last executing test programs: 31.376842648s ago: executing program 1 (id=1218): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) 24.596343486s ago: executing program 1 (id=1218): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) 19.635285035s ago: executing program 1 (id=1218): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) 13.088910991s ago: executing program 1 (id=1218): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) 8.547682978s ago: executing program 3 (id=1819): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) socketpair(0x1e, 0x7ffffffe, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00'}, 0x18) close(r3) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 8.043034238s ago: executing program 2 (id=1825): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x7f, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) r6 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000480)={0x0, r5}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x5, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x47) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000003}, 0x6c8d, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200004499fab5517600000000000400000000000300"/34], 0x50) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000780)={r9}, 0x8) close(r10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000e0000001500000000000000270000000000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2616}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETCARRIER(r9, 0x400454e2, &(0x7f00000001c0)) 7.675412934s ago: executing program 2 (id=1826): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) close(0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r0, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r6, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x55, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xa5, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ldst={0x3, 0x1, 0x1, 0xa, 0x2, 0x8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0xffff, 0xa8, &(0x7f0000000300)=""/168, 0x40f00, 0x45, '\x00', 0x0, @fallback=0x10, r5, 0x8, &(0x7f00000003c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x1, 0x6, 0x3}, 0x10, r8, r6, 0x1, 0x0, &(0x7f00000007c0)=[{0x0, 0x5, 0xc, 0xa}], 0x10, 0x9}, 0x94) 7.581983453s ago: executing program 1 (id=1218): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) 5.553127753s ago: executing program 2 (id=1828): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0xa, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x15) sendmsg$tipc(r1, &(0x7f0000000300)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0xfa13af4565b4ba95, 0x3, 0x1}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000100)="f4a8cab26e91016076f60661c66a5f74fd428db9eb1ce62b41e3d328d7519ffebb75516a1572049b567ef0c59468060b69647d3d9cfa413edee2bf", 0x3b}, {&(0x7f0000000240)="fa94f3d970cbaaf551284afe8a04369d5c46867dc7e434d26878f7c66c273021ea589ac13522821819e129767e7e3efd6199e4f6a7b3218789a90a8a247ee6d9ff49109557f28c36c2ecf8cccef1704f94486a1cf93c7250b102737e84701e0b0bc5c2a5a71cda2cfd38599a60bd332827851ed485ae", 0x76}], 0x2, &(0x7f0000000ec0)="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", 0x1000, 0x20000010}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x0, 0x0, &(0x7f0000000e80)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r6) sendmsg$inet(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001ec0)={&(0x7f0000001f40)='subflow_check_data_avail\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) close(r8) 5.547740384s ago: executing program 3 (id=1829): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002a000000180100002025642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000089cdc832850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="b9ff03318944268cb89914f00800", 0x0, 0x2004, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 6) 5.106587347s ago: executing program 3 (id=1833): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='sched_switch\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000850000000800000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48c8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.156767148s ago: executing program 3 (id=1834): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="c74b92300500"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1, &(0x7f0000000b80)=ANY=[@ANYRES32, @ANYBLOB="ffffffff7f0000010000000011000000000000000000000001000000000000000000000014000000000000000000000002000000ff0100000000000014000000000000000000000000000000ed00000000000000640000000000000000000000070000004454a8c3e000000100000f5c6000000100000007ac1e000100000fffac1e010100000000e000000200000772ffffffff0000000100000000000000b7ac1e00010ae08f50e000000200000005ac1e0101000000000000000011000000000000000000000001"], 0x118}, 0x20000004) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e0000000400000004000000090000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYRESHEX=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000009c0), 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x11000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c2c0d9349", 0x17, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c809118816a8710c24cd41ce5529bb42ae7cb04953f3b41bc1da72c434430e0e8b310ccad3ce8da4e43133be39d1073241d151933e51fbf91d95b4e439d6122c5d681eec57cae963327499a16b3fe1") syz_open_procfs$namespace(r2, &(0x7f0000000380)='ns/user\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffff70, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES64=r5, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES16=r2, @ANYRES32, @ANYBLOB='\x00'/11], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000002000000020000000700000000000000", @ANYRES32, @ANYBLOB="080000000000000000000000000000a46f000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.156300898s ago: executing program 2 (id=1835): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x50) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x80001, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xe}, 0x4, 0x4, 0x0, 0x2, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180)=r10, 0x17e) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r11}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.971359956s ago: executing program 2 (id=1837): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x9, 0x7}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffff63, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 1.970841676s ago: executing program 4 (id=1838): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x8, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x1, 0x3, 0x2, 0x0, 0x0, 0x3, 0x1850, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xa, 0x17e32c3f015a1efa, @perf_config_ext={0xc}, 0x80, 0x8, 0x80, 0x8, 0x5, 0xff, 0x9, 0x0, 0xffff, 0x0, 0xdf}, r6, 0xd, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) 1.970420046s ago: executing program 0 (id=1839): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='signal_generate\x00', r2}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200000002000000040000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000b0c779f4664a4611ffffffffff0000f26effff00000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040), &(0x7f0000000140)=r5}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r10, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r11, 0x0, &(0x7f0000002780)=""/4096}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, &(0x7f0000000080), &(0x7f0000000380)=r3}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x5, 0xc, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0xf) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000240), 0x4) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.969876106s ago: executing program 3 (id=1840): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0xc8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414"], 0xcfa4) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 1.93019841s ago: executing program 2 (id=1841): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4}]}, @enum64={0xd, 0x7, 0x0, 0x13, 0x1, 0xf, [{0x4, 0xff, 0xfffffff9}, {0xb, 0x3, 0x2}, {0x8, 0x800, 0x3ff}, {0x3, 0x9, 0x2}, {0xf, 0x8000}, {0x10, 0x5, 0xe69}, {0xb, 0xb, 0x1}]}, @typedef={0xb, 0x0, 0x0, 0x8, 0x2}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x3, 0x8}, @func={0xf, 0x0, 0x0, 0xc, 0x1}, @typedef={0xe, 0x0, 0x0, 0x8, 0x2}, @enum64={0x7, 0x4, 0x0, 0x13, 0x1, 0x3, [{0xc, 0x4, 0xd7}, {0x6, 0x4, 0x3}, {0x7, 0x2}, {0xd, 0x400, 0x400}]}]}, {0x0, [0x61, 0x5f, 0x2e, 0x30, 0x30, 0x61, 0x5f]}}, &(0x7f0000001200)=""/80, 0x105, 0x50, 0x1, 0x8, 0x10000}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001300)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001000)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@bloom_filter={0x1e, 0x0, 0x40, 0x5, 0x80, r2, 0x479a8cb5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x1, 0xa}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r3}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, 0xffffffffffffffff, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000024c0)={&(0x7f0000002340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x30, 0x61, 0x0, 0x30, 0x5f, 0x2e]}}, &(0x7f00000023c0)=""/194, 0x20, 0xc2, 0x1}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') syz_clone(0x63008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.909852532s ago: executing program 3 (id=1842): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4}]}, @enum64={0xd, 0x7, 0x0, 0x13, 0x1, 0xf, [{0x4, 0xff, 0xfffffff9}, {0xb, 0x3, 0x2}, {0x8, 0x800, 0x3ff}, {0x3, 0x9, 0x2}, {0xf, 0x8000}, {0x10, 0x5, 0xe69}, {0xb, 0xb, 0x1}]}, @typedef={0xb, 0x0, 0x0, 0x8, 0x2}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x3, 0x8}, @func={0xf, 0x0, 0x0, 0xc, 0x1}, @typedef={0xe, 0x0, 0x0, 0x8, 0x2}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x2}, @enum64={0x7, 0x7, 0x0, 0x13, 0x1, 0x3, [{0x7, 0x8, 0x1ff}, {0xc, 0x4, 0xd7}, {0x9, 0x4, 0x3}, {0xc, 0x6, 0x3}, {0x6, 0x4, 0x3}, {0x7, 0x2}, {0xd, 0x400, 0x400}]}]}, {0x0, [0x61, 0x5f, 0x2e, 0x30, 0x30, 0x61, 0x5f]}}, &(0x7f0000001200)=""/80, 0x135, 0x50, 0x1, 0x8, 0x10000}, 0x28) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000012c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000001300)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001000)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@bloom_filter={0x1e, 0x0, 0x40, 0x5, 0x80, r3, 0x479a8cb5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x1, 0xa}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="06000000040000007c05"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r7, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') syz_clone(0x63008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.63373398s ago: executing program 0 (id=1843): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000013"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x12, 0x0, 0x0, 0x406}, 0x40020000) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r8, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x83, &(0x7f0000000340), 0x0, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x1a, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x1e, &(0x7f00000001c0)=ANY=[@ANYBLOB="181742d9ae0000000000ec000e33cf7186aa1432", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000182b0000", @ANYRES32, @ANYBLOB="0000000000080000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x7923, 0x0, 0x0, 0x40f00, 0x10, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000700)=[{0xd, 0x2, 0x8, 0x1}, {0x1, 0x2, 0x1, 0x8}, {0x1, 0x4, 0xc, 0x4}], 0x10, 0x3ff}, 0x94) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0x11, &(0x7f0000001000)=ANY=[@ANYBLOB="180000001e0001000000000500000000000000000b00010000000000fbffffff18fdffffff000000000000000000000003970008030000002fb4e4fffcffffff185100000f00000000000000000022000d4a300000000000186500000800000000000000048cc93e36a3009955fab0cf3c761b000000396010000000000018470000080000000000"], &(0x7f00000010c0)='syzkaller\x00', 0x3, 0xfc, &(0x7f0000001100)=""/252, 0x41000, 0x0, '\x00', r9, 0x0, r10, 0x8, &(0x7f0000001240)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001280)={0x1, 0x6, 0x4, 0x4000000}, 0x10, 0xff4, r1, 0x0, 0x0, &(0x7f0000001340), 0x10, 0x5a63}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.534385969s ago: executing program 4 (id=1844): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70300000000000085"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1821f4de09104a0d6e02"], 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) getpid() bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000700)=@base={0x10, 0x4, 0x4, 0x6, 0x0, r3}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="4b968372b01f004b18000000f7ffffff00000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000008500000005450000a22a"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) 1.399174722s ago: executing program 4 (id=1845): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18090000000000000000000000010000181200", @ANYRES32=r2, @ANYBLOB="0000000000000000b70300000000000085"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) getpid() bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000700)=@base={0x10, 0x4, 0x4, 0x6, 0x0, r3}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="4b968372b01f004b18000000f7ffffff00000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000008500000005450000a22a"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) 1.277777254s ago: executing program 0 (id=1846): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x9, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x3, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240), 0xb}, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe50}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) write$cgroup_subtree(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="2d70696473202d6d656d6f7279202b637075202b667265657a6572202b726c696d697420bf6e65745f636c73202d626c6b696f202b687567657438b4bdbb6c62202b706964732027121882f2fa294f5a666881d61330a27369d63e8f09bbfa29d66a87"], 0x43) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x1}) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) 1.240607798s ago: executing program 4 (id=1847): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='sched_switch\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000850000000800000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48c8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.136677298s ago: executing program 4 (id=1848): r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair(0x26, 0x800, 0x4, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000007c0)="38b65bf5487503bb7fe4c8ca8faf26f21c566f01fb000073e64344d400e276a8ebf755f9ca07a9ca6df543b9a4826235045051e0032e98de1cd8e0d3222bf31287dfdd7564c037ff595e2c208b323948ff4498d4e8e8e1a8af6813103525718c923cec0cd06c17159c54bf497fca21946873631ce99eb58b572e7614d4b23e3c7dcf6c476721582f6c293b1427f6c66cef325c83", &(0x7f0000000b00)="723283245f0a983c32e6eec06710399b113af4ca4c3ad600250ed56fbbe86fdfac9c6c773206000007000000000000006876e954cc039c84e73ef1cec2ad062cc029935299f3b24dadaedef47ccc07643d401a4cad100016aafb8ac9f738d9b9ff3e502706008000000000007b138b2aaa2ac6fc9b7002c0b24782b83c29576cc1e4d85dd0297f42a68b0818a4bf2aaa6a883b51113c378251fcbd37f6e259bdca20ac", 0xffffff80, r3, 0x0, 0x200000}, 0x38) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffc, 0x6041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, @perf_config_ext={0x0, 0x6}, 0x1000c0, 0x7f, 0x0, 0x8, 0x2000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0xb, 0x10, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0xc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 800.715881ms ago: executing program 0 (id=1849): perf_event_open(&(0x7f0000000100)={0x1, 0x8d, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x450d, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0x14, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x7fe2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xb, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) 455.088936ms ago: executing program 0 (id=1850): syz_clone(0x1000, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="414af84cf516d02c04f312792145add0b68fb7285fabfca9849ac6b3ae790dc908cc05d73896762a791013821a75e9877906e4a47e172f4395441ddd71ca3056f50e940dc015ab5dd06c26bd4b7e7a4a59ed9e786850650ed2aba4e836b72d33f93fd951f8010645bb3a8a850583679e0f1f7a8d7380294a53ae4c1a6073b0afbff5901b63fac22b23e9f6cf37600101d88df9985b3e4fbe47f6d967879e8c44ec6e10e2464c253418cd00896ee1ad35c991365e3d57b0df510be8e9fb36dc2244646d9c2d78af699eaa240361d90e5179852dbf578e7c0c5ef636e6d4574e0770548d5c41013295300d14519bd73c8b4e23b8") bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xc8, 0x1, 0x0, 0x7fffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 323.412179ms ago: executing program 4 (id=1851): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) socketpair(0x1d, 0x2, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x17, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xd9, &(0x7f0000000300)=""/217, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x5, 0x0, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r0, 0x1], 0x0, 0x10, 0x9}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000540)={0x0, r2}, 0x8) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 90.134351ms ago: executing program 0 (id=1852): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x9, 0x7}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffff63, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 0s ago: executing program 1 (id=1218): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0xc006000000000000) kernel console output (not intermixed with test programs): 250][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.706655][ T3706] device bridge_slave_0 entered promiscuous mode [ 150.788433][ T3706] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.858200][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.866023][ T3706] device bridge_slave_1 entered promiscuous mode [ 151.685032][ T10] device bridge_slave_1 left promiscuous mode [ 151.697433][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.705424][ T10] device bridge_slave_0 left promiscuous mode [ 151.712447][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.729436][ T10] device veth1_macvtap left promiscuous mode [ 151.743630][ T10] device veth0_vlan left promiscuous mode [ 151.830145][ T3736] FAULT_INJECTION: forcing a failure. [ 151.830145][ T3736] name failslab, interval 1, probability 0, space 0, times 0 [ 151.846868][ T3736] CPU: 1 PID: 3736 Comm: syz.4.1282 Not tainted syzkaller #0 [ 151.854403][ T3736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 151.864578][ T3736] Call Trace: [ 151.868028][ T3736] [ 151.870969][ T3736] __dump_stack+0x21/0x30 [ 151.875309][ T3736] dump_stack_lvl+0xee/0x150 [ 151.879997][ T3736] ? show_regs_print_info+0x20/0x20 [ 151.885213][ T3736] dump_stack+0x15/0x20 [ 151.889889][ T3736] should_fail+0x3c1/0x510 [ 151.894317][ T3736] __should_failslab+0xa4/0xe0 [ 151.899614][ T3736] should_failslab+0x9/0x20 [ 151.904496][ T3736] slab_pre_alloc_hook+0x3b/0xe0 [ 151.909671][ T3736] ? __d_alloc+0x2d/0x6a0 [ 151.914509][ T3736] kmem_cache_alloc+0x44/0x260 [ 151.919648][ T3736] __d_alloc+0x2d/0x6a0 [ 151.923901][ T3736] d_alloc_anon+0x17/0x20 [ 151.928516][ T3736] __ns_get_path+0x2e8/0x470 [ 151.933210][ T3736] ns_get_path+0x54/0x90 [ 151.937633][ T3736] proc_ns_get_link+0xf3/0x200 [ 151.942668][ T3736] ? proc_ns_instantiate+0xf0/0xf0 [ 151.947966][ T3736] ? _raw_spin_lock+0x8e/0xe0 [ 151.952755][ T3736] ? security_inode_follow_link+0xc4/0x110 [ 151.958779][ T3736] ? proc_ns_instantiate+0xf0/0xf0 [ 151.963895][ T3736] pick_link+0x6d4/0xe00 [ 151.968314][ T3736] step_into+0xaec/0xd10 [ 151.972555][ T3736] ? pid_revalidate+0x141/0x1a0 [ 151.977416][ T3736] ? lookup_fast+0x37f/0x700 [ 151.982184][ T3736] ? set_root+0x400/0x400 [ 151.986531][ T3736] ? path_openat+0x165/0x2f10 [ 151.991224][ T3736] path_openat+0x1629/0x2f10 [ 151.996464][ T3736] ? __kasan_check_read+0x11/0x20 [ 152.001507][ T3736] ? __cond_resched+0xb0/0xb0 [ 152.006295][ T3736] ? do_syscall_64+0x4c/0xa0 [ 152.011021][ T3736] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 152.017751][ T3736] ? irqentry_exit+0x37/0x40 [ 152.022878][ T3736] ? do_filp_open+0x3e0/0x3e0 [ 152.027857][ T3736] ? memset+0x3a/0x40 [ 152.031982][ T3736] do_filp_open+0x1b3/0x3e0 [ 152.037227][ T3736] ? vfs_tmpfile+0x2d0/0x2d0 [ 152.042050][ T3736] do_sys_openat2+0x14c/0x7b0 [ 152.046812][ T3736] ? __fput+0x63f/0x8b0 [ 152.050981][ T3736] ? do_sys_open+0xe0/0xe0 [ 152.055608][ T3736] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 152.061528][ T3736] __x64_sys_openat+0x136/0x160 [ 152.066405][ T3736] x64_sys_call+0x219/0x9a0 [ 152.071184][ T3736] do_syscall_64+0x4c/0xa0 [ 152.075624][ T3736] ? clear_bhb_loop+0x50/0xa0 [ 152.080411][ T3736] ? clear_bhb_loop+0x50/0xa0 [ 152.085103][ T3736] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 152.091138][ T3736] RIP: 0033:0x7ffb0983f810 [ 152.095577][ T3736] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 152.115412][ T3736] RSP: 002b:00007ffb082a8f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 152.123928][ T3736] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffb0983f810 [ 152.131988][ T3736] RDX: 0000000000000000 RSI: 00007ffb082a8fa0 RDI: 00000000ffffff9c [ 152.140059][ T3736] RBP: 00007ffb082a8fa0 R08: 0000000000000000 R09: 0000000000000000 [ 152.148266][ T3736] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 152.156483][ T3736] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 152.164759][ T3736] [ 152.232591][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.242251][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.250333][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.259814][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.269179][ T539] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.276459][ T539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.285152][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.294588][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.303384][ T539] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.310594][ T539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.318472][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.382602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.413065][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.453564][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.514325][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.582970][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.607725][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.648572][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.657075][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.665587][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.674056][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.712985][ T3706] device veth0_vlan entered promiscuous mode [ 152.775651][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.787556][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.818054][ T3706] device veth1_macvtap entered promiscuous mode [ 153.011278][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.021387][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.030470][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.149864][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.161876][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.080446][ T3763] FAULT_INJECTION: forcing a failure. [ 154.080446][ T3763] name failslab, interval 1, probability 0, space 0, times 0 [ 154.093151][ T3763] CPU: 1 PID: 3763 Comm: syz.2.1294 Not tainted syzkaller #0 [ 154.100579][ T3763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 154.111122][ T3763] Call Trace: [ 154.114603][ T3763] [ 154.117561][ T3763] __dump_stack+0x21/0x30 [ 154.121924][ T3763] dump_stack_lvl+0xee/0x150 [ 154.126747][ T3763] ? show_regs_print_info+0x20/0x20 [ 154.132246][ T3763] ? wq_worker_last_func+0x50/0x50 [ 154.137400][ T3763] dump_stack+0x15/0x20 [ 154.141664][ T3763] should_fail+0x3c1/0x510 [ 154.146376][ T3763] __should_failslab+0xa4/0xe0 [ 154.151292][ T3763] should_failslab+0x9/0x20 [ 154.156608][ T3763] slab_pre_alloc_hook+0x3b/0xe0 [ 154.161575][ T3763] ? __alloc_skb+0xe0/0x740 [ 154.166506][ T3763] kmem_cache_alloc+0x44/0x260 [ 154.171509][ T3763] ? __kasan_check_write+0x14/0x20 [ 154.176820][ T3763] __alloc_skb+0xe0/0x740 [ 154.181168][ T3763] tipc_buf_acquire+0x2b/0xe0 [ 154.186250][ T3763] tipc_named_publish+0x2fa/0x890 [ 154.191406][ T3763] tipc_nametbl_publish+0x1a8/0x2f0 [ 154.197104][ T3763] tipc_sk_publish+0x1f8/0x440 [ 154.201911][ T3763] ? tipc_sk_withdraw+0x620/0x620 [ 154.207507][ T3763] ? tipc_nametbl_build_group+0x3d2/0x430 [ 154.213356][ T3763] tipc_sk_join+0x389/0x6a0 [ 154.217886][ T3763] ? sock_init_data+0xc0/0xc0 [ 154.222746][ T3763] ? __tipc_sendstream+0x11a0/0x11a0 [ 154.228333][ T3763] ? __kasan_check_write+0x14/0x20 [ 154.233881][ T3763] ? _copy_from_user+0x95/0xd0 [ 154.238682][ T3763] tipc_setsockopt+0x684/0x900 [ 154.243790][ T3763] ? tipc_shutdown+0x400/0x400 [ 154.248746][ T3763] ? security_socket_setsockopt+0x82/0xa0 [ 154.254695][ T3763] ? tipc_shutdown+0x400/0x400 [ 154.259834][ T3763] __sys_setsockopt+0x2f0/0x460 [ 154.265813][ T3763] ? __kasan_check_write+0x14/0x20 [ 154.271565][ T3763] ? __ia32_sys_recv+0xb0/0xb0 [ 154.276379][ T3763] ? ksys_write+0x1eb/0x240 [ 154.280915][ T3763] ? __ia32_sys_read+0x90/0x90 [ 154.286056][ T3763] __x64_sys_setsockopt+0xbf/0xd0 [ 154.292439][ T3763] x64_sys_call+0x982/0x9a0 [ 154.297549][ T3763] do_syscall_64+0x4c/0xa0 [ 154.302136][ T3763] ? clear_bhb_loop+0x50/0xa0 [ 154.307020][ T3763] ? clear_bhb_loop+0x50/0xa0 [ 154.311901][ T3763] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.318124][ T3763] RIP: 0033:0x7f0b1a230fc9 [ 154.322658][ T3763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.342636][ T3763] RSP: 002b:00007f0b18c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 154.351098][ T3763] RAX: ffffffffffffffda RBX: 00007f0b1a487fa0 RCX: 00007f0b1a230fc9 [ 154.359277][ T3763] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 154.367638][ T3763] RBP: 00007f0b18c99090 R08: 0000000000000127 R09: 0000000000000000 [ 154.375750][ T3763] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000002 [ 154.384039][ T3763] R13: 00007f0b1a488038 R14: 00007f0b1a487fa0 R15: 00007fffa11a5408 [ 154.392256][ T3763] [ 154.395475][ T3763] tipc: Publication distribution failure [ 155.110862][ T3774] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.183188][ T3774] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.246322][ T3774] device bridge_slave_0 entered promiscuous mode [ 155.357187][ T3774] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.366358][ T3774] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.373950][ T3774] device bridge_slave_1 entered promiscuous mode [ 156.005908][ T10] device bridge_slave_1 left promiscuous mode [ 156.026275][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.119323][ T10] device bridge_slave_0 left promiscuous mode [ 156.201025][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.330187][ T10] device veth1_macvtap left promiscuous mode [ 156.367384][ T10] device veth0_vlan left promiscuous mode [ 156.411613][ T30] audit: type=1400 audit(1761031728.652:141): avc: denied { create } for pid=3818 comm="syz.3.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 156.763309][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.773960][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.786379][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.797542][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.807230][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.815554][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.823779][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.832937][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.841831][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.849155][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.909747][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.920811][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.930319][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.881633][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.923428][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.960090][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.988394][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.034192][ T3774] device veth0_vlan entered promiscuous mode [ 158.050959][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.061009][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.081865][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.091461][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.115348][ T3774] device veth1_macvtap entered promiscuous mode [ 158.197726][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.207804][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.216577][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.233994][ T3858] device sit0 left promiscuous mode [ 158.316811][ T3855] device sit0 entered promiscuous mode [ 158.433325][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.450516][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 158.607878][ T3872] device sit0 entered promiscuous mode [ 160.138073][ T3891] ------------[ cut here ]------------ [ 160.143807][ T3891] trace type BPF program uses run-time allocation [ 160.195860][ T3891] WARNING: CPU: 0 PID: 3891 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 160.298555][ T3891] Modules linked in: [ 160.314224][ T3891] CPU: 0 PID: 3891 Comm: syz.3.1334 Not tainted syzkaller #0 [ 160.349770][ T3891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 160.360586][ T3891] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 160.367616][ T3891] Code: ee ff 48 c7 c6 60 f0 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 e6 4c ee ff c6 05 54 98 6b 05 01 48 c7 c7 c0 ec 47 85 e8 f3 5a 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 160.446988][ T3891] RSP: 0018:ffffc90000a87428 EFLAGS: 00010246 [ 160.459973][ T3891] RAX: be8bdb69f09c3e00 RBX: 0000000000000001 RCX: 0000000000080000 [ 160.468448][ T3891] RDX: ffffc90002720000 RSI: 0000000000002841 RDI: 0000000000002842 [ 160.500497][ T3891] RBP: ffffc90000a87470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 160.514334][ T3887] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.586418][ T3887] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.594195][ T3887] device bridge_slave_0 entered promiscuous mode [ 160.645922][ T3891] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff888123e10000 [ 160.655032][ T3891] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888127c90000 [ 160.671199][ T3891] FS: 00007f19efab16c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 160.695604][ T3891] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 160.781018][ T3891] CR2: 00002000002b4000 CR3: 000000012b7d0000 CR4: 00000000003506b0 [ 160.795538][ T3887] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.806448][ T3887] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.816169][ T3891] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 160.825065][ T3887] device bridge_slave_1 entered promiscuous mode [ 160.836778][ T3891] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 160.845005][ T3891] Call Trace: [ 160.885890][ T3891] [ 160.888985][ T3891] resolve_pseudo_ldimm64+0x685/0x11d0 [ 160.894591][ T3891] ? check_attach_btf_id+0xde0/0xde0 [ 160.988039][ T3891] ? __mark_reg_known+0x1b0/0x1b0 [ 161.004788][ T3891] ? security_capable+0x87/0xb0 [ 161.014760][ T3891] bpf_check+0x2c25/0xf280 [ 161.021181][ T3891] ? 0xffffffffa0028000 [ 161.048290][ T3891] ? is_bpf_text_address+0x177/0x190 [ 161.054704][ T3891] ? bpf_get_btf_vmlinux+0x60/0x60 [ 161.061517][ T3891] ? unwind_get_return_address+0x4d/0x90 [ 161.071812][ T3891] ? stack_trace_save+0xe0/0xe0 [ 161.095788][ T3891] ? arch_stack_walk+0xee/0x140 [ 161.100896][ T3891] ? stack_trace_save+0x98/0xe0 [ 161.109173][ T3891] ? __stack_depot_save+0x34/0x480 [ 161.124881][ T3891] ? __kasan_slab_alloc+0x69/0xf0 [ 161.132451][ T3891] ? _find_next_bit+0x1fa/0x200 [ 161.147250][ T3891] ? __kasan_kmalloc+0xec/0x110 [ 161.170416][ T3891] ? __kasan_kmalloc+0xda/0x110 [ 161.175589][ T3891] ? kmem_cache_alloc_trace+0x119/0x270 [ 161.176070][ T3887] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.188525][ T3887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.196434][ T3887] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.200485][ T3891] ? selinux_bpf_prog_alloc+0x51/0x140 [ 161.203753][ T3887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.218471][ T3891] ? security_bpf_prog_alloc+0x62/0x90 [ 161.224057][ T3891] ? bpf_prog_load+0x97c/0x1550 [ 161.229269][ T3891] ? __sys_bpf+0x4c3/0x730 [ 161.233853][ T3891] ? __x64_sys_bpf+0x7c/0x90 [ 161.238878][ T3891] ? x64_sys_call+0x4b9/0x9a0 [ 161.260394][ T3891] ? do_syscall_64+0x4c/0xa0 [ 161.269530][ T3891] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.275988][ T3891] ? check_stack_object+0x81/0x140 [ 161.281507][ T3891] ? memset+0x35/0x40 [ 161.285688][ T3891] ? bpf_obj_name_cpy+0x193/0x1e0 [ 161.291567][ T3891] bpf_prog_load+0x1042/0x1550 [ 161.296836][ T3891] ? map_freeze+0x360/0x360 [ 161.301542][ T3891] ? selinux_bpf+0xc7/0xf0 [ 161.306639][ T3891] ? security_bpf+0x82/0xa0 [ 161.311323][ T3891] __sys_bpf+0x4c3/0x730 [ 161.316525][ T3891] ? bpf_link_show_fdinfo+0x310/0x310 [ 161.322223][ T3891] ? __kasan_check_write+0x14/0x20 [ 161.351011][ T3891] ? switch_fpu_return+0x15d/0x2c0 [ 161.358388][ T3891] __x64_sys_bpf+0x7c/0x90 [ 161.378291][ T539] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.379565][ T3891] x64_sys_call+0x4b9/0x9a0 [ 161.390783][ T3891] do_syscall_64+0x4c/0xa0 [ 161.396361][ T3891] ? clear_bhb_loop+0x50/0xa0 [ 161.401388][ T3891] ? clear_bhb_loop+0x50/0xa0 [ 161.406467][ T3891] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 161.413083][ T3891] RIP: 0033:0x7f19f1048fc9 [ 161.418937][ T539] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.424315][ T3891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.533401][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.557156][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.562332][ T3891] RSP: 002b:00007f19efab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.607143][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.615925][ T3891] RAX: ffffffffffffffda RBX: 00007f19f129ffa0 RCX: 00007f19f1048fc9 [ 161.624611][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.633395][ T3891] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 161.642186][ T539] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.649400][ T539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.705784][ T3891] RBP: 00007f19f10cbf91 R08: 0000000000000000 R09: 0000000000000000 [ 161.774974][ T3891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 161.812456][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.845856][ T3891] R13: 00007f19f12a0038 R14: 00007f19f129ffa0 R15: 00007ffe4c30b9a8 [ 161.878364][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.916033][ T3891] [ 161.926946][ T539] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.934220][ T539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.954954][ T3891] ---[ end trace 617648a266eb770b ]--- [ 162.077457][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.139756][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.168667][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.222673][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.274585][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.316345][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.350367][ T394] device bridge_slave_1 left promiscuous mode [ 162.366295][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.425361][ T394] device bridge_slave_0 left promiscuous mode [ 162.476522][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.543839][ T394] device veth1_macvtap left promiscuous mode [ 162.568999][ T394] device veth0_vlan left promiscuous mode [ 162.926375][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.934617][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.943147][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.956308][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.004988][ T3887] device veth0_vlan entered promiscuous mode [ 163.367216][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.375598][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.435167][ T3887] device veth1_macvtap entered promiscuous mode [ 163.476889][ T3956] device syzkaller0 entered promiscuous mode [ 163.540464][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.549028][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.558345][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.568452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.586380][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.170342][ T3979] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.177931][ T3979] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.185913][ T3979] device bridge_slave_0 entered promiscuous mode [ 165.246254][ T3979] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.295798][ T3979] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.310398][ T3979] device bridge_slave_1 entered promiscuous mode [ 165.807455][ T394] device bridge_slave_1 left promiscuous mode [ 165.814227][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.822314][ T394] device bridge_slave_0 left promiscuous mode [ 165.829481][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.838742][ T394] device veth1_macvtap left promiscuous mode [ 165.845112][ T394] device veth0_vlan left promiscuous mode [ 166.452945][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.460955][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.535252][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.550791][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.578636][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.586295][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.644797][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.666085][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.705093][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.712660][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.811274][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.821929][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.835081][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.920770][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.932104][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.011069][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.022623][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.083404][ T3979] device veth0_vlan entered promiscuous mode [ 167.105964][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.116916][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.132169][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.145519][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.219615][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.231573][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.344997][ T3979] device veth1_macvtap entered promiscuous mode [ 167.379710][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.396595][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.460290][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.490243][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.601118][ T4061] syz.2.1389[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.601227][ T4061] syz.2.1389[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.618156][ T4060] FAULT_INJECTION: forcing a failure. [ 168.618156][ T4060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 168.697947][ T4061] device syzkaller0 entered promiscuous mode [ 168.705455][ T4060] CPU: 0 PID: 4060 Comm: syz.3.1390 Tainted: G W syzkaller #0 [ 168.714729][ T4060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 168.725045][ T4060] Call Trace: [ 168.728536][ T4060] [ 168.731486][ T4060] __dump_stack+0x21/0x30 [ 168.735925][ T4060] dump_stack_lvl+0xee/0x150 [ 168.740898][ T4060] ? show_regs_print_info+0x20/0x20 [ 168.746208][ T4060] dump_stack+0x15/0x20 [ 168.750381][ T4060] should_fail+0x3c1/0x510 [ 168.754820][ T4060] should_fail_usercopy+0x1a/0x20 [ 168.759936][ T4060] _copy_from_iter+0x21a/0x1050 [ 168.764992][ T4060] ? __kasan_check_write+0x14/0x20 [ 168.770194][ T4060] ? skb_set_owner_w+0x24d/0x370 [ 168.775687][ T4060] ? copy_mc_pipe_to_iter+0x770/0x770 [ 168.781946][ T4060] ? check_stack_object+0x81/0x140 [ 168.787596][ T4060] ? __kasan_check_read+0x11/0x20 [ 168.793135][ T4060] ? __check_object_size+0x2f4/0x3c0 [ 168.798643][ T4060] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 168.805116][ T4060] ? skb_put+0x10e/0x1f0 [ 168.809863][ T4060] tun_get_user+0xc3c/0x33c0 [ 168.814736][ T4060] ? tun_do_read+0x1c40/0x1c40 [ 168.820645][ T4060] ? kstrtouint_from_user+0x1a0/0x200 [ 168.826662][ T4060] ? kstrtol_from_user+0x260/0x260 [ 168.831901][ T4060] ? bpf_probe_write_user+0x98/0xf0 [ 168.837348][ T4060] ? avc_policy_seqno+0x1b/0x70 [ 168.842394][ T4060] ? selinux_file_permission+0x2aa/0x510 [ 168.848125][ T4060] tun_chr_write_iter+0x1eb/0x2e0 [ 168.853162][ T4060] vfs_write+0x802/0xf70 [ 168.857425][ T4060] ? file_end_write+0x1b0/0x1b0 [ 168.862319][ T4060] ? __fget_files+0x2c4/0x320 [ 168.867025][ T4060] ? __fdget_pos+0x1f7/0x380 [ 168.871622][ T4060] ? ksys_write+0x71/0x240 [ 168.876092][ T4060] ksys_write+0x140/0x240 [ 168.880670][ T4060] ? __ia32_sys_read+0x90/0x90 [ 168.885551][ T4060] ? debug_smp_processor_id+0x17/0x20 [ 168.891057][ T4060] __x64_sys_write+0x7b/0x90 [ 168.895946][ T4060] x64_sys_call+0x8ef/0x9a0 [ 168.900664][ T4060] do_syscall_64+0x4c/0xa0 [ 168.905283][ T4060] ? clear_bhb_loop+0x50/0xa0 [ 168.910273][ T4060] ? clear_bhb_loop+0x50/0xa0 [ 168.915059][ T4060] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.921536][ T4060] RIP: 0033:0x7f19f1048fc9 [ 168.926062][ T4060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.946793][ T4060] RSP: 002b:00007f19efab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 168.956110][ T4060] RAX: ffffffffffffffda RBX: 00007f19f129ffa0 RCX: 00007f19f1048fc9 [ 168.964715][ T4060] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 168.973147][ T4060] RBP: 00007f19efab1090 R08: 0000000000000000 R09: 0000000000000000 [ 168.981812][ T4060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.990591][ T4060] R13: 00007f19f12a0038 R14: 00007f19f129ffa0 R15: 00007ffe4c30b9a8 [ 169.000243][ T4060] [ 169.591155][ T4071] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.722343][ T4071] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.859638][ T4071] device bridge_slave_0 entered promiscuous mode [ 169.979581][ T4071] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.987471][ T4071] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.997401][ T4071] device bridge_slave_1 entered promiscuous mode [ 170.100601][ T394] device bridge_slave_1 left promiscuous mode [ 170.107648][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.166516][ T394] device bridge_slave_0 left promiscuous mode [ 170.200555][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.267175][ T394] device veth1_macvtap left promiscuous mode [ 170.273612][ T394] device veth0_vlan left promiscuous mode [ 171.602774][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.611266][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.636710][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.645503][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.654683][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.661930][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.671073][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.680483][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.688996][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.696354][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.704037][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.766158][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.774655][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.801432][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.810329][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.870350][ T4071] device veth0_vlan entered promiscuous mode [ 171.909596][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.956578][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.976190][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.984887][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.993875][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.002438][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.037245][ T4071] device veth1_macvtap entered promiscuous mode [ 172.091231][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.121357][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.152707][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.211813][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.248354][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.316497][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.367427][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.206681][ T394] device bridge_slave_1 left promiscuous mode [ 173.213138][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.221360][ T394] device bridge_slave_0 left promiscuous mode [ 173.227699][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.236423][ T394] device veth1_macvtap left promiscuous mode [ 173.242811][ T394] device veth0_vlan left promiscuous mode [ 173.851941][ T4135] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.916152][ T4135] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.005053][ T4135] device bridge_slave_0 entered promiscuous mode [ 174.176028][ T4135] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.183121][ T4135] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.228243][ T4135] device bridge_slave_1 entered promiscuous mode [ 175.264254][ T4178] device syzkaller0 entered promiscuous mode [ 175.349139][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.368008][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.727879][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.746420][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.795273][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.802844][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.905867][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.928140][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.938751][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.948016][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.955564][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.025882][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.059023][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.078387][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.097520][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.220291][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.229281][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.259710][ T4135] device veth0_vlan entered promiscuous mode [ 176.266966][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.276797][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.286266][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.314896][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.391625][ T4135] device veth1_macvtap entered promiscuous mode [ 176.446640][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.466045][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.475382][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.573111][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.586379][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.648655][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.657251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.959704][ T4228] FAULT_INJECTION: forcing a failure. [ 177.959704][ T4228] name failslab, interval 1, probability 0, space 0, times 0 [ 177.973260][ T4228] CPU: 0 PID: 4228 Comm: syz.4.1444 Tainted: G W syzkaller #0 [ 177.982521][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 177.992794][ T4228] Call Trace: [ 177.996104][ T4228] [ 177.999049][ T4228] __dump_stack+0x21/0x30 [ 178.003609][ T4228] dump_stack_lvl+0xee/0x150 [ 178.008415][ T4228] ? show_regs_print_info+0x20/0x20 [ 178.013753][ T4228] dump_stack+0x15/0x20 [ 178.017961][ T4228] should_fail+0x3c1/0x510 [ 178.022633][ T4228] __should_failslab+0xa4/0xe0 [ 178.027807][ T4228] should_failslab+0x9/0x20 [ 178.032607][ T4228] slab_pre_alloc_hook+0x3b/0xe0 [ 178.038323][ T4228] ? __alloc_skb+0xe0/0x740 [ 178.042866][ T4228] kmem_cache_alloc+0x44/0x260 [ 178.047781][ T4228] __alloc_skb+0xe0/0x740 [ 178.052413][ T4228] br_info_notify+0xae/0x170 [ 178.057150][ T4228] br_ifinfo_notify+0x2a/0x40 [ 178.062123][ T4228] br_device_event+0x6af/0x790 [ 178.067608][ T4228] ? br_boolopt_multi_get+0xf0/0xf0 [ 178.073126][ T4228] ? packet_notifier+0x8bc/0x8d0 [ 178.078953][ T4228] ? addrconf_notify+0x37b/0xde0 [ 178.083918][ T4228] raw_notifier_call_chain+0x90/0x100 [ 178.089506][ T4228] dev_set_mac_address+0x318/0x420 [ 178.094726][ T4228] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 178.100767][ T4228] dev_set_mac_address_user+0x31/0x50 [ 178.106417][ T4228] dev_ifsioc+0x757/0xe70 [ 178.110835][ T4228] ? dev_ioctl+0xd10/0xd10 [ 178.115279][ T4228] ? __kasan_check_write+0x14/0x20 [ 178.120493][ T4228] ? mutex_lock+0x95/0x1a0 [ 178.125278][ T4228] ? wait_for_completion_killable_timeout+0x10/0x10 [ 178.131966][ T4228] ? dev_get_by_name_rcu+0xc8/0xf0 [ 178.137112][ T4228] dev_ioctl+0x560/0xd10 [ 178.141369][ T4228] sock_do_ioctl+0x22e/0x300 [ 178.146007][ T4228] ? sock_show_fdinfo+0xa0/0xa0 [ 178.150872][ T4228] ? selinux_file_ioctl+0x377/0x480 [ 178.156104][ T4228] sock_ioctl+0x4bc/0x6b0 [ 178.160601][ T4228] ? sock_poll+0x3d0/0x3d0 [ 178.165131][ T4228] ? __fget_files+0x2c4/0x320 [ 178.170028][ T4228] ? security_file_ioctl+0x84/0xa0 [ 178.175182][ T4228] ? sock_poll+0x3d0/0x3d0 [ 178.179703][ T4228] __se_sys_ioctl+0x121/0x1a0 [ 178.184512][ T4228] __x64_sys_ioctl+0x7b/0x90 [ 178.189354][ T4228] x64_sys_call+0x2f/0x9a0 [ 178.194107][ T4228] do_syscall_64+0x4c/0xa0 [ 178.198559][ T4228] ? clear_bhb_loop+0x50/0xa0 [ 178.203408][ T4228] ? clear_bhb_loop+0x50/0xa0 [ 178.208678][ T4228] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.214627][ T4228] RIP: 0033:0x7ffb09840fc9 [ 178.219245][ T4228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.239186][ T4228] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.247707][ T4228] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 178.255774][ T4228] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 178.263887][ T4228] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 178.271968][ T4228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.280306][ T4228] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 178.288527][ T4228] [ 181.569793][ T4231] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.656431][ T4231] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.746230][ T4231] device bridge_slave_0 entered promiscuous mode [ 181.852179][ T4231] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.860102][ T4231] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.867952][ T4231] device bridge_slave_1 entered promiscuous mode [ 182.226458][ T394] device bridge_slave_1 left promiscuous mode [ 182.233302][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.267943][ T394] device bridge_slave_0 left promiscuous mode [ 182.274319][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.342509][ T394] device veth1_macvtap left promiscuous mode [ 182.381140][ T394] device veth0_vlan left promiscuous mode [ 183.329816][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.353147][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.389695][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.404890][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.420079][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.427402][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.449635][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.460751][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.469910][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.477217][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.586705][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.658117][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.868008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.892027][ T4231] device veth0_vlan entered promiscuous mode [ 183.952914][ T4231] device veth1_macvtap entered promiscuous mode [ 183.989268][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.016918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.046487][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.054712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.073622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.082475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.091099][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.099988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.120034][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.176554][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.217632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.252660][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.261766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.722257][ T4370] FAULT_INJECTION: forcing a failure. [ 185.722257][ T4370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.773074][ T4370] CPU: 1 PID: 4370 Comm: syz.4.1500 Tainted: G W syzkaller #0 [ 185.782112][ T4370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 185.792661][ T4370] Call Trace: [ 185.796057][ T4370] [ 185.799157][ T4370] __dump_stack+0x21/0x30 [ 185.803645][ T4370] dump_stack_lvl+0xee/0x150 [ 185.808768][ T4370] ? show_regs_print_info+0x20/0x20 [ 185.814104][ T4370] ? vfs_write+0xc17/0xf70 [ 185.818552][ T4370] dump_stack+0x15/0x20 [ 185.822716][ T4370] should_fail+0x3c1/0x510 [ 185.827153][ T4370] should_fail_usercopy+0x1a/0x20 [ 185.832284][ T4370] _copy_from_user+0x20/0xd0 [ 185.837169][ T4370] __sys_bpf+0x233/0x730 [ 185.841557][ T4370] ? bpf_link_show_fdinfo+0x310/0x310 [ 185.847106][ T4370] ? debug_smp_processor_id+0x17/0x20 [ 185.852727][ T4370] __x64_sys_bpf+0x7c/0x90 [ 185.857266][ T4370] x64_sys_call+0x4b9/0x9a0 [ 185.861909][ T4370] do_syscall_64+0x4c/0xa0 [ 185.866627][ T4370] ? clear_bhb_loop+0x50/0xa0 [ 185.871524][ T4370] ? clear_bhb_loop+0x50/0xa0 [ 185.876422][ T4370] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.882699][ T4370] RIP: 0033:0x7ffb09840fc9 [ 185.887277][ T4370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.907366][ T4370] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 185.916007][ T4370] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 185.924586][ T4370] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 185.933234][ T4370] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 185.941827][ T4370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.950236][ T4370] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 185.958606][ T4370] [ 185.989619][ T4380] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.997294][ T4380] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.005007][ T4380] device bridge_slave_0 entered promiscuous mode [ 186.013898][ T4380] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.021680][ T4380] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.030160][ T4380] device bridge_slave_1 entered promiscuous mode [ 186.241193][ T394] device bridge_slave_1 left promiscuous mode [ 186.250310][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.288130][ T394] device bridge_slave_0 left promiscuous mode [ 186.325354][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.335762][ T394] device veth1_macvtap left promiscuous mode [ 186.342346][ T394] device veth0_vlan left promiscuous mode [ 186.469618][ T4398] device sit0 entered promiscuous mode [ 187.049874][ T30] audit: type=1400 audit(1761031759.292:142): avc: denied { create } for pid=4412 comm="syz.3.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 187.054639][ T4380] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.082830][ T4380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.092885][ T4380] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.100097][ T4380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.110424][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.118932][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.634215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.656381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.755072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.764639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.775130][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.782254][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.809100][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.818268][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.826797][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.833891][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.841931][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.850556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.859102][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.867597][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.932561][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 187.945910][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.021230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.034090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.043358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.051709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.191408][ T4380] device veth0_vlan entered promiscuous mode [ 188.206484][ T4445] FAULT_INJECTION: forcing a failure. [ 188.206484][ T4445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.220284][ T4445] CPU: 1 PID: 4445 Comm: syz.3.1524 Tainted: G W syzkaller #0 [ 188.229180][ T4445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 188.239478][ T4445] Call Trace: [ 188.242797][ T4445] [ 188.245757][ T4445] __dump_stack+0x21/0x30 [ 188.250207][ T4445] dump_stack_lvl+0xee/0x150 [ 188.254833][ T4445] ? show_regs_print_info+0x20/0x20 [ 188.260246][ T4445] ? vfs_write+0xc17/0xf70 [ 188.264706][ T4445] dump_stack+0x15/0x20 [ 188.268980][ T4445] should_fail+0x3c1/0x510 [ 188.273421][ T4445] should_fail_usercopy+0x1a/0x20 [ 188.278471][ T4445] _copy_from_user+0x20/0xd0 [ 188.283089][ T4445] __sys_bpf+0x233/0x730 [ 188.287359][ T4445] ? bpf_link_show_fdinfo+0x310/0x310 [ 188.292780][ T4445] ? debug_smp_processor_id+0x17/0x20 [ 188.298351][ T4445] __x64_sys_bpf+0x7c/0x90 [ 188.302793][ T4445] x64_sys_call+0x4b9/0x9a0 [ 188.307295][ T4445] do_syscall_64+0x4c/0xa0 [ 188.311877][ T4445] ? clear_bhb_loop+0x50/0xa0 [ 188.316555][ T4445] ? clear_bhb_loop+0x50/0xa0 [ 188.321320][ T4445] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 188.327222][ T4445] RIP: 0033:0x7f19f1048fc9 [ 188.331645][ T4445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.343854][ T4380] device veth1_macvtap entered promiscuous mode [ 188.351456][ T4445] RSP: 002b:00007f19efab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.351485][ T4445] RAX: ffffffffffffffda RBX: 00007f19f129ffa0 RCX: 00007f19f1048fc9 [ 188.351501][ T4445] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 188.382268][ T4445] RBP: 00007f19efab1090 R08: 0000000000000000 R09: 0000000000000000 [ 188.390331][ T4445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.398428][ T4445] R13: 00007f19f12a0038 R14: 00007f19f129ffa0 R15: 00007ffe4c30b9a8 [ 188.406897][ T4445] [ 188.457763][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.466527][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.475233][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.507494][ T4448] device sit0 left promiscuous mode [ 188.579540][ T4449] device sit0 entered promiscuous mode [ 188.821313][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.877761][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.968072][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.016205][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.578355][ T394] device bridge_slave_1 left promiscuous mode [ 190.591116][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.685019][ T394] device bridge_slave_0 left promiscuous mode [ 190.691980][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.700592][ T4475] FAULT_INJECTION: forcing a failure. [ 190.700592][ T4475] name failslab, interval 1, probability 0, space 0, times 0 [ 190.766680][ T394] device veth1_macvtap left promiscuous mode [ 190.796199][ T394] device veth0_vlan left promiscuous mode [ 190.829325][ T4475] CPU: 0 PID: 4475 Comm: syz.3.1536 Tainted: G W syzkaller #0 [ 190.838586][ T4475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 190.848766][ T4475] Call Trace: [ 190.852075][ T4475] [ 190.855022][ T4475] __dump_stack+0x21/0x30 [ 190.859367][ T4475] dump_stack_lvl+0xee/0x150 [ 190.864027][ T4475] ? show_regs_print_info+0x20/0x20 [ 190.869394][ T4475] ? avc_has_perm_noaudit+0x2f4/0x460 [ 190.874801][ T4475] dump_stack+0x15/0x20 [ 190.878983][ T4475] should_fail+0x3c1/0x510 [ 190.883712][ T4475] __should_failslab+0xa4/0xe0 [ 190.888494][ T4475] should_failslab+0x9/0x20 [ 190.893170][ T4475] slab_pre_alloc_hook+0x3b/0xe0 [ 190.898399][ T4475] ? __alloc_skb+0xe0/0x740 [ 190.903069][ T4475] kmem_cache_alloc+0x44/0x260 [ 190.907978][ T4475] __alloc_skb+0xe0/0x740 [ 190.912424][ T4475] alloc_skb_with_frags+0xa8/0x620 [ 190.917541][ T4475] sock_alloc_send_pskb+0x853/0x980 [ 190.923010][ T4475] ? is_bpf_text_address+0x177/0x190 [ 190.928414][ T4475] ? sock_kzfree_s+0x60/0x60 [ 190.933117][ T4475] ? perf_swevent_event+0xce/0x530 [ 190.938325][ T4475] ? debug_smp_processor_id+0x17/0x20 [ 190.943951][ T4475] tun_get_user+0x4e6/0x33c0 [ 190.948558][ T4475] ? tun_do_read+0x1c40/0x1c40 [ 190.953432][ T4475] ? kstrtouint_from_user+0x1a0/0x200 [ 190.958823][ T4475] ? kstrtol_from_user+0x260/0x260 [ 190.964220][ T4475] ? avc_policy_seqno+0x1b/0x70 [ 190.969212][ T4475] ? selinux_file_permission+0x2aa/0x510 [ 190.974972][ T4475] tun_chr_write_iter+0x1eb/0x2e0 [ 190.980132][ T4475] vfs_write+0x802/0xf70 [ 190.984400][ T4475] ? file_end_write+0x1b0/0x1b0 [ 190.989274][ T4475] ? __fget_files+0x2c4/0x320 [ 190.993976][ T4475] ? __fdget_pos+0x1f7/0x380 [ 190.998819][ T4475] ? ksys_write+0x71/0x240 [ 191.003893][ T4475] ksys_write+0x140/0x240 [ 191.008253][ T4475] ? __ia32_sys_read+0x90/0x90 [ 191.013242][ T4475] ? debug_smp_processor_id+0x17/0x20 [ 191.019031][ T4475] __x64_sys_write+0x7b/0x90 [ 191.023832][ T4475] x64_sys_call+0x8ef/0x9a0 [ 191.028831][ T4475] do_syscall_64+0x4c/0xa0 [ 191.033546][ T4475] ? clear_bhb_loop+0x50/0xa0 [ 191.038683][ T4475] ? clear_bhb_loop+0x50/0xa0 [ 191.043432][ T4475] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.049357][ T4475] RIP: 0033:0x7f19f1048fc9 [ 191.053960][ T4475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.074289][ T4475] RSP: 002b:00007f19efab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 191.082717][ T4475] RAX: ffffffffffffffda RBX: 00007f19f129ffa0 RCX: 00007f19f1048fc9 [ 191.090699][ T4475] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 191.098803][ T4475] RBP: 00007f19efab1090 R08: 0000000000000000 R09: 0000000000000000 [ 191.106798][ T4475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.114807][ T4475] R13: 00007f19f12a0038 R14: 00007f19f129ffa0 R15: 00007ffe4c30b9a8 [ 191.122997][ T4475] [ 191.596523][ T4492] FAULT_INJECTION: forcing a failure. [ 191.596523][ T4492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.645886][ T4492] CPU: 1 PID: 4492 Comm: syz.4.1540 Tainted: G W syzkaller #0 [ 191.654801][ T4492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 191.665366][ T4492] Call Trace: [ 191.668749][ T4492] [ 191.671697][ T4492] __dump_stack+0x21/0x30 [ 191.676056][ T4492] dump_stack_lvl+0xee/0x150 [ 191.680682][ T4492] ? show_regs_print_info+0x20/0x20 [ 191.686168][ T4492] ? ioctl_has_perm+0x394/0x4d0 [ 191.691063][ T4492] dump_stack+0x15/0x20 [ 191.695258][ T4492] should_fail+0x3c1/0x510 [ 191.699717][ T4492] should_fail_usercopy+0x1a/0x20 [ 191.705317][ T4492] _copy_from_user+0x20/0xd0 [ 191.709983][ T4492] __tun_chr_ioctl+0x1ed/0x1eb0 [ 191.714889][ T4492] ? tun_flow_create+0x320/0x320 [ 191.720120][ T4492] ? mutex_unlock+0x89/0x220 [ 191.725017][ T4492] ? __fget_files+0x2c4/0x320 [ 191.729758][ T4492] tun_chr_ioctl+0x2a/0x40 [ 191.734472][ T4492] ? tun_chr_poll+0x720/0x720 [ 191.739435][ T4492] __se_sys_ioctl+0x121/0x1a0 [ 191.744310][ T4492] __x64_sys_ioctl+0x7b/0x90 [ 191.748924][ T4492] x64_sys_call+0x2f/0x9a0 [ 191.753359][ T4492] do_syscall_64+0x4c/0xa0 [ 191.757782][ T4492] ? clear_bhb_loop+0x50/0xa0 [ 191.762638][ T4492] ? clear_bhb_loop+0x50/0xa0 [ 191.767350][ T4492] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.773451][ T4492] RIP: 0033:0x7ffb09840fc9 [ 191.778047][ T4492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.798581][ T4492] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.807209][ T4492] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 191.815457][ T4492] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000003 [ 191.823635][ T4492] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 191.831835][ T4492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.839996][ T4492] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 191.847986][ T4492] [ 191.861241][ T4473] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.880221][ T4473] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.896267][ T4473] device bridge_slave_0 entered promiscuous mode [ 191.948804][ T4473] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.956534][ T4473] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.965779][ T4473] device bridge_slave_1 entered promiscuous mode [ 193.646792][ T4530] FAULT_INJECTION: forcing a failure. [ 193.646792][ T4530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.669782][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.696780][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.706828][ T4530] CPU: 1 PID: 4530 Comm: syz.0.1553 Tainted: G W syzkaller #0 [ 193.716582][ T4530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 193.727459][ T4530] Call Trace: [ 193.730789][ T4530] [ 193.733895][ T4530] __dump_stack+0x21/0x30 [ 193.738287][ T4530] dump_stack_lvl+0xee/0x150 [ 193.743150][ T4530] ? show_regs_print_info+0x20/0x20 [ 193.748722][ T4530] ? vfs_write+0xc17/0xf70 [ 193.753377][ T4530] dump_stack+0x15/0x20 [ 193.757574][ T4530] should_fail+0x3c1/0x510 [ 193.762050][ T4530] should_fail_usercopy+0x1a/0x20 [ 193.767119][ T4530] _copy_from_user+0x20/0xd0 [ 193.771730][ T4530] __sys_bpf+0x233/0x730 [ 193.776180][ T4530] ? bpf_link_show_fdinfo+0x310/0x310 [ 193.781912][ T4530] ? debug_smp_processor_id+0x17/0x20 [ 193.787700][ T4530] __x64_sys_bpf+0x7c/0x90 [ 193.792166][ T4530] x64_sys_call+0x4b9/0x9a0 [ 193.797096][ T4530] do_syscall_64+0x4c/0xa0 [ 193.802031][ T4530] ? clear_bhb_loop+0x50/0xa0 [ 193.807191][ T4530] ? clear_bhb_loop+0x50/0xa0 [ 193.812399][ T4530] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 193.818767][ T4530] RIP: 0033:0x7ff36e0bffc9 [ 193.823294][ T4530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.843793][ T4530] RSP: 002b:00007ff36cb28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 193.852427][ T4530] RAX: ffffffffffffffda RBX: 00007ff36e316fa0 RCX: 00007ff36e0bffc9 [ 193.860526][ T4530] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 193.868823][ T4530] RBP: 00007ff36cb28090 R08: 0000000000000000 R09: 0000000000000000 [ 193.876908][ T4530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.885585][ T4530] R13: 00007ff36e317038 R14: 00007ff36e316fa0 R15: 00007ffcf5082c28 [ 193.894255][ T4530] [ 193.901020][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.948718][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.006172][ T539] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.013559][ T539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.078123][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.094856][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.167395][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.199169][ T539] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.206413][ T539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.224559][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.238195][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.257804][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.267755][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.277216][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 194.289138][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 194.338166][ T4473] device veth0_vlan entered promiscuous mode [ 194.349909][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.358424][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.375216][ T4473] device veth1_macvtap entered promiscuous mode [ 194.385915][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.402581][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.419781][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.441632][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.454076][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.547204][ T4560] FAULT_INJECTION: forcing a failure. [ 194.547204][ T4560] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 194.564186][ T4560] CPU: 0 PID: 4560 Comm: syz.4.1565 Tainted: G W syzkaller #0 [ 194.573272][ T4560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 194.583791][ T4560] Call Trace: [ 194.587178][ T4560] [ 194.590227][ T4560] __dump_stack+0x21/0x30 [ 194.594586][ T4560] dump_stack_lvl+0xee/0x150 [ 194.599328][ T4560] ? show_regs_print_info+0x20/0x20 [ 194.604636][ T4560] ? 0xffffffffa0028000 [ 194.608801][ T4560] dump_stack+0x15/0x20 [ 194.613068][ T4560] should_fail+0x3c1/0x510 [ 194.617933][ T4560] should_fail_alloc_page+0x55/0x80 [ 194.623423][ T4560] prepare_alloc_pages+0x156/0x600 [ 194.628565][ T4560] ? __alloc_pages_bulk+0xab0/0xab0 [ 194.633870][ T4560] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 194.639696][ T4560] __alloc_pages+0x10a/0x440 [ 194.644389][ T4560] ? prep_new_page+0x110/0x110 [ 194.649455][ T4560] ? sysvec_call_function_single+0x61/0xc0 [ 194.655442][ T4560] pcpu_populate_chunk+0x184/0xcb0 [ 194.660573][ T4560] ? _find_next_bit+0x1b5/0x200 [ 194.665880][ T4560] pcpu_alloc+0xc4d/0x1660 [ 194.670319][ T4560] __alloc_percpu_gfp+0x25/0x30 [ 194.675184][ T4560] bpf_map_alloc_percpu+0xc5/0x150 [ 194.680496][ T4560] array_map_alloc+0x39a/0x6d0 [ 194.685271][ T4560] map_create+0x455/0x21b0 [ 194.689907][ T4560] __sys_bpf+0x2cf/0x730 [ 194.694169][ T4560] ? bpf_link_show_fdinfo+0x310/0x310 [ 194.700368][ T4560] ? debug_smp_processor_id+0x17/0x20 [ 194.705982][ T4560] __x64_sys_bpf+0x7c/0x90 [ 194.710870][ T4560] x64_sys_call+0x4b9/0x9a0 [ 194.715567][ T4560] do_syscall_64+0x4c/0xa0 [ 194.720258][ T4560] ? clear_bhb_loop+0x50/0xa0 [ 194.725127][ T4560] ? clear_bhb_loop+0x50/0xa0 [ 194.729989][ T4560] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 194.735998][ T4560] RIP: 0033:0x7ffb09840fc9 [ 194.740465][ T4560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.760307][ T4560] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 194.768903][ T4560] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 194.777276][ T4560] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 2000000000000000 [ 194.785426][ T4560] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 194.793491][ T4560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 194.801591][ T4560] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 194.809814][ T4560] [ 194.821577][ T4557] device pim6reg1 entered promiscuous mode [ 194.839074][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.847768][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.860155][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.869798][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.876373][ T539] device bridge_slave_1 left promiscuous mode [ 195.882609][ T539] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.890505][ T539] device bridge_slave_0 left promiscuous mode [ 195.896976][ T539] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.905048][ T539] device veth1_macvtap left promiscuous mode [ 195.911258][ T539] device veth0_vlan left promiscuous mode [ 196.532590][ T4585] device syzkaller0 entered promiscuous mode [ 196.812578][ T4603] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.887895][ T4603] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.895604][ T4603] device bridge_slave_0 entered promiscuous mode [ 197.045849][ T4603] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.075829][ T4603] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.083621][ T4603] device bridge_slave_1 entered promiscuous mode [ 201.423116][ T4641] ªªªªªª: renamed from vlan0 [ 201.458064][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.508219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.556841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.593020][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.630958][ T4650] syz.2.1590[4650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.631053][ T4650] syz.2.1590[4650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.701565][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.720838][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.824154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.833287][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.842774][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.850061][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.859367][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.868587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.902668][ T30] audit: type=1400 audit(1761031774.142:143): avc: denied { append } for pid=4653 comm="syz.3.1592" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 201.955544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.033894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.106136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.224657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.276787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.333109][ T4603] device veth0_vlan entered promiscuous mode [ 202.340264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.348648][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.357086][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.364730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.430221][ T4603] device veth1_macvtap entered promiscuous mode [ 202.465749][ T4666] device syzkaller0 entered promiscuous mode [ 202.535362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.546281][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.556345][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.658249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.671221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.680080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.688942][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.856583][ T539] device bridge_slave_1 left promiscuous mode [ 203.862790][ T539] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.881689][ T539] device bridge_slave_0 left promiscuous mode [ 203.888204][ T539] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.898655][ T539] device veth1_macvtap left promiscuous mode [ 203.904937][ T539] device veth0_vlan left promiscuous mode [ 204.790648][ T4711] device syzkaller0 entered promiscuous mode [ 204.808780][ T4696] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.849356][ T4696] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.883958][ T4696] device bridge_slave_0 entered promiscuous mode [ 204.966550][ T4696] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.990887][ T4696] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.027361][ T4696] device bridge_slave_1 entered promiscuous mode [ 205.908603][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.976682][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.141893][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.166686][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.176839][ T539] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.184418][ T539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.201542][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.274628][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.336086][ T539] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.343203][ T539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.350831][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.359443][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.394294][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.414926][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.511222][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.570167][ T4696] device veth0_vlan entered promiscuous mode [ 206.576776][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.585555][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.594542][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.603134][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.636717][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.648252][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.688901][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.703046][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.713422][ T4696] device veth1_macvtap entered promiscuous mode [ 206.772791][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.783131][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.863792][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.921594][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.933622][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.116843][ T394] device bridge_slave_1 left promiscuous mode [ 208.123309][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.131061][ T394] device bridge_slave_0 left promiscuous mode [ 208.137390][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.145322][ T394] device veth1_macvtap left promiscuous mode [ 208.151427][ T394] device veth0_vlan left promiscuous mode [ 208.837635][ T4790] device pim6reg1 entered promiscuous mode [ 208.979446][ T4796] FAULT_INJECTION: forcing a failure. [ 208.979446][ T4796] name failslab, interval 1, probability 0, space 0, times 0 [ 209.095970][ T4796] CPU: 0 PID: 4796 Comm: syz.4.1637 Tainted: G W syzkaller #0 [ 209.104998][ T4796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 209.115406][ T4796] Call Trace: [ 209.118720][ T4796] [ 209.121677][ T4796] __dump_stack+0x21/0x30 [ 209.126042][ T4796] dump_stack_lvl+0xee/0x150 [ 209.130675][ T4796] ? show_regs_print_info+0x20/0x20 [ 209.136092][ T4796] ? avc_has_perm_noaudit+0x2f4/0x460 [ 209.141505][ T4796] dump_stack+0x15/0x20 [ 209.145698][ T4796] should_fail+0x3c1/0x510 [ 209.150162][ T4796] __should_failslab+0xa4/0xe0 [ 209.154977][ T4796] should_failslab+0x9/0x20 [ 209.159687][ T4796] slab_pre_alloc_hook+0x3b/0xe0 [ 209.164775][ T4796] ? __alloc_skb+0xe0/0x740 [ 209.169327][ T4796] kmem_cache_alloc+0x44/0x260 [ 209.174134][ T4796] __alloc_skb+0xe0/0x740 [ 209.178685][ T4796] alloc_skb_with_frags+0xa8/0x620 [ 209.183938][ T4796] sock_alloc_send_pskb+0x853/0x980 [ 209.189170][ T4796] ? is_bpf_text_address+0x177/0x190 [ 209.194764][ T4796] ? __kernel_text_address+0xa0/0x100 [ 209.200197][ T4796] ? sock_kzfree_s+0x60/0x60 [ 209.204936][ T4796] ? stack_trace_save+0x98/0xe0 [ 209.209911][ T4796] tun_get_user+0x4e6/0x33c0 [ 209.214645][ T4796] ? bpf_bprintf_prepare+0x1060/0x13d0 [ 209.220139][ T4796] ? __x64_sys_openat+0x136/0x160 [ 209.225203][ T4796] ? tun_do_read+0x1c40/0x1c40 [ 209.230023][ T4796] ? kstrtouint_from_user+0x1a0/0x200 [ 209.235438][ T4796] ? kstrtol_from_user+0x260/0x260 [ 209.240769][ T4796] ? putname+0x111/0x160 [ 209.245157][ T4796] ? avc_policy_seqno+0x1b/0x70 [ 209.250042][ T4796] ? selinux_file_permission+0x2aa/0x510 [ 209.255726][ T4796] tun_chr_write_iter+0x1eb/0x2e0 [ 209.260945][ T4796] vfs_write+0x802/0xf70 [ 209.265321][ T4796] ? file_end_write+0x1b0/0x1b0 [ 209.270207][ T4796] ? __fget_files+0x2c4/0x320 [ 209.275023][ T4796] ? __fdget_pos+0x1f7/0x380 [ 209.279651][ T4796] ? ksys_write+0x71/0x240 [ 209.284103][ T4796] ksys_write+0x140/0x240 [ 209.288770][ T4796] ? __ia32_sys_read+0x90/0x90 [ 209.293751][ T4796] ? debug_smp_processor_id+0x17/0x20 [ 209.299280][ T4796] __x64_sys_write+0x7b/0x90 [ 209.304034][ T4796] x64_sys_call+0x8ef/0x9a0 [ 209.308573][ T4796] do_syscall_64+0x4c/0xa0 [ 209.313228][ T4796] ? clear_bhb_loop+0x50/0xa0 [ 209.317951][ T4796] ? clear_bhb_loop+0x50/0xa0 [ 209.322773][ T4796] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 209.328844][ T4796] RIP: 0033:0x7ffb09840fc9 [ 209.333293][ T4796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.353025][ T4796] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 209.361714][ T4796] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 209.369725][ T4796] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 209.377752][ T4796] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 209.386055][ T4796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.394240][ T4796] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 209.402259][ T4796] [ 209.625053][ T4794] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.653323][ T4794] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.676073][ T4794] device bridge_slave_0 entered promiscuous mode [ 209.790100][ T4794] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.804087][ T4794] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.812524][ T4794] device bridge_slave_1 entered promiscuous mode [ 210.983786][ T4819] FAULT_INJECTION: forcing a failure. [ 210.983786][ T4819] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 211.065890][ T4819] CPU: 1 PID: 4819 Comm: syz.4.1646 Tainted: G W syzkaller #0 [ 211.074735][ T4819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 211.084835][ T4819] Call Trace: [ 211.088149][ T4819] [ 211.091376][ T4819] __dump_stack+0x21/0x30 [ 211.095828][ T4819] dump_stack_lvl+0xee/0x150 [ 211.100568][ T4819] ? show_regs_print_info+0x20/0x20 [ 211.105813][ T4819] ? stack_trace_save+0x98/0xe0 [ 211.110880][ T4819] dump_stack+0x15/0x20 [ 211.115167][ T4819] should_fail+0x3c1/0x510 [ 211.120138][ T4819] should_fail_alloc_page+0x55/0x80 [ 211.125687][ T4819] prepare_alloc_pages+0x156/0x600 [ 211.131113][ T4819] ? __alloc_pages_bulk+0xab0/0xab0 [ 211.136628][ T4819] __alloc_pages+0x10a/0x440 [ 211.141348][ T4819] ? prep_new_page+0x110/0x110 [ 211.146254][ T4819] kmalloc_order+0x4c/0x160 [ 211.150844][ T4819] ? alloc_skb_with_frags+0xa8/0x620 [ 211.156180][ T4819] kmalloc_order_trace+0x18/0xb0 [ 211.161347][ T4819] __kmalloc_track_caller+0x198/0x2c0 [ 211.167024][ T4819] ? kmem_cache_alloc+0xf7/0x260 [ 211.172109][ T4819] ? alloc_skb_with_frags+0xa8/0x620 [ 211.177576][ T4819] __alloc_skb+0x21a/0x740 [ 211.182044][ T4819] alloc_skb_with_frags+0xa8/0x620 [ 211.187458][ T4819] sock_alloc_send_pskb+0x853/0x980 [ 211.193209][ T4819] ? is_bpf_text_address+0x177/0x190 [ 211.198867][ T4819] ? __kernel_text_address+0xa0/0x100 [ 211.204474][ T4819] ? sock_kzfree_s+0x60/0x60 [ 211.209226][ T4819] ? stack_trace_save+0x98/0xe0 [ 211.214448][ T4819] tun_get_user+0x4e6/0x33c0 [ 211.219062][ T4819] ? __kasan_poison_slab+0x40/0x70 [ 211.224353][ T4819] ? kmem_cache_free+0x100/0x320 [ 211.229311][ T4819] ? __x64_sys_openat+0x136/0x160 [ 211.234413][ T4819] ? x64_sys_call+0x219/0x9a0 [ 211.239390][ T4819] ? tun_do_read+0x1c40/0x1c40 [ 211.244277][ T4819] ? kstrtouint_from_user+0x1a0/0x200 [ 211.249862][ T4819] ? kstrtol_from_user+0x260/0x260 [ 211.255029][ T4819] ? avc_policy_seqno+0x1b/0x70 [ 211.259994][ T4819] ? selinux_file_permission+0x2aa/0x510 [ 211.266289][ T4819] tun_chr_write_iter+0x1eb/0x2e0 [ 211.271524][ T4819] vfs_write+0x802/0xf70 [ 211.275890][ T4819] ? file_end_write+0x1b0/0x1b0 [ 211.280766][ T4819] ? __fget_files+0x2c4/0x320 [ 211.285451][ T4819] ? __fdget_pos+0x1f7/0x380 [ 211.290140][ T4819] ? ksys_write+0x71/0x240 [ 211.294561][ T4819] ksys_write+0x140/0x240 [ 211.299047][ T4819] ? __ia32_sys_read+0x90/0x90 [ 211.304010][ T4819] ? debug_smp_processor_id+0x17/0x20 [ 211.309491][ T4819] __x64_sys_write+0x7b/0x90 [ 211.314333][ T4819] x64_sys_call+0x8ef/0x9a0 [ 211.318953][ T4819] do_syscall_64+0x4c/0xa0 [ 211.323574][ T4819] ? clear_bhb_loop+0x50/0xa0 [ 211.328297][ T4819] ? clear_bhb_loop+0x50/0xa0 [ 211.333121][ T4819] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.339110][ T4819] RIP: 0033:0x7ffb09840fc9 [ 211.343702][ T4819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.363403][ T4819] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 211.372297][ T4819] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 211.380319][ T4819] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 211.388733][ T4819] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 211.396924][ T4819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.404988][ T4819] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 211.413069][ T4819] [ 211.420916][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.428813][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.499675][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.516093][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.525358][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.532533][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.547292][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.560546][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.570073][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.577256][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.585507][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.686403][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.706071][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.778535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.826299][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.873593][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.882410][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.904391][ T4794] device veth0_vlan entered promiscuous mode [ 211.960479][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.970896][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.987953][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.028364][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.092984][ T4794] device veth1_macvtap entered promiscuous mode [ 213.072933][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.086206][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.094635][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.150681][ T4840] device syzkaller0 entered promiscuous mode [ 213.178052][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.189790][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.198815][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.207296][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.402889][ T4847] device sit0 left promiscuous mode [ 213.577383][ T4853] device sit0 entered promiscuous mode [ 215.110782][ T394] device bridge_slave_1 left promiscuous mode [ 215.119061][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.127248][ T394] device bridge_slave_0 left promiscuous mode [ 215.133872][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.178842][ T394] device veth1_macvtap left promiscuous mode [ 215.218637][ T394] device veth0_vlan left promiscuous mode [ 215.861498][ T4864] device sit0 left promiscuous mode [ 215.922217][ T4866] device sit0 entered promiscuous mode [ 216.735716][ T4872] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.765750][ T4872] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.773375][ T4872] device bridge_slave_0 entered promiscuous mode [ 216.823981][ T4872] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.855933][ T4872] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.869876][ T4872] device bridge_slave_1 entered promiscuous mode [ 217.509565][ T4919] FAULT_INJECTION: forcing a failure. [ 217.509565][ T4919] name failslab, interval 1, probability 0, space 0, times 0 [ 217.567263][ T4919] CPU: 1 PID: 4919 Comm: syz.4.1674 Tainted: G W syzkaller #0 [ 217.567474][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.576078][ T4919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 217.576092][ T4919] Call Trace: [ 217.576104][ T4919] [ 217.576112][ T4919] __dump_stack+0x21/0x30 [ 217.576139][ T4919] dump_stack_lvl+0xee/0x150 [ 217.576158][ T4919] ? show_regs_print_info+0x20/0x20 [ 217.594957][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.596713][ T4919] dump_stack+0x15/0x20 [ 217.596740][ T4919] should_fail+0x3c1/0x510 [ 217.629826][ T4919] __should_failslab+0xa4/0xe0 [ 217.634966][ T4919] should_failslab+0x9/0x20 [ 217.639530][ T4919] slab_pre_alloc_hook+0x3b/0xe0 [ 217.644577][ T4919] ? __alloc_file+0x28/0x2a0 [ 217.649297][ T4919] kmem_cache_alloc+0x44/0x260 [ 217.654242][ T4919] __alloc_file+0x28/0x2a0 [ 217.658783][ T4919] alloc_empty_file+0x97/0x180 [ 217.663672][ T4919] alloc_file+0x59/0x540 [ 217.667918][ T4919] alloc_file_pseudo+0x17a/0x1f0 [ 217.672914][ T4919] ? alloc_empty_file_noaccount+0x80/0x80 [ 217.678639][ T4919] ? _raw_spin_lock_bh+0x8e/0xe0 [ 217.683585][ T4919] anon_inode_getfile+0xa6/0x180 [ 217.688536][ T4919] bpf_link_prime+0xf0/0x250 [ 217.693239][ T4919] bpf_raw_tracepoint_open+0x4d4/0x960 [ 217.698706][ T4919] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 217.704431][ T4919] ? vfs_write+0xc17/0xf70 [ 217.708941][ T4919] ? selinux_bpf+0xce/0xf0 [ 217.713637][ T4919] ? security_bpf+0x82/0xa0 [ 217.718157][ T4919] __sys_bpf+0x490/0x730 [ 217.722405][ T4919] ? bpf_link_show_fdinfo+0x310/0x310 [ 217.727882][ T4919] ? debug_smp_processor_id+0x17/0x20 [ 217.733366][ T4919] __x64_sys_bpf+0x7c/0x90 [ 217.737905][ T4919] x64_sys_call+0x4b9/0x9a0 [ 217.742416][ T4919] do_syscall_64+0x4c/0xa0 [ 217.746841][ T4919] ? clear_bhb_loop+0x50/0xa0 [ 217.751727][ T4919] ? clear_bhb_loop+0x50/0xa0 [ 217.756407][ T4919] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.762308][ T4919] RIP: 0033:0x7ffb09840fc9 [ 217.766901][ T4919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.786733][ T4919] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 217.795599][ T4919] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 217.803670][ T4919] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 217.811734][ T4919] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 217.819839][ T4919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.827814][ T4919] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 217.836095][ T4919] [ 217.847121][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.855940][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.864556][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.871889][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.882283][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.891027][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.904027][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.911311][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.958243][ T4917] device sit0 left promiscuous mode [ 218.040265][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.066896][ T4920] device sit0 entered promiscuous mode [ 218.248111][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.260378][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.270887][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.285137][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.305059][ T4872] device veth0_vlan entered promiscuous mode [ 218.412001][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.446625][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.466017][ T4940] FAULT_INJECTION: forcing a failure. [ 219.466017][ T4940] name failslab, interval 1, probability 0, space 0, times 0 [ 219.479408][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.495064][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.503972][ T4940] CPU: 0 PID: 4940 Comm: syz.4.1681 Tainted: G W syzkaller #0 [ 219.513023][ T4940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 219.523637][ T4940] Call Trace: [ 219.526926][ T4940] [ 219.529859][ T4940] __dump_stack+0x21/0x30 [ 219.534472][ T4940] dump_stack_lvl+0xee/0x150 [ 219.539249][ T4940] ? show_regs_print_info+0x20/0x20 [ 219.544558][ T4940] ? security_file_alloc+0x33/0x120 [ 219.549773][ T4940] ? kmem_cache_alloc+0xf7/0x260 [ 219.554722][ T4940] dump_stack+0x15/0x20 [ 219.559071][ T4940] should_fail+0x3c1/0x510 [ 219.563517][ T4940] __should_failslab+0xa4/0xe0 [ 219.568322][ T4940] should_failslab+0x9/0x20 [ 219.573043][ T4940] slab_pre_alloc_hook+0x3b/0xe0 [ 219.578013][ T4940] kmem_cache_alloc_trace+0x48/0x270 [ 219.583444][ T4940] ? bpf_trampoline_update+0x58/0x1270 [ 219.588930][ T4940] bpf_trampoline_update+0x58/0x1270 [ 219.594239][ T4940] ? wait_for_completion_killable_timeout+0x10/0x10 [ 219.601020][ T4940] ? _raw_spin_lock_bh+0x8e/0xe0 [ 219.606012][ T4940] bpf_trampoline_link_prog+0x436/0x640 [ 219.611583][ T4940] bpf_tracing_prog_attach+0x7c7/0xea0 [ 219.617311][ T4940] ? bpf_insn_prepare_dump+0x830/0x830 [ 219.622824][ T4940] ? __fget_files+0x2c4/0x320 [ 219.627653][ T4940] bpf_raw_tracepoint_open+0x667/0x960 [ 219.633227][ T4940] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 219.638969][ T4940] ? vfs_write+0xc17/0xf70 [ 219.643585][ T4940] ? selinux_bpf+0xce/0xf0 [ 219.648176][ T4940] ? security_bpf+0x82/0xa0 [ 219.652701][ T4940] __sys_bpf+0x490/0x730 [ 219.657130][ T4940] ? bpf_link_show_fdinfo+0x310/0x310 [ 219.662514][ T4940] ? debug_smp_processor_id+0x17/0x20 [ 219.667901][ T4940] __x64_sys_bpf+0x7c/0x90 [ 219.672322][ T4940] x64_sys_call+0x4b9/0x9a0 [ 219.676833][ T4940] do_syscall_64+0x4c/0xa0 [ 219.681375][ T4940] ? clear_bhb_loop+0x50/0xa0 [ 219.686165][ T4940] ? clear_bhb_loop+0x50/0xa0 [ 219.690983][ T4940] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.697172][ T4940] RIP: 0033:0x7ffb09840fc9 [ 219.701600][ T4940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.721491][ T4940] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.730109][ T4940] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 219.738272][ T4940] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000011 [ 219.746346][ T4940] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 219.754514][ T4940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.762726][ T4940] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 219.770828][ T4940] [ 219.776572][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.784203][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.811175][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.820243][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.938293][ T4872] device veth1_macvtap entered promiscuous mode [ 220.107655][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.190892][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.206309][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.297706][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.333714][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.466427][ T43] device bridge_slave_1 left promiscuous mode [ 222.473127][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.505945][ T43] device bridge_slave_0 left promiscuous mode [ 222.512433][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.226790][ T43] device veth1_macvtap left promiscuous mode [ 223.232874][ T43] device veth0_vlan left promiscuous mode [ 223.407686][ T4963] device sit0 left promiscuous mode [ 223.437331][ T4970] device sit0 entered promiscuous mode [ 223.738983][ T4971] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.797435][ T4971] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.805233][ T4971] device bridge_slave_0 entered promiscuous mode [ 223.985307][ T4971] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.077669][ T4971] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.096387][ T4971] device bridge_slave_1 entered promiscuous mode [ 225.520798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.598183][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.684999][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.720124][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.755102][ T539] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.762252][ T539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.830992][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.870170][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.906029][ T539] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.913367][ T539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.921596][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.969222][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.032683][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.102830][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.186877][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.247564][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 226.376336][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.457117][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.527173][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.596827][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.642545][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.670377][ T4971] device veth0_vlan entered promiscuous mode [ 226.829841][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.841791][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.856615][ T4971] device veth1_macvtap entered promiscuous mode [ 226.978480][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.026467][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.107185][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.136542][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.116522][ T332] device bridge_slave_1 left promiscuous mode [ 228.123240][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.136328][ T332] device bridge_slave_0 left promiscuous mode [ 228.143156][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.151884][ T332] device veth1_macvtap left promiscuous mode [ 228.158445][ T332] device veth0_vlan left promiscuous mode [ 229.530756][ T5081] FAULT_INJECTION: forcing a failure. [ 229.530756][ T5081] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 229.545493][ T5081] CPU: 1 PID: 5081 Comm: syz.0.1729 Tainted: G W syzkaller #0 [ 229.556129][ T5081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 229.567904][ T5081] Call Trace: [ 229.572057][ T5081] [ 229.575195][ T5081] __dump_stack+0x21/0x30 [ 229.579898][ T5081] dump_stack_lvl+0xee/0x150 [ 229.585164][ T5081] ? show_regs_print_info+0x20/0x20 [ 229.591143][ T5081] dump_stack+0x15/0x20 [ 229.596468][ T5081] should_fail+0x3c1/0x510 [ 229.601299][ T5081] should_fail_alloc_page+0x55/0x80 [ 229.607873][ T5081] prepare_alloc_pages+0x156/0x600 [ 229.613315][ T5081] ? __alloc_pages_bulk+0xab0/0xab0 [ 229.618815][ T5081] __alloc_pages+0x10a/0x440 [ 229.623836][ T5081] ? prep_new_page+0x110/0x110 [ 229.629355][ T5081] ? _raw_spin_lock+0x8e/0xe0 [ 229.634695][ T5081] ? _raw_spin_trylock_bh+0x130/0x130 [ 229.641366][ T5081] ? kasan_check_range+0x16e/0x290 [ 229.647135][ T5081] __get_free_pages+0x10/0x30 [ 229.652295][ T5081] kasan_populate_vmalloc_pte+0x29/0x120 [ 229.659262][ T5081] __apply_to_page_range+0x8cd/0xc70 [ 229.665644][ T5081] ? kasan_populate_vmalloc+0x70/0x70 [ 229.671655][ T5081] ? kasan_populate_vmalloc+0x70/0x70 [ 229.677990][ T5081] apply_to_page_range+0x3b/0x50 [ 229.683056][ T5081] kasan_populate_vmalloc+0x60/0x70 [ 229.688556][ T5081] alloc_vmap_area+0x185c/0x1990 [ 229.693747][ T5081] ? vm_map_ram+0xa70/0xa70 [ 229.698781][ T5081] ? __get_vm_area_node+0x11d/0x350 [ 229.705287][ T5081] __get_vm_area_node+0x14e/0x350 [ 229.711675][ T5081] __vmalloc_node_range+0xdf/0xaf0 [ 229.721463][ T5081] ? htab_map_alloc+0x3c0/0x14f0 [ 229.729041][ T5081] bpf_map_area_alloc+0xd5/0xe0 [ 229.733936][ T5081] ? htab_map_alloc+0x3c0/0x14f0 [ 229.739622][ T5081] htab_map_alloc+0x3c0/0x14f0 [ 229.744922][ T5081] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 229.751389][ T5081] map_create+0x455/0x21b0 [ 229.755956][ T5081] __sys_bpf+0x2cf/0x730 [ 229.761092][ T5081] ? bpf_link_show_fdinfo+0x310/0x310 [ 229.766973][ T5081] ? debug_smp_processor_id+0x17/0x20 [ 229.772657][ T5081] __x64_sys_bpf+0x7c/0x90 [ 229.779046][ T5081] x64_sys_call+0x4b9/0x9a0 [ 229.784838][ T5081] do_syscall_64+0x4c/0xa0 [ 229.789766][ T5081] ? clear_bhb_loop+0x50/0xa0 [ 229.795115][ T5081] ? clear_bhb_loop+0x50/0xa0 [ 229.800412][ T5081] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.806984][ T5081] RIP: 0033:0x7ff36e0bffc9 [ 229.812098][ T5081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.833939][ T5081] RSP: 002b:00007ff36cb28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 229.842416][ T5081] RAX: ffffffffffffffda RBX: 00007ff36e316fa0 RCX: 00007ff36e0bffc9 [ 229.850910][ T5081] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 229.859946][ T5081] RBP: 00007ff36cb28090 R08: 0000000000000000 R09: 0000000000000000 [ 229.868598][ T5081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 229.876807][ T5081] R13: 00007ff36e317038 R14: 00007ff36e316fa0 R15: 00007ffcf5082c28 [ 229.886095][ T5081] [ 229.915952][ T5070] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.924667][ T5070] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.937136][ T5070] device bridge_slave_0 entered promiscuous mode [ 229.944857][ T5070] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.954106][ T5070] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.962829][ T5070] device bridge_slave_1 entered promiscuous mode [ 230.065268][ T5070] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.073350][ T5070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.160384][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.177603][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.231126][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.403901][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.453169][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.526050][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.533454][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.681263][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.735450][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.742593][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.883911][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.978277][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.039699][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.068799][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.832176][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.875948][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.890954][ T5070] device veth0_vlan entered promiscuous mode [ 231.942359][ T5070] device veth1_macvtap entered promiscuous mode [ 231.956298][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.976416][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.986954][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.026446][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.050155][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.144938][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.164319][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.188832][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.206260][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.677567][ T394] device bridge_slave_1 left promiscuous mode [ 233.683823][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.691642][ T394] device bridge_slave_0 left promiscuous mode [ 233.698233][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.706469][ T394] device veth1_macvtap left promiscuous mode [ 233.712679][ T394] device veth0_vlan left promiscuous mode [ 234.336050][ T5146] ref_ctr_offset mismatch. inode: 0x7ca offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 235.159560][ T5163] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.166794][ T5163] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.174440][ T5163] device bridge_slave_0 entered promiscuous mode [ 235.188630][ T5163] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.196112][ T5163] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.204395][ T5163] device bridge_slave_1 entered promiscuous mode [ 235.637753][ T5184] device pim6reg1 entered promiscuous mode [ 235.654750][ T5186] FAULT_INJECTION: forcing a failure. [ 235.654750][ T5186] name failslab, interval 1, probability 0, space 0, times 0 [ 235.668631][ T5186] CPU: 0 PID: 5186 Comm: syz.2.1764 Tainted: G W syzkaller #0 [ 235.677884][ T5186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 235.688580][ T5186] Call Trace: [ 235.691974][ T5186] [ 235.695016][ T5186] __dump_stack+0x21/0x30 [ 235.700099][ T5186] dump_stack_lvl+0xee/0x150 [ 235.704898][ T5186] ? show_regs_print_info+0x20/0x20 [ 235.710346][ T5186] dump_stack+0x15/0x20 [ 235.714570][ T5186] should_fail+0x3c1/0x510 [ 235.719181][ T5186] __should_failslab+0xa4/0xe0 [ 235.724156][ T5186] should_failslab+0x9/0x20 [ 235.728683][ T5186] slab_pre_alloc_hook+0x3b/0xe0 [ 235.733850][ T5186] kmem_cache_alloc_trace+0x48/0x270 [ 235.739683][ T5186] ? device_add+0xbf/0xed0 [ 235.744204][ T5186] device_add+0xbf/0xed0 [ 235.748521][ T5186] ? pm_runtime_init+0x258/0x330 [ 235.754273][ T5186] ? device_initialize+0x1e1/0x420 [ 235.759404][ T5186] netdev_register_kobject+0x179/0x320 [ 235.765498][ T5186] ? raw_notifier_call_chain+0xe9/0x100 [ 235.771066][ T5186] register_netdevice+0xdfa/0x13a0 [ 235.776521][ T5186] ? netif_stacked_transfer_operstate+0x220/0x220 [ 235.784094][ T5186] ? xdp_rxq_info_reg+0xf1/0x320 [ 235.789343][ T5186] ? alloc_netdev_mqs+0x9b8/0xc90 [ 235.794554][ T5186] br_add_bridge+0xa2/0xf0 [ 235.799250][ T5186] br_ioctl_stub+0x345/0x7a0 [ 235.806748][ T5186] ? vfs_write+0xc17/0xf70 [ 235.812746][ T5186] ? br_dev_siocdevprivate+0x1320/0x1320 [ 235.820419][ T5186] ? __kasan_check_write+0x14/0x20 [ 235.827459][ T5186] ? mutex_lock+0x95/0x1a0 [ 235.832919][ T5186] ? wait_for_completion_killable_timeout+0x10/0x10 [ 235.840174][ T5186] ? selinux_file_ioctl+0x377/0x480 [ 235.845606][ T5186] ? br_dev_siocdevprivate+0x1320/0x1320 [ 235.851607][ T5186] sock_ioctl+0x2e8/0x6b0 [ 235.856082][ T5186] ? sock_poll+0x3d0/0x3d0 [ 235.861396][ T5186] ? __fget_files+0x2c4/0x320 [ 235.867019][ T5186] ? security_file_ioctl+0x84/0xa0 [ 235.872502][ T5186] ? sock_poll+0x3d0/0x3d0 [ 235.877042][ T5186] __se_sys_ioctl+0x121/0x1a0 [ 235.881768][ T5186] __x64_sys_ioctl+0x7b/0x90 [ 235.886750][ T5186] x64_sys_call+0x2f/0x9a0 [ 235.891634][ T5186] do_syscall_64+0x4c/0xa0 [ 235.896252][ T5186] ? clear_bhb_loop+0x50/0xa0 [ 235.901200][ T5186] ? clear_bhb_loop+0x50/0xa0 [ 235.906067][ T5186] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 235.912238][ T5186] RIP: 0033:0x7f0b1a230fc9 [ 235.916682][ T5186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.937193][ T5186] RSP: 002b:00007f0b18c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 235.945725][ T5186] RAX: ffffffffffffffda RBX: 00007f0b1a487fa0 RCX: 00007f0b1a230fc9 [ 235.954048][ T5186] RDX: 0000200000000080 RSI: 00000000000089a0 RDI: 000000000000000b [ 235.962562][ T5186] RBP: 00007f0b18c99090 R08: 0000000000000000 R09: 0000000000000000 [ 235.970799][ T5186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.978872][ T5186] R13: 00007f0b1a488038 R14: 00007f0b1a487fa0 R15: 00007fffa11a5408 [ 235.986858][ T5186] [ 236.047403][ T5188] device sit0 left promiscuous mode [ 236.162817][ T5195] device sit0 entered promiscuous mode [ 236.948456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.956888][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.030904][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.066399][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.074807][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.082264][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.141541][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.152215][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.208692][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.236106][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.243803][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.251563][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.260124][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.269248][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.278479][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.317074][ T5232] device wg2 entered promiscuous mode [ 237.366739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.384821][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.435256][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.448878][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.470909][ T5163] device veth0_vlan entered promiscuous mode [ 237.494018][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.502438][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.571523][ T5163] device veth1_macvtap entered promiscuous mode [ 237.598519][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.608667][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.631927][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.357512][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.376176][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.416950][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.452746][ T5248] FAULT_INJECTION: forcing a failure. [ 238.452746][ T5248] name failslab, interval 1, probability 0, space 0, times 0 [ 238.466728][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.477043][ T5248] CPU: 0 PID: 5248 Comm: syz.2.1782 Tainted: G W syzkaller #0 [ 238.486031][ T5248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 238.496759][ T5248] Call Trace: [ 238.500045][ T5248] [ 238.502986][ T5248] __dump_stack+0x21/0x30 [ 238.508065][ T5248] dump_stack_lvl+0xee/0x150 [ 238.513092][ T5248] ? show_regs_print_info+0x20/0x20 [ 238.518804][ T5248] dump_stack+0x15/0x20 [ 238.523558][ T5248] should_fail+0x3c1/0x510 [ 238.528874][ T5248] __should_failslab+0xa4/0xe0 [ 238.533683][ T5248] should_failslab+0x9/0x20 [ 238.538407][ T5248] slab_pre_alloc_hook+0x3b/0xe0 [ 238.543833][ T5248] kmem_cache_alloc_trace+0x48/0x270 [ 238.549450][ T5248] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 238.555525][ T5248] selinux_sk_alloc_security+0x7e/0x1a0 [ 238.561473][ T5248] security_sk_alloc+0x72/0xa0 [ 238.566452][ T5248] sk_prot_alloc+0x108/0x320 [ 238.571050][ T5248] sk_alloc+0x38/0x430 [ 238.575614][ T5248] bpf_prog_test_run_skb+0x24b/0x1150 [ 238.581009][ T5248] ? __kasan_check_write+0x14/0x20 [ 238.586528][ T5248] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 238.592440][ T5248] bpf_prog_test_run+0x3d5/0x620 [ 238.597702][ T5248] ? bpf_prog_query+0x230/0x230 [ 238.602580][ T5248] ? selinux_bpf+0xce/0xf0 [ 238.607119][ T5248] ? security_bpf+0x82/0xa0 [ 238.611728][ T5248] __sys_bpf+0x52c/0x730 [ 238.616093][ T5248] ? bpf_link_show_fdinfo+0x310/0x310 [ 238.621792][ T5248] ? debug_smp_processor_id+0x17/0x20 [ 238.627453][ T5248] __x64_sys_bpf+0x7c/0x90 [ 238.632141][ T5248] x64_sys_call+0x4b9/0x9a0 [ 238.636889][ T5248] do_syscall_64+0x4c/0xa0 [ 238.641591][ T5248] ? clear_bhb_loop+0x50/0xa0 [ 238.646369][ T5248] ? clear_bhb_loop+0x50/0xa0 [ 238.651264][ T5248] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 238.657362][ T5248] RIP: 0033:0x7f0b1a230fc9 [ 238.662572][ T5248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.682569][ T5248] RSP: 002b:00007f0b18c99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 238.691122][ T5248] RAX: ffffffffffffffda RBX: 00007f0b1a487fa0 RCX: 00007f0b1a230fc9 [ 238.699115][ T5248] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 238.707373][ T5248] RBP: 00007f0b18c99090 R08: 0000000000000000 R09: 0000000000000000 [ 238.715621][ T5248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.723993][ T5248] R13: 00007f0b1a488038 R14: 00007f0b1a487fa0 R15: 00007fffa11a5408 [ 238.732269][ T5248] [ 240.196516][ T394] device bridge_slave_1 left promiscuous mode [ 240.203206][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.211526][ T394] device bridge_slave_0 left promiscuous mode [ 240.217777][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.226001][ T394] device veth1_macvtap left promiscuous mode [ 240.232645][ T394] device veth0_vlan left promiscuous mode [ 241.121433][ T5283] FAULT_INJECTION: forcing a failure. [ 241.121433][ T5283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 241.182180][ T5283] CPU: 0 PID: 5283 Comm: syz.0.1795 Tainted: G W syzkaller #0 [ 241.191109][ T5283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 241.201391][ T5283] Call Trace: [ 241.204697][ T5283] [ 241.207658][ T5283] __dump_stack+0x21/0x30 [ 241.212305][ T5283] dump_stack_lvl+0xee/0x150 [ 241.216928][ T5283] ? show_regs_print_info+0x20/0x20 [ 241.222243][ T5283] ? unwind_get_return_address+0x4d/0x90 [ 241.228341][ T5283] ? stack_trace_save+0xe0/0xe0 [ 241.233538][ T5283] dump_stack+0x15/0x20 [ 241.237741][ T5283] should_fail+0x3c1/0x510 [ 241.242185][ T5283] should_fail_alloc_page+0x55/0x80 [ 241.247588][ T5283] prepare_alloc_pages+0x156/0x600 [ 241.252932][ T5283] ? __alloc_pages_bulk+0xab0/0xab0 [ 241.258169][ T5283] ? __kasan_slab_alloc+0xcf/0xf0 [ 241.263414][ T5283] ? __kasan_slab_alloc+0xbd/0xf0 [ 241.268468][ T5283] ? slab_post_alloc_hook+0x4f/0x2b0 [ 241.273788][ T5283] ? alloc_vmap_area+0x17a/0x1990 [ 241.278881][ T5283] __alloc_pages+0x10a/0x440 [ 241.283977][ T5283] ? prep_new_page+0x110/0x110 [ 241.288876][ T5283] __get_free_pages+0x10/0x30 [ 241.293580][ T5283] kasan_populate_vmalloc_pte+0x29/0x120 [ 241.299228][ T5283] __apply_to_page_range+0x8cd/0xc70 [ 241.304802][ T5283] ? kasan_populate_vmalloc+0x70/0x70 [ 241.310492][ T5283] ? kasan_populate_vmalloc+0x70/0x70 [ 241.315892][ T5283] apply_to_page_range+0x3b/0x50 [ 241.321028][ T5283] kasan_populate_vmalloc+0x60/0x70 [ 241.326469][ T5283] alloc_vmap_area+0x185c/0x1990 [ 241.331532][ T5283] ? vm_map_ram+0xa70/0xa70 [ 241.336063][ T5283] ? __get_vm_area_node+0x11d/0x350 [ 241.341288][ T5283] __get_vm_area_node+0x14e/0x350 [ 241.346335][ T5283] __vmalloc_node_range+0xdf/0xaf0 [ 241.352024][ T5283] ? htab_map_alloc+0xb29/0x14f0 [ 241.357589][ T5283] bpf_map_area_alloc+0xd5/0xe0 [ 241.362473][ T5283] ? htab_map_alloc+0xb29/0x14f0 [ 241.367438][ T5283] htab_map_alloc+0xb29/0x14f0 [ 241.372318][ T5283] map_create+0x455/0x21b0 [ 241.376756][ T5283] __sys_bpf+0x2cf/0x730 [ 241.381024][ T5283] ? bpf_link_show_fdinfo+0x310/0x310 [ 241.386674][ T5283] ? debug_smp_processor_id+0x17/0x20 [ 241.392058][ T5283] __x64_sys_bpf+0x7c/0x90 [ 241.396501][ T5283] x64_sys_call+0x4b9/0x9a0 [ 241.401012][ T5283] do_syscall_64+0x4c/0xa0 [ 241.405619][ T5283] ? clear_bhb_loop+0x50/0xa0 [ 241.410322][ T5283] ? clear_bhb_loop+0x50/0xa0 [ 241.415011][ T5283] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 241.420937][ T5283] RIP: 0033:0x7ff36e0bffc9 [ 241.425647][ T5283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.445350][ T5283] RSP: 002b:00007ff36cb28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 241.453889][ T5283] RAX: ffffffffffffffda RBX: 00007ff36e316fa0 RCX: 00007ff36e0bffc9 [ 241.461881][ T5283] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 241.469972][ T5283] RBP: 00007ff36cb28090 R08: 0000000000000000 R09: 0000000000000000 [ 241.478078][ T5283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.486244][ T5283] R13: 00007ff36e317038 R14: 00007ff36e316fa0 R15: 00007ffcf5082c28 [ 241.494330][ T5283] [ 241.587447][ T5272] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.594724][ T5272] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.740854][ T5272] device bridge_slave_0 entered promiscuous mode [ 241.796633][ T5272] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.854484][ T5272] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.865450][ T5272] device bridge_slave_1 entered promiscuous mode [ 242.488828][ T5272] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.496113][ T5272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.503441][ T5272] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.510610][ T5272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.788901][ T5337] FAULT_INJECTION: forcing a failure. [ 242.788901][ T5337] name failslab, interval 1, probability 0, space 0, times 0 [ 242.802590][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.811316][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.830209][ T5337] CPU: 0 PID: 5337 Comm: syz.4.1813 Tainted: G W syzkaller #0 [ 242.839422][ T5337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 242.849853][ T5337] Call Trace: [ 242.853156][ T5337] [ 242.856104][ T5337] __dump_stack+0x21/0x30 [ 242.860467][ T5337] dump_stack_lvl+0xee/0x150 [ 242.865270][ T5337] ? show_regs_print_info+0x20/0x20 [ 242.870576][ T5337] ? __kasan_kmalloc+0xec/0x110 [ 242.875442][ T5337] dump_stack+0x15/0x20 [ 242.879705][ T5337] should_fail+0x3c1/0x510 [ 242.884320][ T5337] __should_failslab+0xa4/0xe0 [ 242.889294][ T5337] should_failslab+0x9/0x20 [ 242.894079][ T5337] slab_pre_alloc_hook+0x3b/0xe0 [ 242.899313][ T5337] ? getname_kernel+0x59/0x2e0 [ 242.904202][ T5337] kmem_cache_alloc+0x44/0x260 [ 242.909007][ T5337] getname_kernel+0x59/0x2e0 [ 242.913799][ T5337] kern_path+0x24/0x1b0 [ 242.917978][ T5337] create_local_trace_uprobe+0xa2/0x6f0 [ 242.923546][ T5337] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 242.928944][ T5337] ? _copy_from_user+0x95/0xd0 [ 242.933734][ T5337] perf_uprobe_init+0xf9/0x1a0 [ 242.938855][ T5337] perf_uprobe_event_init+0xe6/0x180 [ 242.944286][ T5337] perf_try_init_event+0x14a/0x430 [ 242.949415][ T5337] perf_event_alloc+0xedd/0x1a20 [ 242.954461][ T5337] __se_sys_perf_event_open+0x5ae/0x1b80 [ 242.960200][ T5337] ? __kasan_check_write+0x14/0x20 [ 242.965364][ T5337] ? mutex_unlock+0x89/0x220 [ 242.970066][ T5337] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 242.975985][ T5337] ? __ia32_sys_read+0x90/0x90 [ 242.980804][ T5337] __x64_sys_perf_event_open+0xbf/0xd0 [ 242.986377][ T5337] x64_sys_call+0x50d/0x9a0 [ 242.990921][ T5337] do_syscall_64+0x4c/0xa0 [ 242.995453][ T5337] ? clear_bhb_loop+0x50/0xa0 [ 243.000375][ T5337] ? clear_bhb_loop+0x50/0xa0 [ 243.005248][ T5337] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 243.011353][ T5337] RIP: 0033:0x7ffb09840fc9 [ 243.015884][ T5337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.036744][ T5337] RSP: 002b:00007ffb082a9038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 243.045193][ T5337] RAX: ffffffffffffffda RBX: 00007ffb09a97fa0 RCX: 00007ffb09840fc9 [ 243.053386][ T5337] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 243.061486][ T5337] RBP: 00007ffb082a9090 R08: 0000000000000000 R09: 0000000000000000 [ 243.069686][ T5337] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 243.078228][ T5337] R13: 00007ffb09a98038 R14: 00007ffb09a97fa0 R15: 00007ffd11eac1c8 [ 243.086232][ T5337] [ 243.177777][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.185384][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.218996][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.227984][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.236690][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.243993][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.252738][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.263407][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.272518][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.279746][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.290557][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.299543][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.308789][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.318304][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.327149][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.335881][ T30] audit: type=1400 audit(1761031815.572:144): avc: denied { create } for pid=5344 comm="syz.4.1816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 243.355759][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.467465][ T5272] device veth0_vlan entered promiscuous mode [ 243.477788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.489879][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.515239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.599788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.647667][ T5272] device veth1_macvtap entered promiscuous mode [ 243.660424][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.679645][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.696294][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 243.818809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.833000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.852439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.876309][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.566516][ T394] device bridge_slave_1 left promiscuous mode [ 245.572956][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.580999][ T394] device bridge_slave_0 left promiscuous mode [ 245.587510][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.595979][ T394] device veth1_macvtap left promiscuous mode [ 245.602106][ T394] device veth0_vlan left promiscuous mode [ 246.461823][ T5380] FAULT_INJECTION: forcing a failure. [ 246.461823][ T5380] name failslab, interval 1, probability 0, space 0, times 0 [ 246.535858][ T5380] CPU: 0 PID: 5380 Comm: syz.3.1829 Tainted: G W syzkaller #0 [ 246.545736][ T5380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 246.555827][ T5380] Call Trace: [ 246.559220][ T5380] [ 246.563349][ T5380] __dump_stack+0x21/0x30 [ 246.568125][ T5380] dump_stack_lvl+0xee/0x150 [ 246.573379][ T5380] ? show_regs_print_info+0x20/0x20 [ 246.579060][ T5380] dump_stack+0x15/0x20 [ 246.583337][ T5380] should_fail+0x3c1/0x510 [ 246.587871][ T5380] __should_failslab+0xa4/0xe0 [ 246.592850][ T5380] should_failslab+0x9/0x20 [ 246.597847][ T5380] slab_pre_alloc_hook+0x3b/0xe0 [ 246.602929][ T5380] ? __build_skb+0x2d/0x310 [ 246.607828][ T5380] kmem_cache_alloc+0x44/0x260 [ 246.612622][ T5380] __build_skb+0x2d/0x310 [ 246.617532][ T5380] ? __kasan_check_write+0x14/0x20 [ 246.622879][ T5380] build_skb+0x24/0x200 [ 246.627089][ T5380] bpf_prog_test_run_skb+0x279/0x1150 [ 246.632612][ T5380] ? __kasan_check_write+0x14/0x20 [ 246.637867][ T5380] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 246.643772][ T5380] bpf_prog_test_run+0x3d5/0x620 [ 246.648752][ T5380] ? bpf_prog_query+0x230/0x230 [ 246.654025][ T5380] ? selinux_bpf+0xce/0xf0 [ 246.658467][ T5380] ? security_bpf+0x82/0xa0 [ 246.663253][ T5380] __sys_bpf+0x52c/0x730 [ 246.667787][ T5380] ? bpf_link_show_fdinfo+0x310/0x310 [ 246.673638][ T5380] ? debug_smp_processor_id+0x17/0x20 [ 246.679018][ T5380] __x64_sys_bpf+0x7c/0x90 [ 246.684100][ T5380] x64_sys_call+0x4b9/0x9a0 [ 246.689004][ T5380] do_syscall_64+0x4c/0xa0 [ 246.693645][ T5380] ? clear_bhb_loop+0x50/0xa0 [ 246.698355][ T5380] ? clear_bhb_loop+0x50/0xa0 [ 246.703370][ T5380] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.709562][ T5380] RIP: 0033:0x7f19f1048fc9 [ 246.714600][ T5380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.736922][ T5380] RSP: 002b:00007f19efab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 246.745808][ T5380] RAX: ffffffffffffffda RBX: 00007f19f129ffa0 RCX: 00007f19f1048fc9 [ 246.753815][ T5380] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 246.762072][ T5380] RBP: 00007f19efab1090 R08: 0000000000000000 R09: 0000000000000000 [ 246.770500][ T5380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.778704][ T5380] R13: 00007f19f12a0038 R14: 00007f19f129ffa0 R15: 00007ffe4c30b9a8 [ 246.787612][ T5380] [ 249.851396][ T5393] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.859656][ T5393] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.869402][ T5393] device bridge_slave_0 entered promiscuous mode [ 249.876925][ T5393] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.884194][ T5393] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.892475][ T5393] device bridge_slave_1 entered promiscuous mode [ 250.200660][ T5393] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.208594][ T5393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.216225][ T5393] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.223360][ T5393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.536992][ T5432] device sit0 left promiscuous mode [ 250.641363][ T5429] device sit0 entered promiscuous mode [ 250.682746][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.691021][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.700329][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.712763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.961370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.987624][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.026030][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.033585][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.041536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.050702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.059670][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.067308][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.128712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.137346][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.146592][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.154892][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.249726][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.265907][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.324138][ T5393] device veth0_vlan entered promiscuous mode [ 251.349260][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.371183][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.478713][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.506796][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.522458][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.546845][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.571678][ T5393] device veth1_macvtap entered promiscuous mode [ 251.644751][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.655944][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 251.668922][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.729676][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.739541][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=1218 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 252.205770][ T30] audit: type=1400 audit(1761031824.442:145): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14871]" dev="pipefs" ino=14871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 252.939162][ T281] syz-executor (281) used greatest stack depth: 21600 bytes left [ 253.077437][ T394] syzkaller: port 1(erspan0) entered disabled state [ 253.085846][ T394] device erspan0 left promiscuous mode [ 253.091882][ T394] syzkaller: port 1(erspan0) entered disabled state [ 253.189682][ T30] audit: type=1400 audit(1761031825.432:146): avc: denied { read } for pid=5455 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 253.298047][ T394] device bridge_slave_1 left promiscuous mode [ 253.304638][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.313183][ T394] device bridge_slave_0 left promiscuous mode [ 253.320280][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.328909][ T394] device bridge_slave_1 left promiscuous mode [ 253.335283][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.343359][ T394] device bridge_slave_0 left promiscuous mode [ 253.349956][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.358530][ T394] device veth1_macvtap left promiscuous mode [ 253.364770][ T394] device veth0_vlan left promiscuous mode Stopping sshd: stopped /usr/sbin/sshd (pid 192) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 253.505313][ T30] audit: type=1400 audit(1761031825.742:147): avc: denied { search } for pid=5467 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: OK Stopping iptables: [ 253.752135][ T30] audit: type=1400 audit(1761031825.992:148): avc: denied { search } for pid=5481 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK Stopping system [ 253.788595][ T30] audit: type=1400 audit(1761031826.012:149): avc: denied { write } for pid=5481 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 message bus: [ 253.814793][ T30] audit: type=1400 audit(1761031826.012:150): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 253.840424][ T30] audit: type=1400 audit(1761031826.012:151): avc: denied { add_name } for pid=5481 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 253.864433][ T30] audit: type=1400 audit(1761031826.012:152): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done [ 253.891181][ T30] audit: type=1400 audit(1761031826.012:153): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 253.915078][ T30] audit: type=1400 audit(1761031826.012:154): avc: denied { create } for pid=5481 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 killall: can't kill pid 682: No such process [ 254.017517][ T101] udevd (101) used greatest stack depth: 20864 bytes left Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK [ 255.102436][ T394] device bridge_slave_1 left promiscuous mode [ 255.108711][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.117738][ T394] device bridge_slave_0 left promiscuous mode [ 255.124169][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.132829][ T394] device bridge_slave_1 left promiscuous mode [ 255.139496][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.147513][ T394] device bridge_slave_0 left promiscuous mode [ 255.153746][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.162826][ T394] device bridge_slave_1 left promiscuous mode [ 255.169610][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.177337][ T394] device bridge_slave_0 left promiscuous mode [ 255.183879][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.193524][ T394] device veth0_vlan left promiscuous mode [ 255.200809][ T394] device veth0_vlan left promiscuous mode umount: devtmpfs busy - remounted read-only [ 255.375905][ T5501] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. The system is going down NOW! Sent SIGKILL to all processes Requesting system poweroff [ 257.434782][ T5502] kvm: exiting hardware virtualization [ 257.441340][ T5502] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 257.448497][ T5502] ACPI: PM: Preparing to enter system sleep state S5 [ 257.455466][ T5502] reboot: Power down serialport: VM disconnected.