157.485105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.501881][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.529137][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.536239][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.546785][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.572265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.616010][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.623188][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.730251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.801953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.845686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.998084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.044510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.052887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.063362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.091647][ T4372] device veth0_vlan entered promiscuous mode [ 158.276340][ T4469] device veth0_vlan left promiscuous mode [ 158.283116][ T4469] device veth0_vlan entered promiscuous mode [ 158.306206][ T4372] device veth1_macvtap entered promiscuous mode [ 158.327616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.339284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.349397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.369047][ T4478] FAULT_INJECTION: forcing a failure. [ 158.369047][ T4478] name failslab, interval 1, probability 0, space 0, times 0 [ 158.383196][ T4478] CPU: 1 PID: 4478 Comm: syz.2.1092 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 158.394765][ T4478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 158.404825][ T4478] Call Trace: [ 158.408100][ T4478] [ 158.411116][ T4478] __dump_stack+0x21/0x30 [ 158.415457][ T4478] dump_stack_lvl+0xee/0x150 [ 158.420044][ T4478] ? show_regs_print_info+0x20/0x20 [ 158.425241][ T4478] dump_stack+0x15/0x20 [ 158.429401][ T4478] should_fail+0x3c1/0x510 [ 158.432784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.433824][ T4478] __should_failslab+0xa4/0xe0 [ 158.446522][ T4478] should_failslab+0x9/0x20 [ 158.451031][ T4478] slab_pre_alloc_hook+0x3b/0xe0 [ 158.455969][ T4478] ? anon_vma_clone+0xc0/0x500 [ 158.460739][ T4478] kmem_cache_alloc+0x44/0x260 [ 158.461024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.465491][ T4478] anon_vma_clone+0xc0/0x500 [ 158.465514][ T4478] anon_vma_fork+0x8c/0x510 [ 158.465538][ T4478] copy_mm+0x9d1/0x1390 [ 158.465561][ T4478] ? copy_signal+0x600/0x600 [ 158.491350][ T4478] ? __init_rwsem+0xfc/0x1d0 [ 158.496235][ T4478] ? copy_signal+0x4cb/0x600 [ 158.500852][ T4478] copy_process+0x115c/0x3210 [ 158.505531][ T4478] ? __kasan_check_write+0x14/0x20 [ 158.510639][ T4478] ? __pidfd_prepare+0x150/0x150 [ 158.515577][ T4478] ? security_file_permission+0x83/0xa0 [ 158.521109][ T4478] kernel_clone+0x23f/0x940 [ 158.525598][ T4478] ? create_io_thread+0x130/0x130 [ 158.530611][ T4478] ? __kasan_check_write+0x14/0x20 [ 158.535709][ T4478] ? mutex_unlock+0x89/0x220 [ 158.540279][ T4478] __x64_sys_clone+0x176/0x1d0 [ 158.545021][ T4478] ? __kasan_check_write+0x14/0x20 [ 158.550113][ T4478] ? __ia32_sys_vfork+0xf0/0xf0 [ 158.554979][ T4478] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 158.561034][ T4478] x64_sys_call+0x41f/0x9a0 [ 158.565524][ T4478] do_syscall_64+0x4c/0xa0 [ 158.569921][ T4478] ? clear_bhb_loop+0x50/0xa0 [ 158.574678][ T4478] ? clear_bhb_loop+0x50/0xa0 [ 158.579360][ T4478] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 158.585242][ T4478] RIP: 0033:0x7ff94a50cbe9 [ 158.589640][ T4478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.609230][ T4478] RSP: 002b:00007ff948f74fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 158.617626][ T4478] RAX: ffffffffffffffda RBX: 00007ff94a733fa0 RCX: 00007ff94a50cbe9 [ 158.625579][ T4478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 158.633702][ T4478] RBP: 00007ff948f75090 R08: 0000000000000000 R09: 0000000000000000 [ 158.641650][ T4478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 158.649608][ T4478] R13: 00007ff94a734038 R14: 00007ff94a733fa0 R15: 00007ffde3ff7dd8 [ 158.657566][ T4478] [ 158.749658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.772632][ T4485] syz.2.1093[4485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.773993][ T4485] syz.2.1093[4485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.799823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 158.972515][ T4485] device wg2 left promiscuous mode [ 159.182626][ T4491] ±ÿ: renamed from bond_slave_0 [ 159.194910][ T4485] bridge0: port 3(veth0) entered blocking state [ 159.201488][ T4485] bridge0: port 3(veth0) entered disabled state [ 159.210080][ T4485] device veth0 entered promiscuous mode [ 159.234872][ T4497] syz.2.1097[4497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.234948][ T4497] syz.2.1097[4497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.607487][ T4510] device pim6reg1 entered promiscuous mode [ 160.565298][ T346] device bridge_slave_1 left promiscuous mode [ 160.571420][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.578956][ T346] device bridge_slave_0 left promiscuous mode [ 160.585261][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.593026][ T346] device veth1_macvtap left promiscuous mode [ 160.599066][ T346] device veth0_vlan left promiscuous mode [ 161.110844][ T4521] FAULT_INJECTION: forcing a failure. [ 161.110844][ T4521] name failslab, interval 1, probability 0, space 0, times 0 [ 161.268740][ T4521] CPU: 1 PID: 4521 Comm: syz.1.1104 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 161.280335][ T4521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 161.290506][ T4521] Call Trace: [ 161.293793][ T4521] [ 161.296728][ T4521] __dump_stack+0x21/0x30 [ 161.301063][ T4521] dump_stack_lvl+0xee/0x150 [ 161.305661][ T4521] ? show_regs_print_info+0x20/0x20 [ 161.310871][ T4521] dump_stack+0x15/0x20 [ 161.315036][ T4521] should_fail+0x3c1/0x510 [ 161.319465][ T4521] __should_failslab+0xa4/0xe0 [ 161.324230][ T4521] should_failslab+0x9/0x20 [ 161.328732][ T4521] slab_pre_alloc_hook+0x3b/0xe0 [ 161.333670][ T4521] ? anon_vma_fork+0x200/0x510 [ 161.338430][ T4521] kmem_cache_alloc+0x44/0x260 [ 161.343192][ T4521] anon_vma_fork+0x200/0x510 [ 161.347790][ T4521] copy_mm+0x9d1/0x1390 [ 161.353275][ T4521] ? copy_signal+0x600/0x600 [ 161.357871][ T4521] ? __init_rwsem+0xfc/0x1d0 [ 161.362464][ T4521] ? copy_signal+0x4cb/0x600 [ 161.367050][ T4521] copy_process+0x115c/0x3210 [ 161.371729][ T4521] ? __kasan_check_write+0x14/0x20 [ 161.376848][ T4521] ? __pidfd_prepare+0x150/0x150 [ 161.381777][ T4521] ? security_file_permission+0x83/0xa0 [ 161.387333][ T4521] kernel_clone+0x23f/0x940 [ 161.391835][ T4521] ? create_io_thread+0x130/0x130 [ 161.396853][ T4521] ? __kasan_check_write+0x14/0x20 [ 161.401957][ T4521] ? mutex_unlock+0x89/0x220 [ 161.406539][ T4521] __x64_sys_clone+0x176/0x1d0 [ 161.411296][ T4521] ? __kasan_check_write+0x14/0x20 [ 161.416426][ T4521] ? __ia32_sys_vfork+0xf0/0xf0 [ 161.421281][ T4521] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 161.427349][ T4521] x64_sys_call+0x41f/0x9a0 [ 161.431850][ T4521] do_syscall_64+0x4c/0xa0 [ 161.436260][ T4521] ? clear_bhb_loop+0x50/0xa0 [ 161.440930][ T4521] ? clear_bhb_loop+0x50/0xa0 [ 161.445599][ T4521] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.451612][ T4521] RIP: 0033:0x7fb221423be9 [ 161.456020][ T4521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.475615][ T4521] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 161.484030][ T4521] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 161.491996][ T4521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 161.499968][ T4521] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 161.507934][ T4521] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 161.515897][ T4521] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 161.523886][ T4521] [ 161.716449][ T4530] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.723537][ T4530] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.738684][ T4530] device bridge_slave_0 entered promiscuous mode [ 161.847649][ T4530] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.858765][ T4530] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.867518][ T4530] device bridge_slave_1 entered promiscuous mode [ 162.003669][ T4579] FAULT_INJECTION: forcing a failure. [ 162.003669][ T4579] name failslab, interval 1, probability 0, space 0, times 0 [ 162.021740][ T4579] CPU: 0 PID: 4579 Comm: syz.2.1119 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 162.033320][ T4579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 162.043470][ T4579] Call Trace: [ 162.046747][ T4579] [ 162.049755][ T4579] __dump_stack+0x21/0x30 [ 162.054089][ T4579] dump_stack_lvl+0xee/0x150 [ 162.058729][ T4579] ? show_regs_print_info+0x20/0x20 [ 162.063939][ T4579] dump_stack+0x15/0x20 [ 162.068182][ T4579] should_fail+0x3c1/0x510 [ 162.072599][ T4579] __should_failslab+0xa4/0xe0 [ 162.077533][ T4579] should_failslab+0x9/0x20 [ 162.082044][ T4579] slab_pre_alloc_hook+0x3b/0xe0 [ 162.086982][ T4579] ? anon_vma_clone+0xc0/0x500 [ 162.091750][ T4579] kmem_cache_alloc+0x44/0x260 [ 162.096527][ T4579] anon_vma_clone+0xc0/0x500 [ 162.101129][ T4579] anon_vma_fork+0x8c/0x510 [ 162.105808][ T4579] copy_mm+0x9d1/0x1390 [ 162.109961][ T4579] ? copy_signal+0x600/0x600 [ 162.114561][ T4579] ? __init_rwsem+0xfc/0x1d0 [ 162.119271][ T4579] ? copy_signal+0x4cb/0x600 [ 162.123958][ T4579] copy_process+0x115c/0x3210 [ 162.128650][ T4579] ? __kasan_check_write+0x14/0x20 [ 162.133766][ T4579] ? __pidfd_prepare+0x150/0x150 [ 162.138696][ T4579] ? security_file_permission+0x83/0xa0 [ 162.144238][ T4579] kernel_clone+0x23f/0x940 [ 162.148899][ T4579] ? create_io_thread+0x130/0x130 [ 162.153935][ T4579] ? __kasan_check_write+0x14/0x20 [ 162.159041][ T4579] ? mutex_unlock+0x89/0x220 [ 162.163620][ T4579] __x64_sys_clone+0x176/0x1d0 [ 162.168452][ T4579] ? __kasan_check_write+0x14/0x20 [ 162.173546][ T4579] ? __ia32_sys_vfork+0xf0/0xf0 [ 162.178393][ T4579] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 162.184445][ T4579] x64_sys_call+0x41f/0x9a0 [ 162.188932][ T4579] do_syscall_64+0x4c/0xa0 [ 162.193331][ T4579] ? clear_bhb_loop+0x50/0xa0 [ 162.198000][ T4579] ? clear_bhb_loop+0x50/0xa0 [ 162.202662][ T4579] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 162.208538][ T4579] RIP: 0033:0x7ff94a50cbe9 [ 162.212943][ T4579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.232530][ T4579] RSP: 002b:00007ff948f74fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 162.240926][ T4579] RAX: ffffffffffffffda RBX: 00007ff94a733fa0 RCX: 00007ff94a50cbe9 [ 162.249090][ T4579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 162.257051][ T4579] RBP: 00007ff948f75090 R08: 0000000000000000 R09: 0000000000000000 [ 162.265011][ T4579] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 162.272967][ T4579] R13: 00007ff94a734038 R14: 00007ff94a733fa0 R15: 00007ffde3ff7dd8 [ 162.281020][ T4579] [ 162.330561][ T4530] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.337617][ T4530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.344911][ T4530] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.351961][ T4530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.450850][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.459091][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.467167][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.490823][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.499871][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.507082][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.515242][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.523476][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.530544][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.560006][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.659779][ T4606] device pim6reg1 entered promiscuous mode [ 162.681066][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.689234][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.716822][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.725399][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.753715][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.762849][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.771429][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.784325][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.793725][ T4530] device veth0_vlan entered promiscuous mode [ 162.832339][ T4615] device syzkaller0 entered promiscuous mode [ 162.847739][ T4530] device veth1_macvtap entered promiscuous mode [ 162.876672][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 162.895692][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.904131][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.971369][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.980218][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.993979][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.003811][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.058927][ T4631] FAULT_INJECTION: forcing a failure. [ 163.058927][ T4631] name failslab, interval 1, probability 0, space 0, times 0 [ 163.072801][ T4631] CPU: 1 PID: 4631 Comm: syz.1.1131 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 163.084709][ T4631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 163.094771][ T4631] Call Trace: [ 163.098049][ T4631] [ 163.100989][ T4631] __dump_stack+0x21/0x30 [ 163.105322][ T4631] dump_stack_lvl+0xee/0x150 [ 163.109913][ T4631] ? show_regs_print_info+0x20/0x20 [ 163.115113][ T4631] dump_stack+0x15/0x20 [ 163.119261][ T4631] should_fail+0x3c1/0x510 [ 163.123669][ T4631] __should_failslab+0xa4/0xe0 [ 163.128430][ T4631] should_failslab+0x9/0x20 [ 163.132944][ T4631] slab_pre_alloc_hook+0x3b/0xe0 [ 163.137999][ T4631] ? alloc_pid+0x9d/0xac0 [ 163.142330][ T4631] kmem_cache_alloc+0x44/0x260 [ 163.147090][ T4631] alloc_pid+0x9d/0xac0 [ 163.151245][ T4631] copy_process+0x1365/0x3210 [ 163.155925][ T4631] ? memset+0x35/0x40 [ 163.159903][ T4631] ? __kasan_check_write+0x14/0x20 [ 163.165014][ T4631] ? __pidfd_prepare+0x150/0x150 [ 163.170050][ T4631] ? security_file_permission+0x83/0xa0 [ 163.175695][ T4631] kernel_clone+0x23f/0x940 [ 163.180223][ T4631] ? create_io_thread+0x130/0x130 [ 163.185241][ T4631] ? __kasan_check_write+0x14/0x20 [ 163.190361][ T4631] ? mutex_unlock+0x89/0x220 [ 163.194941][ T4631] __x64_sys_clone+0x176/0x1d0 [ 163.199698][ T4631] ? __kasan_check_write+0x14/0x20 [ 163.204806][ T4631] ? __ia32_sys_vfork+0xf0/0xf0 [ 163.209780][ T4631] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 163.215851][ T4631] x64_sys_call+0x41f/0x9a0 [ 163.220349][ T4631] do_syscall_64+0x4c/0xa0 [ 163.224758][ T4631] ? clear_bhb_loop+0x50/0xa0 [ 163.229445][ T4631] ? clear_bhb_loop+0x50/0xa0 [ 163.234158][ T4631] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 163.240056][ T4631] RIP: 0033:0x7fb221423be9 [ 163.244469][ T4631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.264187][ T4631] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 163.272590][ T4631] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 163.280547][ T4631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 163.288511][ T4631] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 163.296463][ T4631] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 163.304412][ T4631] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 163.312387][ T4631] [ 163.523569][ T4635] device syzkaller0 entered promiscuous mode [ 165.165384][ T45] device bridge_slave_1 left promiscuous mode [ 165.171517][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.179059][ T45] device bridge_slave_0 left promiscuous mode [ 165.185272][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.193191][ T45] device veth1_macvtap left promiscuous mode [ 165.199297][ T45] device veth0_vlan left promiscuous mode [ 165.717044][ T4675] FAULT_INJECTION: forcing a failure. [ 165.717044][ T4675] name failslab, interval 1, probability 0, space 0, times 0 [ 165.970720][ T4675] CPU: 0 PID: 4675 Comm: syz.4.1144 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 165.982297][ T4675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 165.992355][ T4675] Call Trace: [ 165.995635][ T4675] [ 165.998558][ T4675] __dump_stack+0x21/0x30 [ 166.002899][ T4675] dump_stack_lvl+0xee/0x150 [ 166.007487][ T4675] ? show_regs_print_info+0x20/0x20 [ 166.012681][ T4675] dump_stack+0x15/0x20 [ 166.016831][ T4675] should_fail+0x3c1/0x510 [ 166.021243][ T4675] __should_failslab+0xa4/0xe0 [ 166.026020][ T4675] should_failslab+0x9/0x20 [ 166.030519][ T4675] slab_pre_alloc_hook+0x3b/0xe0 [ 166.035460][ T4675] ? anon_vma_fork+0xf2/0x510 [ 166.040149][ T4675] kmem_cache_alloc+0x44/0x260 [ 166.044917][ T4675] anon_vma_fork+0xf2/0x510 [ 166.049425][ T4675] copy_mm+0x9d1/0x1390 [ 166.053583][ T4675] ? copy_signal+0x600/0x600 [ 166.058168][ T4675] ? __init_rwsem+0xfc/0x1d0 [ 166.062865][ T4675] ? copy_signal+0x4cb/0x600 [ 166.067449][ T4675] copy_process+0x115c/0x3210 [ 166.072126][ T4675] ? __kasan_check_write+0x14/0x20 [ 166.077235][ T4675] ? __pidfd_prepare+0x150/0x150 [ 166.082290][ T4675] ? security_file_permission+0x83/0xa0 [ 166.087847][ T4675] kernel_clone+0x23f/0x940 [ 166.092376][ T4675] ? create_io_thread+0x130/0x130 [ 166.097449][ T4675] ? __kasan_check_write+0x14/0x20 [ 166.102647][ T4675] ? mutex_unlock+0x89/0x220 [ 166.107233][ T4675] __x64_sys_clone+0x176/0x1d0 [ 166.112002][ T4675] ? __kasan_check_write+0x14/0x20 [ 166.117111][ T4675] ? __ia32_sys_vfork+0xf0/0xf0 [ 166.122140][ T4675] x64_sys_call+0x41f/0x9a0 [ 166.126646][ T4675] do_syscall_64+0x4c/0xa0 [ 166.131055][ T4675] ? clear_bhb_loop+0x50/0xa0 [ 166.135728][ T4675] ? clear_bhb_loop+0x50/0xa0 [ 166.140401][ T4675] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.146293][ T4675] RIP: 0033:0x7ff4c7394be9 [ 166.150704][ T4675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.170302][ T4675] RSP: 002b:00007ff4c5dfcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 166.178721][ T4675] RAX: ffffffffffffffda RBX: 00007ff4c75bbfa0 RCX: 00007ff4c7394be9 [ 166.186954][ T4675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 166.194932][ T4675] RBP: 00007ff4c5dfd090 R08: 0000000000000000 R09: 0000000000000000 [ 166.202906][ T4675] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 166.210876][ T4675] R13: 00007ff4c75bc038 R14: 00007ff4c75bbfa0 R15: 00007ffd8155e798 [ 166.219038][ T4675] [ 166.291421][ T4661] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.299587][ T4661] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.308474][ T4661] device bridge_slave_0 entered promiscuous mode [ 166.321820][ T4661] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.329122][ T4661] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.378763][ T4661] device bridge_slave_1 entered promiscuous mode [ 167.092878][ T4661] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.099979][ T4661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.107297][ T4661] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.114322][ T4661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.149264][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.156791][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.164298][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.172099][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.198835][ T4725] device syzkaller0 entered promiscuous mode [ 167.289436][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.297898][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.306102][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.313140][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.321751][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.330095][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.338562][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.345608][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.366596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.374778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.382778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.394080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.411368][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.420587][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.508179][ T4730] FAULT_INJECTION: forcing a failure. [ 167.508179][ T4730] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 168.696448][ T4730] CPU: 0 PID: 4730 Comm: syz.1.1156 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 168.708147][ T4730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 168.718293][ T4730] Call Trace: [ 168.721585][ T4730] [ 168.724539][ T4730] __dump_stack+0x21/0x30 [ 168.728869][ T4730] dump_stack_lvl+0xee/0x150 [ 168.733456][ T4730] ? show_regs_print_info+0x20/0x20 [ 168.738659][ T4730] dump_stack+0x15/0x20 [ 168.742813][ T4730] should_fail+0x3c1/0x510 [ 168.747232][ T4730] should_fail_alloc_page+0x55/0x80 [ 168.752439][ T4730] prepare_alloc_pages+0x156/0x600 [ 168.757675][ T4730] ? __alloc_pages_bulk+0xab0/0xab0 [ 168.762966][ T4730] __alloc_pages+0x10a/0x440 [ 168.767562][ T4730] ? prep_new_page+0x110/0x110 [ 168.772559][ T4730] ? arch_stack_walk+0xee/0x140 [ 168.777420][ T4730] pte_alloc_one+0x70/0x180 [ 168.781926][ T4730] ? pfn_modify_allowed+0x2f0/0x2f0 [ 168.787118][ T4730] ? stack_trace_save+0x98/0xe0 [ 168.791965][ T4730] ? __stack_depot_save+0x34/0x480 [ 168.797075][ T4730] ? copy_mm+0x9d1/0x1390 [ 168.801513][ T4730] ? copy_process+0x115c/0x3210 [ 168.806375][ T4730] ? kernel_clone+0x23f/0x940 [ 168.811232][ T4730] __pte_alloc+0x75/0x290 [ 168.815932][ T4730] ? __kasan_check_write+0x14/0x20 [ 168.821045][ T4730] ? _raw_spin_lock+0x8e/0xe0 [ 168.825730][ T4730] ? free_pgtables+0x280/0x280 [ 168.830679][ T4730] ? __kasan_check_write+0x14/0x20 [ 168.835791][ T4730] ? add_mm_rss_vec+0x209/0x220 [ 168.840641][ T4730] copy_page_range+0x2348/0x2890 [ 168.845590][ T4730] ? pfn_valid+0x1d0/0x1d0 [ 168.850007][ T4730] copy_mm+0xbdc/0x1390 [ 168.854161][ T4730] ? copy_signal+0x600/0x600 [ 168.858869][ T4730] ? __init_rwsem+0xfc/0x1d0 [ 168.863527][ T4730] ? copy_signal+0x4cb/0x600 [ 168.868246][ T4730] copy_process+0x115c/0x3210 [ 168.872941][ T4730] ? __kasan_check_write+0x14/0x20 [ 168.878057][ T4730] ? __pidfd_prepare+0x150/0x150 [ 168.882997][ T4730] ? security_file_permission+0x83/0xa0 [ 168.888548][ T4730] kernel_clone+0x23f/0x940 [ 168.893055][ T4730] ? create_io_thread+0x130/0x130 [ 168.898113][ T4730] ? __kasan_check_write+0x14/0x20 [ 168.903221][ T4730] ? mutex_unlock+0x89/0x220 [ 168.907809][ T4730] __x64_sys_clone+0x176/0x1d0 [ 168.912703][ T4730] ? __kasan_check_write+0x14/0x20 [ 168.917823][ T4730] ? __ia32_sys_vfork+0xf0/0xf0 [ 168.922691][ T4730] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 168.928769][ T4730] x64_sys_call+0x41f/0x9a0 [ 168.933271][ T4730] do_syscall_64+0x4c/0xa0 [ 168.937683][ T4730] ? clear_bhb_loop+0x50/0xa0 [ 168.942460][ T4730] ? clear_bhb_loop+0x50/0xa0 [ 168.947138][ T4730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.953027][ T4730] RIP: 0033:0x7fb221423be9 [ 168.957437][ T4730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.977041][ T4730] RSP: 002b:00007fb21fe8bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 168.985459][ T4730] RAX: ffffffffffffffda RBX: 00007fb22164afa0 RCX: 00007fb221423be9 [ 168.993464][ T4730] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 169.001431][ T4730] RBP: 00007fb21fe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 169.009599][ T4730] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 169.017569][ T4730] R13: 00007fb22164b038 R14: 00007fb22164afa0 R15: 00007ffc3c2bff68 [ 169.025557][ T4730] [ 170.230690][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.238715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.251225][ T4661] device veth0_vlan entered promiscuous mode [ 170.259403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.267596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.290621][ T4661] device veth1_macvtap entered promiscuous mode [ 170.300079][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.328234][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.350466][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.385672][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.404192][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.424541][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.445022][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.559481][ T4753] device veth0_vlan left promiscuous mode [ 170.599358][ T4753] device veth0_vlan entered promiscuous mode [ 170.731419][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.745150][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 170.752939][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.485145][ T45] device bridge_slave_1 left promiscuous mode [ 172.491273][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.498810][ T45] device bridge_slave_0 left promiscuous mode [ 172.505070][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.513296][ T45] device veth1_macvtap left promiscuous mode [ 172.519490][ T45] device veth0_vlan left promiscuous mode [ 172.875403][ T4789] FAULT_INJECTION: forcing a failure. [ 172.875403][ T4789] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.898642][ T4789] CPU: 1 PID: 4789 Comm: syz.2.1170 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 172.910320][ T4789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 172.920372][ T4789] Call Trace: [ 172.923644][ T4789] [ 172.926592][ T4789] __dump_stack+0x21/0x30 [ 172.930926][ T4789] dump_stack_lvl+0xee/0x150 [ 172.935593][ T4789] ? show_regs_print_info+0x20/0x20 [ 172.940794][ T4789] dump_stack+0x15/0x20 [ 172.944931][ T4789] should_fail+0x3c1/0x510 [ 172.949330][ T4789] should_fail_alloc_page+0x55/0x80 [ 172.954514][ T4789] prepare_alloc_pages+0x156/0x600 [ 172.959609][ T4789] ? __alloc_pages_bulk+0xab0/0xab0 [ 172.964797][ T4789] ? kvm_sched_clock_read+0x18/0x40 [ 172.969981][ T4789] ? sched_clock+0x9/0x10 [ 172.974291][ T4789] __alloc_pages+0x10a/0x440 [ 172.978951][ T4789] ? prep_new_page+0x110/0x110 [ 172.983704][ T4789] ? cpumask_next+0x7c/0xa0 [ 172.988190][ T4789] wp_page_copy+0x20f/0x18f0 [ 172.992769][ T4789] ? insert_page_into_pte_locked+0x310/0x310 [ 172.998734][ T4789] ? update_curr+0x40d/0x5b0 [ 173.003329][ T4789] ? _raw_spin_trylock+0xb1/0x140 [ 173.008373][ T4789] ? __cpuidle_text_end+0xb/0xb [ 173.013221][ T4789] ? reweight_entity+0x84/0x510 [ 173.018097][ T4789] ? vm_normal_page+0x99/0x1f0 [ 173.022892][ T4789] do_wp_page+0x731/0xc90 [ 173.027218][ T4789] handle_pte_fault+0x73c/0x2680 [ 173.032165][ T4789] ? fault_around_bytes_set+0xc0/0xc0 [ 173.037541][ T4789] ? memcpy+0x56/0x70 [ 173.041690][ T4789] do_handle_mm_fault+0x1a6d/0x1d50 [ 173.047150][ T4789] ? numa_migrate_prep+0xd0/0xd0 [ 173.052083][ T4789] ? __this_cpu_preempt_check+0x13/0x20 [ 173.057872][ T4789] ? find_vma_from_tree+0xfd/0x110 [ 173.063011][ T4789] ? access_error+0x152/0x260 [ 173.067695][ T4789] do_user_addr_fault+0x554/0x1180 [ 173.072888][ T4789] ? do_kern_addr_fault+0x80/0x80 [ 173.077913][ T4789] ? __kasan_check_write+0x14/0x20 [ 173.083010][ T4789] ? switch_fpu_return+0x15d/0x2c0 [ 173.088106][ T4789] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 173.093723][ T4789] exc_page_fault+0x51/0xb0 [ 173.098221][ T4789] asm_exc_page_fault+0x27/0x30 [ 173.103226][ T4789] RIP: 0033:0x7ff94a3d2900 [ 173.107625][ T4789] Code: c0 75 27 69 3d c5 0d e9 00 b8 0b 00 00 e8 58 a2 13 00 31 f6 bf 3c 00 00 00 31 c0 e8 da a2 13 00 eb fe 0f 1f 84 00 00 00 00 00 <64> c7 04 25 94 ff ff ff 00 00 00 00 48 83 c4 38 c3 66 66 2e 0f 1f [ 173.127219][ T4789] RSP: 002b:00007ff948f74ff0 EFLAGS: 00010202 [ 173.133287][ T4789] RAX: 0000000000000462 RBX: 00007ff94a733fa0 RCX: 00007ff94a50cbe9 [ 173.141247][ T4789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 173.149210][ T4789] RBP: 00007ff948f75090 R08: 0000000000000000 R09: 0000000000000000 [ 173.157172][ T4789] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 173.165130][ T4789] R13: 00007ff94a734038 R14: 00007ff94a733fa0 R15: 00007ffde3ff7dd8 [ 173.173104][ T4789] [ 173.253628][ T4789] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 173.327993][ T4797] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.351766][ T4797] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.408311][ T4797] device bridge_slave_0 entered promiscuous mode [ 173.472131][ T4797] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.512592][ T4797] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.575945][ T4797] device bridge_slave_1 entered promiscuous mode [ 173.738572][ T30] audit: type=1400 audit(1754815158.085:158): avc: denied { create } for pid=4819 comm="syz.0.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 174.252255][ T4797] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.259573][ T4797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.266972][ T4797] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.274216][ T4797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.330230][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.358715][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.409414][ T276] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 174.421303][ T276] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 174.429716][ T276] CPU: 1 PID: 276 Comm: syz-executor Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 174.441358][ T276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 174.451503][ T276] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 174.457273][ T276] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 de e2 3a ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 bb e2 3a ff 41 f6 45 00 01 48 89 [ 174.477183][ T276] RSP: 0018:ffffc900007cfa00 EFLAGS: 00010246 [ 174.483258][ T276] RAX: dffffc0000000000 RBX: ffff88812021f508 RCX: 1ffff11024043ea1 [ 174.491238][ T276] RDX: ffffffff819af460 RSI: 1ffff1102233d069 RDI: ffff88812021f4f8 [ 174.499232][ T276] RBP: ffffc900007cfa60 R08: dffffc0000000000 R09: ffffed102233d06d [ 174.507215][ T276] R10: ffffed102233d06d R11: 1ffff1102233d06c R12: 1ffff11024043ea2 [ 174.515302][ T276] R13: 0000000000000000 R14: ffff88812021f4f8 R15: 0000000000000000 [ 174.523277][ T276] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 174.532213][ T276] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 174.538862][ T276] CR2: 00007f06693eac60 CR3: 000000011e66a000 CR4: 00000000003506a0 [ 174.546879][ T276] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 174.554855][ T276] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 174.562939][ T276] Call Trace: [ 174.566238][ T276] [ 174.569258][ T276] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 174.575699][ T276] vma_interval_tree_remove+0xadf/0xb00 [ 174.581264][ T276] unlink_file_vma+0xd7/0xf0 [ 174.585860][ T276] free_pgtables+0x139/0x280 [ 174.590456][ T276] exit_mmap+0x407/0x860 [ 174.594702][ T276] ? debug_smp_processor_id+0x17/0x20 [ 174.600092][ T276] ? vm_brk+0x30/0x30 [ 174.604082][ T276] ? mutex_unlock+0x89/0x220 [ 174.608678][ T276] ? uprobe_clear_state+0x2c1/0x320 [ 174.614012][ T276] __mmput+0x93/0x320 [ 174.618000][ T276] ? mmput+0x48/0x150 [ 174.621985][ T276] mmput+0x50/0x150 [ 174.625794][ T276] do_exit+0x9d2/0x27a0 [ 174.629975][ T276] ? put_task_struct+0x90/0x90 [ 174.634742][ T276] ? __fdget_pos+0x1f7/0x380 [ 174.639335][ T276] ? ksys_write+0x1da/0x240 [ 174.643840][ T276] ? __ia32_sys_read+0x90/0x90 [ 174.648612][ T276] do_group_exit+0x141/0x310 [ 174.653206][ T276] ? debug_smp_processor_id+0x17/0x20 [ 174.658592][ T276] __x64_sys_exit_group+0x3f/0x40 [ 174.663619][ T276] x64_sys_call+0x832/0x9a0 [ 174.668197][ T276] do_syscall_64+0x4c/0xa0 [ 174.672620][ T276] ? clear_bhb_loop+0x50/0xa0 [ 174.677363][ T276] ? clear_bhb_loop+0x50/0xa0 [ 174.682044][ T276] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.687947][ T276] RIP: 0033:0x7f0669515be9 [ 174.692356][ T276] Code: Unable to access opcode bytes at RIP 0x7f0669515bbf. [ 174.699713][ T276] RSP: 002b:00007ffeebd110b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 174.708134][ T276] RAX: ffffffffffffffda RBX: 0000000000000043 RCX: 00007f0669515be9 [ 174.716114][ T276] RDX: 00007f0669514660 RSI: 0000000000000004 RDI: 0000000000000043 [ 174.724095][ T276] RBP: 00007f066973d7b8 R08: 00007ffeebd0ee56 R09: 0000000000000008 [ 174.732068][ T276] R10: 000000000000001a R11: 0000000000000246 R12: 0000000000000008 [ 174.740051][ T276] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 174.748044][ T276] [ 174.751068][ T276] Modules linked in: [ 174.758863][ T30] audit: type=1400 audit(1754815159.105:159): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 174.786891][ T30] audit: type=1400 audit(1754815159.105:160): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 174.787567][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.812469][ T30] audit: type=1400 audit(1754815159.105:161): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 174.839495][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.855661][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.864278][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.887781][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.894869][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.903529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.913389][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.921832][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.928899][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.936642][ T30] audit: type=1400 audit(1754815159.105:162): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 174.957595][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.975688][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.984743][ T30] audit: type=1400 audit(1754815159.105:163): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 175.036599][ T30] audit: type=1400 audit(1754815159.105:164): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 175.036764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.072532][ T30] audit: type=1400 audit(1754815159.105:165): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 175.126135][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.142857][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.154764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.168657][ T4797] device veth0_vlan entered promiscuous mode [ 175.175349][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.183434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.197904][ T4797] device veth1_macvtap entered promiscuous mode [ 175.198557][ T276] ---[ end trace b8bc9d1e9dad8e19 ]--- [ 175.204558][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.210100][ T276] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 175.218096][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.232774][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.236635][ T276] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 de e2 3a ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 bb e2 3a ff 41 f6 45 00 01 48 89 [ 175.242572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.260681][ T276] RSP: 0018:ffffc900007cfa00 EFLAGS: 00010246 [ 175.269083][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.274645][ T276] RAX: dffffc0000000000 RBX: ffff88812021f508 RCX: 1ffff11024043ea1 [ 175.289954][ T276] RDX: ffffffff819af460 RSI: 1ffff1102233d069 RDI: ffff88812021f4f8 [ 175.298086][ T276] RBP: ffffc900007cfa60 R08: dffffc0000000000 R09: ffffed102233d06d [ 175.306722][ T276] R10: ffffed102233d06d R11: 1ffff1102233d06c R12: 1ffff11024043ea2 [ 175.306801][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.315919][ T276] R13: 0000000000000000 R14: ffff88812021f4f8 R15: 0000000000000000 [ 175.331254][ T276] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 175.331903][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.340357][ T276] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 175.340373][ T276] CR2: 0000200000cff000 CR3: 00000001275ac000 CR4: 00000000003506b0 [ 175.340388][ T276] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 175.340398][ T276] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 175.340410][ T276] Kernel panic - not syncing: Fatal exception [ 175.340590][ T276] Kernel Offset: disabled [ 175.389676][ T276] Rebooting in 86400 seconds..