last executing test programs: 21.729738512s ago: executing program 1 (id=18): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x4, 0x1}, @typedef={0xb}]}, {0x0, [0x0]}}, &(0x7f0000000b40)=""/207, 0x37, 0xcf, 0x0, 0x2, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f00000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a29b1cb7b5c3cd3aea00000000000000000000dbb61b11dff80a396fb7360f00173f80f4e802b06fd0398c685180bc64f9b1949860c9731f4875293550659d797480d481c79ded5588842c0d74481f4a8801c149788beb4779d5c2f0a4b6b3a2bbda16a42c2289f4a3b1d669135584e0510fc29b2a0d5cadd04da1c6a92385019261fd6c150584c4f5401e05fee0dbf6f42cb6a1b94306e96694f78bc051506afdd015a43b5e8c1ac8b92b8a111d498ae31c1d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000030000ffff0600"/20, @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050040000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x9, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xfe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18.56131917s ago: executing program 1 (id=18): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x4, 0x1}, @typedef={0xb}]}, {0x0, [0x0]}}, &(0x7f0000000b40)=""/207, 0x37, 0xcf, 0x0, 0x2, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f00000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a29b1cb7b5c3cd3aea00000000000000000000dbb61b11dff80a396fb7360f00173f80f4e802b06fd0398c685180bc64f9b1949860c9731f4875293550659d797480d481c79ded5588842c0d74481f4a8801c149788beb4779d5c2f0a4b6b3a2bbda16a42c2289f4a3b1d669135584e0510fc29b2a0d5cadd04da1c6a92385019261fd6c150584c4f5401e05fee0dbf6f42cb6a1b94306e96694f78bc051506afdd015a43b5e8c1ac8b92b8a111d498ae31c1d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000030000ffff0600"/20, @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050040000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x9, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xfe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) 15.880256177s ago: executing program 1 (id=18): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x4, 0x1}, @typedef={0xb}]}, {0x0, [0x0]}}, &(0x7f0000000b40)=""/207, 0x37, 0xcf, 0x0, 0x2, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f00000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a29b1cb7b5c3cd3aea00000000000000000000dbb61b11dff80a396fb7360f00173f80f4e802b06fd0398c685180bc64f9b1949860c9731f4875293550659d797480d481c79ded5588842c0d74481f4a8801c149788beb4779d5c2f0a4b6b3a2bbda16a42c2289f4a3b1d669135584e0510fc29b2a0d5cadd04da1c6a92385019261fd6c150584c4f5401e05fee0dbf6f42cb6a1b94306e96694f78bc051506afdd015a43b5e8c1ac8b92b8a111d498ae31c1d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000030000ffff0600"/20, @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050040000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x9, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xfe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) 7.468519188s ago: executing program 1 (id=18): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x4, 0x1}, @typedef={0xb}]}, {0x0, [0x0]}}, &(0x7f0000000b40)=""/207, 0x37, 0xcf, 0x0, 0x2, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f00000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a29b1cb7b5c3cd3aea00000000000000000000dbb61b11dff80a396fb7360f00173f80f4e802b06fd0398c685180bc64f9b1949860c9731f4875293550659d797480d481c79ded5588842c0d74481f4a8801c149788beb4779d5c2f0a4b6b3a2bbda16a42c2289f4a3b1d669135584e0510fc29b2a0d5cadd04da1c6a92385019261fd6c150584c4f5401e05fee0dbf6f42cb6a1b94306e96694f78bc051506afdd015a43b5e8c1ac8b92b8a111d498ae31c1d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000030000ffff0600"/20, @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050040000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x9, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xfe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) 4.200272965s ago: executing program 1 (id=18): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x4, 0x1}, @typedef={0xb}]}, {0x0, [0x0]}}, &(0x7f0000000b40)=""/207, 0x37, 0xcf, 0x0, 0x2, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f00000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a29b1cb7b5c3cd3aea00000000000000000000dbb61b11dff80a396fb7360f00173f80f4e802b06fd0398c685180bc64f9b1949860c9731f4875293550659d797480d481c79ded5588842c0d74481f4a8801c149788beb4779d5c2f0a4b6b3a2bbda16a42c2289f4a3b1d669135584e0510fc29b2a0d5cadd04da1c6a92385019261fd6c150584c4f5401e05fee0dbf6f42cb6a1b94306e96694f78bc051506afdd015a43b5e8c1ac8b92b8a111d498ae31c1d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000030000ffff0600"/20, @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050040000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x9, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xfe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) 3.236822396s ago: executing program 2 (id=215): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfd, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xb}, [@alu={0x7, 0x1, 0xc, 0x3, 0x9, 0xffffffffffffffce, 0x8}, @call={0x85, 0x0, 0x0, 0x7f}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xc}, @exit, @ldst={0x1, 0x1, 0x3, 0x2, 0x0, 0x10, 0xfffffffffffffff0}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0x401, 0x2e, &(0x7f00000000c0)=""/46, 0x41100, 0x4f, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x5, 0x1, 0xff, 0x7ff}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[r0, r0, r0, r0, 0x1, r0], &(0x7f0000000200)=[{0x5, 0x1, 0x6, 0x3}, {0x0, 0x4, 0x8, 0xa}], 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380), &(0x7f00000004c0), 0x0, 0xa2, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000880), &(0x7f00000006c0), 0x3, 0xf7, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 3.098700818s ago: executing program 2 (id=232): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1a00000005000000050001000900000001420000", @ANYRES32, @ANYBLOB="fc37ffff00004b182bf9000010000854ba0000001e55a5d9dbcacea6430738b548eaa897faabd1c56a5b29b539893363418ab322e0c1b6bfaa1fcebf7c928a1ccd9ef020a9de7d83e05ba86d8ef0afde07cbfe0eb11c21e67b5203f02fb79c8951df7e0dc1e3ef6daf0e7518070acc19ffdf37a3ad9cd672654e2f4ef355e4a7221abef41c3a00201cd6653ea8fd9fab9bc8bf585d0f14a5c0d9680876e2a88fb9130ac1d2e2bcb762597bd5a78968db7f51f7d0c229db643e6837b76c3d0b0566f3d578d8bfd8fd818ba7a12a8eeb3d3e420f39f43c3b2d16dfdeffc092", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x19, 0xf, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="71cf9f2d9c948d4c926d5b4eda41d6502111eb42fe703d66ee6d1df29a0b0250f2ff53cdfb689faebddbe896e0a06f21e5af259b6f59db29c9c74bfd4d76"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9febd6e618000000000000002400000024000000030000003d0018270691b082ab8b6e2f00"], &(0x7f0000000440)=""/130, 0x3f, 0x82, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000005694ce1f742a28fa0900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000001000000100000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000f5ffffff000000001000"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r5, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9b, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x8, 0x0, 0x0}}, 0x10) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r6}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x0, 0x703, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x231, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair$unix(0x1, 0x8b5add7e989ea096, 0x0, &(0x7f0000000000)) 2.972551299s ago: executing program 2 (id=233): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 2.543998585s ago: executing program 2 (id=236): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x20, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0xf, 0x2, 0x7, 0xd5, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x7d}, @jmp={0x5, 0x0, 0x5, 0x1, 0xb, 0x100, 0x4}, @alu={0x7, 0x0, 0x6, 0x4, 0x0, 0xffffffffffffffc0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2.232145231s ago: executing program 2 (id=241): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_freezer_state(r2, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={r2, &(0x7f0000000040)="6d1061e0f90d", &(0x7f00000002c0)=""/230, 0x4}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000004c0c000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.192177105s ago: executing program 0 (id=243): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r3, 0x8982, 0x20000000) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r10, 0x58, &(0x7f0000000180)}, 0x10) 2.042698737s ago: executing program 0 (id=245): openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000d00)='devices.deny\x00', 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="00000000000000000000000000006a1ed6ec02d6740ee109000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfe11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r2, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8d, &(0x7f0000000540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x83, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000007000000180100002220692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xb8, &(0x7f00000006c0)=""/184, 0x41100, 0x8, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000a40)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000a80)=[r0], &(0x7f0000000ac0)=[{0x1, 0x3, 0x8, 0xa}, {0x0, 0x1, 0x1, 0x3}, {0x5, 0x1, 0x10, 0x5}, {0x1, 0x4, 0x2, 0xa}, {0x5, 0x5, 0x7, 0x6}, {0x2, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x1, 0x9}, {0x0, 0x3, 0x8, 0x9}, {0x4, 0x2, 0x7, 0x1}, {0x2, 0x4, 0x3, 0x2}], 0x10, 0x5, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r8, 0x1, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x416000, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(0x0) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r10, 0x8982, 0x20000500) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0x1a, 0x0, &(0x7f0000000080)="630db7a11a2294d615308c0afceced8e46cca8afefa2bf681786", 0x0, 0xffff, 0x0, 0x0, 0xfffffcfa, 0x0, 0x0}, 0x50) 1.967836694s ago: executing program 0 (id=246): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x20080, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) r3 = syz_clone(0x80000000, &(0x7f0000000300)="bfaaf806a028f8586029b478d97af65e8314a9196afee03c96292b68872777bc73f7f5d06657bb1b6323aa3a316638a063a9b01f945cf4b5400e76ad6ce21500b8fdb4f4f3b6ea84aef242c798078fb2e51b02f3b6de5aceeab68c69df12ffdab2c29388954f482f26742cca6417d0478eabf4f058bcd0e51f9133c40a82532225185222df4b511a4ec4106f83d2cf81941facd3bcd9a2698ae0498430f2f87cab93ba20daeb99f08b35dc4e6d49484ace71449e0b77efe89a5920c5da1280dabb41dd0d3c5a4d1e71f6d846ccb7cb03cef5962d9f", 0xd5, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000004c0)="8d078574027231e974db03128284e5344942ede0e0570b2c98509a1b5945f2067b49d30e1d8226d4e7cae1cc0158d1e3925b641f364908012b9a24afc8ab6024662e37cf4a82448ec1dc27") r4 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000540)=0xfffffffeffffffff) perf_event_open(&(0x7f0000000180)={0x7, 0x80, 0x2c, 0x4, 0x5f, 0x4, 0x0, 0x4, 0x8800, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x218, 0x700000000, 0x0, 0x1, 0x7, 0x388f, 0xe85e, 0x0, 0xa0000000, 0x0, 0x7}, r3, 0xc, r4, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.788809369s ago: executing program 0 (id=248): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 1.719780955s ago: executing program 4 (id=249): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x24008, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r3}, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000009700000000000000fbbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r9, 0x0, 0xa002a0}, 0x38) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 1.393684402s ago: executing program 0 (id=251): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x10210, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x79, 0x0, 0x0, 0x44}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa}, @printk={@x}], {0x95, 0x0, 0x30}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x30000000, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x36) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073114900000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x8, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x27, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 919.781342ms ago: executing program 0 (id=256): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x0, 0x0, 0x10000, 0x0, 0xffc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1f00000004000000040000001200001800000000271c30ced3e7441c8290306ce4afdace3f213339700f8c518e0c99aaebcd6ee5160b250f6a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r6, r7, 0x2, 0x0, 0x0, @void, @value}, 0x10) openat$cgroup_devices(r6, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000000080), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r9, &(0x7f0000000080)=ANY=[], 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000400000000000000008500000027000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000230000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x65) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 686.835492ms ago: executing program 4 (id=258): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0008de1069b5b581000040000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 686.065242ms ago: executing program 3 (id=259): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0xfe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x0, 0x0, 0x9, 0x9bb, 0x200, 0x1, 0x9, '\x00', 0x0, r1, 0x1, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f00000005c0)={[{0x2d, 'memory'}, {0x0, 'rdma'}, {0x2b, 'hugetlb'}, {0x2d, 'memory'}]}, 0x1f) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={0x0, r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x0, 0x0, &(0x7f0000000580)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xc, 0x9, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x5, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r6, 0xffffffffffffffff, 0x2, 0x0, 0x4000, @void, @value}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) 532.225265ms ago: executing program 4 (id=260): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES16=r1, @ANYRESOCT=0x0, @ANYBLOB='\x00'/20, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="000000000000000000010000000000000000000000000000000000001088bcc3d8fa10425b61f8ff210700f7c3a841bbcf2c95d996b59de95cefc1e3732e69904d7b8d8b4261871364b9f6a10da9dea6786a8ac42f0a53000780a9a47657de430fae71f94dc0e2165be404fae3ef5699020271a98d058421b4dbd363ce93ecdc4bbbb2dc3aec511e7d6fbf43518d748a74568acccb6e0c3d84d12218fcff9e682d8dde3fd4ce5a85a520eb0b081ad7246ad75be8afb4385e826452dfd79b"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$ENABLE_STATS(0x20, &(0x7f0000000180), 0xa0f6c5e414ac29ac) 492.874128ms ago: executing program 4 (id=261): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 179.224064ms ago: executing program 4 (id=262): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x5, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x6b, 0x7fdf, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000ec0)={r1, &(0x7f0000000d00), 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) syz_clone(0x640c2500, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40)=r5, 0x12) syz_open_procfs$namespace(r5, &(0x7f0000000000)='ns/user\x00') write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 178.687905ms ago: executing program 3 (id=263): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000f1000000000000000000009f34d4070467cec5c124d80412b765c6136f8c099e25"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES8=r0, @ANYRES32=0x1, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="100000000400300008000000070000c7d2421ff15c62e97296378dcb5d22b5c4ea758d708052ded74d8d30e10ceba49a5db28ffe5dd91c113efff9b6af3aa6432d288eb4a9d7019b55ad8f4efeb1fce9d59df3751c6b40cc9656f734ff9ad49d43", @ANYBLOB="8094c612bda30fb348ee71bb91a87c3096b2edd1d2eccd9aad6b4cb1c03127bdcdd6ec6cd231d44149cd324092f5cdd17088caa3f08c4d4b81ba34f071ed37767773063df05261ac3e2051a161b5cb", @ANYBLOB='\x00'/20, @ANYRESDEC=r1, @ANYRES32, @ANYRES8=r4], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r7}, 0x0, &(0x7f0000000dc0)}, 0x20) (async) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4db1, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x20000000, @void, @value}, 0x94) (async) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 177.886995ms ago: executing program 3 (id=264): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x99, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x8, 0x0, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910a800000000005500ffff000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) r0 = gettid() r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, r0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000005c0)={0x1, 0x80, 0x71, 0x7, 0x9, 0x5, 0x0, 0x4, 0x6, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x1028be, 0xa3, 0x9, 0x2, 0x80000001, 0xfffeffff, 0x8000, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x10, r1, 0x4) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f00000008c0)="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", &(0x7f0000000180)=""/212}, 0x20) (async, rerun: 64) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (rerun: 64) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0x31) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004ffffffff0000000003000000fcffffff000000000000000d00"/67], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x200, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (rerun: 32) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0xfffffebd) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feffffff0000000000000000000000000000800000000000712cc448cbd8e0420c7fb3740a095cab5f1eb0326f3f7d049eebf62c19f5d1ccecea3e9199fbf6021d84a6db4d5bd036c85aac5ffb8743bf7c1f5efb89931290df97a17bda2f4e01d5c7fea19b0158511ff834bc801b061c618d76ed753797369f4e9604ff59dbece8fcd4ae3d645911000000004ac49ef35a2cbc10580c0b661ff0ea52e1e554b2995a5f4990"], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}, 0xe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 32) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x26, 0x1, 0x0, &(0x7f0000000000)) 175.258116ms ago: executing program 3 (id=265): bpf$OBJ_GET_MAP(0x7, &(0x7f0000000fc0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x677}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000003000000000000000000000d00000000020000000100000f03000000030000000100000003000000da6b9b8d47000000000000000f01000000f800"], &(0x7f0000000000)=""/163, 0x4f, 0xa3, 0x1, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 57.225455ms ago: executing program 3 (id=266): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000859fc700030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000012c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffe78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x2074, 0xc8, 0x0, 0x0, 0x7, 0xfffffffc}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000900)='mm_page_alloc\x00', r7}, 0x18) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYRES64=0x0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r9, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 56.675935ms ago: executing program 4 (id=267): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000107000000ffff00000701020001000000", @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'syz_tun\x00', 0x100}) 53.079365ms ago: executing program 2 (id=241): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_freezer_state(r2, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={r2, &(0x7f0000000040)="6d1061e0f90d", &(0x7f00000002c0)=""/230, 0x4}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x7, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000004c0c000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 52.769135ms ago: executing program 3 (id=268): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1282, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32], 0x48) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r4, 0x40047451, 0x2000000c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r8) close(r7) write$cgroup_subtree(r1, 0x0, 0x9) 0s ago: executing program 1 (id=18): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x4, 0x1}, @typedef={0xb}]}, {0x0, [0x0]}}, &(0x7f0000000b40)=""/207, 0x37, 0xcf, 0x0, 0x2, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000008000000ff0f00000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000a29b1cb7b5c3cd3aea00000000000000000000dbb61b11dff80a396fb7360f00173f80f4e802b06fd0398c685180bc64f9b1949860c9731f4875293550659d797480d481c79ded5588842c0d74481f4a8801c149788beb4779d5c2f0a4b6b3a2bbda16a42c2289f4a3b1d669135584e0510fc29b2a0d5cadd04da1c6a92385019261fd6c150584c4f5401e05fee0dbf6f42cb6a1b94306e96694f78bc051506afdd015a43b5e8c1ac8b92b8a111d498ae31c1d"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000030000ffff0600"/20, @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050040000100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x9, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xfe00000000000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 450224][ T530] syz.0.54[530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.450291][ T530] syz.0.54[530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.479347][ T30] audit: type=1400 audit(1729463318.021:129): avc: denied { create } for pid=536 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 25.552837][ T528] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.564141][ T528] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.571485][ T528] device bridge_slave_0 entered promiscuous mode [ 25.578649][ T528] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.585614][ T528] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.593143][ T528] device bridge_slave_1 entered promiscuous mode [ 25.690404][ T528] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.697294][ T528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.704390][ T528] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.711152][ T528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.764570][ T8] device bridge_slave_1 left promiscuous mode [ 25.770744][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.805303][ T8] device bridge_slave_0 left promiscuous mode [ 25.811357][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.820827][ T8] device veth1_macvtap left promiscuous mode [ 25.843629][ T8] device veth0_vlan left promiscuous mode [ 25.853780][ T566] FAULT_INJECTION: forcing a failure. [ 25.853780][ T566] name failslab, interval 1, probability 0, space 0, times 1 [ 25.876141][ T566] CPU: 1 PID: 566 Comm: syz.3.63 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 25.885592][ T566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 25.895491][ T566] Call Trace: [ 25.898620][ T566] [ 25.901390][ T566] dump_stack_lvl+0x151/0x1c0 [ 25.905990][ T566] ? io_uring_drop_tctx_refs+0x190/0x190 [ 25.911466][ T566] dump_stack+0x15/0x20 [ 25.915449][ T566] should_fail+0x3c6/0x510 [ 25.919701][ T566] __should_failslab+0xa4/0xe0 [ 25.924301][ T566] ? anon_vma_clone+0x9a/0x500 [ 25.928903][ T566] should_failslab+0x9/0x20 [ 25.933242][ T566] slab_pre_alloc_hook+0x37/0xd0 [ 25.938016][ T566] ? anon_vma_clone+0x9a/0x500 [ 25.942613][ T566] kmem_cache_alloc+0x44/0x200 [ 25.947213][ T566] anon_vma_clone+0x9a/0x500 [ 25.951643][ T566] anon_vma_fork+0x91/0x4e0 [ 25.955977][ T566] ? anon_vma_name+0x43/0x70 [ 25.960420][ T566] ? vm_area_dup+0x17a/0x230 [ 25.964837][ T566] copy_mm+0xa3a/0x13e0 [ 25.968831][ T566] ? copy_signal+0x610/0x610 [ 25.973250][ T566] ? __init_rwsem+0xfe/0x1d0 [ 25.977680][ T566] ? copy_signal+0x4e3/0x610 [ 25.982190][ T566] copy_process+0x1149/0x3290 [ 25.986705][ T566] ? __kasan_check_write+0x14/0x20 [ 25.991654][ T566] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 25.996614][ T566] ? vfs_write+0x94d/0x1110 [ 26.000943][ T566] kernel_clone+0x21e/0x9e0 [ 26.005279][ T566] ? __kasan_check_write+0x14/0x20 [ 26.010223][ T566] ? create_io_thread+0x1e0/0x1e0 [ 26.015089][ T566] __x64_sys_clone+0x23f/0x290 [ 26.019693][ T566] ? __do_sys_vfork+0x130/0x130 [ 26.024375][ T566] ? debug_smp_processor_id+0x17/0x20 [ 26.029755][ T566] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 26.035756][ T566] ? exit_to_user_mode_prepare+0x39/0xa0 [ 26.041225][ T566] x64_sys_call+0x1b0/0x9a0 [ 26.045563][ T566] do_syscall_64+0x3b/0xb0 [ 26.049820][ T566] ? clear_bhb_loop+0x35/0x90 [ 26.054330][ T566] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.060057][ T566] RIP: 0033:0x7f66241b2ff9 [ 26.064314][ T566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.083839][ T566] RSP: 002b:00007f6622e2bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 26.092085][ T566] RAX: ffffffffffffffda RBX: 00007f662436af80 RCX: 00007f66241b2ff9 [ 26.099896][ T566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 26.107979][ T566] RBP: 00007f6622e2c090 R08: 0000000000000000 R09: 0000000000000000 [ 26.115778][ T566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 26.123589][ T566] R13: 0000000000000000 R14: 00007f662436af80 R15: 00007fff96d882e8 [ 26.131406][ T566] [ 26.135420][ T566] cgroup: fork rejected by pids controller in /syz3 [ 26.274885][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.282126][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.305883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.313484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.332850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.341235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.350128][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.356990][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.366213][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.374808][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.382986][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.389837][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.408178][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.416369][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.424467][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.432501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.462339][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.470511][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.515298][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.525140][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.540594][ T528] device veth0_vlan entered promiscuous mode [ 26.552454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.559732][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.580701][ T594] device syzkaller0 entered promiscuous mode [ 26.587470][ T592] tun0: tun_chr_ioctl cmd 35108 [ 26.623817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.632610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.641678][ T528] device veth1_macvtap entered promiscuous mode [ 26.686327][ T601] FAULT_INJECTION: forcing a failure. [ 26.686327][ T601] name failslab, interval 1, probability 0, space 0, times 0 [ 26.703470][ T597] device sit0 entered promiscuous mode [ 26.709434][ T601] CPU: 0 PID: 601 Comm: syz.2.75 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 26.718881][ T601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 26.728788][ T601] Call Trace: [ 26.731906][ T601] [ 26.734681][ T601] dump_stack_lvl+0x151/0x1c0 [ 26.739285][ T601] ? io_uring_drop_tctx_refs+0x190/0x190 [ 26.744748][ T601] dump_stack+0x15/0x20 [ 26.748742][ T601] should_fail+0x3c6/0x510 [ 26.752993][ T601] __should_failslab+0xa4/0xe0 [ 26.757678][ T601] ? anon_vma_clone+0x9a/0x500 [ 26.762276][ T601] should_failslab+0x9/0x20 [ 26.766617][ T601] slab_pre_alloc_hook+0x37/0xd0 [ 26.771390][ T601] ? anon_vma_clone+0x9a/0x500 [ 26.775993][ T601] kmem_cache_alloc+0x44/0x200 [ 26.780600][ T601] anon_vma_clone+0x9a/0x500 [ 26.785017][ T601] anon_vma_fork+0x91/0x4e0 [ 26.789358][ T601] ? anon_vma_name+0x43/0x70 [ 26.793794][ T601] ? vm_area_dup+0x17a/0x230 [ 26.798216][ T601] copy_mm+0xa3a/0x13e0 [ 26.802208][ T601] ? copy_signal+0x610/0x610 [ 26.806729][ T601] ? __init_rwsem+0xfe/0x1d0 [ 26.811142][ T601] ? copy_signal+0x4e3/0x610 [ 26.815567][ T601] copy_process+0x1149/0x3290 [ 26.820080][ T601] ? __kasan_check_write+0x14/0x20 [ 26.825032][ T601] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 26.829978][ T601] ? vfs_write+0x94d/0x1110 [ 26.834325][ T601] kernel_clone+0x21e/0x9e0 [ 26.838657][ T601] ? __kasan_check_write+0x14/0x20 [ 26.843607][ T601] ? create_io_thread+0x1e0/0x1e0 [ 26.849080][ T601] __x64_sys_clone+0x23f/0x290 [ 26.853674][ T601] ? __do_sys_vfork+0x130/0x130 [ 26.858367][ T601] ? debug_smp_processor_id+0x17/0x20 [ 26.863565][ T601] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 26.869473][ T601] ? exit_to_user_mode_prepare+0x39/0xa0 [ 26.874935][ T601] x64_sys_call+0x1b0/0x9a0 [ 26.879276][ T601] do_syscall_64+0x3b/0xb0 [ 26.883701][ T601] ? clear_bhb_loop+0x35/0x90 [ 26.888214][ T601] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.894032][ T601] RIP: 0033:0x7fea208c3ff9 [ 26.898284][ T601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.917728][ T601] RSP: 002b:00007fea1f53cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 26.925968][ T601] RAX: ffffffffffffffda RBX: 00007fea20a7bf80 RCX: 00007fea208c3ff9 [ 26.933863][ T601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 26.941678][ T601] RBP: 00007fea1f53d090 R08: 0000000000000000 R09: 0000000000000000 [ 26.949495][ T601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 26.957299][ T601] R13: 0000000000000000 R14: 00007fea20a7bf80 R15: 00007ffe5ab88048 [ 26.965203][ T601] [ 26.970570][ T601] cgroup: fork rejected by pids controller in /syz2 [ 27.202729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.218923][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.227854][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.243207][ T615] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.289080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.297365][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.305865][ T595] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.314117][ T595] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.321623][ T595] device bridge_slave_0 entered promiscuous mode [ 27.328901][ T595] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.336008][ T595] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.343467][ T595] device bridge_slave_1 entered promiscuous mode [ 27.575543][ T30] audit: type=1400 audit(1729463320.121:130): avc: denied { create } for pid=630 comm="syz.4.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.673645][ T629] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.680582][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.688116][ T629] device bridge_slave_0 entered promiscuous mode [ 27.694963][ T629] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.702190][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.710340][ T629] device bridge_slave_1 entered promiscuous mode [ 27.724822][ T645] FAULT_INJECTION: forcing a failure. [ 27.724822][ T645] name failslab, interval 1, probability 0, space 0, times 0 [ 27.737318][ T645] CPU: 1 PID: 645 Comm: syz.0.87 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 27.746685][ T645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 27.756582][ T645] Call Trace: [ 27.759706][ T645] [ 27.762480][ T645] dump_stack_lvl+0x151/0x1c0 [ 27.766994][ T645] ? io_uring_drop_tctx_refs+0x190/0x190 [ 27.772468][ T645] dump_stack+0x15/0x20 [ 27.776628][ T645] should_fail+0x3c6/0x510 [ 27.780881][ T645] __should_failslab+0xa4/0xe0 [ 27.785480][ T645] ? vm_area_dup+0x26/0x230 [ 27.789829][ T645] should_failslab+0x9/0x20 [ 27.794155][ T645] slab_pre_alloc_hook+0x37/0xd0 [ 27.798930][ T645] ? vm_area_dup+0x26/0x230 [ 27.803274][ T645] kmem_cache_alloc+0x44/0x200 [ 27.807873][ T645] vm_area_dup+0x26/0x230 [ 27.812040][ T645] copy_mm+0x9a1/0x13e0 [ 27.816035][ T645] ? copy_signal+0x610/0x610 [ 27.820457][ T645] ? __init_rwsem+0xfe/0x1d0 [ 27.824882][ T645] ? copy_signal+0x4e3/0x610 [ 27.829311][ T645] copy_process+0x1149/0x3290 [ 27.833828][ T645] ? __kasan_check_write+0x14/0x20 [ 27.838774][ T645] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 27.843719][ T645] ? vfs_write+0x94d/0x1110 [ 27.848058][ T645] kernel_clone+0x21e/0x9e0 [ 27.852406][ T645] ? __kasan_check_write+0x14/0x20 [ 27.857343][ T645] ? create_io_thread+0x1e0/0x1e0 [ 27.862206][ T645] __x64_sys_clone+0x23f/0x290 [ 27.866804][ T645] ? __do_sys_vfork+0x130/0x130 [ 27.871492][ T645] ? debug_smp_processor_id+0x17/0x20 [ 27.876699][ T645] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 27.882605][ T645] ? exit_to_user_mode_prepare+0x39/0xa0 [ 27.888069][ T645] x64_sys_call+0x1b0/0x9a0 [ 27.892410][ T645] do_syscall_64+0x3b/0xb0 [ 27.896662][ T645] ? clear_bhb_loop+0x35/0x90 [ 27.901177][ T645] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.906901][ T645] RIP: 0033:0x7f9756ab2ff9 [ 27.911156][ T645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.930774][ T645] RSP: 002b:00007f975572bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 27.939013][ T645] RAX: ffffffffffffffda RBX: 00007f9756c6af80 RCX: 00007f9756ab2ff9 [ 27.946825][ T645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 27.954637][ T645] RBP: 00007f975572c090 R08: 0000000000000000 R09: 0000000000000000 [ 27.962534][ T645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 27.970344][ T645] R13: 0000000000000000 R14: 00007f9756c6af80 R15: 00007ffffd4c40c8 [ 27.978162][ T645] [ 28.006825][ T289] cgroup: fork rejected by pids controller in /syz0 [ 28.015403][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.026204][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.033870][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.042217][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.050194][ T583] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.057046][ T583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.064292][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.080309][ T30] audit: type=1400 audit(1729463320.621:131): avc: denied { create } for pid=647 comm="syz.4.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.105811][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.114038][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.122030][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.128867][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.160855][ T289] syz-executor (289) used greatest stack depth: 20448 bytes left [ 28.184432][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.232163][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.248236][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.261744][ T631] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.268667][ T631] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.276008][ T631] device bridge_slave_0 entered promiscuous mode [ 28.284983][ T631] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.291974][ T631] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.299204][ T631] device bridge_slave_1 entered promiscuous mode [ 28.325052][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.333021][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.340287][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.366970][ T8] device bridge_slave_1 left promiscuous mode [ 28.372979][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.382310][ T8] device bridge_slave_0 left promiscuous mode [ 28.388331][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.396610][ T8] device veth1_macvtap left promiscuous mode [ 28.458880][ T595] device veth0_vlan entered promiscuous mode [ 28.475795][ T664] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.489333][ T664] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.504988][ T665] device bridge_slave_1 left promiscuous mode [ 28.510937][ T665] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.518329][ T665] device bridge_slave_0 left promiscuous mode [ 28.524397][ T665] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.589813][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.598132][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.607063][ T595] device veth1_macvtap entered promiscuous mode [ 28.655931][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.666420][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.674807][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.683575][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.691671][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.789235][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.803390][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.814647][ T661] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.821580][ T661] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.828929][ T661] device bridge_slave_0 entered promiscuous mode [ 28.835882][ T661] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.843019][ T661] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.850262][ T661] device bridge_slave_1 entered promiscuous mode [ 28.870107][ T678] device wg2 entered promiscuous mode [ 28.886343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.899442][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.925600][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.932466][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.992183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.020041][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.028445][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.037181][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.044030][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.051330][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.059535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.067499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.075731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.147961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.157032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.189414][ T629] device veth0_vlan entered promiscuous mode [ 29.198494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.206478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.215916][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.223466][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.230727][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.239485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.247741][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.254591][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.263200][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.271439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.280536][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.287399][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.295363][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.303312][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.310668][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.317996][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.379167][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.389490][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.397549][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.405892][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.418000][ T629] device veth1_macvtap entered promiscuous mode [ 29.433440][ T631] device veth0_vlan entered promiscuous mode [ 29.464163][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.474108][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.482073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.499929][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.508394][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.534706][ T691] FAULT_INJECTION: forcing a failure. [ 29.534706][ T691] name failslab, interval 1, probability 0, space 0, times 0 [ 29.547207][ T691] CPU: 1 PID: 691 Comm: syz.4.99 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 29.556664][ T691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 29.567084][ T691] Call Trace: [ 29.570308][ T691] [ 29.573073][ T691] dump_stack_lvl+0x151/0x1c0 [ 29.577587][ T691] ? io_uring_drop_tctx_refs+0x190/0x190 [ 29.583059][ T691] dump_stack+0x15/0x20 [ 29.587049][ T691] should_fail+0x3c6/0x510 [ 29.591303][ T691] __should_failslab+0xa4/0xe0 [ 29.595901][ T691] ? vm_area_dup+0x26/0x230 [ 29.600256][ T691] should_failslab+0x9/0x20 [ 29.604579][ T691] slab_pre_alloc_hook+0x37/0xd0 [ 29.609356][ T691] ? vm_area_dup+0x26/0x230 [ 29.613694][ T691] kmem_cache_alloc+0x44/0x200 [ 29.618294][ T691] vm_area_dup+0x26/0x230 [ 29.622457][ T691] copy_mm+0x9a1/0x13e0 [ 29.626539][ T691] ? copy_signal+0x610/0x610 [ 29.630962][ T691] ? __init_rwsem+0xfe/0x1d0 [ 29.635391][ T691] ? copy_signal+0x4e3/0x610 [ 29.639816][ T691] copy_process+0x1149/0x3290 [ 29.644339][ T691] ? __kasan_check_write+0x14/0x20 [ 29.649302][ T691] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 29.654225][ T691] ? vfs_write+0x94d/0x1110 [ 29.658564][ T691] kernel_clone+0x21e/0x9e0 [ 29.662907][ T691] ? __kasan_check_write+0x14/0x20 [ 29.667851][ T691] ? create_io_thread+0x1e0/0x1e0 [ 29.672714][ T691] __x64_sys_clone+0x23f/0x290 [ 29.677313][ T691] ? __do_sys_vfork+0x130/0x130 [ 29.681997][ T691] ? debug_smp_processor_id+0x17/0x20 [ 29.687211][ T691] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 29.693110][ T691] ? exit_to_user_mode_prepare+0x39/0xa0 [ 29.698573][ T691] x64_sys_call+0x1b0/0x9a0 [ 29.702915][ T691] do_syscall_64+0x3b/0xb0 [ 29.707165][ T691] ? clear_bhb_loop+0x35/0x90 [ 29.711679][ T691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 29.717419][ T691] RIP: 0033:0x7f5a190a2ff9 [ 29.721660][ T691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.741104][ T691] RSP: 002b:00007f5a17d1bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 29.749353][ T691] RAX: ffffffffffffffda RBX: 00007f5a1925af80 RCX: 00007f5a190a2ff9 [ 29.757161][ T691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 29.764970][ T691] RBP: 00007f5a17d1c090 R08: 0000000000000000 R09: 0000000000000000 [ 29.772785][ T691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 29.780767][ T691] R13: 0000000000000000 R14: 00007f5a1925af80 R15: 00007ffcd3259dc8 [ 29.788584][ T691] [ 29.797406][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.805819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.813244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.821367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.829603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.837670][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.855067][ T291] cgroup: fork rejected by pids controller in /syz4 [ 29.870229][ T631] device veth1_macvtap entered promiscuous mode [ 29.883941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.892167][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.900066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.910904][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.918919][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.943553][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.951569][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.004689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.014795][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.041894][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.059435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.069979][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.076842][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.085669][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.094484][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.102602][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.109475][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.117474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.198701][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.206603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.214620][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.222754][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.357198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.365715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.453338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.461225][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.469410][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.476858][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.485036][ T661] device veth0_vlan entered promiscuous mode [ 30.496223][ T701] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.503114][ T701] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.510279][ T701] device bridge_slave_0 entered promiscuous mode [ 30.525107][ T661] device veth1_macvtap entered promiscuous mode [ 30.538825][ T701] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.546139][ T701] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.553988][ T701] device bridge_slave_1 entered promiscuous mode [ 30.560619][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.568870][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.577680][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.585665][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.594026][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.603060][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.613438][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.726951][ T720] device syzkaller0 entered promiscuous mode [ 30.925723][ T701] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.932609][ T701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.939685][ T701] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.946498][ T701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.970876][ T8] device bridge_slave_1 left promiscuous mode [ 30.977666][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.984997][ T8] device bridge_slave_0 left promiscuous mode [ 30.990972][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.032636][ T8] device bridge_slave_1 left promiscuous mode [ 31.038738][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.048669][ T736] FAULT_INJECTION: forcing a failure. [ 31.048669][ T736] name failslab, interval 1, probability 0, space 0, times 0 [ 31.063698][ T736] CPU: 0 PID: 736 Comm: syz.3.111 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 31.073239][ T736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 31.083135][ T736] Call Trace: [ 31.086253][ T736] [ 31.089037][ T736] dump_stack_lvl+0x151/0x1c0 [ 31.093637][ T736] ? io_uring_drop_tctx_refs+0x190/0x190 [ 31.099105][ T736] dump_stack+0x15/0x20 [ 31.103095][ T736] should_fail+0x3c6/0x510 [ 31.107349][ T736] __should_failslab+0xa4/0xe0 [ 31.111966][ T736] ? anon_vma_clone+0x9a/0x500 [ 31.116544][ T736] should_failslab+0x9/0x20 [ 31.120884][ T736] slab_pre_alloc_hook+0x37/0xd0 [ 31.125669][ T736] ? anon_vma_clone+0x9a/0x500 [ 31.130257][ T736] kmem_cache_alloc+0x44/0x200 [ 31.134859][ T736] anon_vma_clone+0x9a/0x500 [ 31.139283][ T736] anon_vma_fork+0x91/0x4e0 [ 31.143622][ T736] ? anon_vma_name+0x43/0x70 [ 31.148050][ T736] ? vm_area_dup+0x17a/0x230 [ 31.152476][ T736] copy_mm+0xa3a/0x13e0 [ 31.156489][ T736] ? copy_signal+0x610/0x610 [ 31.160896][ T736] ? __init_rwsem+0xfe/0x1d0 [ 31.165365][ T736] ? copy_signal+0x4e3/0x610 [ 31.169749][ T736] copy_process+0x1149/0x3290 [ 31.174262][ T736] ? __kasan_check_write+0x14/0x20 [ 31.179212][ T736] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 31.184162][ T736] ? vfs_write+0x94d/0x1110 [ 31.188498][ T736] kernel_clone+0x21e/0x9e0 [ 31.192835][ T736] ? __kasan_check_write+0x14/0x20 [ 31.197782][ T736] ? create_io_thread+0x1e0/0x1e0 [ 31.202661][ T736] __x64_sys_clone+0x23f/0x290 [ 31.207242][ T736] ? __do_sys_vfork+0x130/0x130 [ 31.211953][ T736] ? debug_smp_processor_id+0x17/0x20 [ 31.217137][ T736] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 31.223127][ T736] ? exit_to_user_mode_prepare+0x39/0xa0 [ 31.228593][ T736] x64_sys_call+0x1b0/0x9a0 [ 31.232932][ T736] do_syscall_64+0x3b/0xb0 [ 31.237183][ T736] ? clear_bhb_loop+0x35/0x90 [ 31.241696][ T736] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.247429][ T736] RIP: 0033:0x7f1e565ccff9 [ 31.251680][ T736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.271129][ T736] RSP: 002b:00007f1e55245fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 31.279450][ T736] RAX: ffffffffffffffda RBX: 00007f1e56784f80 RCX: 00007f1e565ccff9 [ 31.287264][ T736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 31.295077][ T736] RBP: 00007f1e55246090 R08: 0000000000000000 R09: 0000000000000000 [ 31.302886][ T736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 31.310694][ T736] R13: 0000000000000000 R14: 00007f1e56784f80 R15: 00007ffd32420c98 [ 31.318525][ T736] [ 31.321959][ T8] device bridge_slave_0 left promiscuous mode [ 31.328203][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.343832][ T8] device bridge_slave_1 left promiscuous mode [ 31.354906][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.363293][ T8] device bridge_slave_0 left promiscuous mode [ 31.369235][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.378692][ T8] device veth1_macvtap left promiscuous mode [ 31.384539][ T8] device veth0_vlan left promiscuous mode [ 31.391470][ T8] device veth1_macvtap left promiscuous mode [ 31.398180][ T8] device veth0_vlan left promiscuous mode [ 31.404149][ T8] device veth1_macvtap left promiscuous mode [ 31.650810][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.665160][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.686169][ T752] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.695448][ T752] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.744843][ T723] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.751810][ T723] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.759194][ T723] device bridge_slave_0 entered promiscuous mode [ 31.791910][ T753] device bridge_slave_1 left promiscuous mode [ 31.798226][ T753] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.839028][ T753] device bridge_slave_0 left promiscuous mode [ 31.845306][ T753] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.852275][ T30] audit: type=1400 audit(1729463324.391:132): avc: denied { create } for pid=758 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.926517][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.934300][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.952791][ T723] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.959706][ T723] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.967147][ T723] device bridge_slave_1 entered promiscuous mode [ 32.003408][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.011563][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.031666][ T583] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.038536][ T583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.058417][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.066631][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.074902][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.081757][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.095873][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 32.104156][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.121303][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 32.129588][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.373555][ T756] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.380424][ T756] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.389765][ T756] device bridge_slave_0 entered promiscuous mode [ 32.397050][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.406740][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.450689][ T756] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.458954][ T756] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.466552][ T756] device bridge_slave_1 entered promiscuous mode [ 32.474228][ T701] device veth0_vlan entered promiscuous mode [ 32.482533][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.490389][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.498650][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.506105][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.672699][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.680860][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.710169][ T701] device veth1_macvtap entered promiscuous mode [ 32.832716][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.853159][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.871136][ T785] FAULT_INJECTION: forcing a failure. [ 32.871136][ T785] name failslab, interval 1, probability 0, space 0, times 0 [ 32.884063][ T785] CPU: 1 PID: 785 Comm: syz.0.123 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 32.893609][ T785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 32.903512][ T785] Call Trace: [ 32.906628][ T785] [ 32.909401][ T785] dump_stack_lvl+0x151/0x1c0 [ 32.913915][ T785] ? io_uring_drop_tctx_refs+0x190/0x190 [ 32.919384][ T785] dump_stack+0x15/0x20 [ 32.923376][ T785] should_fail+0x3c6/0x510 [ 32.927631][ T785] __should_failslab+0xa4/0xe0 [ 32.932233][ T785] ? anon_vma_clone+0x9a/0x500 [ 32.936830][ T785] should_failslab+0x9/0x20 [ 32.941167][ T785] slab_pre_alloc_hook+0x37/0xd0 [ 32.945939][ T785] ? anon_vma_clone+0x9a/0x500 [ 32.950538][ T785] kmem_cache_alloc+0x44/0x200 [ 32.955143][ T785] anon_vma_clone+0x9a/0x500 [ 32.959571][ T785] anon_vma_fork+0x91/0x4e0 [ 32.963907][ T785] ? anon_vma_name+0x43/0x70 [ 32.968331][ T785] ? vm_area_dup+0x17a/0x230 [ 32.972759][ T785] copy_mm+0xa3a/0x13e0 [ 32.976768][ T785] ? copy_signal+0x610/0x610 [ 32.981237][ T785] ? __init_rwsem+0xfe/0x1d0 [ 32.985602][ T785] ? copy_signal+0x4e3/0x610 [ 32.990027][ T785] copy_process+0x1149/0x3290 [ 32.994548][ T785] ? __kasan_check_write+0x14/0x20 [ 32.999498][ T785] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 33.004436][ T785] ? vfs_write+0x94d/0x1110 [ 33.008781][ T785] kernel_clone+0x21e/0x9e0 [ 33.013119][ T785] ? __kasan_check_write+0x14/0x20 [ 33.018076][ T785] ? create_io_thread+0x1e0/0x1e0 [ 33.022929][ T785] __x64_sys_clone+0x23f/0x290 [ 33.027525][ T785] ? __do_sys_vfork+0x130/0x130 [ 33.032214][ T785] ? debug_smp_processor_id+0x17/0x20 [ 33.037426][ T785] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 33.043325][ T785] ? exit_to_user_mode_prepare+0x39/0xa0 [ 33.048798][ T785] x64_sys_call+0x1b0/0x9a0 [ 33.053129][ T785] do_syscall_64+0x3b/0xb0 [ 33.057378][ T785] ? clear_bhb_loop+0x35/0x90 [ 33.061893][ T785] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 33.067711][ T785] RIP: 0033:0x7f28bf360ff9 [ 33.071966][ T785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.091402][ T785] RSP: 002b:00007f28bdfd9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 33.099648][ T785] RAX: ffffffffffffffda RBX: 00007f28bf518f80 RCX: 00007f28bf360ff9 [ 33.107459][ T785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 33.115270][ T785] RBP: 00007f28bdfda090 R08: 0000000000000000 R09: 0000000000000000 [ 33.123082][ T785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 33.130981][ T785] R13: 0000000000000000 R14: 00007f28bf518f80 R15: 00007ffd09cd1428 [ 33.138798][ T785] [ 33.152470][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.163062][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.288337][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.297317][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.322632][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.330854][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.338823][ T583] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.345680][ T583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.353727][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 33.362257][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.370332][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.377184][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.384530][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.392392][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.399557][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.407810][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.415979][ T583] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.422839][ T583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.430006][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 33.437626][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 33.472308][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 33.480745][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.489351][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.496225][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.504854][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 33.514016][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.522527][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.530521][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.538844][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.586226][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.599549][ T30] audit: type=1400 audit(1729463326.141:133): avc: denied { create } for pid=811 comm="syz.2.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.607648][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.681477][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.712384][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.720644][ T30] audit: type=1400 audit(1729463326.151:134): avc: denied { setopt } for pid=811 comm="syz.2.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.757358][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.765808][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.773956][ T723] device veth0_vlan entered promiscuous mode [ 33.833686][ T723] device veth1_macvtap entered promiscuous mode [ 33.844133][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.852445][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.860626][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.892162][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.930458][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.978339][ T756] device veth0_vlan entered promiscuous mode [ 33.992726][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.002289][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.020920][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.049454][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.108602][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.159590][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.232491][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.302441][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.351464][ T756] device veth1_macvtap entered promiscuous mode [ 34.371924][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.382043][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.403537][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.419736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.428123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.461438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.476034][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.536226][ T819] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.543176][ T819] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.550439][ T819] device bridge_slave_0 entered promiscuous mode [ 34.558476][ T819] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.565694][ T819] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.573084][ T819] device bridge_slave_1 entered promiscuous mode [ 34.756232][ T819] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.763097][ T819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.770153][ T819] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.776983][ T819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.812408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.819994][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.827118][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.843797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.852043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.859955][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.866793][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.875003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.884058][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.892242][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.899063][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.918424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.926247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.935195][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.943314][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.963827][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.972253][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.983141][ T8] device bridge_slave_1 left promiscuous mode [ 34.989115][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.002673][ T841] FAULT_INJECTION: forcing a failure. [ 35.002673][ T841] name failslab, interval 1, probability 0, space 0, times 0 [ 35.018535][ T8] device bridge_slave_0 left promiscuous mode [ 35.032108][ T841] CPU: 1 PID: 841 Comm: syz.2.135 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 35.033680][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.041660][ T841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 35.058395][ T841] Call Trace: [ 35.061520][ T841] [ 35.064317][ T841] dump_stack_lvl+0x151/0x1c0 [ 35.068815][ T841] ? io_uring_drop_tctx_refs+0x190/0x190 [ 35.074280][ T841] dump_stack+0x15/0x20 [ 35.078271][ T841] should_fail+0x3c6/0x510 [ 35.082526][ T841] __should_failslab+0xa4/0xe0 [ 35.087129][ T841] ? anon_vma_clone+0x9a/0x500 [ 35.091747][ T841] should_failslab+0x9/0x20 [ 35.096065][ T841] slab_pre_alloc_hook+0x37/0xd0 [ 35.100843][ T841] ? anon_vma_clone+0x9a/0x500 [ 35.105523][ T841] kmem_cache_alloc+0x44/0x200 [ 35.110128][ T841] anon_vma_clone+0x9a/0x500 [ 35.114557][ T841] anon_vma_fork+0x91/0x4e0 [ 35.118890][ T841] ? anon_vma_name+0x43/0x70 [ 35.123321][ T841] ? vm_area_dup+0x17a/0x230 [ 35.127746][ T841] copy_mm+0xa3a/0x13e0 [ 35.131745][ T841] ? copy_signal+0x610/0x610 [ 35.136162][ T841] ? __init_rwsem+0xfe/0x1d0 [ 35.140590][ T841] ? copy_signal+0x4e3/0x610 [ 35.145016][ T841] copy_process+0x1149/0x3290 [ 35.149528][ T841] ? __kasan_check_write+0x14/0x20 [ 35.154479][ T841] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 35.159422][ T841] ? vfs_write+0x94d/0x1110 [ 35.163769][ T841] kernel_clone+0x21e/0x9e0 [ 35.168103][ T841] ? __kasan_check_write+0x14/0x20 [ 35.173051][ T841] ? create_io_thread+0x1e0/0x1e0 [ 35.177914][ T841] __x64_sys_clone+0x23f/0x290 [ 35.182512][ T841] ? __do_sys_vfork+0x130/0x130 [ 35.187199][ T841] ? debug_smp_processor_id+0x17/0x20 [ 35.192408][ T841] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 35.198307][ T841] ? exit_to_user_mode_prepare+0x39/0xa0 [ 35.203778][ T841] x64_sys_call+0x1b0/0x9a0 [ 35.208115][ T841] do_syscall_64+0x3b/0xb0 [ 35.212368][ T841] ? clear_bhb_loop+0x35/0x90 [ 35.216890][ T841] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.222610][ T841] RIP: 0033:0x7fa2f5daaff9 [ 35.226862][ T841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.246301][ T841] RSP: 002b:00007fa2f4a23fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 35.254547][ T841] RAX: ffffffffffffffda RBX: 00007fa2f5f62f80 RCX: 00007fa2f5daaff9 [ 35.262358][ T841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 35.270170][ T841] RBP: 00007fa2f4a24090 R08: 0000000000000000 R09: 0000000000000000 [ 35.277984][ T841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 35.285796][ T841] R13: 0000000000000000 R14: 00007fa2f5f62f80 R15: 00007ffc2b095a58 [ 35.293611][ T841] [ 35.298705][ T8] device bridge_slave_1 left promiscuous mode [ 35.305973][ T30] audit: type=1400 audit(1729463327.851:135): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 35.316592][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.335770][ T30] audit: type=1400 audit(1729463327.851:136): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 35.357964][ T8] device bridge_slave_0 left promiscuous mode [ 35.364080][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.373297][ T8] device veth1_macvtap left promiscuous mode [ 35.379173][ T8] device veth0_vlan left promiscuous mode [ 35.385050][ T8] device veth1_macvtap left promiscuous mode [ 35.390849][ T8] device veth0_vlan left promiscuous mode [ 35.396718][ T8] device veth1_macvtap left promiscuous mode [ 35.402548][ T8] device veth0_vlan left promiscuous mode [ 35.599220][ T819] device veth0_vlan entered promiscuous mode [ 35.652510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.660323][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.668805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.676183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.690727][ T819] device veth1_macvtap entered promiscuous mode [ 35.724242][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.778480][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.786858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.794475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.802937][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.834271][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.843556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.047300][ T30] audit: type=1400 audit(1729463328.591:137): avc: denied { write } for pid=870 comm="syz.3.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.072068][ T844] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.079271][ T30] audit: type=1400 audit(1729463328.611:138): avc: denied { read } for pid=870 comm="syz.3.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.101046][ T844] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.114851][ T844] device bridge_slave_0 entered promiscuous mode [ 36.148159][ T844] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.155498][ T844] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.162799][ T844] device bridge_slave_1 entered promiscuous mode [ 36.183416][ T853] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.184229][ T892] FAULT_INJECTION: forcing a failure. [ 36.184229][ T892] name failslab, interval 1, probability 0, space 0, times 0 [ 36.190268][ T853] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.209878][ T892] CPU: 0 PID: 892 Comm: syz.3.147 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 36.210582][ T853] device bridge_slave_0 entered promiscuous mode [ 36.219405][ T892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 36.219417][ T892] Call Trace: [ 36.219422][ T892] [ 36.219428][ T892] dump_stack_lvl+0x151/0x1c0 [ 36.219454][ T892] ? io_uring_drop_tctx_refs+0x190/0x190 [ 36.226562][ T853] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.235467][ T892] dump_stack+0x15/0x20 [ 36.235491][ T892] should_fail+0x3c6/0x510 [ 36.238625][ T853] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.241366][ T892] __should_failslab+0xa4/0xe0 [ 36.246388][ T853] device bridge_slave_1 entered promiscuous mode [ 36.251349][ T892] ? anon_vma_fork+0xf7/0x4e0 [ 36.251368][ T892] should_failslab+0x9/0x20 [ 36.292924][ T892] slab_pre_alloc_hook+0x37/0xd0 [ 36.297692][ T892] ? anon_vma_fork+0xf7/0x4e0 [ 36.302210][ T892] kmem_cache_alloc+0x44/0x200 [ 36.306808][ T892] anon_vma_fork+0xf7/0x4e0 [ 36.311146][ T892] ? anon_vma_name+0x43/0x70 [ 36.315571][ T892] ? vm_area_dup+0x17a/0x230 [ 36.320000][ T892] copy_mm+0xa3a/0x13e0 [ 36.324008][ T892] ? copy_signal+0x610/0x610 [ 36.328420][ T892] ? __init_rwsem+0xfe/0x1d0 [ 36.332847][ T892] ? copy_signal+0x4e3/0x610 [ 36.337273][ T892] copy_process+0x1149/0x3290 [ 36.341785][ T892] ? __kasan_check_write+0x14/0x20 [ 36.346735][ T892] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 36.351679][ T892] ? vfs_write+0x94d/0x1110 [ 36.356022][ T892] kernel_clone+0x21e/0x9e0 [ 36.360360][ T892] ? __kasan_check_write+0x14/0x20 [ 36.365306][ T892] ? create_io_thread+0x1e0/0x1e0 [ 36.370170][ T892] __x64_sys_clone+0x23f/0x290 [ 36.374766][ T892] ? __do_sys_vfork+0x130/0x130 [ 36.379455][ T892] ? debug_smp_processor_id+0x17/0x20 [ 36.384663][ T892] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 36.390648][ T892] ? exit_to_user_mode_prepare+0x39/0xa0 [ 36.396121][ T892] x64_sys_call+0x1b0/0x9a0 [ 36.400459][ T892] do_syscall_64+0x3b/0xb0 [ 36.404716][ T892] ? clear_bhb_loop+0x35/0x90 [ 36.409225][ T892] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 36.414951][ T892] RIP: 0033:0x7f3afe227ff9 [ 36.419205][ T892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.438644][ T892] RSP: 002b:00007f3afcea0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 36.446889][ T892] RAX: ffffffffffffffda RBX: 00007f3afe3dff80 RCX: 00007f3afe227ff9 [ 36.454700][ T892] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.462515][ T892] RBP: 00007f3afcea1090 R08: 0000000000000000 R09: 0000000000000000 [ 36.470329][ T892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 36.478133][ T892] R13: 0000000000000000 R14: 00007f3afe3dff80 R15: 00007fff6ece2eb8 [ 36.485951][ T892] [ 36.601320][ T907] device pim6reg1 entered promiscuous mode [ 36.638943][ T912] device pim6reg1 entered promiscuous mode [ 36.666231][ T844] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.673110][ T844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.680164][ T844] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.686985][ T844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.705657][ T853] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.712506][ T853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.719573][ T853] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.726417][ T853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.879998][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.887509][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.894906][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.903289][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.910406][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.954815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.962330][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.970453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.979131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.987281][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.994136][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.002109][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.010235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.018395][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.025246][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.032626][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.040720][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.048748][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.055588][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.062907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.071031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.079104][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.085936][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.112804][ T916] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.122008][ T916] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.129194][ T916] device bridge_slave_0 entered promiscuous mode [ 37.137450][ T916] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.144325][ T916] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.151441][ T916] device bridge_slave_1 entered promiscuous mode [ 37.157954][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.165862][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.173725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.181613][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.189459][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.197322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.222422][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.230457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.258461][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.267265][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.280386][ T844] device veth0_vlan entered promiscuous mode [ 37.300081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.308299][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.316686][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.324574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.332509][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.339761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.368296][ T844] device veth1_macvtap entered promiscuous mode [ 37.381275][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.389444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.397747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.408024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.415865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.424039][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.431355][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.442358][ T853] device veth0_vlan entered promiscuous mode [ 37.465343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.473524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.489824][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.498195][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.520980][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.534296][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.543757][ T853] device veth1_macvtap entered promiscuous mode [ 37.565426][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.573047][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.581143][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.592697][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.600675][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.642414][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.649738][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.658771][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.667036][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.673913][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.681258][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.698112][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.706204][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.713077][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.727624][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.743117][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.757679][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.769462][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.777378][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.784869][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.793555][ T916] device veth0_vlan entered promiscuous mode [ 37.811517][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.820731][ T916] device veth1_macvtap entered promiscuous mode [ 37.830390][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.847986][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.952986][ T8] device bridge_slave_1 left promiscuous mode [ 37.958931][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.966546][ T8] device bridge_slave_0 left promiscuous mode [ 37.972595][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.982582][ T8] device bridge_slave_1 left promiscuous mode [ 37.989317][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.996939][ T8] device bridge_slave_0 left promiscuous mode [ 38.002976][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.010704][ T8] device bridge_slave_1 left promiscuous mode [ 38.016709][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.024138][ T8] device bridge_slave_0 left promiscuous mode [ 38.030039][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.038664][ T8] device veth1_macvtap left promiscuous mode [ 38.044725][ T8] device veth1_macvtap left promiscuous mode [ 38.050519][ T8] device veth0_vlan left promiscuous mode [ 38.056492][ T8] device veth1_macvtap left promiscuous mode [ 38.062301][ T8] device veth0_vlan left promiscuous mode [ 38.068110][ T8] device veth1_macvtap left promiscuous mode [ 38.074171][ T8] device veth0_vlan left promiscuous mode [ 38.260195][ T946] FAULT_INJECTION: forcing a failure. [ 38.260195][ T946] name failslab, interval 1, probability 0, space 0, times 0 [ 38.276880][ T946] CPU: 0 PID: 946 Comm: syz.4.161 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 38.286427][ T946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 38.296316][ T946] Call Trace: [ 38.299434][ T946] [ 38.302209][ T946] dump_stack_lvl+0x151/0x1c0 [ 38.306724][ T946] ? io_uring_drop_tctx_refs+0x190/0x190 [ 38.312194][ T946] dump_stack+0x15/0x20 [ 38.316187][ T946] should_fail+0x3c6/0x510 [ 38.320440][ T946] __should_failslab+0xa4/0xe0 [ 38.325035][ T946] ? anon_vma_fork+0x1df/0x4e0 [ 38.329761][ T946] should_failslab+0x9/0x20 [ 38.334099][ T946] slab_pre_alloc_hook+0x37/0xd0 [ 38.338875][ T946] ? anon_vma_fork+0x1df/0x4e0 [ 38.343477][ T946] kmem_cache_alloc+0x44/0x200 [ 38.348074][ T946] anon_vma_fork+0x1df/0x4e0 [ 38.352521][ T946] copy_mm+0xa3a/0x13e0 [ 38.356500][ T946] ? copy_signal+0x610/0x610 [ 38.360920][ T946] ? __init_rwsem+0xfe/0x1d0 [ 38.365442][ T946] ? copy_signal+0x4e3/0x610 [ 38.369864][ T946] copy_process+0x1149/0x3290 [ 38.374381][ T946] ? __kasan_check_write+0x14/0x20 [ 38.379331][ T946] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 38.384271][ T946] ? vfs_write+0x94d/0x1110 [ 38.388615][ T946] kernel_clone+0x21e/0x9e0 [ 38.392953][ T946] ? __kasan_check_write+0x14/0x20 [ 38.397916][ T946] ? create_io_thread+0x1e0/0x1e0 [ 38.402766][ T946] __x64_sys_clone+0x23f/0x290 [ 38.407359][ T946] ? __do_sys_vfork+0x130/0x130 [ 38.412053][ T946] ? debug_smp_processor_id+0x17/0x20 [ 38.417251][ T946] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 38.423267][ T946] ? exit_to_user_mode_prepare+0x39/0xa0 [ 38.428734][ T946] x64_sys_call+0x1b0/0x9a0 [ 38.433070][ T946] do_syscall_64+0x3b/0xb0 [ 38.437322][ T946] ? clear_bhb_loop+0x35/0x90 [ 38.441833][ T946] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.447564][ T946] RIP: 0033:0x7fe02217dff9 [ 38.451820][ T946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.471273][ T946] RSP: 002b:00007fe020df6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 38.479516][ T946] RAX: ffffffffffffffda RBX: 00007fe022335f80 RCX: 00007fe02217dff9 [ 38.487322][ T946] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 38.495124][ T946] RBP: 00007fe020df7090 R08: 0000000000000000 R09: 0000000000000000 [ 38.502940][ T946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 38.510872][ T946] R13: 0000000000000000 R14: 00007fe022335f80 R15: 00007ffe6a4887b8 [ 38.518709][ T946] [ 38.711325][ T952] device syzkaller0 entered promiscuous mode [ 38.956280][ T951] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.974054][ T951] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.994703][ T951] device bridge_slave_0 entered promiscuous mode [ 39.012931][ T951] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.031878][ T951] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.039168][ T951] device bridge_slave_1 entered promiscuous mode [ 39.070392][ T965] device veth1_macvtap left promiscuous mode [ 39.132827][ T976] bond_slave_1: mtu less than device minimum [ 39.139675][ T30] audit: type=1400 audit(1729463331.681:139): avc: denied { create } for pid=975 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 39.214962][ T970] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.246590][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.264275][ T970] device bridge_slave_0 entered promiscuous mode [ 39.285125][ T970] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.292165][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.299462][ T970] device bridge_slave_1 entered promiscuous mode [ 39.438092][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.447639][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.448277][ T999] FAULT_INJECTION: forcing a failure. [ 39.448277][ T999] name failslab, interval 1, probability 0, space 0, times 0 [ 39.473051][ T999] CPU: 1 PID: 999 Comm: syz.0.174 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 39.473201][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.482590][ T999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 39.482605][ T999] Call Trace: [ 39.482610][ T999] [ 39.482616][ T999] dump_stack_lvl+0x151/0x1c0 [ 39.496665][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.500385][ T999] ? io_uring_drop_tctx_refs+0x190/0x190 [ 39.506487][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.510799][ T999] dump_stack+0x15/0x20 [ 39.518640][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.524078][ T999] should_fail+0x3c6/0x510 [ 39.542864][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.546475][ T999] __should_failslab+0xa4/0xe0 [ 39.558978][ T999] ? anon_vma_clone+0x9a/0x500 [ 39.562291][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.563625][ T999] should_failslab+0x9/0x20 [ 39.563656][ T999] slab_pre_alloc_hook+0x37/0xd0 [ 39.577135][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.580496][ T999] ? anon_vma_clone+0x9a/0x500 [ 39.587410][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.591948][ T999] kmem_cache_alloc+0x44/0x200 [ 39.603596][ T999] anon_vma_clone+0x9a/0x500 [ 39.608013][ T999] anon_vma_fork+0x91/0x4e0 [ 39.612348][ T999] ? anon_vma_name+0x43/0x70 [ 39.613892][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.616772][ T999] ? vm_area_dup+0x17a/0x230 [ 39.628414][ T999] copy_mm+0xa3a/0x13e0 [ 39.632406][ T999] ? copy_signal+0x610/0x610 [ 39.636820][ T999] ? __init_rwsem+0xfe/0x1d0 [ 39.641248][ T999] ? copy_signal+0x4e3/0x610 [ 39.645675][ T999] copy_process+0x1149/0x3290 [ 39.650190][ T999] ? __kasan_check_write+0x14/0x20 [ 39.655139][ T999] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 39.660083][ T999] ? vfs_write+0x94d/0x1110 [ 39.664430][ T999] kernel_clone+0x21e/0x9e0 [ 39.668763][ T999] ? __kasan_check_write+0x14/0x20 [ 39.673712][ T999] ? create_io_thread+0x1e0/0x1e0 [ 39.678665][ T999] __x64_sys_clone+0x23f/0x290 [ 39.683262][ T999] ? __do_sys_vfork+0x130/0x130 [ 39.687952][ T999] ? debug_smp_processor_id+0x17/0x20 [ 39.693152][ T999] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 39.699051][ T999] ? exit_to_user_mode_prepare+0x39/0xa0 [ 39.704521][ T999] x64_sys_call+0x1b0/0x9a0 [ 39.708858][ T999] do_syscall_64+0x3b/0xb0 [ 39.713114][ T999] ? clear_bhb_loop+0x35/0x90 [ 39.717634][ T999] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.723504][ T999] RIP: 0033:0x7fa3e3454ff9 [ 39.727763][ T999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.747213][ T999] RSP: 002b:00007fa3e20cdfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 39.755444][ T999] RAX: ffffffffffffffda RBX: 00007fa3e360cf80 RCX: 00007fa3e3454ff9 [ 39.763254][ T999] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 39.771063][ T999] RBP: 00007fa3e20ce090 R08: 0000000000000000 R09: 0000000000000000 [ 39.778961][ T999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 39.786774][ T999] R13: 0000000000000000 R14: 00007fa3e360cf80 R15: 00007ffeafeb18c8 [ 39.794589][ T999] [ 39.830857][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.844102][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.875042][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.906302][ T951] device veth0_vlan entered promiscuous mode [ 39.913299][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.932019][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.940604][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.977439][ T951] device veth1_macvtap entered promiscuous mode [ 39.997621][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.028075][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.044703][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.232453][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.240715][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.271778][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.279909][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.287978][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.294840][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.302391][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.310545][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.318775][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.325639][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.333698][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.341860][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.349858][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.357706][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.365592][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.383423][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.391504][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.399716][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.407659][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.415714][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.423112][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.442088][ T970] device veth0_vlan entered promiscuous mode [ 40.478170][ T1029] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.485419][ T1029] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.492788][ T1029] device bridge_slave_0 entered promiscuous mode [ 40.499719][ T1029] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.506657][ T1029] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.513889][ T1029] device bridge_slave_1 entered promiscuous mode [ 40.529920][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.538034][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.550308][ T970] device veth1_macvtap entered promiscuous mode [ 40.583643][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.590991][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.599117][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.622683][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.630641][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.673751][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.682905][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.690870][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.697724][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.705133][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.717899][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.725943][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.732898][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.745864][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.761607][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.775825][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.787282][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.795086][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.802739][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.817576][ T1029] device veth0_vlan entered promiscuous mode [ 40.827834][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.837050][ T1029] device veth1_macvtap entered promiscuous mode [ 40.851117][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.860940][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.912794][ T8] device bridge_slave_1 left promiscuous mode [ 40.918908][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.926318][ T8] device bridge_slave_0 left promiscuous mode [ 40.932318][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.940334][ T8] device bridge_slave_1 left promiscuous mode [ 40.946500][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.953881][ T8] device bridge_slave_0 left promiscuous mode [ 40.959777][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.967861][ T8] device veth1_macvtap left promiscuous mode [ 40.973769][ T8] device veth0_vlan left promiscuous mode [ 40.979633][ T8] device veth1_macvtap left promiscuous mode [ 40.985518][ T8] device veth0_vlan left promiscuous mode [ 41.439608][ T1058] FAULT_INJECTION: forcing a failure. [ 41.439608][ T1058] name failslab, interval 1, probability 0, space 0, times 0 [ 41.452783][ T1058] CPU: 1 PID: 1058 Comm: syz.2.186 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 41.462410][ T1058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 41.472307][ T1058] Call Trace: [ 41.475428][ T1058] [ 41.478207][ T1058] dump_stack_lvl+0x151/0x1c0 [ 41.482725][ T1058] ? io_uring_drop_tctx_refs+0x190/0x190 [ 41.488188][ T1058] ? avc_denied+0x1b0/0x1b0 [ 41.492529][ T1058] dump_stack+0x15/0x20 [ 41.496523][ T1058] should_fail+0x3c6/0x510 [ 41.500773][ T1058] __should_failslab+0xa4/0xe0 [ 41.505373][ T1058] ? vm_area_dup+0x26/0x230 [ 41.509714][ T1058] should_failslab+0x9/0x20 [ 41.514053][ T1058] slab_pre_alloc_hook+0x37/0xd0 [ 41.518829][ T1058] ? vm_area_dup+0x26/0x230 [ 41.523169][ T1058] kmem_cache_alloc+0x44/0x200 [ 41.527770][ T1058] vm_area_dup+0x26/0x230 [ 41.531935][ T1058] copy_mm+0x9a1/0x13e0 [ 41.535947][ T1058] ? copy_signal+0x610/0x610 [ 41.540352][ T1058] ? __init_rwsem+0xfe/0x1d0 [ 41.544776][ T1058] ? copy_signal+0x4e3/0x610 [ 41.549202][ T1058] copy_process+0x1149/0x3290 [ 41.553723][ T1058] ? __kasan_check_write+0x14/0x20 [ 41.558667][ T1058] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 41.563611][ T1058] ? vfs_write+0x94d/0x1110 [ 41.567954][ T1058] kernel_clone+0x21e/0x9e0 [ 41.572291][ T1058] ? __kasan_check_write+0x14/0x20 [ 41.577239][ T1058] ? create_io_thread+0x1e0/0x1e0 [ 41.582099][ T1058] __x64_sys_clone+0x23f/0x290 [ 41.586695][ T1058] ? __do_sys_vfork+0x130/0x130 [ 41.591391][ T1058] ? debug_smp_processor_id+0x17/0x20 [ 41.596591][ T1058] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 41.602494][ T1058] ? exit_to_user_mode_prepare+0x39/0xa0 [ 41.607961][ T1058] x64_sys_call+0x1b0/0x9a0 [ 41.612301][ T1058] do_syscall_64+0x3b/0xb0 [ 41.616572][ T1058] ? clear_bhb_loop+0x35/0x90 [ 41.621069][ T1058] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.626792][ T1058] RIP: 0033:0x7f4793643ff9 [ 41.631046][ T1058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.650491][ T1058] RSP: 002b:00007f47922bcfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 41.658733][ T1058] RAX: ffffffffffffffda RBX: 00007f47937fbf80 RCX: 00007f4793643ff9 [ 41.666545][ T1058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 41.674359][ T1058] RBP: 00007f47922bd090 R08: 0000000000000000 R09: 0000000000000000 [ 41.682255][ T1058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 41.690069][ T1058] R13: 0000000000000000 R14: 00007f47937fbf80 R15: 00007ffd7f88e5e8 [ 41.697883][ T1058] [ 41.754762][ T1045] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.765144][ T1045] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.774569][ T1045] device bridge_slave_0 entered promiscuous mode [ 41.822707][ T1045] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.836243][ T1045] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.844061][ T1045] device bridge_slave_1 entered promiscuous mode [ 42.377787][ T1068] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.388855][ T1068] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.402217][ T1068] device bridge_slave_0 entered promiscuous mode [ 42.436835][ T1068] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.444094][ T1068] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.451425][ T1068] device bridge_slave_1 entered promiscuous mode [ 42.486604][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.502085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.562843][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.571484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.591845][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.598684][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.612204][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 42.663156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.701839][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.708781][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.805643][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.382898][ T8] device bridge_slave_1 left promiscuous mode [ 43.388862][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.421940][ T8] device bridge_slave_0 left promiscuous mode [ 43.427901][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.482710][ T8] device bridge_slave_1 left promiscuous mode [ 43.488767][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.532262][ T8] device bridge_slave_0 left promiscuous mode [ 43.538208][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.582579][ T8] device bridge_slave_1 left promiscuous mode [ 43.588621][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.632514][ T8] device bridge_slave_0 left promiscuous mode [ 43.638464][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.693256][ T8] device veth1_macvtap left promiscuous mode [ 43.711926][ T8] device veth1_macvtap left promiscuous mode [ 43.717759][ T8] device veth0_vlan left promiscuous mode [ 43.752201][ T8] device veth0_vlan left promiscuous mode [ 48.095859][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.106966][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.134705][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.143036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.177220][ T1101] FAULT_INJECTION: forcing a failure. [ 48.177220][ T1101] name failslab, interval 1, probability 0, space 0, times 0 [ 48.209757][ T1101] CPU: 0 PID: 1101 Comm: syz.0.197 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 48.215940][ T1045] device veth0_vlan entered promiscuous mode [ 48.219382][ T1101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 48.219396][ T1101] Call Trace: [ 48.219401][ T1101] [ 48.219408][ T1101] dump_stack_lvl+0x151/0x1c0 [ 48.239330][ T1045] device veth1_macvtap entered promiscuous mode [ 48.240992][ T1101] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.257142][ T1101] dump_stack+0x15/0x20 [ 48.261129][ T1101] should_fail+0x3c6/0x510 [ 48.265381][ T1101] __should_failslab+0xa4/0xe0 [ 48.269980][ T1101] ? anon_vma_clone+0x9a/0x500 [ 48.274638][ T1101] should_failslab+0x9/0x20 [ 48.279039][ T1101] slab_pre_alloc_hook+0x37/0xd0 [ 48.283826][ T1101] ? anon_vma_clone+0x9a/0x500 [ 48.288413][ T1101] kmem_cache_alloc+0x44/0x200 [ 48.293015][ T1101] anon_vma_clone+0x9a/0x500 [ 48.297448][ T1101] anon_vma_fork+0x91/0x4e0 [ 48.301782][ T1101] ? anon_vma_name+0x4c/0x70 [ 48.306301][ T1101] ? vm_area_dup+0x17a/0x230 [ 48.310721][ T1101] copy_mm+0xa3a/0x13e0 [ 48.314716][ T1101] ? copy_signal+0x610/0x610 [ 48.319140][ T1101] ? __init_rwsem+0xfe/0x1d0 [ 48.323566][ T1101] ? copy_signal+0x4e3/0x610 [ 48.327992][ T1101] copy_process+0x1149/0x3290 [ 48.332513][ T1101] ? __kasan_check_write+0x14/0x20 [ 48.337474][ T1101] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 48.342401][ T1101] ? vfs_write+0x94d/0x1110 [ 48.346744][ T1101] kernel_clone+0x21e/0x9e0 [ 48.351079][ T1101] ? __kasan_check_write+0x14/0x20 [ 48.356027][ T1101] ? create_io_thread+0x1e0/0x1e0 [ 48.360886][ T1101] __x64_sys_clone+0x23f/0x290 [ 48.365488][ T1101] ? __do_sys_vfork+0x130/0x130 [ 48.370174][ T1101] ? debug_smp_processor_id+0x17/0x20 [ 48.375410][ T1101] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 48.381281][ T1101] ? exit_to_user_mode_prepare+0x39/0xa0 [ 48.386751][ T1101] x64_sys_call+0x1b0/0x9a0 [ 48.391088][ T1101] do_syscall_64+0x3b/0xb0 [ 48.395366][ T1101] ? clear_bhb_loop+0x35/0x90 [ 48.399865][ T1101] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.405583][ T1101] RIP: 0033:0x7f40a1aa6ff9 [ 48.409836][ T1101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.429277][ T1101] RSP: 002b:00007f40a071ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 48.437529][ T1101] RAX: ffffffffffffffda RBX: 00007f40a1c5ef80 RCX: 00007f40a1aa6ff9 [ 48.445330][ T1101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 48.453144][ T1101] RBP: 00007f40a0720090 R08: 0000000000000000 R09: 0000000000000000 [ 48.461039][ T1101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 48.468852][ T1101] R13: 0000000000000000 R14: 00007f40a1c5ef80 R15: 00007ffe8ff7dfa8 [ 48.476671][ T1101] [ 48.490317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.500832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.513332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.524333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.533231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.541294][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.549694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.557783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.566442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.574679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.582765][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.590979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.598248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.674244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.681979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.704968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.722448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.735767][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.742786][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.765318][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.793434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.801452][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.808313][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.815998][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.857685][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.865229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.893463][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.902271][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.910198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.917711][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.933172][ T1068] device veth0_vlan entered promiscuous mode [ 48.957371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.966942][ T1068] device veth1_macvtap entered promiscuous mode [ 48.990046][ T1114] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.997290][ T1114] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.005018][ T1114] device bridge_slave_0 entered promiscuous mode [ 49.011790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.020250][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.033200][ T1114] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.040039][ T1114] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.047749][ T1114] device bridge_slave_1 entered promiscuous mode [ 49.057994][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.066850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.187725][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.195731][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.214278][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.222713][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.230730][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.237735][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.245856][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.254242][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.263944][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.270799][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.278206][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.294335][ T8] device bridge_slave_1 left promiscuous mode [ 49.300369][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.308191][ T8] device bridge_slave_0 left promiscuous mode [ 49.314290][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.323568][ T8] device veth1_macvtap left promiscuous mode [ 49.329420][ T8] device veth0_vlan left promiscuous mode [ 49.413833][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.421263][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.433318][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.444408][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.452293][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.459492][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.467617][ T1114] device veth0_vlan entered promiscuous mode [ 49.478219][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.487025][ T1114] device veth1_macvtap entered promiscuous mode [ 49.495773][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.505378][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.015708][ T1133] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.033450][ T1133] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.040839][ T1133] device bridge_slave_0 entered promiscuous mode [ 50.047802][ T1133] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.057610][ T1133] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.064842][ T1133] device bridge_slave_1 entered promiscuous mode [ 50.098927][ T1163] FAULT_INJECTION: forcing a failure. [ 50.098927][ T1163] name failslab, interval 1, probability 0, space 0, times 0 [ 50.126240][ T1163] CPU: 1 PID: 1163 Comm: syz.2.209 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 50.136045][ T1163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 50.145943][ T1163] Call Trace: [ 50.149063][ T1163] [ 50.151840][ T1163] dump_stack_lvl+0x151/0x1c0 [ 50.156356][ T1163] ? io_uring_drop_tctx_refs+0x190/0x190 [ 50.161823][ T1163] dump_stack+0x15/0x20 [ 50.165814][ T1163] should_fail+0x3c6/0x510 [ 50.170067][ T1163] __should_failslab+0xa4/0xe0 [ 50.174757][ T1163] ? anon_vma_clone+0x9a/0x500 [ 50.179352][ T1163] should_failslab+0x9/0x20 [ 50.183780][ T1163] slab_pre_alloc_hook+0x37/0xd0 [ 50.188552][ T1163] ? anon_vma_clone+0x9a/0x500 [ 50.193158][ T1163] kmem_cache_alloc+0x44/0x200 [ 50.197753][ T1163] anon_vma_clone+0x9a/0x500 [ 50.202185][ T1163] anon_vma_fork+0x91/0x4e0 [ 50.206521][ T1163] ? anon_vma_name+0x4c/0x70 [ 50.210945][ T1163] ? vm_area_dup+0x17a/0x230 [ 50.215370][ T1163] copy_mm+0xa3a/0x13e0 [ 50.219363][ T1163] ? copy_signal+0x610/0x610 [ 50.223803][ T1163] ? __init_rwsem+0xfe/0x1d0 [ 50.228213][ T1163] ? copy_signal+0x4e3/0x610 [ 50.232641][ T1163] copy_process+0x1149/0x3290 [ 50.237153][ T1163] ? __kasan_check_write+0x14/0x20 [ 50.242105][ T1163] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 50.247048][ T1163] ? vfs_write+0x94d/0x1110 [ 50.251393][ T1163] kernel_clone+0x21e/0x9e0 [ 50.255731][ T1163] ? __kasan_check_write+0x14/0x20 [ 50.260690][ T1163] ? create_io_thread+0x1e0/0x1e0 [ 50.265536][ T1163] __x64_sys_clone+0x23f/0x290 [ 50.270133][ T1163] ? __do_sys_vfork+0x130/0x130 [ 50.274829][ T1163] ? debug_smp_processor_id+0x17/0x20 [ 50.280027][ T1163] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 50.285946][ T1163] ? exit_to_user_mode_prepare+0x39/0xa0 [ 50.291401][ T1163] x64_sys_call+0x1b0/0x9a0 [ 50.295752][ T1163] do_syscall_64+0x3b/0xb0 [ 50.299990][ T1163] ? clear_bhb_loop+0x35/0x90 [ 50.304505][ T1163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.310232][ T1163] RIP: 0033:0x7fb01641aff9 [ 50.314488][ T1163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.333926][ T1163] RSP: 002b:00007fb015093fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 50.342172][ T1163] RAX: ffffffffffffffda RBX: 00007fb0165d2f80 RCX: 00007fb01641aff9 [ 50.349981][ T1163] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 50.357793][ T1163] RBP: 00007fb015094090 R08: 0000000000000000 R09: 0000000000000000 [ 50.365606][ T1163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 50.373420][ T1163] R13: 0000000000000000 R14: 00007fb0165d2f80 R15: 00007ffe39777fd8 [ 50.381231][ T1163] [ 50.624144][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.634143][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.654016][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.669457][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.687779][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.694652][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.712300][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.732530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.752371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.766782][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.773739][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.781239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.789683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.899246][ T1133] device veth0_vlan entered promiscuous mode [ 50.909769][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.922298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.932154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.963263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.027885][ T1197] device pim6reg1 entered promiscuous mode [ 51.060186][ T1207] FAULT_INJECTION: forcing a failure. [ 51.060186][ T1207] name failslab, interval 1, probability 0, space 0, times 0 [ 51.074837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.082120][ T1207] CPU: 0 PID: 1207 Comm: syz.3.221 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 51.092172][ T1207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 51.102072][ T1207] Call Trace: [ 51.105191][ T1207] [ 51.107969][ T1207] dump_stack_lvl+0x151/0x1c0 [ 51.112487][ T1207] ? io_uring_drop_tctx_refs+0x190/0x190 [ 51.117953][ T1207] dump_stack+0x15/0x20 [ 51.121943][ T1207] should_fail+0x3c6/0x510 [ 51.126196][ T1207] __should_failslab+0xa4/0xe0 [ 51.130799][ T1207] ? anon_vma_clone+0x9a/0x500 [ 51.135411][ T1207] should_failslab+0x9/0x20 [ 51.139738][ T1207] slab_pre_alloc_hook+0x37/0xd0 [ 51.144511][ T1207] ? anon_vma_clone+0x9a/0x500 [ 51.149107][ T1207] kmem_cache_alloc+0x44/0x200 [ 51.153711][ T1207] anon_vma_clone+0x9a/0x500 [ 51.158140][ T1207] anon_vma_fork+0x91/0x4e0 [ 51.162476][ T1207] ? anon_vma_name+0x43/0x70 [ 51.166901][ T1207] ? vm_area_dup+0x17a/0x230 [ 51.171433][ T1207] copy_mm+0xa3a/0x13e0 [ 51.175411][ T1207] ? copy_signal+0x610/0x610 [ 51.179833][ T1207] ? __init_rwsem+0xfe/0x1d0 [ 51.184260][ T1207] ? copy_signal+0x4e3/0x610 [ 51.188687][ T1207] copy_process+0x1149/0x3290 [ 51.193204][ T1207] ? __kasan_check_write+0x14/0x20 [ 51.198151][ T1207] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 51.203096][ T1207] ? vfs_write+0x94d/0x1110 [ 51.207439][ T1207] kernel_clone+0x21e/0x9e0 [ 51.211771][ T1207] ? __kasan_check_write+0x14/0x20 [ 51.216719][ T1207] ? create_io_thread+0x1e0/0x1e0 [ 51.221583][ T1207] __x64_sys_clone+0x23f/0x290 [ 51.226181][ T1207] ? __do_sys_vfork+0x130/0x130 [ 51.230872][ T1207] ? debug_smp_processor_id+0x17/0x20 [ 51.236159][ T1207] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 51.242064][ T1207] ? exit_to_user_mode_prepare+0x39/0xa0 [ 51.247531][ T1207] x64_sys_call+0x1b0/0x9a0 [ 51.251871][ T1207] do_syscall_64+0x3b/0xb0 [ 51.256122][ T1207] ? clear_bhb_loop+0x35/0x90 [ 51.260643][ T1207] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.266368][ T1207] RIP: 0033:0x7f6c3dabbff9 [ 51.270622][ T1207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.290057][ T1207] RSP: 002b:00007f6c3c734fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 51.298312][ T1207] RAX: ffffffffffffffda RBX: 00007f6c3dc73f80 RCX: 00007f6c3dabbff9 [ 51.306116][ T1207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 51.313929][ T1207] RBP: 00007f6c3c735090 R08: 0000000000000000 R09: 0000000000000000 [ 51.321739][ T1207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 51.329549][ T1207] R13: 0000000000000000 R14: 00007f6c3dc73f80 R15: 00007ffde17efbe8 [ 51.337380][ T1207] [ 51.393930][ T1185] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.400990][ T1185] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.408416][ T1185] device bridge_slave_0 entered promiscuous mode [ 51.415440][ T1185] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.422509][ T1185] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.429704][ T1185] device bridge_slave_1 entered promiscuous mode [ 51.438677][ T1133] device veth1_macvtap entered promiscuous mode [ 51.514939][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.558522][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.575607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.583819][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.612152][ T8] device bridge_slave_1 left promiscuous mode [ 51.618139][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.625944][ T8] device bridge_slave_0 left promiscuous mode [ 51.632311][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.640227][ T8] device veth1_macvtap left promiscuous mode [ 51.646893][ T8] device veth0_vlan left promiscuous mode [ 52.018708][ T1214] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.045087][ T1214] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.053291][ T1214] device bridge_slave_0 entered promiscuous mode [ 52.074789][ T1214] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.088344][ T1214] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.101326][ T1214] device bridge_slave_1 entered promiscuous mode [ 52.110138][ T1185] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.117000][ T1185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.163477][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.171628][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.181604][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.213830][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.224533][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.235421][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.242273][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.253610][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.261894][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.268723][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.276184][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.283993][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.311439][ T1185] device veth0_vlan entered promiscuous mode [ 52.338291][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.349065][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.357477][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.364877][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.411099][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.419894][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.430559][ T1185] device veth1_macvtap entered promiscuous mode [ 52.444595][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.452376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.460417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.468519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.476606][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.521423][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.528940][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.544661][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.552795][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.560667][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.567448][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.575346][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.586686][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.595118][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.603176][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.610000][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.629773][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.637618][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.646670][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.654654][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.674055][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 52.682168][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.693550][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 52.701209][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.709177][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.716588][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.724664][ T1214] device veth0_vlan entered promiscuous mode [ 52.739736][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.747693][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.756590][ T1214] device veth1_macvtap entered promiscuous mode [ 52.770975][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.779162][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.788259][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.796453][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.973708][ T8] device bridge_slave_1 left promiscuous mode [ 52.985361][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.995641][ T8] device bridge_slave_0 left promiscuous mode [ 53.001598][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.052919][ T8] device bridge_slave_1 left promiscuous mode [ 53.058919][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.130327][ T8] device bridge_slave_0 left promiscuous mode [ 53.175283][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.244009][ T8] device bridge_slave_1 left promiscuous mode [ 53.277767][ T1254] FAULT_INJECTION: forcing a failure. [ 53.277767][ T1254] name failslab, interval 1, probability 0, space 0, times 0 [ 53.291566][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.314235][ T1254] CPU: 1 PID: 1254 Comm: syz.2.233 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 53.323874][ T1254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.333771][ T1254] Call Trace: [ 53.336890][ T1254] [ 53.339668][ T1254] dump_stack_lvl+0x151/0x1c0 [ 53.344227][ T1254] ? io_uring_drop_tctx_refs+0x190/0x190 [ 53.349655][ T1254] dump_stack+0x15/0x20 [ 53.353648][ T1254] should_fail+0x3c6/0x510 [ 53.357898][ T1254] __should_failslab+0xa4/0xe0 [ 53.362501][ T1254] ? anon_vma_clone+0x9a/0x500 [ 53.367101][ T1254] should_failslab+0x9/0x20 [ 53.371434][ T1254] slab_pre_alloc_hook+0x37/0xd0 [ 53.376210][ T1254] ? anon_vma_clone+0x9a/0x500 [ 53.380807][ T1254] kmem_cache_alloc+0x44/0x200 [ 53.385413][ T1254] anon_vma_clone+0x9a/0x500 [ 53.389840][ T1254] anon_vma_fork+0x91/0x4e0 [ 53.394187][ T1254] ? anon_vma_name+0x4c/0x70 [ 53.398604][ T1254] ? vm_area_dup+0x17a/0x230 [ 53.403032][ T1254] copy_mm+0xa3a/0x13e0 [ 53.407029][ T1254] ? copy_signal+0x610/0x610 [ 53.411458][ T1254] ? __init_rwsem+0xfe/0x1d0 [ 53.415869][ T1254] ? copy_signal+0x4e3/0x610 [ 53.420297][ T1254] copy_process+0x1149/0x3290 [ 53.424808][ T1254] ? __kasan_check_write+0x14/0x20 [ 53.429760][ T1254] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 53.434706][ T1254] ? group_send_sig_info+0xa4/0x460 [ 53.439737][ T1254] ? __lock_task_sighand+0x100/0x100 [ 53.444858][ T1254] kernel_clone+0x21e/0x9e0 [ 53.449198][ T1254] ? __kasan_check_write+0x14/0x20 [ 53.454144][ T1254] ? create_io_thread+0x1e0/0x1e0 [ 53.459008][ T1254] __x64_sys_clone+0x23f/0x290 [ 53.463611][ T1254] ? __do_sys_vfork+0x130/0x130 [ 53.468294][ T1254] ? __bpf_trace_sys_enter+0x62/0x70 [ 53.473419][ T1254] x64_sys_call+0x1b0/0x9a0 [ 53.477753][ T1254] do_syscall_64+0x3b/0xb0 [ 53.482003][ T1254] ? clear_bhb_loop+0x35/0x90 [ 53.486517][ T1254] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.492246][ T1254] RIP: 0033:0x7fe9184efff9 [ 53.496506][ T1254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.515942][ T1254] RSP: 002b:00007fe917168fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 53.524186][ T1254] RAX: ffffffffffffffda RBX: 00007fe9186a7f80 RCX: 00007fe9184efff9 [ 53.531996][ T1254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 53.539936][ T1254] RBP: 00007fe917169090 R08: 0000000000000000 R09: 0000000000000000 [ 53.547739][ T1254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 53.555554][ T1254] R13: 0000000000000000 R14: 00007fe9186a7f80 R15: 00007ffd5f694af8 [ 53.563377][ T1254] [ 53.567039][ T8] device bridge_slave_0 left promiscuous mode [ 53.577140][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.607557][ T8] device veth1_macvtap left promiscuous mode [ 53.615309][ T8] device veth0_vlan left promiscuous mode [ 53.621138][ T8] device veth1_macvtap left promiscuous mode [ 53.631051][ T8] device veth0_vlan left promiscuous mode [ 53.642783][ T8] device veth1_macvtap left promiscuous mode [ 53.648705][ T8] device veth0_vlan left promiscuous mode [ 53.956117][ T30] audit: type=1400 audit(1729463346.501:140): avc: denied { create } for pid=1278 comm="syz.4.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 54.070720][ T1240] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.077602][ T1240] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.085012][ T1240] device bridge_slave_0 entered promiscuous mode [ 54.092090][ T1240] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.099236][ T1240] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.106867][ T1240] device bridge_slave_1 entered promiscuous mode [ 54.191784][ T1289] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.198725][ T1289] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.206050][ T1289] device bridge_slave_0 entered promiscuous mode [ 54.212987][ T1289] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.219873][ T1289] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.227430][ T1289] device bridge_slave_1 entered promiscuous mode [ 54.402533][ T1306] FAULT_INJECTION: forcing a failure. [ 54.402533][ T1306] name failslab, interval 1, probability 0, space 0, times 0 [ 54.403953][ T1240] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.421824][ T1240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.428038][ T1306] CPU: 0 PID: 1306 Comm: syz.0.248 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 54.428998][ T1240] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.438554][ T1306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 54.438567][ T1306] Call Trace: [ 54.438572][ T1306] [ 54.438579][ T1306] dump_stack_lvl+0x151/0x1c0 [ 54.445425][ T1240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.455304][ T1306] ? io_uring_drop_tctx_refs+0x190/0x190 [ 54.478226][ T1306] dump_stack+0x15/0x20 [ 54.482218][ T1306] should_fail+0x3c6/0x510 [ 54.486470][ T1306] __should_failslab+0xa4/0xe0 [ 54.491073][ T1306] ? anon_vma_clone+0x9a/0x500 [ 54.495666][ T1306] should_failslab+0x9/0x20 [ 54.500093][ T1306] slab_pre_alloc_hook+0x37/0xd0 [ 54.504866][ T1306] ? anon_vma_clone+0x9a/0x500 [ 54.509467][ T1306] kmem_cache_alloc+0x44/0x200 [ 54.514067][ T1306] anon_vma_clone+0x9a/0x500 [ 54.518502][ T1306] anon_vma_fork+0x91/0x4e0 [ 54.522833][ T1306] ? anon_vma_name+0x4c/0x70 [ 54.527344][ T1306] ? vm_area_dup+0x17a/0x230 [ 54.531772][ T1306] copy_mm+0xa3a/0x13e0 [ 54.535775][ T1306] ? copy_signal+0x610/0x610 [ 54.540280][ T1306] ? __init_rwsem+0xfe/0x1d0 [ 54.544791][ T1306] ? copy_signal+0x4e3/0x610 [ 54.549224][ T1306] copy_process+0x1149/0x3290 [ 54.553733][ T1306] ? __kasan_check_write+0x14/0x20 [ 54.558768][ T1306] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 54.563710][ T1306] ? vfs_write+0x94d/0x1110 [ 54.568050][ T1306] kernel_clone+0x21e/0x9e0 [ 54.572479][ T1306] ? __kasan_check_write+0x14/0x20 [ 54.577425][ T1306] ? create_io_thread+0x1e0/0x1e0 [ 54.582304][ T1306] __x64_sys_clone+0x23f/0x290 [ 54.586893][ T1306] ? __do_sys_vfork+0x130/0x130 [ 54.591574][ T1306] ? debug_smp_processor_id+0x17/0x20 [ 54.596791][ T1306] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 54.602931][ T1306] ? exit_to_user_mode_prepare+0x39/0xa0 [ 54.608387][ T1306] x64_sys_call+0x1b0/0x9a0 [ 54.612727][ T1306] do_syscall_64+0x3b/0xb0 [ 54.616976][ T1306] ? clear_bhb_loop+0x35/0x90 [ 54.621491][ T1306] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.627223][ T1306] RIP: 0033:0x7f9dc19faff9 [ 54.631472][ T1306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.650920][ T1306] RSP: 002b:00007f9dc0673fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 54.659157][ T1306] RAX: ffffffffffffffda RBX: 00007f9dc1bb2f80 RCX: 00007f9dc19faff9 [ 54.666971][ T1306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 54.674783][ T1306] RBP: 00007f9dc0674090 R08: 0000000000000000 R09: 0000000000000000 [ 54.682593][ T1306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 54.690405][ T1306] R13: 0000000000000000 R14: 00007f9dc1bb2f80 R15: 00007ffd2ccebd98 [ 54.698220][ T1306] [ 54.802917][ T1289] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.809776][ T1289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.816900][ T1289] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.823680][ T1289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.865675][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.874127][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.881562][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.889045][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.896297][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.907648][ T1317] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.914588][ T1317] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.928210][ T1318] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.935069][ T1318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.942183][ T1318] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.948936][ T1318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.956959][ T1318] device bridge0 entered promiscuous mode [ 54.990818][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.999273][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.008372][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.015232][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.022513][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.030912][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.040148][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.047024][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.058012][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.066131][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.074405][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.082737][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.134133][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.142509][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.150007][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.172805][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.180872][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.187812][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.212006][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.225629][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.241240][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.248099][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.339157][ T1240] device veth0_vlan entered promiscuous mode [ 55.345678][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.359499][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.367761][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.375787][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.383825][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.391644][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.399469][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.407424][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.415463][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.422844][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.432741][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.440871][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.479198][ T1289] device veth0_vlan entered promiscuous mode [ 55.489349][ T1240] device veth1_macvtap entered promiscuous mode [ 55.499551][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.508405][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.516970][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.525128][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.533759][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.544237][ T1337] device pim6reg1 entered promiscuous mode [ 55.553054][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.560332][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.597417][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.605742][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.623009][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.631088][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.643204][ T1289] device veth1_macvtap entered promiscuous mode [ 55.663733][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.671307][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.679647][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.691456][ T1346] FAULT_INJECTION: forcing a failure. [ 55.691456][ T1346] name failslab, interval 1, probability 0, space 0, times 0 [ 55.711834][ T1346] CPU: 1 PID: 1346 Comm: syz.4.261 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 55.721459][ T1346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 55.731386][ T1346] Call Trace: [ 55.734602][ T1346] [ 55.737386][ T1346] dump_stack_lvl+0x151/0x1c0 [ 55.741916][ T1346] ? io_uring_drop_tctx_refs+0x190/0x190 [ 55.747371][ T1346] dump_stack+0x15/0x20 [ 55.751383][ T1346] should_fail+0x3c6/0x510 [ 55.755612][ T1346] __should_failslab+0xa4/0xe0 [ 55.760220][ T1346] ? anon_vma_fork+0x1df/0x4e0 [ 55.764867][ T1346] should_failslab+0x9/0x20 [ 55.769237][ T1346] slab_pre_alloc_hook+0x37/0xd0 [ 55.774012][ T1346] ? anon_vma_fork+0x1df/0x4e0 [ 55.778611][ T1346] kmem_cache_alloc+0x44/0x200 [ 55.783214][ T1346] anon_vma_fork+0x1df/0x4e0 [ 55.787651][ T1346] copy_mm+0xa3a/0x13e0 [ 55.791632][ T1346] ? copy_signal+0x610/0x610 [ 55.796067][ T1346] ? __init_rwsem+0xfe/0x1d0 [ 55.800481][ T1346] ? copy_signal+0x4e3/0x610 [ 55.804911][ T1346] copy_process+0x1149/0x3290 [ 55.809424][ T1346] ? __kasan_check_write+0x14/0x20 [ 55.814376][ T1346] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 55.819317][ T1346] ? vfs_write+0x94d/0x1110 [ 55.823659][ T1346] kernel_clone+0x21e/0x9e0 [ 55.827995][ T1346] ? __kasan_check_write+0x14/0x20 [ 55.832943][ T1346] ? create_io_thread+0x1e0/0x1e0 [ 55.837808][ T1346] __x64_sys_clone+0x23f/0x290 [ 55.842407][ T1346] ? __do_sys_vfork+0x130/0x130 [ 55.847108][ T1346] ? debug_smp_processor_id+0x17/0x20 [ 55.852296][ T1346] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 55.858208][ T1346] ? exit_to_user_mode_prepare+0x39/0xa0 [ 55.863671][ T1346] x64_sys_call+0x1b0/0x9a0 [ 55.868092][ T1346] do_syscall_64+0x3b/0xb0 [ 55.872345][ T1346] ? clear_bhb_loop+0x35/0x90 [ 55.876859][ T1346] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.882590][ T1346] RIP: 0033:0x7f7429a36ff9 [ 55.886843][ T1346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.906285][ T1346] RSP: 002b:00007f74286affe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 55.914529][ T1346] RAX: ffffffffffffffda RBX: 00007f7429beef80 RCX: 00007f7429a36ff9 [ 55.922338][ T1346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 55.930150][ T1346] RBP: 00007f74286b0090 R08: 0000000000000000 R09: 0000000000000000 [ 55.937979][ T1346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 55.945955][ T1346] R13: 0000000000000000 R14: 00007f7429beef80 R15: 00007ffe5c436868 [ 55.953696][ T1346] [ 55.971123][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.998138][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.039847][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 56.048185][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.117666][ T1333] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.149541][ T1333] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.161443][ T1333] device bridge_slave_0 entered promiscuous mode [ 56.184209][ T1333] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.191115][ T1333] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.198585][ T1333] device bridge_slave_1 entered promiscuous mode Connection to 10.128.1.205 closed by remote host. [ 56.634775][ T1370] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 56.646331][ T1370] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 56.654666][ T1370] CPU: 0 PID: 1370 Comm: syz.2.241 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 [ 56.664291][ T1370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 56.674183][ T1370] RIP: 0010:__rb_erase_color+0x10e/0xa60 [ 56.679652][ T1370] Code: 89 ff e8 c5 cf 2a ff 4c 8b 6d d0 4d 89 2f 4c 89 eb 48 83 cb 01 4c 8b 7d c0 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ff e8 94 cf 2a ff 49 89 1f 4c 89 eb 48 c1 [ 56.699182][ T1370] RSP: 0018:ffffc90000e7f6a0 EFLAGS: 00010246 [ 56.705082][ T1370] RAX: 0000000000000000 RBX: ffff88812052c999 RCX: dffffc0000000000 [ 56.712898][ T1370] RDX: ffffffff81a56990 RSI: ffff88810bc0f828 RDI: ffff88812052c998 [ 56.720708][ T1370] RBP: ffffc90000e7f700 R08: ffffffff81a54a50 R09: ffffed1021781f09 [ 56.728513][ T1370] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110240a589f [ 56.736327][ T1370] R13: ffff88812052c998 R14: ffff88812052c4f8 R15: 0000000000000000 [ 56.744138][ T1370] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 56.752907][ T1370] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 56.759326][ T1370] CR2: 0000000000000000 CR3: 0000000006a0f000 CR4: 00000000003506b0 [ 56.767139][ T1370] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 56.774949][ T1370] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 56.782763][ T1370] Call Trace: [ 56.785894][ T1370] [ 56.788661][ T1370] ? __die_body+0x62/0xb0 [ 56.792834][ T1370] ? die_addr+0x9f/0xd0 [ 56.796820][ T1370] ? exc_general_protection+0x311/0x4b0 [ 56.802208][ T1370] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 56.808190][ T1370] ? asm_exc_general_protection+0x27/0x30 [ 56.813749][ T1370] ? vma_interval_tree_remove+0xae0/0xba0 [ 56.819301][ T1370] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 56.825547][ T1370] ? __rb_erase_color+0x10e/0xa60 [ 56.830411][ T1370] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 56.836660][ T1370] vma_interval_tree_remove+0xb82/0xba0 [ 56.842049][ T1370] unlink_file_vma+0xd9/0xf0 [ 56.846467][ T1370] free_pgtables+0x13f/0x280 [ 56.850896][ T1370] exit_mmap+0x405/0x940 [ 56.854973][ T1370] ? exit_aio+0x25e/0x3c0 [ 56.859148][ T1370] ? vm_brk+0x30/0x30 [ 56.862957][ T1370] ? mutex_unlock+0xb2/0x260 [ 56.867386][ T1370] ? uprobe_clear_state+0x2cd/0x320 [ 56.872418][ T1370] __mmput+0x95/0x310 [ 56.876252][ T1370] mmput+0x5b/0x170 [ 56.879880][ T1370] do_exit+0xb9c/0x2ca0 [ 56.883872][ T1370] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 56.890044][ T1370] ? put_task_struct+0x80/0x80 [ 56.894635][ T1370] ? irqentry_exit+0x30/0x40 [ 56.899070][ T1370] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 56.904721][ T1370] do_group_exit+0x141/0x310 [ 56.909128][ T1370] ? _raw_spin_unlock_irq+0x49/0x70 [ 56.914163][ T1370] get_signal+0x7a3/0x1630 [ 56.918416][ T1370] arch_do_signal_or_restart+0xbd/0x1680 [ 56.924070][ T1370] ? get_sigframe_size+0x10/0x10 [ 56.928839][ T1370] ? __ia32_sys_sigaltstack+0x70/0x70 [ 56.934048][ T1370] ? set_current_blocked+0xd/0x40 [ 56.938912][ T1370] ? __do_sys_rt_sigreturn+0x160/0x1e0 [ 56.944204][ T1370] exit_to_user_mode_loop+0xa0/0xe0 [ 56.949252][ T1370] exit_to_user_mode_prepare+0x5a/0xa0 [ 56.954534][ T1370] syscall_exit_to_user_mode+0x26/0x160 [ 56.959911][ T1370] do_syscall_64+0x47/0xb0 [ 56.964169][ T1370] ? clear_bhb_loop+0x35/0x90 [ 56.968678][ T1370] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.974406][ T1370] RIP: 0033:0x7f906f152230 [ 56.978675][ T1370] Code: Unable to access opcode bytes at RIP 0x7f906f152206. [ 56.985863][ T1370] RSP: 002b:00007f906dda1c78 EFLAGS: 00000283 [ 56.991767][ T1370] RAX: 0000000000000000 RBX: 00007f906dda2d30 RCX: 00007f906f2a8160 [ 56.999575][ T1370] RDX: 00007f906dda1c80 RSI: 00007f906dda1db0 RDI: 0000000000000021 [ 57.007385][ T1370] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 57.015197][ T1370] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 57.023012][ T1370] R13: 00007f906dda2eb0 R14: 9999999999999999 R15: 0000000000000000 [ 57.030827][ T1370] [ 57.033689][ T1370] Modules linked in: [ 57.042552][ T1370] ---[ end trace ce0442d7ac45fdf9 ]--- [ 57.048296][ T1370] RIP: 0010:__rb_erase_color+0x10e/0xa60 [ 57.056652][ T1370] Code: 89 ff e8 c5 cf 2a ff 4c 8b 6d d0 4d 89 2f 4c 89 eb 48 83 cb 01 4c 8b 7d c0 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ff e8 94 cf 2a ff 49 89 1f 4c 89 eb 48 c1 [ 57.079790][ T1370] RSP: 0018:ffffc90000e7f6a0 EFLAGS: 00010246 [ 57.086209][ T1370] RAX: 0000000000000000 RBX: ffff88812052c999 RCX: dffffc0000000000 [ 57.094366][ T1370] RDX: ffffffff81a56990 RSI: ffff88810bc0f828 RDI: ffff88812052c998 [ 57.102470][ T1370] RBP: ffffc90000e7f700 R08: ffffffff81a54a50 R09: ffffed1021781f09 [ 57.110781][ T1370] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110240a589f [ 57.119249][ T1370] R13: ffff88812052c998 R14: ffff88812052c4f8 R15: 0000000000000000 [ 57.127935][ T1370] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 57.137611][ T1370] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 57.144654][ T1370] CR2: 0000000000000000 CR3: 000000010c4f3000 CR4: 00000000003506a0 [ 57.169034][ T1370] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 57.177230][ T1370] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 57.186411][ T1370] Kernel panic - not syncing: Fatal exception [ 57.192596][ T1370] Kernel Offset: disabled [ 57.196727][ T1370] Rebooting in 86400 seconds..